An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems
NASA Astrophysics Data System (ADS)
Vashishtha, Jyoti; Sinha, Aakash
2006-05-01
The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.
TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network.
Ullah, Fasee; Abdullah, Abdul Hanan; Kaiwartya, Omprakash; Cao, Yue
2017-06-01
Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical
An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.
Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien
2010-01-01
We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.
PAD-MAC: Primary User Activity-Aware Distributed MAC for Multi-Channel Cognitive Radio Networks
Ali, Amjad; Piran, Md. Jalil; Kim, Hansoo; Yun, Jihyeok; Suh, Doug Young
2015-01-01
Cognitive radio (CR) has emerged as a promising technology to solve problems related to spectrum scarcity and provides a ubiquitous wireless access environment. CR-enabled secondary users (SUs) exploit spectrum white spaces opportunistically and immediately vacate the acquired licensed channels as primary users (PUs) arrive. Accessing the licensed channels without the prior knowledge of PU traffic patterns causes severe throughput degradation due to excessive channel switching and PU-to-SU collisions. Therefore, it is significantly important to design a PU activity-aware medium access control (MAC) protocol for cognitive radio networks (CRNs). In this paper, we first propose a licensed channel usage pattern identification scheme, based on a two-state Markov model, and then estimate the future idle slots using previous observations of the channels. Furthermore, based on these past observations, we compute the rank of each available licensed channel that gives SU transmission success assessment during the estimated idle slot. Secondly, we propose a PU activity-aware distributed MAC (PAD-MAC) protocol for heterogeneous multi-channel CRNs that selects the best channel for each SU to enhance its throughput. PAD-MAC controls SU activities by allowing them to exploit the licensed channels only for the duration of estimated idle slots and enables predictive and fast channel switching. To evaluate the performance of the proposed PAD-MAC, we compare it with the distributed QoS-aware MAC (QC-MAC) and listen-before-talk MAC schemes. Extensive numerical results show the significant improvements of the PAD-MAC in terms of the SU throughput, SU channel switching rate and PU-to-SU collision rate. PMID:25831084
Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.
Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang
2017-04-10
In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
Energy-efficient boarder node medium access control protocol for wireless sensor networks.
Razaque, Abdul; Elleithy, Khaled M
2014-03-12
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks
Razaque, Abdul; Elleithy, Khaled M.
2014-01-01
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi
Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks
NASA Astrophysics Data System (ADS)
Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie
2008-12-01
Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.
Design and FPGA implementation for MAC layer of Ethernet PON
NASA Astrophysics Data System (ADS)
Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao
2004-04-01
Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.
Operational effectiveness of a Multiple Aquila Control System (MACS)
NASA Technical Reports Server (NTRS)
Brown, R. W.; Flynn, J. D.; Frey, M. R.
1983-01-01
The operational effectiveness of a multiple aquila control system (MACS) was examined under a variety of remotely piloted vehicle (RPV) mission configurations. The set of assumptions and inputs used to form the rules under which a computerized simulation of MACS was run is given. The characteristics that are to govern MACS operations include: the battlefield environment that generates the requests for RPV missions, operating time-lines of the RPV-peculiar equipment, maintenance requirements, and vulnerability to enemy fire. The number of RPV missions and the number of operation days are discussed. Command, control, and communication data rates are estimated by determining how many messages are passed and what information is necessary in them to support ground coordination between MACS sections.
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs
Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos
2015-01-01
In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950
DS-MAC: differential service medium access control design for wireless medical information systems.
Yuan, Xiaojing; Bagga, Sumegha; Shen, Jian; Balakrishnan, M; Benhaddou, D
2008-01-01
The integration of wireless networking technologies with medical information systems (telemedicine) have a significant impact on healthcare services provided to our society. Applications of telemedicine range from personalized medicine to affordable healthcare for underserved population. Though wireless technologies and medical informatics are individually progressing rapidly, wireless networking for healthcare systems is still at a very premature stage. In this paper we first present our open architecture for medical information systems that integrates both wired and wireless networked data acquisition systems. We then present the implementation at the physical layer and differential service MAC design that adapts channel provisioning based on the information criticality. Performance evaluation using analytical modeling and simulation shows that our DS-MAC provides differentiated services for emergency, warning, and normal traffic.
NASA Astrophysics Data System (ADS)
Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung
2010-12-01
This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.
Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks
2007-01-01
Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR
Adaptive low-power listening MAC protocol based on transmission rates.
Hwang, Kwang-il; Yi, Gangman
2014-01-01
Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.
Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Yadav, Rajesh; Varma, Shirshu; Malaviya, N.
2008-05-01
Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.
I-MAC: an incorporation MAC for wireless sensor networks
NASA Astrophysics Data System (ADS)
Zhao, Jumin; Li, Yikun; Li, Dengao; Lin, Xiaojie
2017-11-01
This paper proposes an innovative MAC protocol called I-MAC. Protocol for wireless sensor networks, which combines the advantages of collision tolerance and collision cancellation. The protocol increases the number of antenna in wireless sensor nodes. The purpose is to monitor the occurrence of packet collisions by increasing the number of antenna in real time. The built-in identity structure is used in the frame structure in order to help the sending node to identify the location of the receiving node after a data packet collision is detected. Packets can be recovered from where the conflict occurred. In this way, we can monitor the conflict for a fixed period of time. It can improve the channel utilisation through changing the transmission probability of collision nodes and solve the problem of hidden terminal through collision feedback mechanism. We have evaluated our protocol. Our results show that the throughput of I-MAC is 5 percentage points higher than that of carrier sense multiple access/collision notification. The network utilisation of I-MAC is more than 92%.
Performance Analysis of IEEE 802.15.3 MAC Protocol with Different ACK Polices
NASA Astrophysics Data System (ADS)
Mehta, S.; Kwak, K. S.
The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed, specially, for short range high data rates applications, to coordinate the access to the wireless medium among the competing devices. This paper uses analytical model to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various acknowledgment schemes under different parameters. Also, some important observations are obtained, which can be very useful to the protocol architectures. Finally, we come up with some important research issues to further investigate the possible improvements in the WPAN MAC.
Kim, Sungryul; Yoo, Younghwan
2018-01-26
Medium Access Control (MAC) delay which occurs between the anchor node's transmissions is one of the error sources in underwater localization. In particular, in AUV localization, the MAC delay significantly degrades the ranging accuracy. The Cramer-Rao Low Bound (CRLB) definition theoretically proves that the MAC delay significantly degrades the localization performance. This paper proposes underwater localization combined with multiple access technology to decouple the localization performance from the MAC delay. Towards this goal, we adopt hyperbolic frequency modulation (HFM) signal that provides multiplexing based on its good property, high-temporal correlation. Owing to the multiplexing ability of the HFM signal, the anchor nodes can transmit packets without MAC delay, i.e., simultaneous transmission is possible. In addition, the simulation results show that the simultaneous transmission is not an optional communication scheme, but essential for the localization of mobile object in underwater.
2015-03-26
THE COGNITION OF MULTIAIRCRAFT CONTROL (MAC): COGNITIVE ABILITY PREDICTORS, WORKING MEMORY ...COGNITIVE ABILITY PREDICTORS, WORKING MEMORY , INTERFERENCE, AND ATTENTION CONTROL IN RADIO COMMUNICATION THESIS Presented to the Faculty...UNLIMITED. AFIT-ENV-MS-15-M-205 THE COGNITION OF MULTIAIRCRAFT CONTROL (MAC): COGNITIVE ABILITY PREDICTORS, WORKING MEMORY , INTERFERENCE
2018-01-01
Medium Access Control (MAC) delay which occurs between the anchor node’s transmissions is one of the error sources in underwater localization. In particular, in AUV localization, the MAC delay significantly degrades the ranging accuracy. The Cramer-Rao Low Bound (CRLB) definition theoretically proves that the MAC delay significantly degrades the localization performance. This paper proposes underwater localization combined with multiple access technology to decouple the localization performance from the MAC delay. Towards this goal, we adopt hyperbolic frequency modulation (HFM) signal that provides multiplexing based on its good property, high-temporal correlation. Owing to the multiplexing ability of the HFM signal, the anchor nodes can transmit packets without MAC delay, i.e., simultaneous transmission is possible. In addition, the simulation results show that the simultaneous transmission is not an optional communication scheme, but essential for the localization of mobile object in underwater. PMID:29373518
Performance analysis and improvement of WPAN MAC for home networks.
Mehta, Saurabh; Kwak, Kyung Sup
2010-01-01
The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.
Performance Analysis and Improvement of WPAN MAC for Home Networks
Mehta, Saurabh; Kwak, Kyung Sup
2010-01-01
The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking. PMID:22319274
A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks
Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang
2015-01-01
Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596
Yu, Jeongseok; Park, Laihyuk; Park, Junho; Cho, Sungrae; Keum, Changsup
2016-01-01
Reserving time slots for urgent data, such as life-critical information, seems to be very attractive to guarantee their deadline requirements in wireless body area sensor networks (WBASNs). On the other hand, this reservation imposes a negative impact on performance for the utilization of a channel. This paper proposes a new channel access scheme referred to as the contention over reservation MAC (CoR-MAC) protocol for time-critical services in wireless body area sensor networks. CoR-MAC uses the dual reservation; if the reserved time slots are known to be vacant, other nodes can access the time slots by contention-based reservation to maximize the utilization of a channel and decrease the delay of the data. To measure the effectiveness of the proposed scheme against IEEE 802.15.4 and IEEE 802.15.6, we evaluated their performances with various performance indexes. The CoR-MAC showed 50% to 850% performance improvement in terms of the delay of urgent and time-critical data according to the number of nodes. PMID:27171085
MAC/GMC 4.0 User's Manual: Keywords Manual. Volume 2
NASA Technical Reports Server (NTRS)
Bednarcyk, Brett A.; Arnold, Steven M.
2002-01-01
This document is the second volume in the three volume set of User's Manuals for the Micromechanics Analysis Code with Generalized Method of Cells Version 4.0 (MAC/GMC 4.0). Volume 1 is the Theory Manual, this document is the Keywords Manual, and Volume 3 is the Example Problem Manual. MAC/GMC 4.0 is a composite material and laminate analysis software program developed at the NASA Glenn Research Center. It is based on the generalized method of cells (GMC) micromechanics theory, which provides access to the local stress and strain fields in the composite material. This access grants GMC the ability to accommodate arbitrary local models for inelastic material behavior and various types of damage and failure analysis. MAC/GMC 4.0 has been built around GMC to provide the theory with a user-friendly framework, along with a library of local inelastic, damage, and failure models. Further, applications of simulated thermo-mechanical loading, generation of output results, and selection of architectures to represent the composite material have been automated in MAC/GMC 4.0. Finally, classical lamination theory has been implemented within MAC/GMC 4.0 wherein GMC is used to model the composite material response of each ply. Consequently, the full range of GMC composite material capabilities is available for analysis of arbitrary laminate configurations as well. This volume describes the basic information required to use the MAC/GMC 4.0 software, including a 'Getting Started' section, and an in-depth description of each of the 22 keywords used in the input file to control the execution of the code.
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks
Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah
2012-01-01
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517
An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.
Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah
2012-01-01
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.
Analyzing the effect of routing protocols on media access control protocols in radio networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barrett, C. L.; Drozda, M.; Marathe, A.
2002-01-01
We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.
Alam, Muhammad Mahtab; Ben Hamida, Elyes
2015-09-01
Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.
Aeronautical Mobile Airport Communications System (AeroMACS)
NASA Technical Reports Server (NTRS)
Budinger, James M.; Hall, Edward
2011-01-01
To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.
Modeling MAC layer for powerline communications networks
NASA Astrophysics Data System (ADS)
Hrasnica, Halid; Haidine, Abdelfatteh
2001-02-01
The usage of electrical power distribution networks for voice and data transmission, called Powerline Communications, becomes nowadays more and more attractive, particularly in the telecommunication access area. The most important reasons for that are the deregulation of the telecommunication market and a fact that the access networks are still property of former monopolistic companies. In this work, first we analyze a PLC network and system structure as well as a disturbance scenario in powerline networks. After that, we define a logical structure of the powerline MAC layer and propose the reservation MAC protocols for the usage in the PLC network which provides collision free data transmission. This makes possible better network utilization and realization of QoS guarantees which can make PLC networks competitive to other access technologies.
Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
NASA Astrophysics Data System (ADS)
Tao, Kai; Li, Jing; Sampalli, Srinivas
Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.
IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality
2014-01-01
In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
Uncoordinated MAC for Adaptive Multi Beam Directional Networks: Analysis and Evaluation
2016-08-01
control (MAC) policies for emerging systems that are equipped with fully digital antenna arrays which are capable of adaptive multi-beam directional...Adaptive Beam- forming, Multibeam, Directional Networking, Random Access, Smart Antennas I. INTRODUCTION Fully digital beamforming antenna arrays that...are capable of adaptive multi-beam communications are quickly becoming a reality. These antenna arrays allow users to form multiple simultaneous
A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.
Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen
2016-10-01
In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.
A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks
Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen
2016-01-01
In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime. PMID:27706079
Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong
2013-01-01
Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100
Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong
2013-11-04
Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.
An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks
Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.
2011-01-01
The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826
A Survey of MAC Protocols for Cognitive Radio Body Area Networks.
Bhandari, Sabin; Moh, Sangman
2015-04-20
The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.
Baek, Seungsoo; Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.
Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943
Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm
NASA Astrophysics Data System (ADS)
Brolin Sihite, Alfonso; Hayat Susanti, Bety
2017-10-01
A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.
Scalable Lunar Surface Networks and Adaptive Orbit Access
NASA Technical Reports Server (NTRS)
Wang, Xudong
2015-01-01
Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
A Low-Cost and Energy-Efficient Multiprocessor System-on-Chip for UWB MAC Layer
NASA Astrophysics Data System (ADS)
Xiao, Hao; Isshiki, Tsuyoshi; Khan, Arif Ullah; Li, Dongju; Kunieda, Hiroaki; Nakase, Yuko; Kimura, Sadahiro
Ultra-wideband (UWB) technology has attracted much attention recently due to its high data rate and low emission power. Its media access control (MAC) protocol, WiMedia MAC, promises a lot of facilities for high-speed and high-quality wireless communication. However, these benefits in turn involve a large amount of computational load, which challenges the traditional uniprocessor architecture based implementation method to provide the required performance. However, the constrained cost and power budget, on the other hand, makes using commercial multiprocessor solutions unrealistic. In this paper, a low-cost and energy-efficient multiprocessor system-on-chip (MPSoC), which tackles at once the aspects of system design, software migration and hardware architecture, is presented for the implementation of UWB MAC layer. Experimental results show that the proposed MPSoC, based on four simple RISC processors and shared-memory infrastructure, achieves up to 45% performance improvement and 65% power saving, but takes 15% less area than the uniprocessor implementation.
Romany, Laura; Garrido, Nicolas; Cobo, Ana; Aparicio-Ruiz, Belen; Serra, Vicente; Meseguer, Marcos
2017-02-01
The purpose of this study is to assess outcomes after magnetic-activated cell sorting (MACS) technology on obstetric and perinatal outcomes compared with those achieved after swim up from randomized controlled trial. This is a two-arm, unicentric, prospective, randomized, and triple-blinded trial and has a total of 237 infertile couples, between October 2010 and January 2013. A total of 65 and 66 newborns from MACS and control group, respectively, were described. MACS had no clinically relevant adverse effects on obstetric and perinatal outcomes. No differences were found for obstetric problems including premature rupture of membranes 6.1% (CI95% 0-12.8) vs. 5.9% (CI95% 0-12.4), 1st trimester bleeding 28.6% (CI95% 15.9-41.2) vs. 23.5% (CI95% 11.9-35.1), invasive procedures as amniocentesis 2.0% (CI95% 0-5.9) vs. 3.9% (CI95% 0-9.2), diabetes 14.3% (CI95% 4.5-24.1) vs. 9.8% (CI95% 1.6-17.9), anemia 6.1% (CI95% 0-12.8) vs. 5.9%(CI95% 0-12.4), 2nd and 3rd trimesters 10.2% (CI95% 1.7-18.7) vs. 5.9% (CI95% 0-12.4), urinary tract infection 8.2% (CI95% 0.5-15.9) vs. 3.9% (CI95% 0-9.2), pregnancy-induced hypertension 6.1% (CI95% 0-12.8) vs. 15.7% (CI95% 5.7-25.7), birth weight (g) 2684.10 (CI95% 2499.48-2868.72) vs. 2676.12 (CI95% 2499.02-2852.21), neonatal height (cm) 48.3 (CI95% 47.1-49.4) vs. 46.5 (CI95% 44.6-48.4), and gestational cholestasis 0%(CI95% 0-0) vs. 3.9% (CI95% 0-9.2), respectively, in MACS group compared with control group. Our data suggest that MACS technology does not increase or decrease Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation adverse obstetric and perinatal outcomes in children conceived when this technology was performed, being the largest randomized control trial with live birth reported results with MACS.
EISCAT observations during MAC/SINE and MAC/Epsilon
NASA Technical Reports Server (NTRS)
Roettger, J.; Hoppe, U.-P.; Hall, C.
1989-01-01
The EISCAT incoherent scatter radar facility in Tromsoe, Norway was operated during the MAC/SINE campaign for 78 hours in the period 10 June to 17 July 1987, and during the MAC/Epsilon campaign for 90 hours in the period 15 October to 5 November 1987. The VHF (224 MHz) radar operations during MAC/SINE yielded most interesting observations of strong coherent echoes from the mesopause region. Characteristic data of these polar mesospheric summer echoes are presented. The UHF (933 MHz) radar operations during MAC/Epsilon were done with 18 deg off zenith beam and allows the deduction of meridonal and horizontal wind components as well as radial velocity spectra in addition to the usual electron density profiles in the D and lower E regions. Some results from the VHF and UHF radars indicating the presence of gravity waves are examined.
Liu, Xuemei; Ge, Baofeng
2012-04-01
This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.
Micromechanics Analysis Code (MAC) User Guide: Version 1.0
NASA Technical Reports Server (NTRS)
Wilt, T. E.; Arnold, S. M.
1994-01-01
The ability to accurately predict the thermomechanical deformation response of advanced composite materials continues to play an important role in the development of these strategic materials. Analytical models that predict the effective behavior of composites are used not only by engineers performing structural analysis of large-scale composite components but also by material scientists in developing new material systems. For an analytical model to fulfill these two distinct functions it must be based on a micromechanics approach which utilizes physically based deformation and life constitutive models and allows one to generate the average (macro) response of a composite material given the properties of the individual constituents and their geometric arrangement. Here the user guide for the recently developed, computationally efficient and comprehensive micromechanics analysis code, MAC, who's predictive capability rests entirely upon the fully analytical generalized method of cells, GMC, micromechanics model is described. MAC is a versatile form of research software that 'drives' the double or triple ply periodic micromechanics constitutive models based upon GMC. MAC enhances the basic capabilities of GMC by providing a modular framework wherein (1) various thermal, mechanical (stress or strain control), and thermomechanical load histories can be imposed; (2) different integration algorithms may be selected; (3) a variety of constituent constitutive models may be utilized and/or implemented; and (4) a variety of fiber architectures may be easily accessed through their corresponding representative volume elements.
NASA Astrophysics Data System (ADS)
Pierfederici, F.; Pirzkal, N.; Hook, R. N.
Mac OS X is the new Unix based version of the Macintosh operating system. It combines a high performance DisplayPDF user interface with a standard BSD UNIX subsystem and provides users with simultaneous access to a broad range of applications which were not previously available on a single system such as Microsoft Office and Adobe Photoshop, as well as legacy X11-based scientific tools and packages like IRAF, SuperMongo, MIDAS, etc. The combination of a modern GUI layered on top of a familiar UNIX environment paves the way for new, more flexible and powerful astronomical tools to be developed while assuring compatibility with already existing, older programs. In this paper, we outline the strengths of the Mac OS X platform in a scientific environment, astronomy in particular, and point to the numerous astronomical software packages available for this platform; most notably the Scisoft collection which we have compiled.
A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks
Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad
2017-01-01
Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495
A low power medium access control protocol for wireless medical sensor networks.
Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D
2004-01-01
The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.
Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)-A Survey.
Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D; Meratnia, Nirvana; Havinga, Paul J M
2016-11-29
With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify
MAC/GMC 4.0 User's Manual: Example Problem Manual. Volume 3
NASA Technical Reports Server (NTRS)
Bednarcyk, Brett A.; Arnold, Steven M.
2002-01-01
This document is the third volume in the three volume set of User's Manuals for the Micromechanics Analysis Code with Generalized Method of Cells Version 4.0 (MAC/GMC 4.0). Volume 1 is the Theory Manual, Volume 2 is the Keywords Manual, and this document is the Example Problems Manual. MAC/GMC 4.0 is a composite material and laminate analysis software program developed at the NASA Glenn Research Center. It is based on the generalized method of cells (GMC) micromechanics theory, which provides access to the local stress and strain fields in the composite material. This access grants GMC the ability to accommodate arbitrary local models for inelastic material behavior and various types of damage and failure analysis. MAC/GMC 4.0 has been built around GMC to provide the theory with a user-friendly framework, along with a library of local inelastic, damage, and failure models. Further, application of simulated thermo-mechanical loading, generation of output results, and selection of architectures to represent the composite material, have been automated in MAC/GMC 4.0. Finally, classical lamination theory has been implemented within MAC/GMC 4.0 wherein GMC is used to model the composite material response of each ply. Consequently, the full range of GMC composite material capabilities is available for analysis of arbitrary laminate configurations as well. This volume provides in-depth descriptions of 43 example problems, which were specially designed to highlight many of the most important capabilities of the code. The actual input files associated with each example problem are distributed with the MAC/GMC 4.0 software; thus providing the user with a convenient starting point for their own specialized problems of interest.
An Energy Efficient MAC Protocol for Multi-Hop Swallowable Body Sensor Networks
Lin, Lin; Yang, Chengfeng; Wong, Kai Juan; Yan, Hao; Shen, Junwen; Phee, Soo Jay
2014-01-01
Swallowable body sensor networks (BSNs) are composed of sensors which are swallowed by patients and send the collected data to the outside coordinator. These sensors are energy constraint and the batteries are difficult to be replaced. The medium access control (MAC) protocol plays an important role in energy management. This paper investigates an energy efficient MAC protocol design for swallowable BSNs. Multi-hop communication is analyzed and proved more energy efficient than single-hop communication within the human body when the circuitry power is low. Based on this result, a centrally controlled time slotting schedule is proposed. The major workload is shifted from the sensors to the coordinator. The coordinator collects the path-loss map and calculates the schedules, including routing, slot assignment and transmission power. Sensor nodes follow the schedules to send data in a multi-hop way. The proposed protocol is compared with the IEEE 802.15.6 protocol in terms of energy consumption. The results show that it is more energy efficient than IEEE 802.15.6 for swallowable BSN scenarios. PMID:25330049
Refractory inclusions from the ungrouped carbonaceous chondrites MAC 87300 and MAC 88107
NASA Astrophysics Data System (ADS)
Russell, Sara S.; Davis, Andrew M.; MacPherson, Glenn J.; Guan, Yunbin; Huss, Gary R.
2000-09-01
MAC 87300 and MAC 88107 are two unusual carbonaceous chondrites that are intermediate in chemical composition between the CO3 and CM2 meteorite groups. Calcium-aluminum-rich inclusions (CAIs) from these two meteorites are mostly spinel-pyroxene and melilite-rich (Type A) varieties. Spinel-pyroxene inclusions have either a banded or nodular texture, with aluminous diopside rimming iron-poor spinel. Melilite-rich inclusions (4-42) are irregular in shape and contain minor spinel (FeO <1 wt%), perovskite and, more rarely, hibonite. The CAIs in MAC 88107 and MAC 87300 are similar in primary mineralogy to CAIs from low petrologic grade CO3 meteorites, but differ in that they commonly contain phyllosilicates. The two meteorites also differ somewhat from each other: melilite is more abundant and slightly more aluminum-rich in inclusions from MAC 88107 than in those from MAC 87300, and phyllosilicate is more abundant and magnesium-poor in MAC 87300 CAIs relative to that in MAC 88107. These differences suggest that the two meteorites are not paired. CAI sizes and the abundance of melilite-rich CAIs in MAC 88107 and MAC 87300 suggests a genetic relationship to CO3 meteorites, but the CAIs in both have suffered a greater degree of aqueous alteration than is observed in COs. Al-rich melilite in CAIs from both meteorites generally contains excess 26Mg, presumably from the in situ decay of 26Al. Although well-defined isochrons are not observed, the 26Mg excesses are consistent with initial 26Al/27Al ~3-5 ( 10-5. An unusual hibonite-bearing inclusion is isotopically heterogeneous, with two large and abutting hibonite crystals showing significant differences in their degrees of mass-dependent fractionation of 25Mg/24Mg. The two crystals also show differences in their inferred initial 26Al/27Al, 1 ( 10-5 vs. 3 ( 10-6.
Micromechanics Analysis Code (MAC). User Guide: Version 2.0
NASA Technical Reports Server (NTRS)
Wilt, T. E.; Arnold, S. M.
1996-01-01
The ability to accurately predict the thermomechanical deformation response of advanced composite materials continues to play an important role in the development of these strategic materials. Analytical models that predict the effective behavior of composites are used not only by engineers performing structural analysis of large-scale composite components but also by material scientists in developing new material systems. For an analytical model to fulfill these two distinct functions it must be based on a micromechanics approach which utilizes physically based deformation and life constitutive models and allows one to generate the average (macro) response of a composite material given the properties of the individual constituents and their geometric arrangement. Here the user guide for the recently developed, computationally efficient and comprehensive micromechanics analysis code's (MAC) who's predictive capability rests entirely upon the fully analytical generalized method of cells (GMC), micromechanics model is described. MAC is a versatile form of research software that 'drives' the double or triply periodic micromechanics constitutive models based upon GMC. MAC enhances the basic capabilities of GMC by providing a modular framework wherein (1) various thermal, mechanical (stress or strain control) and thermomechanical load histories can be imposed, (2) different integration algorithms may be selected, (3) a variety of constituent constitutive models may be utilized and/or implemented, and (4) a variety of fiber and laminate architectures may be easily accessed through their corresponding representative volume elements.
NASA Astrophysics Data System (ADS)
Yun, Changho; Kim, Kiseon
2006-04-01
For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.
Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey
Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D.; Meratnia, Nirvana; Havinga, Paul J. M.
2016-01-01
With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify
Transonic Drag Reduction Through Trailing-Edge Blowing on the FAST-MAC Circulation Control Model
NASA Technical Reports Server (NTRS)
Chan, David T.; Jones, Gregory S.; Milholen, William E., II; Goodliff, Scott L.
2017-01-01
A third wind tunnel test of the FAST-MAC circulation control semi-span model was completed in the National Transonic Facility at the NASA Langley Research Center where the model was configured for transonic testing of the cruise configuration with 0deg flap detection to determine the potential for transonic drag reduction with the circulation control blowing. The model allowed independent control of four circulation control plenums producing a high momentum jet from a blowing slot near the wing trailing edge that was directed over a 15% chord simple-hinged ap. Recent upgrades to transonic semi-span flow control testing at the NTF have demonstrated an improvement to overall data repeatability, particularly for the drag measurement, that allows for increased confidence in the data results. The static thrust generated by the blowing slot was removed from the wind-on data using force and moment balance data from wind-o thrust tares. This paper discusses the impact of the trailing-edge blowing to the transonic aerodynamics of the FAST-MAC model in the cruise configuration, where at flight Reynolds numbers, the thrust-removed corrected data showed that an overall drag reduction and increased aerodynamic efficiency was realized as a consequence of the blowing.
TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks
Song, W.-Z.; Huang, R.; Shirazi, B.; LaHusen, R.
2009-01-01
Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and each frame into slots. A parent node determines the children's frame assignment based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. First, given any node, at any time slot, there is at most one active sender in its neighborhood (including itself). Second, the packet scheduling with TreeMAC is bufferless, which therefore minimizes the probability of network congestion. Third, the data throughput to the gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24-node testbed show that TreeMAC protocol significantly improves network throughput, fairness, and energy efficiency compared to TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC. Partial results of this paper were published in Song, Huang, Shirazi and Lahusen [W.-Z. Song, R. Huang, B. Shirazi, and R. Lahusen, TreeMAC: Localized TDMA MAC protocol for high-throughput and fairness in sensor networks, in: The 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom, March 2009]. Our new contributions include analyses of the performance of TreeMAC from various aspects. We also present more implementation detail and evaluate TreeMAC from other aspects. ?? 2009 Elsevier B.V.
Geospatial Multi-Agency Coordination (GeoMAC) wildland fire perimeters, 2008
Walters, Sandra P.; Schneider, Norma J.; Guthrie, John D.
2011-01-01
The Geospatial Multi-Agency Coordination (GeoMAC) has been collecting and storing data on wildland fire perimeters since August 2000. The dataset presented via this U.S. Geological Survey Data Series product contains the GeoMAC wildland fire perimeter data for the calendar year 2008, which are based upon input from incident intelligence sources, Global Positioning System (GPS) data, and infrared (IR) imagery. Wildland fire perimeter data are obtained from the incidents, evaluated for completeness and accuracy, and processed to reflect consistent field names and attributes. After a quality check, the perimeters are loaded to GeoMAC databases, which support the GeoMAC Web application for access by wildland fire managers and the public. The wildland fire perimeters are viewed through the Web application. The data are subsequently archived according to year and state and are made available for downloading through the Internet in shapefile and Keyhole Markup Language (KML) format. These wildland fire perimeter data are also retained for historical, planning, and research purposes. The datasets that pertain to this report can be found on the Rocky Mountain Geographic Science Center HTTP site at http://rmgsc.cr.usgs.gov/outgoing/GeoMAC/historic_fire_data/. The links are also provided on the sidebar.
Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ray, Surjya Sarathi
One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm
Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.
2014-01-01
The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339
TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks
Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.
2009-01-01
Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.
2009-01-01
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.
Mammalian Synthetic Biology: Time for Big MACs.
Martella, Andrea; Pollard, Steven M; Dai, Junbiao; Cai, Yizhi
2016-10-21
The enabling technologies of synthetic biology are opening up new opportunities for engineering and enhancement of mammalian cells. This will stimulate diverse applications in many life science sectors such as regenerative medicine, development of biosensing cell lines, therapeutic protein production, and generation of new synthetic genetic regulatory circuits. Harnessing the full potential of these new engineering-based approaches requires the design and assembly of large DNA constructs-potentially up to chromosome scale-and the effective delivery of these large DNA payloads to the host cell. Random integration of large transgenes, encoding therapeutic proteins or genetic circuits into host chromosomes, has several drawbacks such as risks of insertional mutagenesis, lack of control over transgene copy-number and position-specific effects; these can compromise the intended functioning of genetic circuits. The development of a system orthogonal to the endogenous genome is therefore beneficial. Mammalian artificial chromosomes (MACs) are functional, add-on chromosomal elements, which behave as normal chromosomes-being replicating and portioned to daughter cells at each cell division. They are deployed as useful gene expression vectors as they remain independent from the host genome. MACs are maintained as a single-copy and can accommodate multiple gene expression cassettes of, in theory, unlimited DNA size (MACs up to 10 megabases have been constructed). MACs therefore enabled control over ectopic gene expression and represent an excellent platform to rapidly prototype and characterize novel synthetic gene circuits without recourse to engineering the host genome. This review describes the obstacles synthetic biologists face when working with mammalian systems and how the development of improved MACs can overcome these-particularly given the spectacular advances in DNA synthesis and assembly that are fuelling this research area.
Introduction to MAC CRM training
NASA Technical Reports Server (NTRS)
Brown, Donald D.
1987-01-01
The author introduces the Military Airlift Command (MAC) and its mission. A brief history of Cockpit Resource Management (CRM) as it relates to MAC is given. He also states why MAC is currently interested in CRM.
Modali, Sita D; Zgurskaya, Helen I
2011-08-01
Escherichia coli MacAB-TolC is a tripartite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation of MacB ATPase activity. Binding of MacA to MacB stabilizes the ATP-bound conformation of MacB, whereas interactions with both MacB and TolC affect the conformation of MacA. A single G353A substitution in the C-terminus of MacA inactivates MacAB-TolC function by changing the conformation of the membrane proximal domain of MacA and disrupting the proper assembly of the MacA-MacB complex. We propose that MacA acts in transport by promoting MacB transition into the closed ATP-bound conformation and in this respect, is similar to the periplasmic solute-binding proteins. © 2011 Blackwell Publishing Ltd.
Modali, Sita D.; Zgurskaya, Helen I.
2011-01-01
Escherichia coli MacAB-TolC is a tri-partite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation of MacB ATPase activity. Binding of MacA to MacB stabilizes the ATP-bound conformation of MacB, whereas interactions with both MacB and TolC affect the conformation of MacA. A single G353A substitution in the C-terminus of MacA inactivates MacAB-TolC function by changing the conformation of the membrane proximal domain of MacA and disrupting the proper assembly of the MacA-MacB complex. We propose that MacA acts in transport by promoting MacB transition into the closed ATP-bound conformation and in this respect, is similar to the periplasmic solute-binding proteins. PMID:21696464
MacWilliams Identity for M-Spotty Weight Enumerator
NASA Astrophysics Data System (ADS)
Suzuki, Kazuyoshi; Fujiwara, Eiji
M-spotty byte error control codes are very effective for correcting/detecting errors in semiconductor memory systems that employ recent high-density RAM chips with wide I/O data (e.g., 8, 16, or 32bits). In this case, the width of the I/O data is one byte. A spotty byte error is defined as random t-bit errors within a byte of length b bits, where 1 le t ≤ b. Then, an error is called an m-spotty byte error if at least one spotty byte error is present in a byte. M-spotty byte error control codes are characterized by the m-spotty distance, which includes the Hamming distance as a special case for t =1 or t = b. The MacWilliams identity provides the relationship between the weight distribution of a code and that of its dual code. The present paper presents the MacWilliams identity for the m-spotty weight enumerator of m-spotty byte error control codes. In addition, the present paper clarifies that the indicated identity includes the MacWilliams identity for the Hamming weight enumerator as a special case.
CoCoMac 2.0 and the future of tract-tracing databases
Bakker, Rembrandt; Wachtler, Thomas; Diesmann, Markus
2012-01-01
The CoCoMac database contains the results of several hundred published axonal tract-tracing studies in the macaque monkey brain. The combined results are used for constructing the macaque macro-connectome. Here we discuss the redevelopment of CoCoMac and compare it to six connectome-related projects: two online resources that provide full access to raw tracing data in rodents, a connectome viewer for advanced 3D graphics, a partial but highly detailed rat connectome, a brain data management system that generates custom connectivity matrices, and a software package that covers the complete pipeline from connectivity data to large-scale brain simulations. The second edition of CoCoMac features many enhancements over the original. For example, a search wizard is provided for full access to all tables and their nested dependencies. Connectivity matrices can be computed on demand in a user-selected nomenclature. A new data entry system is available as a preview, and is to become a generic solution for community-driven data entry in manually collated databases. We conclude with the question whether neuronal tracing will remain the gold standard to uncover the wiring of brains, thereby highlighting developments in human connectome construction, tracer substances, polarized light imaging, and serial block-face scanning electron microscopy. PMID:23293600
CoCoMac 2.0 and the future of tract-tracing databases.
Bakker, Rembrandt; Wachtler, Thomas; Diesmann, Markus
2012-01-01
The CoCoMac database contains the results of several hundred published axonal tract-tracing studies in the macaque monkey brain. The combined results are used for constructing the macaque macro-connectome. Here we discuss the redevelopment of CoCoMac and compare it to six connectome-related projects: two online resources that provide full access to raw tracing data in rodents, a connectome viewer for advanced 3D graphics, a partial but highly detailed rat connectome, a brain data management system that generates custom connectivity matrices, and a software package that covers the complete pipeline from connectivity data to large-scale brain simulations. The second edition of CoCoMac features many enhancements over the original. For example, a search wizard is provided for full access to all tables and their nested dependencies. Connectivity matrices can be computed on demand in a user-selected nomenclature. A new data entry system is available as a preview, and is to become a generic solution for community-driven data entry in manually collated databases. We conclude with the question whether neuronal tracing will remain the gold standard to uncover the wiring of brains, thereby highlighting developments in human connectome construction, tracer substances, polarized light imaging, and serial block-face scanning electron microscopy.
NASA Technical Reports Server (NTRS)
Chan, David T.; Milholen, William E., II; Jones, Gregory S.; Goodliff, Scott L.
2014-01-01
A second wind tunnel test of the FAST-MAC circulation control semi-span model was recently completed in the National Transonic Facility at the NASA Langley Research Center. The model allowed independent control of four circulation control plenums producing a high momentum jet from a blowing slot near the wing trailing edge that was directed over a 15% chord simple-hinged flap. The model was configured for transonic testing of the cruise configuration with 0deg flap deflection to determine the potential for drag reduction with the circulation control blowing. Encouraging results from analysis of wing surface pressures suggested that the circulation control blowing was effective in reducing the transonic drag on the configuration, however this could not be quantified until the thrust generated by the blowing slot was correctly removed from the force and moment balance data. This paper will present the thrust removal methodology used for the FAST-MAC circulation control model and describe the experimental measurements and techniques used to develop the methodology. A discussion on the impact to the force and moment data as a result of removing the thrust from the blowing slot will also be presented for the cruise configuration, where at some Mach and Reynolds number conditions, the thrust-removed corrected data showed that a drag reduction was realized as a consequence of the blowing.
Voulgaris, Debra A.; Egger, Christine M.; Seddighi, M. Reza; Rohrbach, Barton W.; Love, Lydia C.; Doherty, Thomas J.
2013-01-01
This study investigated the effects of 70% nitrous oxide (N2O) on the minimum alveolar concentration (MAC) of isoflurane (ISO) that prevents purposeful movement, the MAC of ISO at which there is no motor movement (MACNM), and the MAC of ISO at which autonomic responses are blocked (MACBAR) in dogs. Six adult, healthy, mixed-breed, intact male dogs were anesthetized with ISO delivered via mask. Baseline MAC, MACNM, and MACBAR of ISO were determined for each dog using a supra-maximal electrical stimulus (50 V, 50 Hz, 10 ms). Nitrous oxide (70%) was then administered and MAC and its derivatives (N2O-MAC, N2O-MACNM, and N2O-MACBAR) were determined using the same methodology. The values for baseline MAC, MACNM, and MACBAR were 1.39 ± 0.14, 1.59 ± 0.10, and 1.72 ± 0.16, respectively. The addition of 70% N2O decreased MAC, MACNM, and MACBAR by 32%, 15%, and 25%, respectively. PMID:24082405
Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio
2011-09-01
In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.
SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid
Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin
2016-01-01
The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid. PMID:27043573
SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid.
Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin
2016-03-31
The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.
Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network
NASA Astrophysics Data System (ADS)
Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru
Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.
Monowar, Muhammad Mostafa; Rahman, Md. Obaidur; Hong, Choong Seon; Lee, Sungwon
2010-01-01
Energy conservation is one of the striking research issues now-a-days for power constrained wireless sensor networks (WSNs) and hence, several duty-cycle based MAC protocols have been devised for WSNs in the last few years. However, assimilation of diverse applications with different QoS requirements (i.e., delay and reliability) within the same network also necessitates in devising a generic duty-cycle based MAC protocol that can achieve both the delay and reliability guarantee, termed as multi-constrained QoS, while preserving the energy efficiency. To address this, in this paper, we propose a Multi-constrained QoS-aware duty-cycle MAC for heterogeneous traffic in WSNs (MQ-MAC). MQ-MAC classifies the traffic based on their multi-constrained QoS demands. Through extensive simulation using ns-2 we evaluate the performance of MQ-MAC. MQ-MAC provides the desired delay and reliability guarantee according to the nature of the traffic classes as well as achieves energy efficiency. PMID:22163439
On Proper Selection of Multihop Relays for Future Enhancement of AeroMACS Networks
NASA Technical Reports Server (NTRS)
Kamali, Behnam; Kerczewski, Robert J.; Apaza, Rafael D.
2015-01-01
As the Aeronautical Mobile Airport Communications System (AeroMACS) has evolved from a technology concept to a deployed communications network over major US airports, it is now time to contemplate whether the existing capacity of AeroMACS is sufficient to meet the demands set forth by all fixed and mobile applications over the airport surface given the AeroMACS constraints regarding bandwidth and transmit power. The underlying idea in this article is to present IEEE 802.16j-based WiMAX as a technology that can address future capacity enhancements and therefore is most feasible for AeroMACS applications. The principal argument in favor IEEE 802.16j technology is the flexible and cost effective extension of radio coverage that is afforded by relay fortified networks, with virtually no increase in the power requirements and virtually no rise in interference levels to co-allocated applications. The IEEE 802.16j-based multihop relay systems are briefly described. The focus is on key features of this technology, frame structure, and its architecture. Next, AeroMACS is described as a WiMAX-based wireless network. The two major relay modes supported by IEEE 802.16j amendment, i.e., transparent and non-transparent are described. The benefits of employing multihop relays are listed. Some key challenges related to incorporating relays into AeroMACS networks are discussed. The selection of relay type in a broadband wireless network affects a number of network parameters such as latency, signal overhead, PHY (Scalable Physical Layer) and MAC (Media Access Layer) layer protocols, consequently it can alter key network quantities of throughput and QoS (Quality of Service).
CHANNEL PROTEINS, MUTANT PROKARYOTIC CATION CHANNEL PROTEINS, AND USES THEREOF - MacKinnon, Roderick cation channel proteins, and potentially have uses in treating conditions related to the function of SENSOR DOMAINS OF VOLTAGE-DEPENDENT ION CHANNEL PROTEINS AND USES THEREOF - MacKinnon, Roderick; et. al
Low Duty-Cycling MAC Protocol for Low Data-Rate Medical Wireless Body Area Networks
Zhang, Chongqing; Wang, Yinglong; Liang, Yongquan; Shu, Minglei; Zhang, Jinquan; Ni, Lina
2017-01-01
Wireless body area networks (WBANs) are severely energy constrained, and how to improve the energy efficiency so as to prolong the network lifetime as long as possible is one of the most important goals of WBAN research. Low data-rate WBANs are promising to cut down the energy consumption and extend the network lifetime. Considering the characteristics and demands of low data-rate WBANs, a low duty-cycling medium access control (MAC) protocol is specially designed for this kind of WBAN in this paper. Longer superframes are exploited to cut down the energy consumed on the transmissions and receptions of redundant beacon frames. Insertion time slots are embedded into the inactive part of a superframe to deliver the frames and satisfy the quality of service (QoS) requirements. The number of the data subsections in an insertion time slot can be adaptively adjusted so as to accommodate low data-rate WBANs with different traffic. Simulation results show that the proposed MAC protocol performs well under the condition of low data-rate monitoring traffic. PMID:28509849
AeroMACS System Characterization and Demonstrations
NASA Technical Reports Server (NTRS)
Kerczewski, Robert J.; Apaza, Rafael D.; Dimond, Robert P.
2013-01-01
This The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past 3 years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.
AeroMACS System Characterization and Demonstrations
NASA Technical Reports Server (NTRS)
Kerczewski, Robert J.; Apaza, Rafael D.; Dimond, Robert P.
2013-01-01
The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past three years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.
AeroMACS system characterization and demonstrations
NASA Astrophysics Data System (ADS)
Kerczewski, R. J.; Apaza, R. D.; Dimond, R. P.
This The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past three years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.
NASA Technical Reports Server (NTRS)
Lucas, S. H.; Davis, R. C.
1992-01-01
A user's manual is presented for MacPASCO, which is an interactive, graphic, preprocessor for panel design. MacPASCO creates input for PASCO, an existing computer code for structural analysis and sizing of longitudinally stiffened composite panels. MacPASCO provides a graphical user interface which simplifies the specification of panel geometry and reduces user input errors. The user draws the initial structural geometry and reduces user input errors. The user draws the initial structural geometry on the computer screen, then uses a combination of graphic and text inputs to: refine the structural geometry; specify information required for analysis such as panel load and boundary conditions; and define design variables and constraints for minimum mass optimization. Only the use of MacPASCO is described, since the use of PASCO has been documented elsewhere.
Distributed Multiple Access Control for the Wireless Mesh Personal Area Networks
NASA Astrophysics Data System (ADS)
Park, Moo Sung; Lee, Byungjoo; Rhee, Seung Hyong
Mesh networking technologies for both high-rate and low-rate wireless personal area networks (WPANs) are under development by several standardization bodies. They are considering to adopt distributed TDMA MAC protocols to provide seamless user mobility as well as a good peer-to-peer QoS in WPAN mesh. It has been, however, pointed out that the absence of a central controller in the wireless TDMA MAC may cause a severe performance degradation: e. g., fair allocation, service differentiation, and admission control may be hard to achieve or can not be provided. In this paper, we suggest a new framework of resource allocation for the distributed MAC protocols in WPANs. Simulation results show that our algorithm achieves both a fair resource allocation and flexible service differentiations in a fully distributed way for mesh WPANs where the devices have high mobility and various requirements. We also provide an analytical modeling to discuss about its unique equilibrium and to compute the lengths of reserved time slots at the stable point.
AEROSAT Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Aerosat Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Intelligent Cooperative MAC Protocol for Balancing Energy Consumption
NASA Astrophysics Data System (ADS)
Wu, S.; Liu, K.; Huang, B.; Liu, F.
To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.
Murphy, Kellie E; Hannah, Mary E; Willan, Andrew R; Ohlsson, Arne; Kelly, Edmond N; Matthews, Stephen G; Saigal, Saroj; Asztalos, Elizabeth; Ross, Sue; Delisle, Marie-France; Tomat, Laura; Amankwah, Kofi; Guselle, Patricia; Gafni, Amiram; Lee, Shoo K; Armson, B Anthony
2011-09-01
A single course of antenatal corticosteroids (ACS) is associated with a reduction in respiratory distress syndrome and neonatal death. Multiple Courses of Antenatal Corticosteroids Study (MACS), a study involving 1858 women, was a multicentre randomized placebo-controlled trial of multiple courses of ACS, given every 14 days until 33+6 weeks or birth, whichever came first. The primary outcome of the study, a composite of neonatal mortality and morbidity, was similar for the multiple ACS and placebo groups (12.9% vs. 12.5%), but infants exposed to multiple courses of ACS weighed less, were shorter, and had smaller head circumferences. Thus for women who remain at increased risk of preterm birth, multiple courses of ACS (every 14 days) are not recommended. Chronic use of corticosteroids is associated with numerous side effects including weight gain and depression. The aim of this postpartum assessment was to ascertain if multiple courses of ACS were associated with maternal side effects. Three months postpartum, women who participated in MACS were asked to complete a structured questionnaire that asked about maternal side effects of corticosteroid use during MACS and included the Edinburgh Postnatal Depression Scale. Women were also asked to evaluate their study participation. Of the 1858 women randomized, 1712 (92.1%) completed the postpartum questionnaire. There were no significant differences in the risk of maternal side effects between the two groups. Large numbers of women met the criteria for postpartum depression (14.1% in the ACS vs. 16.0% in the placebo group). Most women (94.1%) responded that they would participate in the trial again. In pregnancy, corticosteroids are given to women for fetal lung maturation and for the treatment of various maternal diseases. In this international multicentre randomized controlled trial, multiple courses of ACS (every 14 days) were not associated with maternal side effects, and the majority of women responded that they
Reflective Database Access Control
ERIC Educational Resources Information Center
Olson, Lars E.
2009-01-01
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
The Mac Internet Tour Guide: Cruising the Internet the Easy Way. [First Edition.
ERIC Educational Resources Information Center
Fraase, Michael
Published exclusively for MacIntosh computer users, this guide provides an overview of Internet resources for new and experienced users. E-mail, file transfer, and decompression software used to access the resources are included on a 800k, 3.5 inch disk. The following chapters are included: (1) "What Is the Internet" covers finding your…
Ullah, Sana; Kwak, Kyung Sup
2012-06-01
Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.
W-MAC: A Workload-Aware MAC Protocol for Heterogeneous Convergecast in Wireless Sensor Networks
Xia, Ming; Dong, Yabo; Lu, Dongming
2011-01-01
The power consumption and latency of existing MAC protocols for wireless sensor networks (WSNs) are high in heterogeneous convergecast, where each sensor node generates different amounts of data in one convergecast operation. To solve this problem, we present W-MAC, a workload-aware MAC protocol for heterogeneous convergecast in WSNs. A subtree-based iterative cascading scheduling mechanism and a workload-aware time slice allocation mechanism are proposed to minimize the power consumption of nodes, while offering a low data latency. In addition, an efficient schedule adjustment mechanism is provided for adapting to data traffic variation and network topology change. Analytical and simulation results show that the proposed protocol provides a significant energy saving and latency reduction in heterogeneous convergecast, and can effectively support data aggregation to further improve the performance. PMID:22163753
ZeroCal: Automatic MAC Protocol Calibration
NASA Astrophysics Data System (ADS)
Meier, Andreas; Woehrle, Matthias; Zimmerling, Marco; Thiele, Lothar
Sensor network MAC protocols are typically configured for an intended deployment scenario once and for all at compile time. This approach, however, leads to suboptimal performance if the network conditions deviate from the expectations. We present ZeroCal, a distributed algorithm that allows nodes to dynamically adapt to variations in traffic volume. Using ZeroCal, each node autonomously configures its MAC protocol at runtime, thereby trying to reduce the maximum energy consumption among all nodes. While the algorithm is readily usable for any asynchronous low-power listening or low-power probing protocol, we validate and demonstrate the effectiveness of ZeroCal on X-MAC. Extensive testbed experiments and simulations indicate that ZeroCal quickly adapts to traffic variations. We further show that ZeroCal extends network lifetime by 50% compared to an optimal configuration with identical and static MAC parameters at all nodes.
Lu, Shuo; Zgurskaya, Helen I
2013-11-01
The Escherichia coli MacAB-TolC transporter has been implicated in efflux of macrolide antibiotics and secretion of enterotoxin STII. In this study, we found that purified MacA, a periplasmic membrane fusion protein, contains one tightly bound rough core lipopolysaccharide (R-LPS) molecule per MacA molecule. R-LPS was bound specifically to MacA protein with affinity exceeding that of polymyxin B. Sequence analyses showed that MacA contains two high-density clusters of positively charged amino acid residues located in the cytoplasmic N-terminal domain and the periplasmic C-terminal domain. Substitutions in the C-terminal cluster reducing the positive-charge density completely abolished binding of R-LPS. At the same time, these substitutions significantly reduced the functionality of MacA in the protection of E. coli against macrolides in vivo and in the in vitro MacB ATPase stimulation assays. Taken together, our results suggest that R-LPS or a similar glycolipid is a physiological substrate of MacAB-TolC.
MAC reduction of isoflurane by sufentanil.
Brunner, M D; Braithwaite, P; Jhaveri, R; McEwan, A I; Goodman, D K; Smith, L R; Glass, P S
1994-01-01
We have shown previously that a plasma fentanyl concentration of 1.67 ng ml-1 reduced the MAC of isoflurane by 50%. By comparing equal degrees of MAC reduction by sufentanil, we may determine the potency ratio of these opioids. Seventy-six patients were allocated randomly to receive predetermined infusions of sufentanil, and end-tidal concentrations of isoflurane in oxygen. Blood samples were obtained 10 min after the start of the infusion, and just before and after skin incision. Any purposeful movement by the patient was recorded. The MAC reduction of isoflurane produced by sufentanil was obtained using a logistic regression model. A sufentanil plasma concentration of 0.145 ng ml-1 (95% confidence limits 0.04, 0.26 ng ml-1) resulted in a 50% reduction in the MAC of isoflurane. At a plasma concentration greater than 0.5 ng ml-1, sufentanil exhibited a ceiling effect.
Lu, Shuo
2013-01-01
The Escherichia coli MacAB-TolC transporter has been implicated in efflux of macrolide antibiotics and secretion of enterotoxin STII. In this study, we found that purified MacA, a periplasmic membrane fusion protein, contains one tightly bound rough core lipopolysaccharide (R-LPS) molecule per MacA molecule. R-LPS was bound specifically to MacA protein with affinity exceeding that of polymyxin B. Sequence analyses showed that MacA contains two high-density clusters of positively charged amino acid residues located in the cytoplasmic N-terminal domain and the periplasmic C-terminal domain. Substitutions in the C-terminal cluster reducing the positive-charge density completely abolished binding of R-LPS. At the same time, these substitutions significantly reduced the functionality of MacA in the protection of E. coli against macrolides in vivo and in the in vitro MacB ATPase stimulation assays. Taken together, our results suggest that R-LPS or a similar glycolipid is a physiological substrate of MacAB-TolC. PMID:23974027
Installation Restoration Program Records Search for MacDill Air Force Base, Florida.
1982-06-01
in Jun 1981 to identify the potential for contamination resulting from past disposal practices. On 26-27 Jan 82, representatives of USAF OEHL, AFESC...13 May 1979 8 Major Plant Communities at MacDill AFB III - 15 9 Location Map of Possible Contaminated Areas at IV - 21 MacDill AFB 10 Historical...RCRA) and implementing regulations. The purpose of the DOD policy is to control the migration of hazardous material contaminants from DOD
Dejean, Laurent M.; Martinez-Caballero, Sonia; Guo, Liang; Hughes, Cynthia; Teijido, Oscar; Ducret, Thomas; Ichas, François; Korsmeyer, Stanley J.; Antonsson, Bruno; Jonas, Elizabeth A.; Kinnally, Kathleen W.
2005-01-01
Bcl-2 family proteins regulate apoptosis, in part, by controlling formation of the mitochondrial apoptosis-induced channel (MAC), which is a putative cytochrome c release channel induced early in the intrinsic apoptotic pathway. This channel activity was never observed in Bcl-2–overexpressing cells. Furthermore, MAC appears when Bax translocates to mitochondria and cytochrome c is released in cells dying by intrinsic apoptosis. Bax is a component of MAC of staurosporine-treated HeLa cells because MAC activity is immunodepleted by Bax antibodies. MAC is preferentially associated with oligomeric, not monomeric, Bax. The single channel behavior of recombinant oligomeric Bax and MAC is similar. Both channel activities are modified by cytochrome c, consistent with entrance of this protein into the pore. The mean conductance of patches of mitochondria isolated after green fluorescent protein-Bax translocation is significantly higher than those from untreated cells, consistent with onset of MAC activity. In contrast, the mean conductance of patches of mitochondria indicates MAC activity is present in apoptotic cells deficient in Bax but absent in apoptotic cells deficient in both Bax and Bak. These findings indicate Bax is a component of MAC in staurosporine-treated HeLa cells and suggest Bax and Bak are functionally redundant as components of MAC. PMID:15772159
A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol
NASA Technical Reports Server (NTRS)
Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton
2005-01-01
Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.
MacIntyre, Rival Traditions and Education
ERIC Educational Resources Information Center
Stolz, Steven A.
2016-01-01
This paper critically discusses MacIntyre's thesis that education is essentially a contested concept. In order to contextualise my discussion, I discuss both whether rival educational traditions of education found in MacIntyre's work--which I refer to as instrumental and non-instrumental justifications of education--can be rationally resolved…
A Very Low Power MAC (VLPM) Protocol for Wireless Body Area Networks
Ullah, Niamat; Khan, Pervez; Kwak, Kyung Sup
2011-01-01
Wireless Body Area Networks (WBANs) consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient’s movements. They are an easy and fast way to diagnose the patient’s status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM) based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit) along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator)] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node’s ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B-MAC and X-MAC in
A Reconfigurable Design and Architecture of the Ethernet and HomePNA3.0 MAC
NASA Astrophysics Data System (ADS)
Khalilydermany, M.; Hosseinghadiry, M.
In this paper a reconfigurable architecture for Ethernet and HomePNA MAC is presented. By using this new architecture, Ethernet and HomePNA reconfigurable network card can be produced. This architecture has been implemented using VHDL language and after that synthesized on a chip. The differences between HomePNA (synchronized and unsynchronized mode) and Ethernet in collision detection mechanism and priority access to media have caused the need to separate architectures for Ethernet and HomePNA, but by using similarities of them, both the Ethernet and the HomePNA can be implemented in a single chip with a little extra hardware. The number of logical elements of the proposed architecture is increased by 19% in compare to when only an Ethernet MAC is implemented
Micromechanics Analysis Code With Generalized Method of Cells (MAC/GMC): User Guide. Version 3
NASA Technical Reports Server (NTRS)
Arnold, S. M.; Bednarcyk, B. A.; Wilt, T. E.; Trowbridge, D.
1999-01-01
The ability to accurately predict the thermomechanical deformation response of advanced composite materials continues to play an important role in the development of these strategic materials. Analytical models that predict the effective behavior of composites are used not only by engineers performing structural analysis of large-scale composite components but also by material scientists in developing new material systems. For an analytical model to fulfill these two distinct functions it must be based on a micromechanics approach which utilizes physically based deformation and life constitutive models and allows one to generate the average (macro) response of a composite material given the properties of the individual constituents and their geometric arrangement. Here the user guide for the recently developed, computationally efficient and comprehensive micromechanics analysis code, MAC, who's predictive capability rests entirely upon the fully analytical generalized method of cells, GMC, micromechanics model is described. MAC/ GMC is a versatile form of research software that "drives" the double or triply periodic micromechanics constitutive models based upon GMC. MAC/GMC enhances the basic capabilities of GMC by providing a modular framework wherein 1) various thermal, mechanical (stress or strain control) and thermomechanical load histories can be imposed, 2) different integration algorithms may be selected, 3) a variety of material constitutive models (both deformation and life) may be utilized and/or implemented, and 4) a variety of fiber architectures (both unidirectional, laminate and woven) may be easily accessed through their corresponding representative volume elements contained within the supplied library of RVEs or input directly by the user, and 5) graphical post processing of the macro and/or micro field quantities is made available.
On Searching Available Channels with Asynchronous MAC-Layer Spectrum Sensing
NASA Astrophysics Data System (ADS)
Jiang, Chunxiao; Ma, Xin; Chen, Canfeng; Ma, Jian; Ren, Yong
Dynamic spectrum access has become a focal issue recently, in which identifying the available spectrum plays a rather important role. Lots of work has been done concerning secondary user (SU) synchronously accessing primary user's (PU's) network. However, on one hand, SU may have no idea about PU's communication protocols; on the other, it is possible that communications among PU are not based on synchronous scheme at all. In order to address such problems, this paper advances a strategy for SU to search available spectrums with asynchronous MAC-layer sensing. With this method, SUs need not know the communication mechanisms in PU's network when dynamically accessing. We will focus on four aspects: 1) strategy for searching available channels; 2) vacating strategy when PUs come back; 3) estimation of channel parameters; 4) impact of SUs' interference on PU's data rate. The simulations show that our search strategy not only can achieve nearly 50% less interference probability than equal allocation of total search time, but also well adapts to time-varying channels. Moreover, access by our strategies can attain 150% more access time than random access. The moment matching estimator shows good performance in estimating and tracing time-varying channels.
Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif
2012-01-01
The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the “transmit-whenever-appropriate” principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposed to ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency. PMID:23202224
Introduction to MacDraft. High-Technology Training Module.
ERIC Educational Resources Information Center
Traxler, Gene
This training module on MacDraft is part of a computer drafting skills unit on communications technology for grades 9-12. The objective is for each student to complete a drawing on the MacIntosh computer using the MacDraft software program. This drawing is to be dimensioned with a dual system and is to include a border and title block. This module…
Malcolm MacLachlan: International Humanitarian Award.
2014-11-01
The International Humanitarian Award recognizes extraordinary humanitarian services and activism by psychologists, including professional and volunteer work conducted primarily in the field with under-served populations. Award recipients are psychologists who, by their extraordinary service at a difficult time, improve the lives and contribute to the well-being of people in a large or small geographic area anywhere in the world. The 2014 recipient is Malcolm MacLachlan. "Focused on the rights and empowerment of vulnerable and marginalized groups, Malcolm MacLachlan's work synthesizes health, rehabilitation, and organizational and political psychology to promote social inclusion and global health." MacLachlan's award citation, biography, and selected bibliography are presented here. PsycINFO Database Record (c) 2014 APA, all rights reserved.
Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul
2011-04-15
Macrolide-specific efflux pump MacAB-TolC has been identified in diverse gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel.
Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul
2011-01-01
Macrolide-specific efflux pump MacAB-TolC has been identified in diverse Gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel. PMID:21325274
Force Base, Fla., May 22, 2018. Police Week is a national observance that pays tribute to the law rescue 5 in Tampa Bay Law Day 2018 MacDill Captain discovers endless possibilities MacDill hosts Sexual ., May 22, 2018. Police Week is a national observance that pays tribute to the law enforcement officers
Papadaki, Amalia; Politou, Anastasia S; Smirlis, Despina; Kotini, Maria P; Kourou, Konstadina; Papamarcaki, Thomais; Boleti, Haralabia
2015-05-01
Acid ecto-phosphatase activity has been implicated in Leishmania donovani promastigote virulence. In the present study, we report data contributing to the molecular/structural and functional characterization of the L. donovani LdMAcP (L. donovani membrane acid phosphatase), member of the histidine acid phosphatase (HAcP) family. LdMAcP is membrane-anchored and shares high sequence identity with the major secreted L. donovani acid phosphatases (LdSAcPs). Sequence comparison of the LdMAcP orthologues in Leishmania sp. revealed strain polymorphism and species specificity for the L. donovani complex, responsible for visceral leishmaniasis (Khala azar), proposing thus a potential value of LdMAcP as an epidemiological or diagnostic tool. The extracellular orientation of the LdMAcP catalytic domain was confirmed in L. donovani promastigotes, wild-type (wt) and transgenic overexpressing a recombinant LdMAcP-mRFP1 (monomeric RFP1) chimera, as well as in transiently transfected mammalian cells expressing rLdMAcP-His. For the first time it is demonstrated in the present study that LdMAcP confers tartrate resistant acid ecto-phosphatase activity in live L. donovani promastigotes. The latter confirmed the long sought molecular identity of at least one enzyme contributing to this activity. Interestingly, the L. donovani rLdMAcP-mRFP1 promastigotes generated in this study, showed significantly higher infectivity and virulence indexes than control parasites in the infection of J774 mouse macrophages highlighting thereby a role for LdMAcP in the parasite's virulence.
Planning for MacArthur: Harnessing the Complexity of Postwar Japan
2014-05-22
change in Japan’s education system, facilitated religious tolerance and strictly controlled information through censorship and targeted information...system, facilitated religious tolerance and strictly controlled information through censorship and targeted information operations. Although many...Supreme Commander for the Allied Powers, it is clear that operational planners on MacArthur’s staff used the principles of understanding the
Fonseca, Rochele Paz; Fachel, Jandyra Maria Guimarães; Chaves, Márcia Lorena Fagundes; Liedtke, Francéia Veiga; Parente, Maria Alice de Mattos Pimenta
2007-01-01
Right-brain-damaged individuals may present discursive, pragmatic, lexical-semantic and/or prosodic disorders. To verify the effect of right hemisphere damage on communication processing evaluated by the Brazilian version of the Protocole Montréal d'Évaluation de la Communication (Montreal Communication Evaluation Battery) - Bateria Montreal de Avaliação da Comunicação, Bateria MAC, in Portuguese. A clinical group of 29 right-brain-damaged participants and a control group of 58 non-brain-damaged adults formed the sample. A questionnaire on sociocultural and health aspects, together with the Brazilian MAC Battery was administered. Significant differences between the clinical and control groups were observed in the following MAC Battery tasks: conversational discourse, unconstrained, semantic and orthographic verbal fluency, linguistic prosody repetition, emotional prosody comprehension, repetition and production. Moreover, the clinical group was less homogeneous than the control group. A right-brain-damage effect was identified directly, on three communication processes: discursive, lexical-semantic and prosodic processes, and indirectly, on pragmatic process.
Improving School Access Control
ERIC Educational Resources Information Center
National Clearinghouse for Educational Facilities, 2008
2008-01-01
Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…
Agoritsas, Thomas; Iserman, Emma; Hobson, Nicholas; Cohen, Natasha; Cohen, Adam; Roshanov, Pavel S; Perez, Miguel; Cotoi, Chris; Parrish, Rick; Pullenayegum, Eleanor; Wilczynski, Nancy L; Iorio, Alfonso; Haynes, R Brian
2014-09-20
Finding current best evidence for clinical decisions remains challenging. With 3,000 new studies published every day, no single evidence-based resource provides all answers or is sufficiently updated. McMaster Premium LiteratUre Service--Federated Search (MacPLUS FS) addresses this issue by looking in multiple high quality resources simultaneously and displaying results in a one-page pyramid with the most clinically useful at the top. Yet, additional logistical and educational barriers need to be addressed to enhance point-of-care evidence retrieval. This trial seeks to test three innovative interventions, among clinicians registered to MacPLUS FS, to increase the quantity and quality of searching for current best evidence to answer clinical questions. In a user-centered approach, we designed three interventions embedded in MacPLUS FS: (A) a web-based Clinical Question Recorder; (B) an Evidence Retrieval Coach composed of eight short educational videos; (C) an Audit, Feedback and Gamification approach to evidence retrieval, based on the allocation of 'badges' and 'reputation scores.' We will conduct a randomized factorial controlled trial among all the 904 eligible medical doctors currently registered to MacPLUS FS at the hospitals affiliated with McMaster University, Canada. Postgraduate trainees (n=429) and clinical faculty/staff (n=475) will be randomized to each of the three following interventions in a factorial design (AxBxC). Utilization will be continuously recorded through clinicians’ accounts that track logins and usage, down to the level of individual keystrokes. The primary outcome is the rate of searches per month per user during the six months of follow-up. Secondary outcomes, measured through the validated Impact Assessment Method questionnaire, include: utility of answers found (meeting clinicians’ information needs), use (application in practice), and perceived usefulness on patient outcomes. Built on effective models for the point
Efficient Access Control in Multimedia Social Networks
NASA Astrophysics Data System (ADS)
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
Hein, Irma M; Troost, Pieter W; Lindeboom, Robert; Benninga, Marc A; Zwaan, C Michel; van Goudoever, Johannes B; Lindauer, Ramón J L
2014-12-01
An objective assessment of children's competence to consent to research participation is currently not possible. Age limits for asking children's consent vary considerably between countries, and, to our knowledge, the correlation between competence and children's age has never been systematically investigated. To test a standardized competence assessment instrument for children by modifying the MacArthur Competence Assessment Tool for Clinical Research (MacCAT-CR), to investigate its reliability and validity, and to examine the correlation of its assessment with age and estimate cutoff ages. This prospective study included children and adolescents aged 6 to 18 years in the inpatient and outpatient departments of allergology, gastroenterology, oncology, ophthalmology, and pulmonology from January 1, 2012, through January 1, 2014. Participants were eligible for clinical research studies, including observational studies and randomized clinical trials. Competence judgments by experts aware of the 4 relevant criteria-understanding, appreciation, reasoning, and choice-were used to establish the reference standard. The index test was the MacCAT-CR, which used a semistructured interview format. Interrater reliability, validity, and dimensionality of the MacCAT-CR and estimated cutoff ages for competence. Of 209 eligible patients, we included 161 (mean age, 10.6 years; 47.2% male). Good reproducibility of MacCAT-CR total and subscale scores was observed (intraclass correlation coefficient range, 0.68-0.92). We confirmed unidimensionality of the MacCAT-CR. By the reference standard, we judged 54 children (33.5%) to be incompetent; by the MacCAT-CR, 61 children (37.9%). Criterion-related validity of MacCAT-CR scores was supported by high overall accuracy in correctly classifying children as competent against the reference standard (area under the receiver operating characteristics curve, 0.78). Age was a good predictor of competence on the MacCAT-CR (area under the receiver
A service-oriented data access control model
NASA Astrophysics Data System (ADS)
Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali
2017-01-01
The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.
Paired lunar meteorites MAC88104 and MAC88105 - A new 'FAN' of lunar petrology
NASA Astrophysics Data System (ADS)
Neal, Clive R.; Taylor, Lawrence A.; Lui, Yun-Gang; Schmitt, Roman A.
1991-11-01
To determine the chemical characteristics of the MAC88104/5 meteorite six thin sections and three bulk samples were analyzed by electron microprobe and instrumental neutron activation. It is concluded that this meteorite is dominated by lithologies of the ferroan anorthosite suite and contains abundant granulitized highland clasts, devitrified glass beads of impact origin, and two small clasts of basaltic origin. It is suggested that one of these basaltic clasts, clast E, is mesostasis material, and clast G is similar to the very low-Ti or low-Ti/high-alumina mare basalts. Impact melt clasts MAC88105, 69, and 72 have major and trace element compositions similar to the bulk meteorite.
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
Considerations for Improving the Capacity and Performance of AeroMACS
NASA Technical Reports Server (NTRS)
Kerczewski, Robert J.; Kamali, Behnam; Apaza, Rafael D.; Wilson, Jeffrey D.; Dimond, Robert P.
2014-01-01
The Aeronautical Mobile Airport Communications System (AeroMACS) has progressed from concept through prototype development, testing, and standards development and is now poised for the first operational deployments at nine US airports by the Federal Aviation Administration. These initial deployments will support fixed applications. Mobile applications providing connectivity to and from aircraft and ground-based vehicles on the airport surface will occur at some point in the future. Given that many fixed applications are possible for AeroMACS, it is necessary to now consider whether the existing capacity of AeroMACS will be reached even before the mobile applications are ready to be added, since AeroMACS is constrained by both available bandwidth and transmit power limitations. This paper describes some concepts that may be applied to improve the future capacity of AeroMACS, with a particular emphasis on gains that can be derived from the addition of IEEE 802.16j multihop relays to the AeroMACS standard, where a significant analysis effort has been undertaken.
Alvarez Marrodán, Ignacio; Baón Pérez, Beatriz; Navío Acosta, Mercedes; López-Antón, Raul; Lobo Escolar, Elena; Ventura Faci, Tirso
2014-09-09
To validate the MacArthur Competence Assessment Tool for Treatment (MacCAT-T) Spanish version, which assesses the mental capacity of patients to consent treatment, by examining 4 areas (Understanding, Appreciation, Reasoning and Expressing a choice). 160 subjects (80 Internal Medicine inpatients, 40 Psychiatric inpatients and 40 healthy controls). MacCAT-T, Mini-Mental Status Examination (MMSE). Feasibility study, reliability and validity calculations (against to gold standard of clinical expert). Mean duration of the MacCAT-T interview was 18min. Inter-rater reliability: Intraclass correlation coefficient for Understanding=0.98, Appreciation=0.97, Reasoning=0.98, Expressing a choice=0.91. Internal consistency (Cronbach's alpha): Understanding=0.87, for Appreciation=0.76, for Reasoning=0.86. Patients considered to be incapable (gold standard) scored lower in all the MacCAT-T areas. Poor performance on the MacCAT-T was related to cognitive impairment assessed by MMSE. Spanish version of the MacCAT-T is feasible, reliable, and valid for assessing the capacity of patients to consent treatment. Copyright © 2013 Elsevier España, S.L. All rights reserved.
Photocopy of drawing (original drawing of MacDill Field in possession ...
Photocopy of drawing (original drawing of MacDill Field in possession of MacDill Air Force Base, Civil Engineering, Tampa, Florida; 1952 architectural drawings by Strategic Air Command, MacDill Air Force Base) BASE LAYOUT, 1952 - MacDill Air Force Base, Bounded by City of Tampa North, Tampa Bay South, Old Tampa Bay West, & Hillsborough Bay East, Tampa, Hillsborough County, FL
Observations by Mid-continent Magnetoseismic Chain (McMAC) and their use in space weather research
NASA Astrophysics Data System (ADS)
Chi, P. J.; McMac Team
The Mid-continent Magnetoseismic Chain McMAC consists of nine magnetometer stations that line up across the U S and Mexico along the 330th magnetic meridian These systems sample at 2 Hz and monitor the fluctuations of the geomagnetic field caused by space weather phenomena and they are always on the Internet to allow rapid access of data The McMAC stations can connect to the Fort Churchill Line of the CARISMA Array and two IGPP-LANL stations at the same longitude and form a long magnetometer chain that spans the L-value range from 1 3 to 11 7 the greatest latitudinal coverage in all meridians One of the main advantages of this magnetometer chain is its close separation between adjacent stations enabling the use of the gradient technique to identify field line resonance FLR frequencies and to further estimate the plasma mass density in the magnetosphere The observations of FLR and the derived density can always be collected in the daytime and occasionally in the nighttime as well In this paper we present the observations by the newly completed McMAC and jointly by the CARISMA and IGPP-LANL Arrays The observed plasma density and its wide coverage in L-value can benefit space weather studies such as on magnetosphere-ionosphere coupling and on the wave-particle interaction for modeling the radiation belts Also discussed are other applications of the McMAC observations in space weather research including possible joint observations with satellite missions
DOT National Transportation Integrated Search
1974-06-01
The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...
Middle Atmosphere Cooperation/Summer in Northern Europe (MAC/SINE) and MAC/Epsilon
NASA Technical Reports Server (NTRS)
Thrane, E. V.
1989-01-01
Two major international campaigns dedicated to the study of middle atmosphere dynamics in high latitudes were successfully completed in 1987. MAC/SINE (Middle Atmosphere Cooperation/Summer in Northern Europe) was carried out during the period 7 June to 19 July, whereas MAC/Epsilon took place in the period 12 October to 15 November. In both campaigns a large number of ground based and rocket techniques were used in a concerted effort to map the dynamical structure of the middle atmosphere over Northern Europe. Although the analysis of the observations has only just started, it is clear that a large and unique data set was obtained, which is believed will provide new insight into the dynamical processes in this interesting region of the atmosphere. A brief overview of the campaigns, their scientific aims, organization and structure is presented.
Library Signage: Applications for the Apple Macintosh and MacPaint.
ERIC Educational Resources Information Center
Diskin, Jill A.; FitzGerald, Patricia
1984-01-01
Describes specific applications of the Macintosh computer at Carnegie-Mellon University Libraries, where MacPaint was used as a flexible, easy to use, and powerful tool to produce informational, instructional, and promotional signage. Profiles of system hardware and software, an evaluation of the computer program MacPaint, and MacPaint signage…
Buhari, Faiza Sulaiman; Selvaraj, Venkatesh
2016-01-01
Background and Aims: Earlier studies have shown that the type of laryngoscope blade influences the degree of hemodynamic response to endotracheal intubation. The aim of the study was to evaluate the hemodynamic response to oral endotracheal intubation with C-MAC laryngoscopy and McCoy laryngoscopy compared to that of Macintosh laryngoscopy in adult patients under general anesthesia. Material and Methods: This is a prospective randomized parallel group study. Ninety American Society of Anesthesiologists I patients were randomly allotted into three groups. Group A – Macintosh laryngoscopy (control group). Group B – laryngoscopy with McCoy laryngoscope. Group C – laryngoscopy with C-MAC video laryngoscope. Heart rate (HR), systolic blood pressure (SBP), diastolic blood pressure (DBP), and mean arterial pressure (MAP) were monitored at baseline (just before induction), just before intubation (T0), 1 min (T1), 3 min (T3), 5 min (T5), and 10 min (T10) after intubation. Intergroup comparison of study parameters was done by unpaired sample t-test for normal data and Mann-Whitney U-test for skewed data. For within-group comparison, the repeated measures of ANOVA for normal data and Friedman followed by Wilcoxon signed rank test for skewed data were performed. Results: In C-MAC group, the HR was significantly higher than the Macintosh group at 3 min after intubation, whereas SBP, DBP, and MAP were significantly higher at 1 min. McCoy group showed a similar response compared to Macintosh group at all time intervals. Conclusion: C-MAC video laryngoscope has a comparatively greater hemodynamic response than Macintosh laryngoscope. PMID:28096584
Access Control in Location-Based Services
NASA Astrophysics Data System (ADS)
Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.
BFT replication resistant to MAC attacks
NASA Astrophysics Data System (ADS)
Zbierski, Maciej
2016-09-01
Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.
Matsumura, Yoko; Kitabatake, Masahiro; Ouji-Sageshima, Noriko; Yasui, Satsuki; Mochida, Naoko; Nakano, Ryuichi; Kasahara, Kei; Tomoda, Koichi; Yano, Hisakazu; Kayano, Shin-Ichi; Ito, Toshihiro
2017-01-01
Nontuberculous mycobacteria (NTM), including Mycobacterium avium complex (MAC), cause opportunistic chronic pulmonary infections. Notably, MAC susceptibility is regulated by various factors, including the host immune system. Persimmon (Ebenaceae Diospyros kaki Thunb.) tannin is a condensed tannin composed of a polymer of catechin groups. It is well known that condensed tannins have high antioxidant activity and bacteriostatic properties. However, it is hypothesized that condensed tannins might need to be digested and/or fermented into smaller molecules in vivo prior to being absorbed into the body to perform beneficial functions. In this study, we evaluated the effects of soluble persimmon-derived tannins on opportunistic MAC disease. Soluble tannins were hydrolyzed and evaluated by the oxygen radical absorbance capacity (ORAC) method. The ORAC value of soluble tannin hydrolysate was approximately five times greater than that of soluble tannin powder. In addition, soluble tannin hydrolysate exhibited high bacteriostatic activity against MAC in vitro. Furthermore, in an in vivo study, MAC infected mice fed a soluble tannin-containing diet showed significantly higher anti-bacterial activity against MAC and less pulmonary granuloma formation compared with those fed a control diet. Tumor necrosis factor α and inducible nitric oxide synthase levels were significantly lower in lungs of the soluble tannin diet group compared with the control diet group. Moreover, proinflammatory cytokines induced by MAC stimulation of bone marrow-derived macrophages were significantly decreased by addition of soluble tannin hydrolysate. These data suggest that soluble tannin from persimmons might attenuate the pathogenesis of pulmonary NTM infection.
Matsumura, Yoko; Kitabatake, Masahiro; Ouji-Sageshima, Noriko; Yasui, Satsuki; Mochida, Naoko; Nakano, Ryuichi; Kasahara, Kei; Tomoda, Koichi; Yano, Hisakazu; Kayano, Shin-ichi
2017-01-01
Nontuberculous mycobacteria (NTM), including Mycobacterium avium complex (MAC), cause opportunistic chronic pulmonary infections. Notably, MAC susceptibility is regulated by various factors, including the host immune system. Persimmon (Ebenaceae Diospyros kaki Thunb.) tannin is a condensed tannin composed of a polymer of catechin groups. It is well known that condensed tannins have high antioxidant activity and bacteriostatic properties. However, it is hypothesized that condensed tannins might need to be digested and/or fermented into smaller molecules in vivo prior to being absorbed into the body to perform beneficial functions. In this study, we evaluated the effects of soluble persimmon-derived tannins on opportunistic MAC disease. Soluble tannins were hydrolyzed and evaluated by the oxygen radical absorbance capacity (ORAC) method. The ORAC value of soluble tannin hydrolysate was approximately five times greater than that of soluble tannin powder. In addition, soluble tannin hydrolysate exhibited high bacteriostatic activity against MAC in vitro. Furthermore, in an in vivo study, MAC infected mice fed a soluble tannin-containing diet showed significantly higher anti-bacterial activity against MAC and less pulmonary granuloma formation compared with those fed a control diet. Tumor necrosis factor α and inducible nitric oxide synthase levels were significantly lower in lungs of the soluble tannin diet group compared with the control diet group. Moreover, proinflammatory cytokines induced by MAC stimulation of bone marrow-derived macrophages were significantly decreased by addition of soluble tannin hydrolysate. These data suggest that soluble tannin from persimmons might attenuate the pathogenesis of pulmonary NTM infection. PMID:28827842
Stochastic generation of MAC waves and implications for convection in Earth's core
NASA Astrophysics Data System (ADS)
Buffett, Bruce; Knezek, Nicholas
2018-03-01
Convection in Earth's core can sustain magnetic-Archemedes-Coriolis (MAC) waves through a variety of mechanisms. Buoyancy and Lorentz forces are viable sources for wave motion, together with the effects of magnetic induction. We develop a quantitative description for zonal MAC waves and assess the source mechanisms using a numerical dynamo model. The largest sources at conditions accessible to the dynamo model are due to buoyancy forces and magnetic induction. However, when these sources are extrapolated to conditions expected in Earth's core, the Lorentz force emerges as the dominant generation mechanism. This source is expected to produce wave velocities of roughly 2 km yr-1 when the internal magnetic field is characterized by a dimensionless Elsasser number of roughly Λ ≈ 10 and the root-mean-square convective velocity defines a magnetic Reynolds number of Rm ≈ 103. Our preferred model has a radially varying stratification and a constant (radial) background magnetic field. It predicts a broad power spectrum for the wave velocity with most power distributed across periods from 30 to 100 yr.
Modeling Woven Polymer Matrix Composites with MAC/GMC
NASA Technical Reports Server (NTRS)
Bednarcyk, Brett A.; Arnold, Steven M. (Technical Monitor)
2000-01-01
NASA's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) is used to predict the elastic properties of plain weave polymer matrix composites (PMCs). The traditional one step three-dimensional homogertization procedure that has been used in conjunction with MAC/GMC for modeling woven composites in the past is inaccurate due to the lack of shear coupling inherent to the model. However, by performing a two step homogenization procedure in which the woven composite repeating unit cell is homogenized independently in the through-thickness direction prior to homogenization in the plane of the weave, MAC/GMC can now accurately model woven PMCs. This two step procedure is outlined and implemented, and predictions are compared with results from the traditional one step approach and other models and experiments from the literature. Full coupling of this two step technique with MAC/ GMC will result in a widely applicable, efficient, and accurate tool for the design and analysis of woven composite materials and structures.
MAC layer security issues in wireless mesh networks
NASA Astrophysics Data System (ADS)
Reddy, K. Ganesh; Thilagam, P. Santhi
2016-03-01
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
Fonseca, Rochele Paz; Fachel, Jandyra Maria Guimarães; Chaves, Márcia Lorena Fagundes; Liedtke, Francéia Veiga; Parente, Maria Alice de Mattos Pimenta
2007-01-01
Right-brain-damaged individuals may present discursive, pragmatic, lexical-semantic and/or prosodic disorders. Objective To verify the effect of right hemisphere damage on communication processing evaluated by the Brazilian version of the Protocole Montréal d’Évaluation de la Communication (Montreal Communication Evaluation Battery) – Bateria Montreal de Avaliação da Comunicação, Bateria MAC, in Portuguese. Methods A clinical group of 29 right-brain-damaged participants and a control group of 58 non-brain-damaged adults formed the sample. A questionnaire on sociocultural and health aspects, together with the Brazilian MAC Battery was administered. Results Significant differences between the clinical and control groups were observed in the following MAC Battery tasks: conversational discourse, unconstrained, semantic and orthographic verbal fluency, linguistic prosody repetition, emotional prosody comprehension, repetition and production. Moreover, the clinical group was less homogeneous than the control group. Conclusions A right-brain-damage effect was identified directly, on three communication processes: discursive, lexical-semantic and prosodic processes, and indirectly, on pragmatic process. PMID:29213400
42 CFR 423.2110 - MAC reviews on its own motion.
Code of Federal Regulations, 2011 CFR
2011-10-01
... its own motion, it will mail the results of its action to the enrollee and to CMS or the IRE, as... 42 Public Health 3 2011-10-01 2011-10-01 false MAC reviews on its own motion. 423.2110 Section 423..., and Judicial Review § 423.2110 MAC reviews on its own motion. (a) General rule. The MAC may decide on...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels
Son, In Keun; Mao, Shiwen; Hur, Seung Min
2009-01-01
We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks. PMID:22408556
Vehicle Health Management Communications Requirements for AeroMACS
NASA Technical Reports Server (NTRS)
Kerczewski, Robert J.; Clements, Donna J.; Apaza, Rafael D.
2012-01-01
As the development of standards for the aeronautical mobile airport communications system (AeroMACS) progresses, the process of identifying and quantifying appropriate uses for the system is progressing. In addition to defining important elements of AeroMACS standards, indentifying the systems uses impacts AeroMACS bandwidth requirements. Although an initial 59 MHz spectrum allocation for AeroMACS was established in 2007, the allocation may be inadequate; studies have indicated that 100 MHz or more of spectrum may be required to support airport surface communications. Hence additional spectrum allocations have been proposed. Vehicle health management (VHM) systems, which can produce large volumes of vehicle health data, were not considered in the original bandwidth requirements analyses, and are therefore of interest in supporting proposals for additional AeroMACS spectrum. VHM systems are an emerging development in air vehicle safety, and preliminary estimates of the amount of data that will be produced and transmitted off an aircraft, both in flight and on the ground, have been prepared based on estimates of data produced by on-board vehicle health sensors and initial concepts of data processing approaches. This allowed an initial estimate of VHM data transmission requirements for the airport surface. More recently, vehicle-level systems designed to process and analyze VHM data and draw conclusions on the current state of vehicle health have been undergoing testing and evaluation. These systems make use of vehicle system data that is mostly different from VHM data considered previously for airport surface transmission, and produce processed system outputs that will be also need to be archived, thus generating additional data load for AeroMACS. This paper provides an analysis of airport surface data transmission requirements resulting from the vehicle level reasoning systems, within the context of overall VHM data requirements.
Research on low-latency MAC protocols for wireless sensor networks
NASA Astrophysics Data System (ADS)
He, Chenguang; Sha, Xuejun; Lee, Chankil
2007-11-01
Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.
Media independent interface. Interface control document
NASA Technical Reports Server (NTRS)
1987-01-01
A Media Independent Interface (MII) is specified, using current standards in the industry. The MII is described in hierarchical fashion. At the base are IEEE/International Standards Organization (ISO) documents (standards) which describe the functionality of the software modules or layers and their interconnection. These documents describe primitives which are to transcent the MII. The intent of the MII is to provide a universal interface to one or more Media Access Contols (MACs) for the Logical Link Controller and Station Manager. This interface includes both a standardized electrical and mechanical interface and a standardized functional specification which defines the services expected from the MAC.
Role of ATP binding and hydrolysis in assembly of MacAB-TolC macrolide transporter
Lu, Shuo; Zgurskaya, Helen I.
2012-01-01
Summary MacB is a founding member of the Macrolide Exporter family of transporters belonging to the ATP-Binding Cassette superfamily. These proteins are broadly represented in genomes of both gram-positive and gram-negative bacteria and are implicated in virulence and protection against antibiotics and peptide toxins. MacB transporter functions together with MacA, a periplasmic membrane fusion protein, which stimulates MacB ATPase. In gram-negative bacteria, MacA is believed to couple ATP hydrolysis to transport of substrates across the outer membrane through a TolC-like channel. In this study, we report a real-time analysis of concurrent ATP hydrolysis and assembly of MacAB-TolC complex. MacB binds nucleotides with a low millimolar affinity and fast on- and off-rates. In contrast, MacA-MacB complex is formed with a nanomolar affinity, which further increases in the presence of ATP. Our results strongly suggest that association between MacA and MacB is stimulated by ATP binding to MacB but remains unchanged during ATP hydrolysis cycle. We also found that the large periplasmic loop of MacB plays the major role in coupling reactions separated in two different membranes. This loop is required for MacA-dependent stimulation of MacB ATPase and at the same time, contributes to recruitment of TolC into a trans-envelope complex. PMID:23057817
Photocopy of drawing (original drawing of MacDill Field in possession ...
Photocopy of drawing (original drawing of MacDill Field in possession of MacDill Air Force Base, Civil Engineering, Tampa, Florida; site plan dated December, 1942) BASE LAYOUT, DECEMBER 1942 - MacDill Air Force Base, Bounded by City of Tampa North, Tampa Bay South, Old Tampa Bay West, & Hillsborough Bay East, Tampa, Hillsborough County, FL
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban
2017-01-01
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This
CAS. Controlled Access Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martinez, B.; Pomeroy, G.
1989-12-01
The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.
NASA Astrophysics Data System (ADS)
Kinne, S.
2015-12-01
Aerosol is highly diverse in space and time. And many different aerosol optical properties are needed (consistent to each other) for the determination of radiative effects. To sidestep a complex (and uncertain) aerosol treatment (emission to mass to optics) a monthly gridded climatology for aerosol properties has been developed. This MPI Aerosol Climatology (MAC) is strongly tied to observational statistics for aerosol column optical properties by AERONET (over land) and by MAN (over oceans). To fill spatial gaps, to address decadal change and to address vertical variability, these sparsely distributed local data are extended with central data of an ensemble of output from global models with complex aerosol modules. This data merging in performed for aerosol column amount (AOD), for aerosol size (AOD,fine) and for aerosol absorption (AAOD). The resulting MAC aerosol climatology is an example for the combination of high quality local observations with spatial, temporal and vertical context from model simulations.
An Attribute Based Access Control Framework for Healthcare System
NASA Astrophysics Data System (ADS)
Afshar, Majid; Samet, Saeed; Hu, Ting
2018-01-01
Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.
Access control for electronic patient records.
Glagola, M J
1998-01-01
The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.
2015-09-01
the network Mac8 Medium Access Control ( Mac ) (Ethernet) address observed as destination for outgoing packets subsessionid8 Zero-based index of...15. SUBJECT TERMS tactical networks, data reduction, high-performance computing, data analysis, big data 16. SECURITY CLASSIFICATION OF: 17...Integer index of row cts_deid Device (instrument) Identifier where observation took place cts_collpt Collection point or logical observation point on
Generic Drug Cost Containment in Medicaid: Lessons from Five State MAC Programs
Abramson, Richard G.; Harrington, Catherine A.; Missmar, Raad; Li, Susan P.; Mendelson, Daniel N.
2004-01-01
In Medicaid, generic drug cost containment revolves around two programs: the Federal upper limit (FUL) program and State maximum allowable cost (MAC) programs. This article analyzes MAC programs in five States and finds considerable variation between these programs and the FUL program in both size and pricing aggressiveness. We conclude that expansion of existing MAC programs and creation of new ones could contribute to cost containment efforts nationwide. Options for States seeking to optimize their efforts include focusing on pricing for drugs with high sales volumes, ensuring that MAC lists include prices for all forms and dosages of listed drug entities, and collaborating with other States or the Federal Government on MAC list operations. PMID:15229994
Greenslade, Jaimi H; Nayer, Robert; Parsonage, William; Doig, Shaela; Young, Joanna; Pickering, John W; Than, Martin; Hammett, Christopher; Cullen, Louise
2017-08-01
The Manchester Acute Coronary Syndromes (MACS) rule and the Troponin-only MACS (T-MACS) rule risk stratify patients with suspected acute coronary syndrome (ACS). This observational study sought to validate and compare the MACS and T-MACS rules for assessment of acute myocardial infarction (AMI). Prospectively collected data from twoEDs in Australia and New Zealand were analysed. Patients were assigned a probability of ACS based on the MACS and T-MACS rules, incorporating high-sensitivity troponin T, heart-type fatty acid-binding protein, ECG results and clinical symptoms. Patients were then deemed very low risk, low risk, intermediate or high risk if their MACS probability was less than 2%, between 2% and 5%, between 5% and 95% and greater than 95%, respectively. The primary endpoint was 30-day diagnosis of AMI. The secondary endpoint was 30-day major adverse cardiac event (MACE) including AMI, revascularisation or coronary stenosis (>70%). Sensitivity, specificity and predictive values were calculated to assess the accuracy of the MACS and T-MACS rules. Of the 1244 patients, 114 (9.2%) were diagnosed with AMI and 163 (13.1%) with MACE. The MACS and T-MACS rules categorised 133 (10.7%) and 246 (19.8%) patients, respectively, as very low risk and potentially suitable for early discharge from the ED. There was one false negative case for both rules making sensitivity 99.1% (95.2%-100%). MACS and T-MACS accurately risk stratify very low risk patients. The T-MACS rule would allow for more patients to be discharged early. The potential for missed MACE events means that further outpatient testing for coronary artery disease may be required for patients identified as very low risk. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
MacMouse. Developing Preschool Readiness Concepts and Skills with HyperCard and MacRecorder.
ERIC Educational Resources Information Center
Fitterman, L. Jeffrey
Through developments with the use of the "Apple Macintosh" computer, "HyperCard," and "MacRecorder," children in preschool handicapped programs are now capable of participating in appropriate computerized learning experiences. "HyperCard" allows educators to produce their own computerized instructional…
Youth with cerebral palsy with differing upper limb abilities: how do they access computers?
Davies, T Claire; Chau, Tom; Fehlings, Darcy L; Ameratunga, Shanthi; Stott, N Susan
2010-12-01
To identify the current level of awareness of different computer access technologies and the choices made regarding mode of access by youth with cerebral palsy (CP) and their families. Survey. Two tertiary-level rehabilitation centers in New Zealand and Canada. Youth (N=60) with CP, Manual Ability Classification Scale (MACS) levels I to V, age 13 to 25 years. Not applicable. Questionnaire. Fifty (83%) of the 60 youth were aware of at least 1 available assistive technology (AT), such as touch screens and joysticks. However, only 34 youth (57%) were familiar with the accessibility options currently available in the most common operating systems. Thirty-three (94%) of 35 youth who were MACS I and II used a standard mouse and keyboard, while few chose to use assistive technology or accessibility options. In contrast, 10 (40%) of 25 youth who were MACS III to V used a variety of assistive technologies such as touch screens, joysticks, trackballs, and scanning technologies. This group also had the highest use of accessibility options, although only 15 (60%) of the 25 were aware of them. Most youth with CP were aware of, and used, assistive technologies to enhance their computer access but were less knowledgeable about accessibility options. Accessibility options allow users to modify their own computer interface and can thus enhance computer access for youth with CP. Clinicians should be knowledgeable enough to give informed advice in this area of computer access, thus ensuring that all youth with CP can benefit from both AT and accessibility options, as required. Copyright © 2010 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
Structure of the MacAB-TolC ABC-type tripartite multidrug efflux pump
Llabrés, Salomé; Neuberger, Arthur; Blaza, James N.; Bai, Xiao-chen; Okada, Ui; Murakami, Satoshi; van Veen, Hendrik W.; Zachariae, Ulrich; Scheres, Sjors H.W.; Luisi, Ben F.
2017-01-01
The MacA-MacB-TolC assembly of Escherichia coli is a transmembrane machine that spans the cell envelope and actively extrudes substrates, including macrolide antibiotics and polypeptide virulence factors. These transport processes are energized by the ATPase MacB, a member of the ATP-binding cassette (ABC) superfamily. We present an electron cryo-microscopy structure of the ABC-type tripartite assembly at near-atomic resolution. A hexamer of the periplasmic protein MacA bridges between a TolC trimer in the outer membrane and a MacB dimer in the inner membrane, generating a quaternary structure with a central channel for substrate translocation. A gating ring found in MacA is proposed to act as a one-way valve in substrate transport. The MacB structure features an atypical transmembrane domain (TMD) with a closely packed dimer interface and a periplasmic opening that is the likely portal for substrate entry from the periplasm, with subsequent displacement through an allosteric transport mechanism. PMID:28504659
Smereka, Jacek; Ladny, Jerzy R; Naylor, Amanda; Ruetzler, Kurt; Szarpak, Lukasz
2017-08-01
The aim of this study was to compare C-MAC videolaryngoscopy with direct laryngoscopy for intubation in simulated cervical spine immobilization conditions. The study was designed as a prospective randomized crossover manikin trial. 70 paramedics with <5years of medical experience participated in the study. The paramedics attempted to intubate manikins in 3 airway scenarios: normal airway without cervical immobilization (Scenario A); manual inline cervical immobilization (Scenario B); cervical immobilization using cervical extraction collar (Scenario C). Scenario A: Nearly all participants performed successful intubations with both MAC and C-MAC on the first attempt (95.7% MAC vs. 100% C-MAC), with similar intubation times (16.5s MAC vs. 18s C-MAC). Scenario B: The results with C-MAC were significantly better than those with MAC (p<0.05) for the time of intubation (23 s MAC vs. 19 s C-MAC), success of the first intubation attempt (88.6% MAC vs. 100% C-MAC), Cormack-Lehane grade, POGO score, severity of dental compression, device difficulty score, and preferred airway device. Scenario C: The results with C-MAC were significantly better than those with MAC (p<0.05) for all the analysed variables: success of the first attempt (51.4% MAC vs. 100% C-MAC), overall success rate, intubation time (27 s MAC vs. 20.5 s C-MAC), Cormack-Lehane grade, POGO score, dental compression, device difficulty score and the preferred airway device. The C-MAC videolaryngoscope is an excellent alternative to the MAC laryngoscope for intubating manikins with cervical spine immobilization. Copyright © 2017 Elsevier Inc. All rights reserved.
Discriminative validity of the MacAndrew Alcoholism Scale with Cluster B personality disorders.
Smith, S R; Hilsenroth, M J
2001-06-01
This study was designed to assess the ability of the Minnesota Multiphasic Personality Inventory (MMPI-2) MacAndrew Alcoholism Scale (MAC-R) to differentiate between outpatients with personality disorders with Substance-Related Disorders (SRDs) and without SRDs. MMPI-2 validity, clinical, and MAC-R scale scores were compared in an SRD Cluster B group (comprised of Narcissistic, Antisocial, Borderline, and Histrionic; n = 15), a non-SRD Cluster B group (n = 33), and a non-SRD group with personality disorders from Clusters A and C (n = 18). Results revealed that the substance-abusing Cluster B group scored significantly higher on the MAC-R ( p <.0001) as well as the Psychopathic Deviate scale ( p <.01). Dimensional analyses illustrated that MAC-R scores were related to the presence of an SRD diagnosis (rpb =.70, p <.0001) and diagnostic criteria for Antisocial Personality Disorder (r =.60, p <.0001). Stepwise regression revealed that (in order of magnitude) the presence of a substance-abuse diagnosis followed by diagnostic criteria for Antisocial and Histrionic Personality Disorders were most related to MAC-R scores (R =.78, R(2) =.60). This indicates that the MAC-R may be more related to the presence of an SRD than has been suggested, and when used in outpatient settings as MacAndrew (1965) intended, the MAC-R may be useful as a screening device for assessing SRD among outpatients with Axis II psychopathology.
Functional characterization of the copper transcription factor AfMac1 from Aspergillus fumigatus.
Park, Yong-Sung; Kim, Tae-Hyoung; Yun, Cheol-Won
2017-07-03
Although copper functions as a cofactor in many physiological processes, copper overload leads to harmful effects in living cells. Thus, copper homeostasis is tightly regulated. However, detailed copper metabolic pathways have not yet been identified in filamentous fungi. In this report, we investigated the copper transcription factor AfMac1 ( A spergillus f umigatus Mac1 homolog) and identified its regulatory mechanism in A. fumigatus AfMac1 has domains homologous to the DNA-binding and copper-binding domains of Mac1 from Saccharomyces cerevisiae , and AfMac1 efficiently complemented Mac1 in S. cerevisiae Expression of Afmac1 resulted in CTR1 up-regulation, and mutation of the DNA-binding domain of Afmac1 failed to activate CTR1 expression in S. cerevisiae The Afmac1 deletion strain of A. fumigatus failed to grow in copper-limited media, and its growth was restored by introducing ctrC We found that AfMac1 specifically bound to the promoter region of ctrC based on EMSA. The AfMac1-binding motif 5'-TGTGCTCA-3' was identified from the promoter region of ctrC , and the addition of mutant ctrC lacking the AfMac1-binding motif failed to up-regulate ctrC in A. fumigatus Furthermore, deletion of Afmac1 significantly reduced strain virulence and activated conidial killing activity by neutrophils and macrophages. Taken together, these results suggest that AfMac1 is a copper transcription factor that regulates cellular copper homeostasis in A. fumigatus . © 2017 The Author(s); published by Portland Press Limited on behalf of the Biochemical Society.
Steven MacCall: Winner of LJ's 2010 Teaching Award
ERIC Educational Resources Information Center
Berry, John N., III
2010-01-01
This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Dischinger, Portia
2005-01-01
This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.
Logical Access Control Mechanisms in Computer Systems.
ERIC Educational Resources Information Center
Hsiao, David K.
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Atom-Role-Based Access Control Model
NASA Astrophysics Data System (ADS)
Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong
Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.
Pahar, Bapi; Lackner, Andrew A; Piatak, Michael; Lifson, Jeffrey D; Wang, Xiaolei; Das, Arpita; Ling, Binhua; Montefiori, David C; Veazey, Ronald S
2009-05-10
Recent HIV vaccine failures have prompted calls for more preclinical vaccine testing in non-human primates. However, similar to HIV infection of humans, developing a vaccine that protects macaques from infection following pathogenic SIV(MAC251) challenge has proven difficult, and current vaccine candidates at best, only reduce viral loads after infection. Here we demonstrate that prior infection with a chimeric simian-human immunodeficiency virus (SHIV) containing an HIV envelope gene confers protection against intravenous infection with the heterologous, highly pathogenic SIV(MAC251) in rhesus macaques. Although definitive immune correlates of protection were not identified, preservation and/or restoration of intestinal CD4(+) memory T cells were associated with protection from challenge and control of viremia. These results suggest that protection against pathogenic lentiviral infection or disease progression is indeed possible, and may correlate with preservation of mucosal CD4(+) T cells.
NASA Technical Reports Server (NTRS)
Lakshmanan, Balakrishnan; Tiwari, Surendra N.
1992-01-01
A robust, discontinuity-resolving TVD MacCormack scheme containing no dependent parameters requiring adjustment is presently used to investigate the 3D separation of wing/body junction flows at supersonic speeds. Many production codes employing MacCormack schemes can be adapted to use this method. A numerical simulation of laminar supersonic junction flow is found to yield improved separation location predictions, as well as the axial velocity profiles in the separated flow region.
Pliable Cognitive MAC for Heterogeneous Adaptive Cognitive Radio Sensor Networks.
Al-Medhwahi, Mohammed; Hashim, Fazirulhisyam; Ali, Borhanuddin Mohd; Sali, Aduwati
2016-01-01
The rapid expansion of wireless monitoring and surveillance applications in several domains reinforces the trend of exploiting emerging technologies such as the cognitive radio. However, these technologies have to adjust their working concepts to consider the common characteristics of conventional wireless sensor networks (WSNs). The cognitive radio sensor network (CRSN), still an immature technology, has to deal with new networks that might have different types of data, traffic patterns, or quality of service (QoS) requirements. In this paper, we design and model a new cognitive radio-based medium access control (MAC) algorithm dealing with the heterogeneous nature of the developed networks in terms of either the traffic pattern or the required QoS for the node applications. The proposed algorithm decreases the consumed power on several fronts, provides satisfactory levels of latency and spectrum utilization with efficient scheduling, and manages the radio resources for various traffic conditions. An intensive performance evaluation is conducted to study the impact of key parameters such as the channel idle time length, node density, and the number of available channels. The performance evaluation of the proposed algorithm shows a better performance than the comparable protocols. Moreover, the results manifest that the proposed algorithm is suitable for real time monitoring applications.
Pliable Cognitive MAC for Heterogeneous Adaptive Cognitive Radio Sensor Networks
Ali, Borhanuddin Mohd; Sali, Aduwati
2016-01-01
The rapid expansion of wireless monitoring and surveillance applications in several domains reinforces the trend of exploiting emerging technologies such as the cognitive radio. However, these technologies have to adjust their working concepts to consider the common characteristics of conventional wireless sensor networks (WSNs). The cognitive radio sensor network (CRSN), still an immature technology, has to deal with new networks that might have different types of data, traffic patterns, or quality of service (QoS) requirements. In this paper, we design and model a new cognitive radio-based medium access control (MAC) algorithm dealing with the heterogeneous nature of the developed networks in terms of either the traffic pattern or the required QoS for the node applications. The proposed algorithm decreases the consumed power on several fronts, provides satisfactory levels of latency and spectrum utilization with efficient scheduling, and manages the radio resources for various traffic conditions. An intensive performance evaluation is conducted to study the impact of key parameters such as the channel idle time length, node density, and the number of available channels. The performance evaluation of the proposed algorithm shows a better performance than the comparable protocols. Moreover, the results manifest that the proposed algorithm is suitable for real time monitoring applications. PMID:27257964
Access control mechanism of wireless gateway based on open flow
NASA Astrophysics Data System (ADS)
Peng, Rong; Ding, Lei
2017-08-01
In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.
Broadcast of four HD videos with LED ceiling lighting: optical-wireless MAC
NASA Astrophysics Data System (ADS)
Bouchet, Olivier; Porcon, Pascal; Gueutier, Eric
2011-09-01
The European project "hOME Gigabit Access Network" (OMEGA) targeted various wireless and wired solutions for 1 Gbit/s connectivity in Home Area Networks (HANs). One objective was to evaluate the suitability of optical wireless technologies in two spectral regions: visible light (visible-light communications - VLC) and near infrared (infrared communications - IRC). Several demonstrators have been built, all of them largely relying on overthe- shelf components. The demonstrators included a "wide-area" VLC broadcast link based on LED ceiling lighting and a laser-based high-data-rate "wide-area" IRC prototype. In this paper we discuss an adapted optical-wireless media-access-control (OWMAC) sublayer, which was developed and implemented during the project. It is suitable for both IRC and VLC. The VLC prototype is based on DMT signal processing and provides broadcasting at { 100 Mbit/s over an area of approximately 5 m2. The IRC prototype provides {300 Mbit/s half-duplex communication over an area of approximately 30 m2. The IRC mesh network, composed of one base station and two terminals, is based on OOK modulation, multi-sector transceivers, and an ultra-fast sector switch. After a brief discussion about the design of the optical-wireless data link layer and the optical-wireless switch (OWS) card, we address the card development and implementation. We also present applications for the VLC and IRC prototypes and measurement results regarding the MAC layer.
42 CFR 423.2110 - MAC reviews on its own motion.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 3 2010-10-01 2010-10-01 false MAC reviews on its own motion. 423.2110 Section 423.2110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Reopening, ALJ Hearings, MAC review...
Liu, X; Dingley, J; Elstad, M; Scull-Brown, E; Steen, P A; Thoresen, M
2013-05-01
Neuroprotection from therapeutic hypothermia increases when combined with the anaesthetic gas xenon in animal studies. A clinical feasibility study of the combined treatment has been successfully undertaken in asphyxiated human term newborns. It is unknown whether xenon alone would be sufficient for sedation during hypothermia eliminating or reducing the need for other sedative or analgesic infusions in ventilated sick infants. Minimum alveolar concentration (MAC) of xenon is unknown in any neonatal species. Eight newborn pigs were anaesthetised with sevoflurane alone and then sevoflurane plus xenon at two temperatures. Pigs were randomised to start at either 38.5°C or 33.5°C. MAC for sevoflurane was determined using the claw clamp technique at the preset body temperature. For xenon MAC determination, a background of 0.5 MAC sevoflurane was used, and 60% xenon added to the gas mixture. The relationship between sevoflurane and xenon MAC is assumed to be additive. Xenon concentrations were changed in 5% steps until a positive clamp reaction was noted. Pigs' temperature was changed to the second target, and two MAC determinations for sevoflurane and 0.5 MAC sevoflurane plus xenon were repeated. MAC for sevoflurane was 4.1% [95% confidence interval (CI): 3.65-4.50] at 38.5°C and 3.05% (CI: 2.63-3.48) at 33.5°C, a significant reduction. MAC for xenon was 120% at 38.5°C and 116% at 33.5°C, not different. In newborn swine sevoflurane, MAC was temperature dependent, while xenon MAC was independent of temperature. There was large individual variability in xenon MAC, from 60% to 120%. © 2013 The Acta Anaesthesiologica Scandinavica Foundation.
Access Control Management for SCADA Systems
NASA Astrophysics Data System (ADS)
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
Dolphin natures, human virtues: MacIntyre and ethical naturalism.
Glackin, Shane Nicholas
2008-09-01
Can biological facts explain human morality? Aristotelian 'virtue' ethics has traditionally assumed so. In recent years Alasdair MacIntyre has reintroduced a form of Aristotle's 'metaphysical biology' into his ethics. He argues that the ethological study of dependence and rationality in other species--dolphins in particular--sheds light on how those same traits in the typical lives of humans give rise to the moral virtues. However, some goal-oriented dolphin behaviour appears both dependent and rational in the precise manner which impresses MacIntyre, yet anything but ethically 'virtuous'. More damningly, dolphin ethologists consistently refuse to evaluate such behaviour in the manner MacIntyre claims is appropriate to moral judgement. In light of this, I argue that virtues--insofar as they name a biological or ethological category--do not name a morally significant one.
Sáiz, Pilar A; Rodríguez-Revuelta, Julia; González-Blanco, Leticia; Burón, Patricia; Al-Halabí, Susana; Garrido, Marlen; García-Alvarez, Leticia; García-Portilla, Paz; Bobes, Julio
2014-01-01
Prevention of suicidal behaviour is a public health priority in the European Union. A previous suicide attempt is the best risk predictor for future attempts, as well as completed suicides. The primary aim of this article is to describe a controlled study protocol designed for prevention of recurrent suicidal behaviour that proposes case management, and includes a psychoeducation program, as compared with the standard intervention (PSyMAC). Patients admitted from January 2011 to June 2013 to the emergency room of the Hospital Universitario Central de Asturias were evaluated using a protocol including sociodemographic, psychiatric, and psychosocial assessment. Patients were randomly assigned to either a group receiving continuous case management including participation in a psychoeducation program (experimental group), or a control group receiving standard care. The primary objective is to examine whether or not the period of time until recurrent suicidal behaviour in the experimental group is significantly different from that of the control group. PSyMAC proposes low cost and easily adaptable interventions to the usual clinical setting that can help to compensate the shortcoming of specific action protocols and suicidal behaviour prevention programs in our country. The evaluation of PSyMAC results will determine their real effectivity as a case-magament program to reduce suicidal risk. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.
NASA Technical Reports Server (NTRS)
Kerczewski, Robert J.; Wilson, Jeffrey D.
2010-01-01
Interference issues related to the operation of an aeronautical mobile airport communications system (AeroMACS) in the C-Band (specifically 5091-5150 MHz) is being investigated. The issue of primary interest is co-channel interference from AeroMACS into mobile-satellite system (MSS) feeder uplinks. The effort is focusing on establishing practical limits on AeroMACS transmissions from airports so that the threshold of interference into MSS is not exceeded. The analyses are being performed with the software package Visualyse Professional, developed by Transfinite Systems Limited. Results with omni-directional antennas and plans to extend the models to represent AeroMACS more accurately will be presented. These models should enable realistic analyses of emerging AeroMACS designs to be developed from NASA Test Bed, RTCA 223, and European results.
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
Dependence of AeroMACS Interference on Airport Radiation Pattern Characteristics
NASA Technical Reports Server (NTRS)
Wilson, Jeffrey D.
2012-01-01
AeroMACS (Aeronautical Mobile Airport Communications System), which is based upon the IEEE 802.16e mobile wireless standard, is expected to be implemented in the 5091 to 5150 MHz frequency band. As this band is also occupied by Mobile Satellite Service (MSS) feeder uplinks, AeroMACS must be designed to avoid interference with this incumbent service. The aspects of AeroMACS operation that present potential interference are under analysis in order to enable the definition of standards that assure that such interference will be avoided. In this study, the cumulative interference power distribution at low earth orbit from AeroMACS transmitters at the 497 major airports in the contiguous United States was simulated with the Visualyse Professional software. The dependence of the interference power on the number of antenna beams per airport, gain patterns, and beam direction orientations was simulated. As a function of these parameters, the simulation results are presented in terms of the limitations on transmitter power required to maintain the cumulative interference power under the established threshold.
Dependence of AeroMACS Interference on Airport Radiation Pattern Characteristics
NASA Technical Reports Server (NTRS)
Wilson, Jeffrey D.
2012-01-01
AeroMACS (Aeronautical Mobile Airport Communications System), which is based upon the IEEE 802.16e mobile wireless standard, is expected to be implemented in the 5091-5150 MHz frequency band. As this band is also occupied by Mobile Satellite Service (MSS) feeder uplinks, AeroMACS must be designed to avoid interference with this incumbent service. The aspects of AeroMACS operation that present potential interference are under analysis in order to enable the definition of standards that assure that such interference will be avoided. In this study, the cumulative interference power distribution at low earth orbit from AeroMACS transmitters at the 497 major airports in the contiguous United States was simulated with the Visualyse Professional software. The dependence of the interference power on the number of antenna beams per airport, gain patterns, and beam direction orientations was simulated. As a function of these parameters, the simulation results are presented in terms of the limitations on transmitter power required to maintain the cumulative interference power under the established threshold.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... Funding and Fiscal Affairs; Farmer Mac Liquidity Management AGENCY: Farm Credit Administration. ACTION... liquidity management regulations for the Federal Agricultural Mortgage Corporation (Farmer Mac). The purpose of the final rule is to strengthen liquidity risk management at Farmer Mac, improve the quality of...
Kaszuba-Zwoinska, J; Chorobik, P; Juszczak, K; Zaraska, W; Thor, P J
2012-10-01
Current studies were aimed to elucidate influence of pulsed electromagnetic field stimulation on cell viability and apoptosis induction pathways. For the experimental model we have chosen monocytic cell line MonoMac6 and several apoptosis inducers with different mechanism of death induction like puromycin, colchicine, cyclophosphamide, minocycline and hydrogen peroxide. MonoMac6 cell line was grown at density 1x10(5) cells/well in 96-well culture plates. To induce cell death cell cultures were treated with different apoptosis inducers like puromycin, colchicine, cyclophosphamide, minocycline, hydrogen peroxide and at the same time with pulsed electromagnetic field 50 Hz, 45±5 mT (PEMF) for 4 hour per each stimulation, three times, in 24 hours intervals. Afterwards, cells were harvested for flow cytometry analysis of cell viability measured by annexin V-APC labeled and propidium iodide staining. Expression of apoptosis related genes was evaluated by semi quantitative reverse transcription (RT)-PCR assay. NuPAGE Novex Western blot analysis was carried out for apoptosis inducing factor (AIF) abundance in cytosolic and nuclear extracts of MonoMac6 cells. Puromycin, colchicine and minocycline activated cells and simultaneously treated with PEMF have shown out diminished percentage of annexinV positive (AnV+) cells comparing to controls without PEMF stimulation. MonaMac6 cells puromycin/colchicyne and PEMF treated were to a higher extent double stained (AnV+,PI+), which means increased late apoptotic as well as necrotic (PI+) cells, than non-stimulated controls. On the other hand, minocycline activated cells prior to PEMF treatment showed diminished amount of apoptotic and necrotic (annexin V, annexin V and propidium iodide, propidium iodide positive staining) cells. The opposite effect of PEMF on the percentage of annexin V positively stained cells has been achieved after treatment of MonoMac6 culture with cyclophoshamide and hydrogen peroxide. PEMF enhanced early
Bohadana, A B; Massin, N; Teculescu, D; Peslin, R
1994-09-01
Methacholine airway challenge (MAC) is a simple and useful means to assess bronchial hyperreactivity in workers exposed to various occupational hazards. Recently, wheeze detection by tracheal auscultation has been proposed as an indicator of bronchial responsiveness during bronchial provocation test in children. Our aim was to examine the relationship between the appearance of wheezes and the concurrent changes in forced expiratory volume in one second (FEV1) observed during MAC test in adults. Three cumulative doses of a methacholine solution (100 micrograms, 500 micrograms and 1500 micrograms) were inhaled by 45 workers with occupational exposure to flour dust. Spirometry was done using an electronic spirometer. Tracheal sounds were recorded with an electronic stethoscope placed over the anterior cervical triangle, 2 cm above the sternal notch. The amplified sounds were stored on magnetic tape, band-pass filtered (50-2000 Hz), and digitized at a sampling rate of 4096 Hz into a GenRad Vibration Control System. Wheezes were detected by fast Fourier transform (FFT) analysis and their presence compared to a 20% fall in FEV1. A positive MAC test by spirometry was found in 12 subjects whereas wheezes were identified in 14 subjects. Among the wheezing subjects, nine had a positive MAC test (range of fall in FEV1 = 20.6 to 42.3%) and five had a negative one (range of fall in FEV1 = 3.6 to 16.9%). Moreover, no wheezes were found in the remaining three subjects with a positive MAC test (range of fall in FEV1 = 20.7 to 27.4%). Taking a 20% fall in FEV1 as reference, wheezes were 75% sensitive and 84.8% specific to detect airflow obstruction. In conclusion, since it carries a significant although small false-negative rate, the acoustic technique based upon wheeze detection cannot, at the present time, fully replace spirometry during airway challenge testing in subjects with suspected asthma.
Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures
NASA Astrophysics Data System (ADS)
Vijayakumaran, Vineeth
Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol
Eliminating the Heart from the Curcumin Molecule: Monocarbonyl Curcumin Mimics (MACs)
Shetty, Dinesh; Kim, Yong Joon; Shim, Hyunsuk; Snyder, James P.
2015-01-01
Curcumin is a natural product with several thousand years of heritage. Its traditional Asian application to human ailments has been subjected in recent decades to worldwide pharmacological, biochemical and clinical investigations. Curcumin’s Achilles heel lies in its poor aqueous solubility and rapid degradation at pH ~ 7.4. Researchers have sought to unlock curcumin’s assets by chemical manipulation. One class of molecules under scrutiny are the monocarbonyl analogs of curcumin (MACs). A thousand plus such agents have been created and tested primarily against cancer and inflammation. The outcome is clear. In vitro, MACs furnish a 10–20 fold potency gain vs. curcumin for numerous cancer cell lines and cellular proteins. Similarly, MACs have successfully demonstrated better pharmacokinetic (PK) profiles in mice and greater tumor regression in cancer xenografts in vivo than curcumin. The compounds reveal limited toxicity as measured by murine weight gain and histopathological assessment. To our knowledge, MAC members have not yet been monitored in larger animals or humans. However, Phase 1 clinical trials are certainly on the horizon. The present review focuses on the large and evolving body of work in cancer and inflammation, but also covers MAC structural diversity and early discovery for treatment of bacteria, tuberculosis, Alzheimer’s disease and malaria. PMID:25547726
Whiley, Harriet; Keegan, Alexandra; Fallowfield, Howard; Bentham, Richard
2014-01-01
Inhalation of potable water presents a potential route of exposure to opportunistic pathogens and hence warrants significant public health concern. This study used qPCR to detect opportunistic pathogens Legionella spp., L. pneumophila and MAC at multiple points along two potable water distribution pipelines. One used chlorine disinfection and the other chloramine disinfection. Samples were collected four times over the year to provide seasonal variation and the chlorine or chloramine residual was measured during collection. Legionella spp., L. pneumophila and MAC were detected in both distribution systems throughout the year and were all detected at a maximum concentration of 103 copies/mL in the chlorine disinfected system and 106, 103 and 104 copies/mL respectively in the chloramine disinfected system. The concentrations of these opportunistic pathogens were primarily controlled throughout the distribution network through the maintenance of disinfection residuals. At a dead-end and when the disinfection residual was not maintained significant (p < 0.05) increases in concentration were observed when compared to the concentration measured closest to the processing plant in the same pipeline and sampling period. Total coliforms were not present in any water sample collected. This study demonstrates the ability of Legionella spp., L. pneumophila and MAC to survive the potable water disinfection process and highlights the need for greater measures to control these organisms along the distribution pipeline and at point of use. PMID:25046636
Whiley, Harriet; Keegan, Alexandra; Fallowfield, Howard; Bentham, Richard
2014-07-18
Inhalation of potable water presents a potential route of exposure to opportunistic pathogens and hence warrants significant public health concern. This study used qPCR to detect opportunistic pathogens Legionella spp., L. pneumophila and MAC at multiple points along two potable water distribution pipelines. One used chlorine disinfection and the other chloramine disinfection. Samples were collected four times over the year to provide seasonal variation and the chlorine or chloramine residual was measured during collection. Legionella spp., L. pneumophila and MAC were detected in both distribution systems throughout the year and were all detected at a maximum concentration of 103 copies/mL in the chlorine disinfected system and 106, 103 and 104 copies/mL respectively in the chloramine disinfected system. The concentrations of these opportunistic pathogens were primarily controlled throughout the distribution network through the maintenance of disinfection residuals. At a dead-end and when the disinfection residual was not maintained significant (p < 0.05) increases in concentration were observed when compared to the concentration measured closest to the processing plant in the same pipeline and sampling period. Total coliforms were not present in any water sample collected. This study demonstrates the ability of Legionella spp., L. pneumophila and MAC to survive the potable water disinfection process and highlights the need for greater measures to control these organisms along the distribution pipeline and at point of use.
Geochemistry and petrography of the MacAlpine Hills lunar meteorites
NASA Technical Reports Server (NTRS)
Lindstrom, Marilyn M.; Mckay, David S.; Wentworth, Susan J.; Martinez, Rene R.; Mittlefehldt, David W.; Wang, Ming-Sheng; Lipschutz, Michael E.
1991-01-01
MacAlpine Hills 88104 and 88105, anorthositic lunar meteorites recovered form the same area in Antartica, are characterized. Petrographic studies show that MAC88104/5 is a polymict breccia dominated by impact melt clasts. It is better classified as a fragmental breccia than a regolith breccia. The bulk composition is ferroan and highly aluminous (Al2O3-28 percent).
NASA Astrophysics Data System (ADS)
Taber, J.; Hubenthal, M.; Wysession, M.
2007-12-01
because they have a physical sense of what the wiggles indicate. As a result students are better positioned to identify S and P arrivals within the complexity of real data available through REV rather than using the canned or artificial data normally associated with a location exercise. REV provides easy access to recent and noteworthy earthquake data via a simple Web interface. Earthquake locations and near-real time ground motion data are accessed via the IRIS Data Management System, and data are automatically processed and selected so that only events with "good" data are presented within REV. Once students have completed the learning sequence using SeisMac, they will be better able to relate the trace of a seismogram to the physical motion of the ground. This can then lead to better understanding of more advanced exercises including detecting the core and finding the Moho. Building on an understanding of the basics of a seismogram, SeisMac can next be used to help student further understand earthquakes by provide a kinesthetic experience to model how hard the Earth shakes during earthquakes. Through another guided exploration students discover that the SeisMac display is calibrated in units of acceleration and can be related to the Modified Mercalli scale. They then compare shaking during an earthquake via video clips and ground shaking maps from the USGS "Did you feel it" Web site to the shaking of personal objects and the laptop.
NASA Astrophysics Data System (ADS)
Hut, Rolf; van de Giesen, Nick; Larson, Martha
2014-05-01
Crowdsourcing has become popular over the past years, also for scientific endeavors. There are many Citizen Science projects and crowdfunding platforms, such as Kickstarter, that are make helpful contributions to moving environmental science forward. An interesting underused source of useful crowd-derived contributions to research is the website Fiverr.com. On this platform, thousands of people, acting as small-scale freelance contractors, offer their skills in the form of services. The platform offers a chance for people to take a hobby, skill, or pastime and make it something more by reaching out to a wider audience and by receiving a payment in return for services. As is typical of other crowdsourcing platforms, the tasks are small and usually self contained. As the name Fiverr suggests, offers start at US5 to provide a particular service. Services offered range from graphic design, to messages sung or spoken with various styles or accents, to complete apps for Android or iPhone. Skill providers on the platform can accept a range of variation of definition in the tasks, some can be described in general terms, for others it is more appropriate to provide examples. Fiverr provides a central location for those offering skills and those needing services to find each other, it makes it possible to communicate and exchange files, to make payments, and it provides support for resolving disputes. In all cases, it is important to keep expectations aligned with the nature of the platform: quality can and will vary. Ultimately, the critical contribution of Fiverr is not to replace professional services or otherwise save money, but rather to provide access to a large group of people with specialized skills who are able to make a contribution on short notice. In the context of this session, it can be considered a pool of people with MacGyver skills lying in wait of a MacGyyer task to attack. There are many ways in which Fiverr tasks, which are called 'gigs', can be useful in
Detomidine reduces isoflurane anesthetic requirement (MAC) in horses.
Steffey, Eugene P; Pascoe, Peter J
2002-10-01
To quantitate the dose- and time-related magnitude of the anesthetic sparing effect of, and selected physiological responses to detomidine during isoflurane anesthesia in horses. Randomized cross-over study. Three, healthy, young adult horses weighing 485 ± 14 kg. Horses were anesthetized on two occasions to determine the minimum alveolar concentration (MAC) of isoflurane in O 2 and then to measure the anesthetic sparing effect (time-related MAC reduction) following IV detomidine (0.03 and 0.06 mg kg -1 ). Selected common measures of cardiopulmonary function, blood glucose and urinary output were also recorded. Isoflurane MAC was 1.44 ± 0.07% (mean ± SEM). This was reduced by 42.8 ± 5.4% and 44.8 ± 3.0% at 83 ± 23 and 125 ± 36 minutes, respectively, following 0.03 and 0.06 mg kg -1 , detomidine. The MAC reduction was detomidine dose- and time-dependent. There was a tendency for mild cardiovascular and respiratory depression, especially following the higher detomidine dose. Detomidine increased both blood glucose and urine flow; the magnitude of these changes was time- and dose-dependent CONCLUSIONS: Detomidine reduces anesthetic requirement for isoflurane and increases blood glucose concentration and urine flow in horses. These changes were dose- and time-related. The results imply potent anesthetic sparing actions by detomidine. The detomidine-related increased urine flow should be considered in designing anesthetic protocols for individual horses. Copyright © 2002 Association of Veterinary Anaesthetists and American College of Veterinary Anesthesia and Analgesia. Published by Elsevier Ltd. All rights reserved.
A particularly pathogenic group of mycobacteria belong to the Mycobacterium avium complex (MAC), which includes M. avium and M. intracellulare. MAC organisms cause disease in children, the elderly, and immuno-compromised individuals. A critical step in preventing MAC infections...
MacIntyre, Managerialism and Universities
ERIC Educational Resources Information Center
Stolz, Steven A.
2017-01-01
MacIntyre's earlier work and concern with social science enquiry not only exposes its limits, but also provides an insight into how its knowledge claims have been put to ideological use. He maintains that the institutional embodiment of these ideological ideas is the bureaucratic manager who has had a negative role to play in social structures…
Role-based access control permissions
Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander
2017-04-25
Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.
SMAC: A soft MAC to reduce control overhead and latency in CDMA-based AMI networks
Garlapati, Shravan; Kuruganti, Teja; Buehrer, Michael R.; ...
2015-10-26
The utilization of state-of-the-art 3G cellular CDMA technologies in a utility owned AMI network results in a large amount of control traffic relative to data traffic, increases the average packet delay and hence are not an appropriate choice for smart grid distribution applications. Like the CDG, we consider a utility owned cellular like CDMA network for smart grid distribution applications and classify the distribution smart grid data as scheduled data and random data. Also, we propose SMAC protocol, which changes its mode of operation based on the type of the data being collected to reduce the data collection latency andmore » control overhead when compared to 3G cellular CDMA2000 MAC. The reduction in the data collection latency and control overhead aids in increasing the number of smart meters served by a base station within the periodic data collection interval, which further reduces the number of base stations needed by a utility or reduces the bandwidth needed to collect data from all the smart meters. The reduction in the number of base stations and/or the reduction in the data transmission bandwidth reduces the CAPital EXpenditure (CAPEX) and OPerational EXpenditure (OPEX) of the AMI network. Finally, the proposed SMAC protocol is analyzed using markov chain, analytical expressions for average throughput and average packet delay are derived, and simulation results are also provided to verify the analysis.« less
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a... title. All waters within Tampa Bay, Florida in the vicinity of MacDill Air Force Base, including...
Characterization of the Murine Myeloid Precursor Cell Line MuMac-E8
Fricke, Stephan; Riemschneider, Sina; Kohlschmidt, Janine; Hilger, Nadja; Fueldner, Christiane; Knauer, Jens; Sack, Ulrich; Emmrich, Frank; Lehmann, Jörg
2014-01-01
Starting point for the present work was the assumption that the cell line MuMac-E8 represents a murine cell population with stem cell properties. Preliminary studies already pointed to the expression of stem-cell associated markers and a self-regenerative potential of the cells. The cell line MuMac-E8 should be examined for their differential stage within stem cell hierarchy. MuMac-E8 cells were derived from a chimeric mouse model of arthritis. It could be shown that MuMac-E8 cells express mRNA of some genes associated with pluripotent stem cells (Nanog, Nucleostemin), of genes for hematopoietic markers (EPCR, Sca-1, CD11b, CD45), for the mesenchymal marker CD105 and of genes for the neural markers Pax-6 and Ezrin. In methylcellulose and May-Grünwald-Giemsa staining, hematopoietic colonies were obtained but the hematopoietic system of lethally irradiated mice could not be rescued. Osteogenic differentiation was not detectable. Thus, it became evident that MuMac-E8 represents not a stem cell line. However, MuMac-E8 cells expressed several myeloid surface markers (i.e. CD11b, F4/80, CD14, CD64), showed phagocytosis and is capable of producing nitric oxide. Thus, this cell line seems to be arrested an advanced stage of myeloid differentiation. Adherence data measured by impedance-based real-time cell analysis together with cell morphology data suggested that MuMac-E8 represents a new macrophage precursor cell line exhibiting weak adherence. This cell line is suitable as an in-vitro model for testing of macrophage functions. Moreover, it might be also useful for differentiation or reprogramming studies. PMID:25546418
Millisecond timing on PCs and Macs.
MacInnes, W J; Taylor, T L
2001-05-01
A real-time, object-oriented solution for displaying stimuli on Windows 95/98, MacOS and Linux platforms is presented. The program, written in C++, utilizes a special-purpose window class (GLWindow), OpenGL, and 32-bit graphics acceleration; it avoids display timing uncertainty by substituting the new window class for the default window code for each system. We report the outcome of tests for real-time capability across PC and Mac platforms running a variety of operating systems. The test program, which can be used as a shell for programming real-time experiments and testing specific processors, is available at http://www.cs.dal.ca/~macinnwj. We propose to provide researchers with a sense of the usefulness of our program, highlight the ability of many multitasking environments to achieve real time, as well as caution users about systems that may not achieve real time, even under optimal conditions.
Low-power low-latency MAC protocol for aeronautical applications
NASA Astrophysics Data System (ADS)
Sabater, Jordi; Kluge, Martin; Bovelli, Sergio; Schalk, Josef
2007-05-01
This paper describes asynchronous MAC (Medium Access Control) strategies based on the IEEE 802.15.4 physical layer for wireless aeronautical applications where low power and low latency are important requirements as well as security and data integrity. Sensor data is acquired and collected on request, by means of a mobile device, and later stored in a centralized database. In order to have the smallest power consumption the wireless sensor has to remain in deep sleep mode as long as possible and wake up and listen periodically for RF activity. If its unique ID is mentioned in the destination address field, the complete frame is received, processed and replied if necessary. If the detected packet is addressed to another sensor the reception will stop immediately and the wireless sensor will go into deep sleep mode again. Listening instead of sending actively does not 'pollute' the already crowded 2.45GHz spectrum, reduces collisions and increases security. The mobile data concentrator can not be synchronized with all the sensors installed in a distributed environment, therefore smart asynchronous data transmission strategies are needed to reduce latencies and increase throughput. For the considered application, sensors are independent of each other, simply share the medium and together with the data concentrator are organized in a star network topology. The centre of the star is the concentrator which is rarely in range. It coordinates and activates the wireless sensor nodes to collect the measured data.
MAP, MAC, and vortex-rings configurations in the Weinberg-Salam model
NASA Astrophysics Data System (ADS)
Teh, Rosy; Ng, Ban-Loong; Wong, Khai-Ming
2015-11-01
We report on the presence of new axially symmetric monopoles, antimonopoles and vortex-rings solutions of the SU(2)×U(1) Weinberg-Salam model of electromagnetic and weak interactions. When the ϕ-winding number n = 1, and 2, the configurations are monopole-antimonopole pair (MAP) and monopole-antimonopole chain (MAC) with poles of alternating sign magnetic charge arranged along the z-axis. Vortex-rings start to appear from the MAP and MAC configurations when the winding number n = 3. The MAP configurations possess zero net magnetic charge whereas the MAC configurations possess net magnetic charge of 4 πn / e. In the MAP configurations, the monopole-antimonopole pair is bounded by the Z0 field flux string and there is an electromagnetic current loop encircling it. The monopole and antimonopole possess magnetic charges ± 4πn/e sin2θW respectively. In the MAC configurations there is no string connecting the monopole and the adjacent antimonopole and they possess magnetic charges ± 4 πn/e respectively. The MAC configurations possess infinite total energy and zero magnetic dipole moment whereas the MAP configurations which are actually sphalerons possess finite total energy and magnetic dipole moment. The configurations were investigated for varying values of Higgs self-coupling constant 0 ≤ λ ≤ 40 at Weinberg angle θW = π/4.
Annexin V-MACS in infertile couples as method for separation of sperm without DNA fragmentation.
Troya, Jhon; Zorrilla, Ingrid
2015-05-01
To determine the effect of using MACS technology on clinical pregnancy, as a method for separation of damaged sperm in infertile patients. 136 infertile men having normal semen parameters in accordance with WHO 2010 criterion, undergoing ICSI cycle were enrolled during the course of the study. The patients were prospectively randomized and enrolled after oocyte retrieval and were assigned to the ICSI group, PICSI group or MACS group. Embryo development and clinical pregnancy were assessed. In 17 randomized MACS patients, sperm DNA fragmentation was tested in the presumptive apoptotic and no apoptotic spermatozoa fractions. Similar results were obtained between groups for the following parameters: fertilization rates of 78.97% (95% confidence interval [CI]:74.37-83.57), 70.15 %(95% CI:63.98-76.33) and 80.28%(95% CI:73.74-86.81) for ICSI, PICSI and MACS group, respectively; Number of Day-3 embryos was 5.04 (95% CI:4.09-5.98), 5.17(95% CI:4.24-6.10) and 5.59(95% CI:4.31-6.87) for ICSI, PICSI and MACS group, respectively; number of freezing embryos in blastocyst stage was 0.78 (95% CI:0.25- 1.31), 0.70(95% CI:0.27-1.14) and 1 (95% CI:0.37-1.6) for ICSI, PICSI and MACS group, respectively. However, clinical pregnancy rates of 58.1% for MACS group versus 40.4% and 27.3% for PICSI and ICSI group, respectively, were showed statistical difference (P=0.019). DNA fragmentation index for the two sperm MACS fraction showed statistical differences (P=0.000), MACS reduced the D.F.I of the sperm sample. The use of MACS technology improves the clinical pregnancy on infertile couples and can be applied as a method for sperm separation, discriminating sperm with high DNA fragmentation.
Schuerner, Philipp; Grande, Bastian; Piegeler, Tobias; Schlaepfer, Martin; Saager, Leif; Hutcherson, Matthew T; Spahn, Donat R; Ruetzler, Kurt
2016-01-01
Sufficient ventilation and oxygenation through proper airway management is essential in patients undergoing cardio-pulmonary resuscitation (CPR). Although widely discussed, securing the airway using an endotracheal tube is considered the standard of care. Endotracheal intubation may be challenging and causes prolonged interruption of chest compressions. Videolaryngoscopes have been introduced to better visualize the vocal cords and accelerate intubation, which makes endotracheal intubation much safer and may contribute to intubation success. Therefore, we aimed to compare hands-off time and intubation success of direct laryngoscopy with videolaryngoscopy (C-MAC, Karl Storz, Tuttlingen, Germany) in a randomized, cross-over manikin study. Twenty-six anesthesia residents and twelve anesthesia consultants of the University Hospital Zurich were recruited through a voluntary enrolment. All participants performed endotracheal intubation using direct laryngoscopy and C-MAC in a random order during ongoing chest compressions. Participants were strictly advised to stop chest compression only if necessary. The median hands-off time was 1.9 seconds in direct laryngoscopy, compared to 3 seconds in the C-MAC group. In direct laryngoscopy 39 intubation attempts were recorded, resulting in an overall first intubation attempt success rate of 97%, compared to 38 intubation attempts and 100% overall first intubation attempt success rate in the C-MAC group. As a conclusion, the results of our manikin-study demonstrate that video laryngoscopes might not be beneficial compared to conventional, direct laryngoscopy in easily accessible airways under CPR conditions and in experienced hands. The benefits of video laryngoscopes are of course more distinct in overcoming difficult airways, as it converts a potential "blind intubation" into an intubation under visual control.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Greene, Nicholas P.; Kaplan, Elise; Crow, Allister; Koronakis, Vassilis
2018-01-01
The MacB ABC transporter forms a tripartite efflux pump with the MacA adaptor protein and TolC outer membrane exit duct to expel antibiotics and export virulence factors from Gram-negative bacteria. Here, we review recent structural and functional data on MacB and its homologs. MacB has a fold that is distinct from other structurally characterized ABC transporters and uses a unique molecular mechanism termed mechanotransmission. Unlike other bacterial ABC transporters, MacB does not transport substrates across the inner membrane in which it is based, but instead couples cytoplasmic ATP hydrolysis with transmembrane conformational changes that are used to perform work in the extra-cytoplasmic space. In the MacAB-TolC tripartite pump, mechanotransmission drives efflux of antibiotics and export of a protein toxin from the periplasmic space via the TolC exit duct. Homologous tripartite systems from pathogenic bacteria similarly export protein-like signaling molecules, virulence factors and siderophores. In addition, many MacB-like ABC transporters do not form tripartite pumps, but instead operate in diverse cellular processes including antibiotic sensing, cell division and lipoprotein trafficking. PMID:29892271
Greene, Nicholas P; Kaplan, Elise; Crow, Allister; Koronakis, Vassilis
2018-01-01
The MacB ABC transporter forms a tripartite efflux pump with the MacA adaptor protein and TolC outer membrane exit duct to expel antibiotics and export virulence factors from Gram-negative bacteria. Here, we review recent structural and functional data on MacB and its homologs. MacB has a fold that is distinct from other structurally characterized ABC transporters and uses a unique molecular mechanism termed mechanotransmission. Unlike other bacterial ABC transporters, MacB does not transport substrates across the inner membrane in which it is based, but instead couples cytoplasmic ATP hydrolysis with transmembrane conformational changes that are used to perform work in the extra-cytoplasmic space. In the MacAB-TolC tripartite pump, mechanotransmission drives efflux of antibiotics and export of a protein toxin from the periplasmic space via the TolC exit duct. Homologous tripartite systems from pathogenic bacteria similarly export protein-like signaling molecules, virulence factors and siderophores. In addition, many MacB-like ABC transporters do not form tripartite pumps, but instead operate in diverse cellular processes including antibiotic sensing, cell division and lipoprotein trafficking.
Task Delegation Based Access Control Models for Workflow Systems
NASA Astrophysics Data System (ADS)
Gaaloul, Khaled; Charoy, François
e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.
Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua
2011-01-01
Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.
Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua
2011-01-01
Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay. PMID:22319385
Public Relations as "Practice": Applying the Theory of Alasdair MacIntyre.
ERIC Educational Resources Information Center
Leeper, Roy V.; Leeper, Kathie A.
2001-01-01
Considers how public relation's search for a unifying theory may be fulfilled through application of Alasdair MacIntyre's concept of a "practice," a very specific and value-laden concept. Explores what it would mean to be a public relations practice in MacIntyre's concept of the term and argues that such an approach to public relations…
Review of SDDOT's highway access control process
DOT National Transportation Integrated Search
2000-02-01
This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...
Typing for Conflict Detection in Access Control Policies
NASA Astrophysics Data System (ADS)
Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge
In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.
Deriving health utilities from the MacNew Heart Disease Quality of Life Questionnaire.
Chen, Gang; McKie, John; Khan, Munir A; Richardson, Jeff R
2015-10-01
Quality of life is included in the economic evaluation of health services by measuring the preference for health states, i.e. health state utilities. However, most intervention studies include a disease-specific, not a utility, instrument. Consequently, there has been increasing use of statistical mapping algorithms which permit utilities to be estimated from a disease-specific instrument. The present paper provides such algorithms between the MacNew Heart Disease Quality of Life Questionnaire (MacNew) instrument and six multi-attribute utility (MAU) instruments, the Euroqol (EQ-5D), the Short Form 6D (SF-6D), the Health Utilities Index (HUI) 3, the Quality of Wellbeing (QWB), the 15D (15 Dimension) and the Assessment of Quality of Life (AQoL-8D). Heart disease patients and members of the healthy public were recruited from six countries. Non-parametric rank tests were used to compare subgroup utilities and MacNew scores. Mapping algorithms were estimated using three separate statistical techniques. Mapping algorithms achieved a high degree of precision. Based on the mean absolute error and the intra class correlation the preferred mapping is MacNew into SF-6D or 15D. Using the R squared statistic the preferred mapping is MacNew into AQoL-8D. The algorithms reported in this paper enable MacNew data to be mapped into utilities predicted from any of six instruments. This permits studies which have included the MacNew to be used in cost utility analyses which, in turn, allows the comparison of services with interventions across the health system. © The European Society of Cardiology 2014.
El-Sayed, Karim M Fawzy; Paris, Sebastian; Graetz, Christian; Kassem, Neemat; Mekhemar, Mohamed; Ungefroren, Hendrick; Fändrich, Fred; Dörfer, Christof
2015-01-01
Recently, gingival margin-derived stem/progenitor cells isolated via STRO-1/magnetic activated cell sorting (MACS) showed remarkable periodontal regenerative potential in vivo. As a second-stage investigation, the present study's aim was to perform in vitro characterisation and comparison of the stem/progenitor cell characteristics of sorted STRO-1-positive (MACS+) and STRO-1-negative (MACS−) cell populations from the human free gingival margin. Cells were isolated from the free gingiva using a minimally invasive technique and were magnetically sorted using anti-STRO-1 antibodies. Subsequently, the MACS+ and MACS− cell fractions were characterized by flow cytometry for expression of CD14, CD34, CD45, CD73, CD90, CD105, CD146/MUC18 and STRO-1. Colony-forming unit (CFU) and multilineage differentiation potential were assayed for both cell fractions. Mineralisation marker expression was examined using real-time polymerase chain reaction (PCR). MACS+ and MACS− cell fractions showed plastic adherence. MACS+ cells, in contrast to MACS− cells, showed all of the predefined mesenchymal stem/progenitor cell characteristics and a significantly higher number of CFUs (P<0.01). More than 95% of MACS+ cells expressed CD105, CD90 and CD73; lacked the haematopoietic markers CD45, CD34 and CD14, and expressed STRO-1 and CD146/MUC18. MACS− cells showed a different surface marker expression profile, with almost no expression of CD14 or STRO-1, and more than 95% of these cells expressed CD73, CD90 and CD146/MUC18, as well as the haematopoietic markers CD34 and CD45 and CD105. MACS+ cells could be differentiated along osteoblastic, adipocytic and chondroblastic lineages. In contrast, MACS− cells demonstrated slight osteogenic potential. Unstimulated MACS+ cells showed significantly higher expression of collagen I (P<0.05) and collagen III (P<0.01), whereas MACS− cells demonstrated higher expression of osteonectin (P<0.05; Mann–Whitney). The present study is the first to
Chavakis, Triantafyllos; Santoso, Sentot; Clemetson, Kenneth J; Sachs, Ulrich J H; Isordia-Salas, Irma; Pixley, Robin A; Nawroth, Peter P; Colman, Robert W; Preissner, Klaus T
2003-11-14
Leukocyte-platelet interaction is important in mediating leukocyte adhesion to a thrombus and leukocyte recruitment to a site of vascular injury. This interaction is mediated at least in part by the beta2-integrin Mac-1 (CD11b/CD18) and its counter-receptor on platelets, glycoprotein Ibalpha (GPIbalpha). High molecular weight kininogen (HK) was previously shown to interact with both GPIbalpha and Mac-1 through its domains 3 and 5, respectively. In this study we investigated the ability of HK to interfere with the leukocyte-platelet interaction. In a purified system, HK binding to GPIbalpha was inhibited by HK domain 3 and the monoclonal antibody (mAb) SZ2, directed against the epitope 269-282 of GPIbalpha, whereas mAb AP1, directed to the region 201-268 of GPIbalpha had no effect. In contrast, mAb AP1 inhibited the Mac-1-GPIbalpha interaction. Binding of GPIbalpha to Mac-1 was enhanced 2-fold by HK. This effect of HK was abrogated in the presence of HK domains 3 or 5 or peptides from the 475-497 region of the carboxyl terminus of domain 5 as well as in the presence of mAb SZ2 but not mAb AP1. Whereas no difference in the affinity of the Mac-1-GPIbalpha interaction was observed in the absence or presence of HK, maximal binding of GPIbalpha to Mac-1 doubled in the presence of HK. Moreover, HK/HKa increased the Mac-1-dependent adhesion of myelomonocytic U937 cells and K562 cells transfected with Mac-1 to immobilized GPIbalpha or to GPIbalpha-transfected Chinese hamster ovary cells. Finally, Mac-1-dependent adhesion of neutrophils to surface-adherent platelets was enhanced by HK. Thus, HK can bridge leukocytes with platelets by interacting via its domain 3 with GPIbalpha and via its domain 5 with Mac-1 thereby augmenting the Mac-1-GPIbalpha interaction. These distinct molecular interactions of HK with leukocytes and platelets contribute to the regulation of the adhesive behavior of vascular cells and provide novel molecular targets for reducing atherothrombotic
Ghedini, Giulia; Loreau, Michel; White, Craig R; Marshall, Dustin J
2018-05-20
Robert MacArthur developed a theory of community assembly based on competition. By incorporating energy flow, MacArthur's theory allows for predictions of community function. A key prediction is that communities minimise energy wastage over time, but this minimisation is a trade-off between two conflicting processes: exploiting food resources, and maintaining low metabolism and mortality. Despite its simplicity and elegance, MacArthur's principle has not been tested empirically despite having long fascinated theoreticians. We used a combination of field chronosequence experiments and laboratory assays to estimate how the energy wastage of a community changes during succession. We found that older successional stages wasted more energy in maintenance, but there was no clear pattern in how communities of different age exploited food resources. We identify several reasons for why MacArthur's original theory may need modification and new avenues to further explore community efficiency, an understudied component of ecosystem functioning. © 2018 John Wiley & Sons Ltd/CNRS.
Industrial WSN Based on IR-UWB and a Low-Latency MAC Protocol
NASA Astrophysics Data System (ADS)
Reinhold, Rafael; Underberg, Lisa; Wulf, Armin; Kays, Ruediger
2016-07-01
Wireless sensor networks for industrial communication require high reliability and low latency. As current wireless sensor networks do not entirely meet these requirements, novel system approaches need to be developed. Since ultra wideband communication systems seem to be a promising approach, this paper evaluates the performance of the IEEE 802.15.4 impulse-radio ultra-wideband physical layer and the IEEE 802.15.4 Low Latency Deterministic Network (LLDN) MAC for industrial applications. Novel approaches and system adaptions are proposed to meet the application requirements. In this regard, a synchronization approach based on circular average magnitude difference functions (CAMDF) and on a clean template (CT) is presented for the correlation receiver. An adapted MAC protocol titled aggregated low latency (ALL) MAC is proposed to significantly reduce the resulting latency. Based on the system proposals, a hardware prototype has been developed, which proves the feasibility of the system and visualizes the real-time performance of the MAC protocol.
A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks
Tong, Fei; Xie, Rong; Shu, Lei; Kim, Young-Chon
2011-01-01
Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs) such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC) for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency. PMID:22163895
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Design and Analysis of a Low Latency Deterministic Network MAC for Wireless Sensor Networks.
Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin
2017-09-22
The IEEE 802.15.4e standard has four different superframe structures for different applications. Use of a low latency deterministic network (LLDN) superframe for the wireless sensor network is one of them, which can operate in a star topology. In this paper, a new channel access mechanism for IEEE 802.15.4e-based LLDN shared slots is proposed, and analytical models are designed based on this channel access mechanism. A prediction model is designed to estimate the possible number of retransmission slots based on the number of failed transmissions. Performance analysis in terms of data transmission reliability, delay, throughput and energy consumption are provided based on our proposed designs. Our designs are validated for simulation and analytical results, and it is observed that the simulation results well match with the analytical ones. Besides, our designs are compared with the IEEE 802.15.4 MAC mechanism, and it is shown that ours outperforms in terms of throughput, energy consumption, delay and reliability.
Design and Analysis of a Low Latency Deterministic Network MAC for Wireless Sensor Networks
Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin
2017-01-01
The IEEE 802.15.4e standard has four different superframe structures for different applications. Use of a low latency deterministic network (LLDN) superframe for the wireless sensor network is one of them, which can operate in a star topology. In this paper, a new channel access mechanism for IEEE 802.15.4e-based LLDN shared slots is proposed, and analytical models are designed based on this channel access mechanism. A prediction model is designed to estimate the possible number of retransmission slots based on the number of failed transmissions. Performance analysis in terms of data transmission reliability, delay, throughput and energy consumption are provided based on our proposed designs. Our designs are validated for simulation and analytical results, and it is observed that the simulation results well match with the analytical ones. Besides, our designs are compared with the IEEE 802.15.4 MAC mechanism, and it is shown that ours outperforms in terms of throughput, energy consumption, delay and reliability. PMID:28937632
Shen, Di; Podolnikova, Nataly P; Yakubenko, Valentin P; Ardell, Christopher L; Balabiyev, Arnat; Ugarova, Tatiana P; Wang, Xu
2017-11-17
Pleiotrophin (PTN) is a multifunctional, cationic, glycosaminoglycan-binding cytokine and growth factor involved in numerous physiological and pathological processes, including tissue repair and inflammation-related diseases. PTN has been shown to promote leukocyte responses by inducing their migration and expression of inflammatory cytokines. However, the mechanisms through which PTN mediates these responses remain unclear. Here, we identified the integrin Mac-1 (αMβ2, CD11b/CD18) as the receptor mediating macrophage adhesion and migration to PTN. We also found that expression of Mac-1 on the surface of human embryonic kidney (HEK) 293 cells induced their adhesion and migration to PTN. Accordingly, PTN promoted Mac-1-dependent cell spreading and initiated intracellular signaling manifested in phosphorylation of Erk1/2. While binding to PTN, Mac-1 on Mac-1-expressing HEK293 cells appears to cooperate with cell-surface proteoglycans because both anti-Mac-1 function-blocking mAb and heparin were required to block adhesion. Moreover, biolayer interferometry and NMR indicated a direct interaction between the α M I domain, the major ligand-binding region of Mac-1, and PTN. Using peptide libraries, we found that in PTN the α M I domain bound sequences enriched in basic and hydrophobic residues, indicating that PTN conforms to the general principle of ligand-recognition specificity of the α M I domain toward cationic proteins/peptides. Finally, using recombinant PTN-derived fragments, we show that PTN contains two distinct Mac-1-binding sites in each of its constitutive domains. Collectively, these results identify PTN as a ligand for the integrin Mac-1 on the surface of leukocytes and suggest that this interaction may play a role in inflammatory responses. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
Application of Multihop Relay for Performance Enhancement of AeroMACS Networks
NASA Technical Reports Server (NTRS)
Kamali, Behnam; Wilson, Jeffrey D.; Kerczewski, Robert J.
2012-01-01
A new transmission technology, based on IEEE 802.16-2009 (WiMAX), is currently being developed for airport surface communications. A C-band spectrum allocation at 5091-5150 MHz has been created by ITU to carry this application. The proposed technology, known as AeroMACS, will be used to support fixed and mobile ground to ground applications and services. This article proposes and demonstrates that IEEE 802.16j-amendment-based WiMAX is most feasible for AeroMACS applications. This amendment introduces multihop relay as an optional deployment that may be used to provide additional coverage and/or enhance the capacity of the network. Particular airport surface radio coverage situations for which IEEE 802.16-2009-WiMAX provides resolutions that are inefficient, costly, or excessively power consuming are discussed. In all these cases, it is argued that 16j technology offers a much better alternative. A major concern about deployment of AeroMACS is interference to co-allocated applications such as the Mobile Satellite Service (MSS) feeder link. Our initial simulation results suggest that no additional interference to MSS feeder link is caused by deployment of IEEE 802.16j-based AeroMACS.
Application of Multihop Relay for Performance Enhancement of AeroMACS Networks
NASA Technical Reports Server (NTRS)
Kamali, Behnam; Wilson, Jeffrey D.; Kerczewski, Robert J.
2012-01-01
A new transmission technology, based on IEEE 802.16-2009 (WiMAX), is currently being developed for airport surface communications. A C-band spectrum allocation at 5091 to 5150 MHz has been created by International Telecommunications Union (ITU) to carry this application. The proposed technology, known as AeroMACS, will be used to support fixed and mobile ground to ground applications and services. This article proposes and demonstrates that IEEE 802.16j-amendment-based WiMAX is most feasible for AeroMACS applications. This amendment introduces multihop relay as an optional deployment that may be used to provide additional coverage and/or enhance the capacity of the network. Particular airport surface radio coverage situations for which IEEE 802.16-2009-WiMAX provides resolutions that are inefficient, costly, or excessively power consuming are discussed. In all these cases, it is argued that 16j technology offers a much better alternative. A major concern about deployment of AeroMACS is interference to co-allocated applications such as the Mobile Satellite Service (MSS) feeder link. Our initial simulation results suggest that no additional interference to MSS feeder link is caused by deployment of IEEE 802.16j-based AeroMACS.
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
Context-aware access control for pervasive access to process-based healthcare systems.
Koufi, Vassiliki; Vassilacopoulos, George
2008-01-01
Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.
MacMillan Pier Transportation Center Feasibility Study.
DOT National Transportation Integrated Search
2006-06-01
The MacMillan Pier Transportation Center Feasibility Study examines two potential sites (landside and waterside) for a transportation center that provides a range of tourist and traveler information. It would serve as a gateway for Provincetown and t...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piao, Shunfu; Xu, Yongbin; Ha, Nam-Chul, E-mail: hnc@pusan.ac.kr
2008-05-01
A periplasmic membrane-fusion protein MacA from Actinobacillus actinomycetemcomitans, an essential component of the multidrug efflux pump in Gram-negative bacteria, was crystallized. Periplasmic membrane-fusion proteins (MFPs) are an essential component of the multidrug efflux pump in Gram-negative bacteria. They play a crucial role in bridging the outer membrane porin TolC and two distinct types of inner membrane transporters. The MFP MacA bridges the inner membrane ABC-type multidrug transporter MacB and the outer membrane porin TolC. MacA from the pathogenic bacterium Actinobacillus actinomycetemcomitans was expressed in Escherichia coli B834 (DE3) and the recombinant protein was purified using Ni–NTA affinity, Q anion-exchange andmore » gel-filtration chromatography. The purified MacA protein was crystallized using the vapour-diffusion method. A MAD diffraction data set was collected to a resolution of 3.0 Å at 100 K. The crystal belongs to space group P622, with unit-cell parameters a = b = 109.2, c = 255.4 Å, α = β = 90, γ = 120°, and contains one molecule in the asymmetric unit.« less
Self-Admitted Pretensions of Mac Users on a Predominantly PC University Campus
ERIC Educational Resources Information Center
Firmin, Michael W.; Wood, Whitney L. Muhlenkamp; Firmin, Ruth L.; Wood, Jordan C.
2010-01-01
The present qualitative research study addressed the overall research question of college students' pretention dynamics in the context of a university setting. Thirty-five Mac users were interviewed on a university campus that exclusively supports PC machines. Mac users shared four self-admitted pretensions related to using Macintosh computers.…
BIG MAC: A bolometer array for mid-infrared astronomy, Center Director's Discretionary Fund
NASA Technical Reports Server (NTRS)
Telesco, C. M.; Decher, R.; Baugher, C.
1985-01-01
The infrared array referred to as Big Mac (for Marshall Array Camera), was designed for ground based astronomical observations in the wavelength range 5 to 35 microns. It contains 20 discrete gallium-doped germanium bolometer detectors at a temperature of 1.4K. Each bolometer is irradiated by a square field mirror constituting a single pixel of the array. The mirrors are arranged contiguously in four columns and five rows, thus defining the array configuration. Big Mac utilized cold reimaging optics and an up looking dewar. The total Big Mac system also contains a telescope interface tube for mounting the dewar and a computer for data acquisition and processing. Initial astronomical observations at a major infrared observatory indicate that Big Mac performance is excellent, having achieved the design specifications and making this instrument an outstanding tool for astrophysics.
Evaluating the effectiveness of biometric access control systems
NASA Astrophysics Data System (ADS)
Lively, Valerie M.
2005-05-01
This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.
A dynamic access control method based on QoS requirement
NASA Astrophysics Data System (ADS)
Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang
2013-03-01
A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.
Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha, Fatemeh; Mu, Yi
2016-05-01
Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
MacMS: A Mass Spectrometer Simulator: Abstract of Issue 9906M
NASA Astrophysics Data System (ADS)
Bigger, Stephen W.; Craig, Robert A.
1999-10-01
, fixed-value range and gain settings, which can be used to enhance the resolution and sensitivity of the instrument respectively.
Esbert, M; Godo, A; Soares, S R; Florensa, M; Amorós, D; Ballesteros, A; Vidal, F
2017-07-01
Colloidal super-paramagnetic microbeads conjugated with annexin V are effective for separating apoptotic spermatozoa by MACS as a result of the high affinity of annexin V for externalized PS molecules. The effectiveness of the procedure in reducing the percentage of sperm with fragmented DNA and abnormal morphology has also been reported. However, it is still unknown if it could decrease the percentage of aneuploid spermatozoa. The objective of our prospective study, performed on 16 males with abnormal FISH on spermatozoa, was to assess if MACS columns were useful tools to retain spermatozoa carrying chromosomal abnormalities in semen samples processed after density gradient centrifugation (DGC). The pellet obtained after DGC was subjected to MACS, and sperm FISH analyses were performed both in the eluded fraction and in the fraction retained in the column. The observed frequencies of disomy and nullisomy 13, 18, and 21, X and Y, as well as the diploidy rates in the MACS eluded fraction and the fraction retained in the MACS column were recorded. We observed that the frequencies of aneuploidies in the eluded fraction were lower than in the fraction retained in the MACS column (0.59% vs. 0.75%; p = 0.010). DGC determined a significant reduction in sperm concentration (z-ratio = 2.83; p = 0.005) and a significant increase in sperm progressive motility (z-ratio = -3.5; p < 0.001). MACS also led to a significant reduction in sperm concentration (z-ratio = 3.14; p = 0.002) and a significant increase in progressive motility (z-ratio = -2.59; p = 0.01) when compared with the post-DGC sample. Sperm concentration was similar in the two fractions generated by MACS (z-ratio = 0.63; p = 0.52), while progressive motility was significantly higher in the MACS eluded fraction (z-ratio = 2.42; p = 0.02). According to our results, MACS columns are able to selectively retain spermatozoa carrying chromosomal abnormalities. Furthermore, the performance of DGC
THE EFFECT OF TEMPERATURE ON THE GROWTH OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS
MAC organisms are able to grow, persist, and colonize in water distribution systems and may amplify in hospital hot water systems. This study examined the response of MAC organisms (M. avium, M. intracellulare, and MX) to a range of temperatures commonly associated with drinking...
STS-52 MS Veach and Payload Specialist MacLean during JSC bailout exercises
NASA Technical Reports Server (NTRS)
1992-01-01
STS-52 Columbia, Orbiter Vehicle (OV) 102, Mission Specialist (MS) Charles Lacy Veach (left) and Canadian Payload Specialist Steven G. MacLean listen to a briefing during emergency egress (bailout) training exercises in JSC's Weightless Environment Training Facility (WETF) Bldg 29. Veach and MacLean are fully outfitted in launch and entry suits (LESs), launch and entry helmets (LEHs), parachutes, and water survival equipment including a life jacket. The WETF's 25-ft deep pool will simulate the ocean as the crewmember's prepare for the event of a water landing. MacLean represents the Canadian Space Agency (CSA).
Boksa, Kevin; Otte, Andrew; Pinal, Rodolfo
2014-09-01
A novel method for the simultaneous production and formulation of pharmaceutical cocrystals, matrix-assisted cocrystallization (MAC), is presented. Hot-melt extrusion (HME) is used to create cocrystals by coprocessing the drug and coformer in the presence of a matrix material. Carbamazepine (CBZ), nicotinamide (NCT), and Soluplus were used as a model drug, coformer, and matrix, respectively. The MAC product containing 80:20 (w/w) cocrystal:matrix was characterized by differential scanning calorimetry, Fourier transform infrared spectroscopy, and powder X-ray diffraction. A partial least squares (PLS) regression model was developed for quantifying the efficiency of cocrystal formation. The MAC product was estimated to be 78% (w/w) cocrystal (theoretical 80%), with approximately 0.3% mixture of free (unreacted) CBZ and NCT, and 21.6% Soluplus (theoretical 20%) with the PLS model. A physical mixture (PM) of a reference cocrystal (RCC), prepared by precipitation from solution, and Soluplus resulted in faster dissolution relative to the pure RCC. However, the MAC product with the exact same composition resulted in considerably faster dissolution and higher maximum concentration (∼five-fold) than those of the PM. The MAC product consists of high-quality cocrystals embedded in a matrix. The processing aspect of MAC plays a major role on the faster dissolution observed. The MAC approach offers a scalable process, suitable for the continuous manufacturing and formulation of pharmaceutical cocrystals. © 2014 Wiley Periodicals, Inc. and the American Pharmacists Association.
van Spriel, A B; Leusen, J H; van Egmond, M; Dijkman, H B; Assmann, K J; Mayadas, T N; van de Winkel, J G
2001-04-15
Receptors for human immunoglobulin (Ig)G and IgA initiate potent cytolysis of antibody (Ab)-coated targets by polymorphonuclear leukocytes (PMNs). Mac-1 (complement receptor type 3, CD11b/CD18) has previously been implicated in receptor cooperation with Fc receptors (FcRs). The role of Mac-1 in FcR-mediated lysis of tumor cells was characterized by studying normal human PMNs, Mac-1-deficient mouse PMNs, and mouse PMNs transgenic for human FcR. All PMNs efficiently phagocytosed Ab-coated particles. However, antibody-dependent cellular cytotoxicity (ADCC) was abrogated in Mac-1(-/-) PMNs and in human PMNs blocked with anti-Mac-1 monoclonal Ab (mAb). Mac-1(-/-) PMNs were unable to spread on Ab-opsonized target cells and other Ab-coated surfaces. Confocal laser scanning and electron microscopy revealed a striking difference in immunologic synapse formation between Mac-1(-/-) and wild-type PMNs. Also, respiratory burst activity could be measured outside membrane-enclosed compartments by using Mac-1(-/-) PMNs bound to Ab-coated tumor cells, in contrast to wild-type PMNs. In summary, these data document an absolute requirement of Mac-1 for FcR-mediated PMN cytotoxicity toward tumor targets. Mac-1(-/-) PMNs exhibit defective spreading on Ab-coated targets, impaired formation of immunologic synapses, and absent tumor cytolysis.
In-house access to PACS images and related data through World Wide Web
NASA Astrophysics Data System (ADS)
Mascarini, Christian; Ratib, Osman M.; Trayser, Gerhard; Ligier, Yves; Appel, R. D.
1996-05-01
The development of a hospital wide PACS is in progress at the University Hospital of Geneva and several archive modules are operational since 1992. This PACS is intended for wide distribution of images to clinical wards. As the PACS project and the number of archived images grow rapidly in the hospital, it was necessary to provide an easy, more widely accessible and convenient access to the PACS database for the clinicians in the different wards and clinical units of the hospital. An innovative solution has been developed using tools such as Netscape navigator and NCSA World Wide Web server as an alternative to conventional database query and retrieval software. These tools present the advantages of providing an user interface which is the same independently of the platform being used (Mac, Windows, UNIX, ...), and an easy integration of different types of documents (text, images, ...). A strict access control has been added to this interface. It allows user identification and access rights checking, as defined by the in-house hospital information system, before allowing the navigation through patient data records.
A MAC Protocol to Support Monitoring of Underwater Spaces.
Santos, Rodrigo; Orozco, Javier; Ochoa, Sergio F; Meseguer, Roc; Eggly, Gabriel; Pistonesi, Marcelo F
2016-06-27
Underwater sensor networks are becoming an important field of research, because of their everyday increasing application scope. Examples of their application areas are environmental and pollution monitoring (mainly oil spills), oceanographic data collection, support for submarine geolocalization, ocean sampling and early tsunamis alert. The challenge of performing underwater communications is well known, provided that radio signals are useless in this medium, and a wired solution is too expensive. Therefore, the sensors in these networks transmit their information using acoustic signals that propagate well under water. This data transmission type not only brings an opportunity, but also several challenges to the implementation of these networks, e.g., in terms of energy consumption, data transmission and signal interference. In order to help advance the knowledge in the design and implementation of these networks for monitoring underwater spaces, this paper proposes a MAC protocol for acoustic communications between the nodes, based on a self-organized time division multiple access mechanism. The proposal was evaluated using simulations of a real monitoring scenario, and the obtained results are highly encouraging.
MacArthur Competence Assessment Tool for Treatment in Alzheimer disease: cross-cultural adaptation.
Santos, Raquel Luiza; Sousa, Maria Fernanda Barroso de; Simões, José Pedro; Bertrand, Elodie; Mograbi, Daniel C; Landeira-Fernandez, Jesus; Laks, Jerson; Dourado, Marcia Cristina Nascimento
2017-01-01
We adapted the MacArthur Competence Assessment Tool for Treatment (MacCAT-T) to Brazilian Portuguese, pilot testing it on mild and moderate patients with Alzheimer's disease (AD). The cross-cultural process required six steps. Sixty-six patients with AD were assessed for competence to consent to treatment, global cognition, working memory, awareness of disease, functionality, depressive symptoms and dementia severity. The items had semantic, idiomatic, conceptual and experiential equivalence. We found no difference between mild and moderate patients with AD on the MacCAT-T domains. The linear regressions showed that reasoning (p = 0.000) and functional status (p = 0.003) were related to understanding. Understanding (p = 0.000) was related to appreciation and reasoning. Awareness of disease (p = 0.001) was related to expressing a choice. The MacCAT-T adaptation was well-understood and the constructs of the original version were maintained. The results of the pilot study demonstrated an available Brazilian tool focused on decision-making capacity in AD.
How Drug Control Policy and Practice Undermine Access to Controlled Medicines
Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.
2017-01-01
Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556
How Drug Control Policy and Practice Undermine Access to Controlled Medicines.
Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K
2017-06-01
Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.
Programmable Direct-Memory-Access Controller
NASA Technical Reports Server (NTRS)
Hendry, David F.
1990-01-01
Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.
NASA Technical Reports Server (NTRS)
Milholen, William E., II; Jones, Gregory S.; Chan, David T.; Goodliff, Scott L.; Anders, Scott G.; Melton, Latunia P.; Carter, Melissa B.; Allan, Brian G.; Capone, Francis J.
2013-01-01
A second wind tunnel test of the FAST-MAC circulation control model was recently completed in the National Transonic Facility at the NASA Langley Research Center. The model was equipped with four onboard flow control valves allowing independent control of the circulation control plenums, which were directed over a 15% chord simple-hinged flap. The model was configured for low-speed high-lift testing with flap deflections of 30 and 60 degrees, along with the transonic cruise configuration with zero degree flap deflection. Testing was again conducted over a wide range of Mach numbers up to 0.88, and Reynolds numbers up to 30 million based on the mean chord. The first wind tunnel test had poor transonic force and moment data repeatability at mild cryogenic conditions due to inadequate thermal conditioning of the balance. The second test demonstrated that an improvement to the balance heating system significantly improved the transonic data repeatability, but also indicated further improvements are still needed. The low-speed highlift performance of the model was improved by testing various blowing slot heights, and the circulation control was again demonstrated to be effective in re-attaching the flow over the wing at off-design transonic conditions. A new tailored spanwise blowing technique was also demonstrated to be effective at transonic conditions with the benefit of reduced mass flow requirements.
Macular telangiectasia type 2 (MacTel) in a 34-year-old patient
Nicolai, Heleen; Wirix, Mieke; Spielberg, Leigh; Leys, Anita
2014-01-01
We report macular telangiectasia type 2 (MacTel) in a 34-year-old man, the youngest patient so far published with MacTel type 2. The patient presented with metamorphopsia and impaired reading ability. Diagnosis was based on bilateral abnormal macular autofluorescence, perifoveal telangiectasia with fluorescein angiographic hyperfluorescence without cystoid oedema, a small foveal avascular zone, asymmetric configuration of the foveal pit, disruptions in the inner segment/outer segment layer and hyper-reflective haze and spots in the outer nuclear layer. Although MacTel usually manifests with a slowly progressive decrease in visual acuity in the fifth to seventh decades of life, younger patients may occasionally be diagnosed with the disease. Awareness of subtle signs of the condition is essential for early diagnosis. PMID:25249218
Walking on water: the biomechanics of Michael A. MacConaill (1902-1987).
Prendergast, P J; Lee, T C
2006-01-01
Biomechanics is a subject that draws on knowledge from many disciplines. One of its great practitioners in the last century was the Irish anatomist M.A. MacConaill. In this paper, we review some of MacConaill's fundamental contributions to biomechanics, namely: the hydrodynamic theory of synovial joint lubrication, the kinematics of joint motion and conjunct rotations; and the theory of spurt and shunt muscles. The aim is to revisit these topics in the light of current research, and to draw some conclusions about the import of his research in the context of recent developments in the field. The paper concludes with a discussion of science in Ireland, the development of the field of biomechanics since MacConaill's time, and some other matters.
FUKUI, Sho; OOYAMA, Norihiko; TAMURA, Jun; UMAR, Mohammed Ahmed; ISHIZUKA, Tomohito; ITAMI, Takaharu; MIYOSHI, Kenjiro; SANO, Tadashi; YAMASHITA, Kazuto
2017-01-01
Maropitant, a neurokinin-1 receptor antagonist, may provide analgesic effects by blocking pharmacological action of substance P. Carprofen is a non-steroidal anti-inflammatory drug commonly used for pain control in dogs. The purpose of this study was to evaluate the effect of a combination of maropitant and carprofen on the minimum alveolar concentration for blunting adrenergic response (MAC-BAR) of sevoflurane in dogs. Six healthy adult beagle dogs were anesthetized with sevoflurane four times with a minimum of 7-day washout period. On each occasion, maropitant (1 mg/kg) alone, carprofen (4 mg/kg) alone, a combination of maropitant (1 mg/kg) and carprofen (4 mg/kg), or saline (0.1 ml/kg) was subcutaneously administered at 1 hr prior to the first electrical stimulation for the sevoflurane MAC-BAR determination. The sevoflurane MAC-BAR was significantly reduced by maropitant alone (2.88 ± 0.73%, P=0.010), carprofen alone (2.96 ± 0.38%, P=0.016) and the combination (2.81 ± 0.51%, P=0.0003), compared with saline (3.37 ± 0.56%). There was no significant difference in the percentage of MAC-BAR reductions between maropitant alone, carprofen alone and the combination. The administration of maropitant alone and carprofen alone produced clinically significant sparing effects on the sevoflurane MAC-BAR in dogs. However, the combination of maropitant and carprofen did not produce any additive effect on the sevoflurane MAC-BAR reduction. Anesthetic premedication with a combination of maropitant and carprofen may not provide any further sparing effect on anesthetic requirement in dogs. PMID:28111373
Fukui, Sho; Ooyama, Norihiko; Tamura, Jun; Umar, Mohammed Ahmed; Ishizuka, Tomohito; Itami, Takaharu; Miyoshi, Kenjiro; Sano, Tadashi; Yamashita, Kazuto
2017-03-18
Maropitant, a neurokinin-1 receptor antagonist, may provide analgesic effects by blocking pharmacological action of substance P. Carprofen is a non-steroidal anti-inflammatory drug commonly used for pain control in dogs. The purpose of this study was to evaluate the effect of a combination of maropitant and carprofen on the minimum alveolar concentration for blunting adrenergic response (MAC-BAR) of sevoflurane in dogs. Six healthy adult beagle dogs were anesthetized with sevoflurane four times with a minimum of 7-day washout period. On each occasion, maropitant (1 mg/kg) alone, carprofen (4 mg/kg) alone, a combination of maropitant (1 mg/kg) and carprofen (4 mg/kg), or saline (0.1 ml/kg) was subcutaneously administered at 1 hr prior to the first electrical stimulation for the sevoflurane MAC-BAR determination. The sevoflurane MAC-BAR was significantly reduced by maropitant alone (2.88 ± 0.73%, P=0.010), carprofen alone (2.96 ± 0.38%, P=0.016) and the combination (2.81 ± 0.51%, P=0.0003), compared with saline (3.37 ± 0.56%). There was no significant difference in the percentage of MAC-BAR reductions between maropitant alone, carprofen alone and the combination. The administration of maropitant alone and carprofen alone produced clinically significant sparing effects on the sevoflurane MAC-BAR in dogs. However, the combination of maropitant and carprofen did not produce any additive effect on the sevoflurane MAC-BAR reduction. Anesthetic premedication with a combination of maropitant and carprofen may not provide any further sparing effect on anesthetic requirement in dogs.
The Polish MacNew heart disease heath-related quality of life questionnaire: a validation study.
Moryś, Joanna M; Höfer, Stefan; Rynkiewicz, Andrzej; Oldridge, Neil Bryan
2015-01-01
The MacNew health-related quality of life questionnaire was designed to assess feelings about how heart disease affects their daily physical, emotional and social functioning in patients with 1 of the 3 major coronary artery diagnoses, stable coronary artery disease (CAD) with angina, ST-elevation myocardial infarction (STEMI), and ischemic heart failure (HF). The aim of this study was to determine the reliability and validity of the Polish version of the MacNew in patients with CAD. Patients with CAD completed a self-report sociodemographic and clinical ques-tionnaire: the MacNew, the Short-Form 36 Health Survey, and HADS at baseline; 10% of the patients completed each questionnaire 2 weeks later. We studied patients with stable CAD with angina (n = 115), with STEMI (n = 112), and with ischemic HF (n = 105). Internal consistency reliability was demonstrated with Cronbach's a from 0.86 to 0.95 for the MacNew global scale and subscales. The original 3-factor structure was confirmed for the Polish version of the MacNew explaining 53.5% of the variance. Convergent validity of similar MacNew and SF-36 subscales was confirmed in the total group and in each diagnosis. Discriminant validity with the SF-36 health transition was fully confirmed in the total group and in patients with HF and partially confirmed in patients with stable CAD with angina or myocardial infarction. The Polish MacNew health-related quality of life questionnaire can be recommended in patients with stable CAD with angina, myocardial infarction and HF.
The vertex operator for a generalization of MacMahon’s formula
NASA Astrophysics Data System (ADS)
Cai, Liqiang; Wang, Lifang; Wu, Ke; Yang, Jie
2015-10-01
We provide a vertex operator realization for a two-parameter generalization of MacMahon’s formula introduced by M. Vuletić [Trans. Amer. Math. Soc. 361, 2789 (2009)]. Since the generalized MacMahon function is the kernel function of some Macdonald symmetric function, we consider the action of two vertex operators on a state corresponding to a Macdonald symmetric function. It becomes evident that the vertex operators appear to be the creation and annihilation operators, respectively on the state.
Rosso, Isabelle M; Killgore, William D S; Olson, Elizabeth A; Webb, Christian A; Fukunaga, Rena; Auerbach, Randy P; Gogel, Hannah; Buchholz, Jennifer L; Rauch, Scott L
2017-03-01
Prior research has shown that the Sadness Program, a technician-assisted Internet-based cognitive behavioral therapy (iCBT) intervention developed in Australia, is effective for treating major depressive disorder (MDD). The current study aimed to expand this work by adapting the protocol for an American population and testing the Sadness Program with an attention control group. In this parallel-group, randomized controlled trial, adult MDD participants (18-45 years) were randomized to a 10-week period of iCBT (n = 37) or monitored attention control (MAC; n = 40). Participants in the iCBT group completed six online therapy lessons, which included access to content summaries and homework assignments. During the 10-week trial, iCBT and MAC participants logged into the web-based system six times to complete self-report symptom scales, and a nonclinician technician contacted participants weekly to provide encouragement and support. The primary outcome was the Hamilton Rating Scale for Depression (HRSD), and the secondary outcomes were the Patient Health Questionnaire-9 and Kessler-10. Intent-to-treat analyses revealed significantly greater reductions in depressive symptoms in iCBT compared with MAC participants, using both the self-report measures and the clinician-rated HRSD (d = -0.80). Importantly, iCBT participants also showed significantly higher rates of clinical response and remission. Exploratory analyses did not support illness severity as a moderator of treatment outcome. The Sadness Program led to significant reductions in depression and distress symptoms. With its potential to be delivered in a scalable, cost-efficient manner, iCBT is a promising strategy to enhance access to effective care. © 2016 Wiley Periodicals, Inc.
MacA is a second cytochrome c peroxidase of Geobacter sulfurreducens.
Seidel, Julian; Hoffmann, Maren; Ellis, Katie E; Seidel, Antonia; Spatzal, Thomas; Gerhardt, Stefan; Elliott, Sean J; Einsle, Oliver
2012-04-03
The metal-reducing δ-proteobacterium Geobacter sulfurreducens produces a large number of c-type cytochromes, many of which have been implicated in the transfer of electrons to insoluble metal oxides. Among these, the dihemic MacA was assigned a central role. Here we have produced G. sulfurreducens MacA by recombinant expression in Escherichia coli and have solved its three-dimensional structure in three different oxidation states. Sequence comparisons group MacA into the family of diheme cytochrome c peroxidases, and the protein indeed showed hydrogen peroxide reductase activity with ABTS(-2) as an electron donor. The observed K(M) was 38.5 ± 3.7 μM H(2)O(2) and v(max) was 0.78 ± 0.03 μmol of H(2)O(2)·min(-1)·mg(-1), resulting in a turnover number k(cat) = 0.46 · s(-1). In contrast, no Fe(III) reductase activity was observed. MacA was found to display electrochemical properties similar to other bacterial diheme peroxidases, in addition to the ability to electrochemically mediate electron transfer to the soluble cytochrome PpcA. Differences in activity between CcpA and MacA can be rationalized with structural variations in one of the three loop regions, loop 2, that undergoes conformational changes during reductive activation of the enzyme. This loop is adjacent to the active site heme and forms an open loop structure rather than a more rigid helix as in CcpA. For the activation of the protein, the loop has to displace the distal ligand to the active site heme, H93, in loop 1. A H93G variant showed an unexpected formation of a helix in loop 2 and disorder in loop 1, while a M297H variant that altered the properties of the electron transfer heme abolished reductive activation.
MacA is a Second Cytochrome c Peroxidase of Geobacter sulfurreducens
Seidel, Julian; Hoffmann, Maren; Ellis, Katie E.; Seidel, Antonia; Spatzal, Thomas; Gerhardt, Stefan; Elliott, Sean J.
2012-01-01
The metal-reducing δ-proteobacterium Geobacter sulfurreducens produces a large number of c-type cytochromes, many of which have been implicated in the transfer of electrons to insoluble metal oxides. Among these, the dihemic MacA was assigned a central role. Here we have produced G. sulfurreducens MacA by recombinant expression in Escherichia coli and have solved its three-dimensional structure in three different oxidation states. Sequence comparisons group MacA into the family of diheme cytochrome c peroxidases, and the protein indeed showed hydrogen peroxide reductase activity with ABTS2– as an electron donor. The observed KM was 38.5 ± 3.7 μM H2O2 and vmax was 0.78 ± 0.03 μmol H2O2·min–1·mg–1, resulting in a turnover number kcat = 0.46 · s–1. In contrast, no Fe(III) reductase activity was observed. MacA was found to display similar electrochemical properties to other bacterial diheme peroxidases, in additional to the ability to electrochemically mediate electron transfer to the soluble cytochrome PpcA. Differences in activity between CcpA and MacA can be rationalized with structural variations in one of the three loop regions, loop 2, that undergo conformational changes during reductive activation of the enzyme. This loop is adjacent to the active site heme and forms an open loop structure rather than a more rigid helix as in CcpA. For the activation of the protein the loop has to displace the distal ligand to the active site heme, H93, in loop 1. A H93G variant showed an unexpected formation of a helix in loop 2 and disorder in loop 1, while a M297H variant that altered the properties of the electron transfer heme abolished reductive activation. PMID:22417533
Chandler, L S; Terhorst, L; Rogers, J C; Holm, M B
2016-07-01
The purpose of this study was to establish the validity, reliability, stability and sensitivity to change of the family-centred Movement Assessment of Children (MAC) in typically developing infants/toddlers from 2 months (1 month 16 days) to 2 years (24 months 15 days) of age. Assessment of infant/toddler motor development is critical so that infants and toddlers who are at-risk for developmental delay or whose functional motor development is delayed can be monitored and receive therapy to improve their developmental outcomes. Infants/toddlers are thought to be more responsive during the MAC assessment because parents and siblings participate and elicit responses. Two hundred seventy six children and 405 assessments contributed to the establishment of age-related parameters for typically developing infants and toddlers on the MAC. The MAC assesses three core domains of functional movement (head control, upper extremities and hands, pelvis and lower extremities), and generates a core total score. Four explanatory domains serve to alert examiners to factors that may impact atypical development (general observations, special senses, primitive reflexes/reactions, muscle tone). Construct validity of functional motor development was examined using the relationship between incremental increases in scores and increases in participants' ages. Subsamples were used to establish inter-rater reliability, test-retest reliability, stability and sensitivity to change. Construct validity was established and inter-rater reliability ICCs for the core items and core total ranged from 0.83 to 0.99. Percent agreement for the explanatory items ranged from 0.72 to 0.96. Stability within age grouping was consistent from baseline to 6 months post-baseline, and sensitivity to change from baseline to 6 months was significant for all core items and the total score. The MAC has proven to be a well-constructed assessment of infant and toddler functional motor development. It is a
Poincaré-MacMillan Equations of Motion for a Nonlinear Nonholonomic Dynamical System
NASA Astrophysics Data System (ADS)
Amjad, Hussain; Syed Tauseef, Mohyud-Din; Ahmet, Yildirim
2012-03-01
MacMillan's equations are extended to Poincaré's formalism, and MacMillan's equations for nonlinear nonholonomic systems are obtained in terms of Poincaré parameters. The equivalence of the results obtained here with other forms of equations of motion is demonstrated. An illustrative example of the theory is provided as well.
Xue, Fu-Shan; Li, Hui-Xian; Liu, Ya-Yang; Yang, Gui-Zhen
2017-01-01
The C-MAC videolaryngoscope is the first Macintosh-typed videolaryngoscope. Since the advent of its original version video Macintosh system in 1999, this device has been modified several times. A unique feature of C-MAC device is its ability to provide the 2 options of direct and video laryngoscopy with the same device. The available evidence shows that in patients with normal airways, C-MAC videolaryngoscope compared with direct laryngoscopy can provide comparable or better laryngeal views and exerts less force on maxillary incisors, but does not offer conclusive benefits with regard to intubation time, intubation success, number of intubation attempts, the use of adjuncts, and hemodynamic responses to intubation. In patients with predicted or known difficult airways, C-MAC videolaryngoscope can achieve a better laryngeal view, a higher intubation success rate and a shorter intubation time than direct laryngoscopy. Furthermore, the option to perform direct and video laryngoscopy with the same device makes C-MAC videolaryngoscope exceptionally useful for emergency intubation. In addition, the C-MAC videolaryngoscope is a very good tool for tracheal intubation teaching. However, tracheal intubation with C-MAC videolaryngoscope may occasionally fail and introduction of C-MAC videolaryngoscope in clinical practice must be accompanied by formal training programs in normal and difficult airway managements. PMID:28740393
Macular telangiectasia type 2 (MacTel) in a 34-year-old patient.
Nicolai, Heleen; Wirix, Mieke; Spielberg, Leigh; Leys, Anita
2014-09-23
We report macular telangiectasia type 2 (MacTel) in a 34-year-old man, the youngest patient so far published with MacTel type 2. The patient presented with metamorphopsia and impaired reading ability. Diagnosis was based on bilateral abnormal macular autofluorescence, perifoveal telangiectasia with fluorescein angiographic hyperfluorescence without cystoid oedema, a small foveal avascular zone, asymmetric configuration of the foveal pit, disruptions in the inner segment/outer segment layer and hyper-reflective haze and spots in the outer nuclear layer. Although MacTel usually manifests with a slowly progressive decrease in visual acuity in the fifth to seventh decades of life, younger patients may occasionally be diagnosed with the disease. Awareness of subtle signs of the condition is essential for early diagnosis. 2014 BMJ Publishing Group Ltd.
Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks
2013-09-16
fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011
View of Staff Officers' Quarters Area from Access Road. Building ...
View of Staff Officers' Quarters Area from Access Road. Building No. 401 is to the left, Building No. 405 is to the right, and Building No. 403 is in center background. Facing northeast - MacDill Air Force Base, Bounded by City of Tampa North, Tampa Bay South, Old Tampa Bay West, & Hillsborough Bay East, Tampa, Hillsborough County, FL
Deconstructing the McGurk-MacDonald Illusion
ERIC Educational Resources Information Center
Soto-Faraco, Salvador; Alsius, Agnes
2009-01-01
Cross-modal illusions such as the McGurk-MacDonald effect have been used to illustrate the automatic, encapsulated nature of multisensory integration. This characterization is based in the widespread assumption that the illusory percept arising from intersensory conflict reflects only the end-product of the multisensory integration process, with…
Integrated, Kerberized Login on MacOS X
NASA Technical Reports Server (NTRS)
Hotz, Henry B.
2006-01-01
Context for this information. MacOS X login process and available hooks. Authorization Services configuration. Authorization Services plug-in s. Kerberos plug-in s. Other bugs and recommendations. Authorization Services Called by loginwindow, screen saver and fast user switching. It calls Directory Services, Login Hook, and Login Items (System Preferences).
Experience with ActiveX control for simple channel access
DOE Office of Scientific and Technical Information (OSTI.GOV)
Timossi, C.; Nishimura, H.; McDonald, J.
2003-05-15
Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.
MacIntyre's Revolutionary Aristotelian Philosophy and His Idea of an Educated Public Revisited
ERIC Educational Resources Information Center
Macallister, James
2016-01-01
In this article I revisit MacIntyre's lecture on the idea of an educated public. I argue that the full significance of MacIntyre's views on the underlying purposes of universities only become clear when his lecture on the educated public is situated in the context of his wider 'revolutionary Aristotelian' philosophical project. I claim that for…
Speed control system for an access gate
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bzorgi, Fariborz M
2012-03-20
An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the outputmore » element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.« less
Accessibility, stabilizability, and feedback control of continuous orbital transfer.
Gurfil, Pini
2004-05-01
This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.
Access Control of Web and Java Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan
2011-01-01
Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.
Mandatory and Location-Aware Access Control for Relational Databases
NASA Astrophysics Data System (ADS)
Decker, Michael
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
Oh, Hoon; Van Vinh, Phan
2013-09-30
This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results.
An Evaluation of the Alternate Programs in "Area C" at MacCorkindale School, 1971-72.
ERIC Educational Resources Information Center
Reid, Marilyn J.
In November, 1971, the 106 Years 4 and 5 pupils of Area C at MacCorkindale School were assigned to two groups--2/3 stayed in the open area and the remainder were moved into a self-contained room within the Area where they could have more structure and direction. This study includes a comparison of Area C pupils with a control group and an…
Open versus Controlled-Access Data | Office of Cancer Genomics
OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data
PathwayAccess: CellDesigner plugins for pathway databases.
Van Hemert, John L; Dickerson, Julie A
2010-09-15
CellDesigner provides a user-friendly interface for graphical biochemical pathway description. Many pathway databases are not directly exportable to CellDesigner models. PathwayAccess is an extensible suite of CellDesigner plugins, which connect CellDesigner directly to pathway databases using respective Java application programming interfaces. The process is streamlined for creating new PathwayAccess plugins for specific pathway databases. Three PathwayAccess plugins, MetNetAccess, BioCycAccess and ReactomeAccess, directly connect CellDesigner to the pathway databases MetNetDB, BioCyc and Reactome. PathwayAccess plugins enable CellDesigner users to expose pathway data to analytical CellDesigner functions, curate their pathway databases and visually integrate pathway data from different databases using standard Systems Biology Markup Language and Systems Biology Graphical Notation. Implemented in Java, PathwayAccess plugins run with CellDesigner version 4.0.1 and were tested on Ubuntu Linux, Windows XP and 7, and MacOSX. Source code, binaries, documentation and video walkthroughs are freely available at http://vrac.iastate.edu/~jlv.
The Ins and Outs of Access Control.
ERIC Educational Resources Information Center
Longworth, David
1999-01-01
Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…
Access control and confidentiality in radiology
NASA Astrophysics Data System (ADS)
Noumeir, Rita; Chafik, Adil
2005-04-01
A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.
What if MacGyver Taught Physical Education?
ERIC Educational Resources Information Center
Marston, Rip; Leech, Trey
2014-01-01
In an era of rising childhood obesity rates, many physical educators find themselves with declining financial resources. Similar to how MacGyver had to do when he was in a bind on his self-titled television show, physical educators need to think creatively when providing equipment for use by their students. The problem that has been identified is:…
Sustaining change: the imperative for patient access strategies.
Glynn, Peter A R
2006-01-01
The paper by Trypuc, MacLeod and Hudson provides a timely and important overview of methods to sustain provincial wait time strategies. The emphasis on accountability for patient access to timely care throughout the healthcare system comes through strongly--as it should. These accountabilities are made "real" through purchase service agreements. Physician-hospital relationships are a fundamental aspect of this accountability. This commentary suggests the inclusion of two additional supporting tools in addition to those cited by the authors of the lead paper--quality monitoring and the use of industrial engineering techniques for queue management and patient flow analysis. Strong and persistent leadership of patient access strategies will ensure sustainable change.
Mueller, Tanja; Haberstroh, Julia; Knebel, Maren; Oswald, Frank; Kaspar, Roman; Kemper, Christoph J; Halder-Sinn, Petra; Schroeder, Johannes; Pantel, Johannes
2017-02-01
The use of assessment tools has been shown to improve the inter-rater reliability of capacity assessments. However, instrument-based capacity assessments of people with dementia face challenges. In dementia research, measuring capacity with instruments like the MacArthur Competence Assessment Tool for Treatment (MacCAT-T) mostly employ hypothetical treatment vignettes that can overwhelm the abstraction capabilities of people with dementia and are thus not always suitable for this target group. The primary aim of this study was to provide a standardized real informed consent paradigm that enables the dementia-specific properties of capacity to consent to treatment in people with dementia to be identified in a real informed consent process that is both externally valid and ethically justifiable. The sample consisted of 53 people with mild to moderate dementia and a group of 133 people without cognitive impairment. Rather than using a hypothetical treatment vignette, we used a standardized version of the MacCAT-T to assess capacity to consent to treatment with cholinesterase inhibitors in people with dementia. Inter-rater reliability, item statistics, and psychometric properties were also investigated. Intraclass correlations (ICCs) (0.951-0.990) indicated high inter-rater reliability of the standardized real informed consent paradigm. In the dementia group, performance on different items of the MacCAT-T varied. Most people with dementia were able to express a treatment choice, and were aware of the need to take a tablet. Further information on the course of the disorder and the benefits and risks of the treatment were less understood, as was comparative reasoning regarding treatment alternatives. The standardized real informed consent paradigm enabled us to detect dementia-specific characteristics of patients' capacity to consent to treatment with cholinesterase inhibitors. In order to determine suitable enhanced consent procedures for this treatment, we recommend
Fine-Grained Access Control for Electronic Health Record Systems
NASA Astrophysics Data System (ADS)
Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh
There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
The MacAndrew Scale as a Measure of Substance Abuse and Delinquency among Adolescents.
ERIC Educational Resources Information Center
Rathus, Spencer A.; And Others
1980-01-01
Used regression equations to determine the predictive power of the abbreviated MacAndrew Scale of the MMPI-168 on self-reported delinquent behavior of 1,672 high school students. The abbreviated MacAndrew Scale score successfully predicted alcohol abuse but was also related to crimes against property and persons and to marijuana usage. (Author)
Research on a dynamic workflow access control model
NASA Astrophysics Data System (ADS)
Liu, Yiliang; Deng, Jinxia
2007-12-01
In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.
Oh, Hoon; Van Vinh, Phan
2013-01-01
This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results. PMID:24084116
NASA Astrophysics Data System (ADS)
Liu, Shun; Xu, Jinglei; Yu, Kaikai
2017-06-01
This paper proposes an improved approach for extraction of pressure fields from velocity data, such as obtained by particle image velocimetry (PIV), especially for steady compressible flows with strong shocks. The principle of this approach is derived from Navier-Stokes equations, assuming adiabatic condition and neglecting viscosity of flow field boundaries measured by PIV. The computing method is based on MacCormack's technique in computational fluid dynamics. Thus, this approach is called the MacCormack method. Moreover, the MacCormack method is compared with several approaches proposed in previous literature, including the isentropic method, the spatial integration and the Poisson method. The effects of velocity error level and PIV spatial resolution on these approaches are also quantified by using artificial velocity data containing shock waves. The results demonstrate that the MacCormack method has higher reconstruction accuracy than other approaches, and its advantages become more remarkable with shock strengthening. Furthermore, the performance of the MacCormack method is also validated by using synthetic PIV images with an oblique shock wave, confirming the feasibility and advantage of this approach in real PIV experiments. This work is highly significant for the studies on aerospace engineering, especially the outer flow fields of supersonic aircraft and the internal flow fields of ramjets.
Global Mobile Satellite Service Interference Analysis for the AeroMACS
NASA Technical Reports Server (NTRS)
Wilson, Jeffrey D.; Apaza, Rafael D.; Hall, Ward; Phillips, Brent
2013-01-01
The AeroMACS (Aeronautical Mobile Airport Communications System), which is based on the IEEE 802.16-2009 mobile wireless standard, is envisioned as the wireless network which will cover all areas of airport surfaces for next generation air transportation. It is expected to be implemented in the 5091-5150 MHz frequency band which is also occupied by mobile satellite service uplinks. Thus the AeroMACS must be designed to avoid interference with this incumbent service. Simulations using Visualyse software were performed utilizing a global database of 6207 airports. Variations in base station and subscriber antenna distribution and gain pattern were examined. Based on these simulations, recommendations for global airport base station and subscriber antenna power transmission limitations are provided.
Macintosh II based space Telemetry and Command (MacTac) system
NASA Technical Reports Server (NTRS)
Dominy, Carol T.; Chesney, James R.; Collins, Aaron S.; Kay, W. K.
1991-01-01
The general architecture and the principal functions of the Macintosh II based Telemetry and Command system, presently under development, are described, with attention given to custom telemetry cards, input/output interfaces, and the icon driven user interface. The MacTac is a low-cost, transportable, easy to use, compact system designed to meet the requirements specified by the Consultative Committeee for Space Data Systems while remaining flexible enough to support a wide variety of other user specific telemetry processing requirements, such as TDM data. In addition, the MacTac can accept or generate forward data (such as spacecraft commands), calculate and append a Polynomial Check Code, and output these data to NASCOM to provide full Telemetry and Command capability.
Nora Tully MacAlvay--Her Life in the Theatre.
ERIC Educational Resources Information Center
Webb, Dorothy
1996-01-01
Recounts the life and times of a pioneer children's theater playwright and fiction author, Nora Tully MacAlvay (1900-86). Points out that her interest in children's theater and children's literature was lifelong and intense. (PA)
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...
33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...
Access control and privacy in large distributed systems
NASA Technical Reports Server (NTRS)
Leiner, B. M.; Bishop, M.
1986-01-01
Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.
Network Access Control List Situation Awareness
ERIC Educational Resources Information Center
Reifers, Andrew
2010-01-01
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Dynamic access control model for privacy preserving personalized healthcare in cloud environment.
Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon
2015-01-01
When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.
Hormone-dependent control of developmental timing through regulation of chromatin accessibility
Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.
2017-01-01
Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147
MAC/FAC: A Model of Similarity-Based Retrieval.
ERIC Educational Resources Information Center
Forbus, Kenneth D.; And Others
1995-01-01
Presents MAC/FAC, a model of similarity-based retrieval that attempts to capture psychological phenomena; discusses its limitations and extensions, its relationship with other retrieval models, and its placement in the context of other work on the nature of similarity. Examines the utility of the model through psychological experiments and…
STS-52 Payload Specialist MacLean floats in pool during JSC bailout exercises
NASA Technical Reports Server (NTRS)
1992-01-01
STS-52 Columbia, Orbiter Vehicle (OV) 102, Payload Specialist Steven G. MacLean, wearing launch and entry suit (LES) and clamshell helmet, is assisted by SCUBA-equipped divers as he floats in pool during emergency egress (bailout) training exercises in JSC's Weightless Environment Training Facility Bldg 29. Bailout exercises utilize the WETF's 25-foot deep pool as the ocean during this water landing simulation. MacLean represents the Canadian Space Agency (CSA).
Rubright, Jonathan; Sankar, Pamela; Casarett, David J; Gur, Ruben; Xie, Sharon X; Karlawish, Jason
2010-01-01
Objectives AD patients' early and progressive cognitive impairments hinder their capacity to provide informed consent. Unfortunately, the limited research on techniques to improve capacity has shown mixed results. Therefore, we tested whether a memory and organizational aid improves AD patient performance on measures of capacity and competency to give informed consent. Design, Setting, and Participants AD patients randomly assigned to standard consent, or standard plus a memory and organizational aid. Intervention Memory and organizational aid summarized at a 6th grade reading level the content of information mandated under the Common Rule's informed consent disclosure requirements. Measurements Three psychiatrists without access to patient data independently reviewed MacArthur Competence Assessment Tool for Clinical Research (MacCAT-CR) interview transcripts to judge whether the patient was capable of providing informed consent. The agreement of at least two of three experts defined a participant as capable of providing informed consent. Secondary outcomes are MacCAT-CR measures of understanding, appreciation and reasoning, and comparison to cognitively normal older adult norms. Results AD intervention and control groups were similar in terms of age, education, and cognitive status. The intervention group was more likely to be judged competent than control group and had higher scores on MacCAT-CR measure of understanding. The intervention had no effect on measures of appreciation or reasoning. Conclusions A consent process that addresses an AD patients' deficits in memory and attention can improve capacity to give informed consent for early phase AD research. The results also validate the MacCAT-CR as an instrument to measure capacity, especially the understanding subscale. PMID:20808101
SAFE: SPARQL Federation over RDF Data Cubes with Access Control.
Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh
2017-02-01
Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... Funding and Fiscal Affairs; Farmer Mac Risk-Based Capital Stress Test, Version 5.0 AGENCY: Farm Credit... credit rating agency) in regulations addressing the Risk-Based Capital Stress Test (RBCST or stress test... Act required FCA to establish a risk- based capital stress test for Farmer Mac's portfolio.\\3\\ This...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-25
... the business planning period a required discussion of how factors might impact Farmer Mac's current... discussion of any expected changes to Farmer Mac's business plan that are likely to have a material impact on... conditions that cause increases in delinquency rates caused by any variety of factors (e.g., widespread...
Information-Flow-Based Access Control for Web Browsers
NASA Astrophysics Data System (ADS)
Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu
The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.
Wound Healing in Mac-1 Deficient Mice
2017-05-01
36. Rosenkranz AR, Coxon A, Maurer M, Gurish MF, Austen KF, Friend DS, Galli SJ, Mayadas TN. Impaired mast cell development and innate immunity in Mac...genetically deficient mice. 3 INTRODUCTION Wound healing is a complex yet well-regulated process in which multiple resident cells ...recruited inflammatory cells , and stem cells interact to create an environment that supports the healing process. An optimal inflammatory response is a
Body, Richard; Sperrin, Matthew; Lewis, Philip S; Burrows, Gillian; Carley, Simon; McDowell, Garry; Buchan, Iain; Greaves, Kim; Mackway-Jones, Kevin
2017-01-01
Background The original Manchester Acute Coronary Syndromes model (MACS) ‘rules in’ and ‘rules out’ acute coronary syndromes (ACS) using high sensitivity cardiac troponin T (hs-cTnT) and heart-type fatty acid binding protein (H-FABP) measured at admission. The latter is not always available. We aimed to refine and validate MACS as Troponin-only Manchester Acute Coronary Syndromes (T-MACS), cutting down the biomarkers to just hs-cTnT. Methods We present secondary analyses from four prospective diagnostic cohort studies including patients presenting to the ED with suspected ACS. Data were collected and hs-cTnT measured on arrival. The primary outcome was ACS, defined as prevalent acute myocardial infarction (AMI) or incident death, AMI or coronary revascularisation within 30 days. T-MACS was built in one cohort (derivation set) and validated in three external cohorts (validation set). Results At the ‘rule out’ threshold, in the derivation set (n=703), T-MACS had 99.3% (95% CI 97.3% to 99.9%) negative predictive value (NPV) and 98.7% (95.3%–99.8%) sensitivity for ACS, ‘ruling out’ 37.7% patients (specificity 47.6%, positive predictive value (PPV) 34.0%). In the validation set (n=1459), T-MACS had 99.3% (98.3%–99.8%) NPV and 98.1% (95.2%–99.5%) sensitivity, ‘ruling out’ 40.4% (n=590) patients (specificity 47.0%, PPV 23.9%). T-MACS would ‘rule in’ 10.1% and 4.7% patients in the respective sets, of which 100.0% and 91.3% had ACS. C-statistics for the original and refined rules were similar (T-MACS 0.91 vs MACS 0.90 on validation). Conclusions T-MACS could ‘rule out’ ACS in 40% of patients, while ‘ruling in’ 5% at highest risk using a single hs-cTnT measurement on arrival. As a clinical decision aid, T-MACS could therefore help to conserve healthcare resources. PMID:27565197
Proximity-based access control for context-sensitive information provision in SOA-based systems
NASA Astrophysics Data System (ADS)
Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew
2014-06-01
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
The MacGyver effect: alive and well in health services research?
2011-01-01
Background In a manner similar to the television action hero MacGyver, health services researchers need to respond to the pressure of unpredictable demands and constrained time frames. The results are often both innovative and functional, with the creation of outputs that could not have been anticipated in the initial planning and design of the research. Discussion In the conduct of health services research many challenges to robust research processes are generated as a result of the interface between academic research, health policy and implementation agendas. Within a complex and rapidly evolving environment the task of the health services researcher is, therefore, to juggle sometimes contradictory pressures to produce valid results. Summary This paper identifies the MacGyver-type dilemmas which arise in health services research, wherein innovation may be called for, to maintain the intended scientific method and rigour. These 'MacGyver drivers' are framed as opposing issues from the perspective of both academic and public policy communities. The ideas expressed in this paper are illustrated by four examples from research projects positioned at the interface between public policy strategy and academia. PMID:21929826
Young Galaxy Candidates in the Hubble Frontier Fields. IV. MACS J1149.5+2223
NASA Astrophysics Data System (ADS)
Zheng, Wei; Zitrin, Adi; Infante, Leopoldo; Laporte, Nicolas; Huang, Xingxing; Moustakas, John; Ford, Holland C.; Shu, Xinwen; Wang, Junxian; Diego, Jose M.; Bauer, Franz E.; Troncoso Iribarren, Paulina; Broadhurst, Tom; Molino, Alberto
2017-02-01
We search for high-redshift dropout galaxies behind the Hubble Frontier Fields (HFF) galaxy cluster MACS J1149.5+2223, a powerful cosmic lens that has revealed a number of unique objects in its field. Using the deep images from the Hubble and Spitzer space telescopes, we find 11 galaxies at z > 7 in the MACS J1149.5+2223 cluster field, and 11 in its parallel field. The high-redshift nature of the bright z ≃ 9.6 galaxy MACS1149-JD, previously reported by Zheng et al., is further supported by non-detection in the extremely deep optical images from the HFF campaign. With the new photometry, the best photometric redshift solution for MACS1149-JD reduces slightly to z = 9.44 ± 0.12. The young galaxy has an estimated stellar mass of (7+/- 2)× {10}8 {M}⊙ , and was formed at z={13.2}-1.6+1.9 when the universe was ≈300 Myr old. Data available for the first four HFF clusters have already enabled us to find faint galaxies to an intrinsic magnitude of {M}{UV}≃ -15.5, approximately a factor of 10 deeper than the parallel fields.
God, Sport Philosophy, Kinesiology: A MacIntyrean Examination
ERIC Educational Resources Information Center
Twietmeyer, Gregg
2015-01-01
Sport philosophy is in crisis. This subdiscipline of kinesiology garners little to no respect and few tenure track lines in kinesiology departments. Why is this the case? Why isn't philosophy held in greater esteem? Is it possible that philosopher Alasdair MacIntyre's (2009) diagnosis found in "God, Philosophy, Universities" could…
75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
NASA Astrophysics Data System (ADS)
Park, Chang-Seop; Kang, Hyun-Sun
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
Access Control for Mobile Assessment Systems Using ID.
Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma
2015-01-01
The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.
Heroic Measures for an American Hero: Attempting to Save the Life of General Douglas MacArthur.
Pappas, Theodore N
2017-12-01
General Douglas MacArthur was a towering public figure on an international stage for the first half of the 20th century. He was healthy throughout his life but developed a series of medical problems when he entered his 80s. This article reviews the General's medical care during two separate life-threatening medical crises that required surgical intervention. The first episode occurred in 1960 when MacArthur presented with renal failure due to an obstructed prostate. Four years later after his 84th birthday, MacArthur developed bile duct obstruction from common duct stones. He underwent an uncomplicated cholecystectomy and common duct exploration but developed variceal bleeding requiring an emergent splenorenal shunt. His terminal event was precipitated by strangulated bowel in long-ignored very large inguinal hernias. MacArthur died, despite state-of-the-art surgical intervention, due to renal failure and hepatic coma.
VLSI (Very Large Scale Integrated Circuits) Design with the MacPitts Silicon Compiler.
1985-09-01
the background. If the algorithm is not fully debugged, then issue instead macpitts basename herald so MacPitts diagnostics and Liszt diagnostics both...command interpreter. Upon compilation, however, the following LI!F compiler ( Liszt ) diagnostic results, Error: Non-number to minus nil where the first...language used in the MacPitts source code. The more instructive solution is to write the Franz LISP code to decide if a jumper wire is needed, and if so, to
Evaluation of the MacDonald scabbler for highway use.
DOT National Transportation Integrated Search
1975-01-01
The MacDonald Scabbler is a small, hand held machine suitable for use in cleaning and roughening concrete surfaces, It weighs 308 pounds (140 kg), has 11 cutting heads, and, as a power source, requires a compressor capable of delivering 365 cubic foo...
Optimal sensitivity for molecular recognition MAC-mode AFM
Schindler; Badt; Hinterdorfer; Kienberger; Raab; Wielert-Badt; Pastushenko
2000-02-01
Molecular recognition force microscopy (MRFM) using the magnetic AC mode (MAC mode) atomic force microscope (AFM) was recently investigated to locate and probe recognition sites. A flexible crosslinker carrying a ligand is bound to the tip for the molecular recognition of receptors on the surface of a sample. In this report, the driving frequency is calculated which optimizes the sensitivity (S). The sensitivity of MRFM is defined as the relative change of the magnetically excited cantilever deflection amplitude arising from a crosslinker/antibody/antigen connection that is characterized by a very small force constant. The sensitivity is calculated in a damped oscillator model with a certain value of quality factor Q, which, together with load, defines the frequency response (unloaded oscillator shows resonance at Q > 0.707). If Q < 1, the greatest value of S corresponds to zero driving frequency omega (measured in units of eigenfrequency). Therefore, for Q < 1, MAC-mode has no advantage in comparison with DC-mode. Two additional extremes are found at omegaL = (1 - 1/Q)(1/2) and omegaR = (1 + 1/Q)(1/2), with corresponding sensitivities S(L) = Q2/(2Q - 1), S(R) = Q2/(2Q + 1). The L-extreme exists only for Q > 1, and then S(L) > S(R), i.e. the L-extreme is the main one. For Q > 1, S(L) > 1, and for Q > 2.41, S(R) > 1. These are the critical Q-values, above which selecting driving frequency equal to sigmaL or sigmaR brings advantage to MAC mode vs. DC mode. Satisfactory quality of the oscillator model is demonstrated by comparison of some results with those calculated within the classical description of cantilevers.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-18
...The Farm Credit Administration (FCA, Agency, us, or we) proposes to amend our regulations governing the Federal Agricultural Mortgage Corporation (Farmer Mac or the Corporation) in the areas of non-program investments and liquidity. We are proposing to modify the specific requirements supporting our objective to ensure that Farmer Mac maintains adequate liquidity to withstand stressful conditions in accordance with board-established risk tolerance and holds only high- quality, liquid investments in its liquidity reserve. We also propose to expand the allowable purposes of Farmer Mac's non-program investments to include investments that would add value to Farmer Mac's operations by complementing its program activities. Further, we request comments on the best approach for compliance with section 939A of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act or DFA), which requires us to remove all references to and requirements relating to credit ratings and to substitute other appropriate standards of creditworthiness. Finally, we propose significant reorganizing of sections to make the flow of the issues covered more logical.
Urban Studies: A Study of Bibliographic Access and Control.
ERIC Educational Resources Information Center
Anderson, Barbara E.
This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…
Open access publishing, article downloads, and citations: randomised controlled trial
Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L
2008-01-01
Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565
2003-12-01
Action can be divided into demolition activities and construction activities. Demolition activities would include the complete removal of 13 multi...that protects those most affected by noise and that can often be achieved on a practical basis. Base activities that have the highest potential...Family Housing – Phase V MacDill AFB, Florida has been approved by the state and Federal fish and wildlife agencies. Land use on MacDill AFB
Multiple lupus-associated ITGAM variants alter Mac-1 functions on neutrophils.
Zhou, Yebin; Wu, Jianming; Kucik, Dennis F; White, Nathan B; Redden, David T; Szalai, Alexander J; Bullard, Daniel C; Edberg, Jeffrey C
2013-11-01
Multiple studies have demonstrated that single-nucleotide polymorphisms (SNPs) in the ITGAM locus (including the nonsynonymous SNPs rs1143679, rs1143678, and rs1143683) are associated with systemic lupus erythematosus (SLE). ITGAM encodes the protein CD11b, a subunit of the β2 integrin Mac-1. The purpose of this study was to determine the effects of ITGAM genetic variation on the biologic functions of neutrophil Mac-1. Neutrophils from ITGAM-genotyped and -sequenced healthy donors were isolated for functional studies. The phagocytic capacity of neutrophil ITGAM variants was probed with complement-coated erythrocytes, serum-treated zymosan, heat-treated zymosan, and IgG-coated erythrocytes. The adhesion capacity of ITGAM variants, in adhering to either purified intercellular adhesion molecule 1 or tumor necrosis factor α-stimulated endothelial cells, was assessed in a flow chamber. Expression levels of total CD11b and activation of CD11b were assessed by flow cytometry. Mac-1-mediated neutrophil phagocytosis, determined in cultures with 2 different complement-coated particles, was significantly reduced in individuals with nonsynonymous variant alleles of ITGAM. This reduction in phagocytosis was related to variation at either rs1143679 (in the β-propeller region) or rs1143678/rs1143683 (highly linked SNPs in the cytoplasmic/calf-1 regions). Phagocytosis mediated by Fcγ receptors was also significantly reduced in donors with variant ITGAM alleles. Similarly, firm adhesion of neutrophils was significantly reduced in individuals with variant ITGAM alleles. These functional alterations were not attributable to differences in total receptor expression or activation. The nonsynonymous ITGAM variants rs1143679 and rs1143678/rs113683 contribute to altered Mac-1 function on neutrophils. These results underscore the need to consider multiple nonsynonymous SNPs when assessing the functional consequences of ITGAM variation on immune cell processes and the risk of SLE
NASA Astrophysics Data System (ADS)
Zhang, Ling; Nan, Zhuotong; Liang, Xu; Xu, Yi; Hernández, Felipe; Li, Lianxia
2018-03-01
Although process-based distributed hydrological models (PDHMs) are evolving rapidly over the last few decades, their extensive applications are still challenged by the computational expenses. This study attempted, for the first time, to apply the numerically efficient MacCormack algorithm to overland flow routing in a representative high-spatial resolution PDHM, i.e., the distributed hydrology-soil-vegetation model (DHSVM), in order to improve its computational efficiency. The analytical verification indicates that both the semi and full versions of the MacCormack schemes exhibit robust numerical stability and are more computationally efficient than the conventional explicit linear scheme. The full-version outperforms the semi-version in terms of simulation accuracy when a same time step is adopted. The semi-MacCormack scheme was implemented into DHSVM (version 3.1.2) to solve the kinematic wave equations for overland flow routing. The performance and practicality of the enhanced DHSVM-MacCormack model was assessed by performing two groups of modeling experiments in the Mercer Creek watershed, a small urban catchment near Bellevue, Washington. The experiments show that DHSVM-MacCormack can considerably improve the computational efficiency without compromising the simulation accuracy of the original DHSVM model. More specifically, with the same computational environment and model settings, the computational time required by DHSVM-MacCormack can be reduced to several dozen minutes for a simulation period of three months (in contrast with one day and a half by the original DHSVM model) without noticeable sacrifice of the accuracy. The MacCormack scheme proves to be applicable to overland flow routing in DHSVM, which implies that it can be coupled into other PHDMs for watershed routing to either significantly improve their computational efficiency or to make the kinematic wave routing for high resolution modeling computational feasible.
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
Fertility Effects of Abortion and Birth Control Pill Access for Minors
GULDI, MELANIE
2008-01-01
This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899
Fertility effects of abortion and birth control pill access for minors.
Guldi, Melanie
2008-11-01
This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.
PaleoMac: A Macintosh™ application for treating paleomagnetic data and making plate reconstructions
NASA Astrophysics Data System (ADS)
Cogné, J. P.
2003-01-01
This brief note provides an overview of a new Macintosh™ application, PaleoMac, (MacOS 8.0 or later, 15Mb RAM required) which permits rapid processing of paleomagnetic data, from the demagnetization data acquired in the laboratory, to the treatment of paleomagnetic poles, plate reconstructions, finite rotation computations on a sphere, and characterization of relative plate motions. Capabilities of PaleoMac include (1) high interactivity between the user and data displayed on screen which provides a fast and easy way to handle, add and remove data or contours, perform computations on subsets of points, change projections, sizes, etc.; (2) performance of all standard principal component analysis and statistical processing on a sphere [, 1953] etc.); (3) output of high quality plots, compatible with graphic programs such as Adobe Illustrator, and output of numerical results as ASCII files. Beyond its usefulness in treating paleomagnetic data, its ability to handle plate motion computations should be of large interest to the Earth science community.
External access to ALICE controls conditions data
NASA Astrophysics Data System (ADS)
Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.
2014-06-01
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.
Evaluation of modified work zone traffic control devices at business accesses
DOT National Transportation Integrated Search
2001-01-01
Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...
Hoshijima, Hiroshi; Mihara, Takahiro; Maruyama, Koichi; Denawa, Yohei; Mizuta, Kentaro; Shiga, Toshiya; Nagasaka, Hiroshi
2018-06-09
The C-MAC laryngoscope (C-MAC) is a videolaryngoscope that uses a modified Macintosh blade. Although several anecdotal reports exist, it remains unclear whether the C-MAC is superior to the Macintosh laryngoscope for tracheal intubation in the adult population. Systematic review, meta-analysis. Operating room, intensive care unit. For inclusion in our analysis, studies had to be prospective randomised trials which compared the C-MAC with the Macintosh laryngoscope for tracheal intubation in the adult population. Data on success rates, intubation time, glottic visualisation and incidence of external laryngeal manipulations (ELM) during tracheal intubation were extracted from the identified studies. In subgroup analysis, we separated those parameters to assess the influence of the airway condition (normal or difficult) and laryngoscopists (novice or experienced). We conducted a trial sequential analysis (TSA). Sixteen articles with 18 trials met the inclusion criteria. The C-MAC provided better glottic visualisation compared to the Macintosh (RR, 1.08; 95% CI, 1.03-1.14). TSA corrected the CI to 1.01-1.19; thus, total sample size reached the required information size (RIS). Success rates and intubation time did not differ significantly between the laryngoscopes. TSA showed that total sample size reached the RIS for success rates. The TSA Z curve surpassed the futility boundary. The C-MAC required less ELM compared to the Macintosh (RR, 0.83; 95% CI, 0.72-0.96). TSA corrected the CI to 0.67-1.03; 52.3% of the RIS was achieved. In difficult airways, the C-MAC showed superior success rates, glottic visualisation, and less ELM compared to the Macintosh. Among experienced laryngoscopists, the C-MAC offered better glottic visualisation with less ELM than the Macintosh. The C-MAC provided better glottic visualisation and less ELM (GRADE: Very Low or Moderate), with improved success rates, glottic visualisation, and less ELM in difficult airways. Copyright © 2018 Elsevier
The Decision to Dismiss General MacArthur
1966-04-22
this document can be found in the DTIC ® Technical Report Database. g DISTRIBUTION STATEMENT A. Approved for public release; distribution is... reporters pre- dicting a bloody stalemate unless major additions were made to his forces and new policies formulated by the United Nations. On 20 March...his decision to dismiss General MacArthur and return him to the United States. Due to a report of a leak of this decision to a newspaper, the
Access Control for Cooperation Systems Based on Group Situation
NASA Astrophysics Data System (ADS)
Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo
Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.
[Access control management in electronic health records: a systematic literature review].
Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio
2012-01-01
This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.
Policy reconciliation for access control in dynamic cross-enterprise collaborations
NASA Astrophysics Data System (ADS)
Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.
2018-03-01
In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.
Deformation, Failure, and Fatigue Life of SiC/Ti-15-3 Laminates Accurately Predicted by MAC/GMC
NASA Technical Reports Server (NTRS)
Bednarcyk, Brett A.; Arnold, Steven M.
2002-01-01
NASA Glenn Research Center's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) (ref.1) has been extended to enable fully coupled macro-micro deformation, failure, and fatigue life predictions for advanced metal matrix, ceramic matrix, and polymer matrix composites. Because of the multiaxial nature of the code's underlying micromechanics model, GMC--which allows the incorporation of complex local inelastic constitutive models--MAC/GMC finds its most important application in metal matrix composites, like the SiC/Ti-15-3 composite examined here. Furthermore, since GMC predicts the microscale fields within each constituent of the composite material, submodels for local effects such as fiber breakage, interfacial debonding, and matrix fatigue damage can and have been built into MAC/GMC. The present application of MAC/GMC highlights the combination of these features, which has enabled the accurate modeling of the deformation, failure, and life of titanium matrix composites.
[Public control and equity of access to hospitals under non-State public administration].
Carneiro Junior, Nivaldo; Elias, Paulo Eduardo
2006-10-01
To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.
Toward Privacy-preserving Content Access Control for Information Centric Networking
2014-03-01
REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
An approach to access control in electronic health record.
Sucurovic, Snezana
2010-08-01
OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.
ERIC Educational Resources Information Center
Fabiszak, Malgorzata
2010-01-01
This paper is an application of Robert E. MacLaury's Vantage Theory (VT) to the analysis of real life spoken discourse. It utilizes Dennis R. Preston's (1994) modification of MacLaury's VT. It elucidates how cognitive processes of coordinate selection and combination contribute to the on-line construction of category membership in the abstract…
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
Empowering citizens with access control mechanisms to their personal health resources.
Calvillo, J; Román, I; Roa, L M
2013-01-01
Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
Rubright, Jonathan; Sankar, Pamela; Casarett, David J; Gur, Ruben; Xie, Sharon X; Karlawish, Jason
2010-12-01
Early and progressive cognitive impairments of patients with Alzheimer disease (AD) hinder their capacity to provide informed consent. Unfortunately, the limited research on techniques to improve capacity has shown mixed results. Therefore, the authors tested whether a memory and organizational aid improves the performance of patients with AD on measures of capacity and competency to give informed consent. Patients with AD randomly assigned to standard consent or standard plus a memory and organizational aid. Memory and organizational aid summarized the content of information mandated under the informed consent disclosure requirements of the Common Rule at a sixth grade reading level. Three psychiatrists without access to patient data independently reviewed MacArthur Competence Assessment Tool for Clinical Research (MacCAT-CR) interview transcripts to judge whether the patient was capable of providing informed consent. The agreement of at least two of the three experts defined a participant as capable of providing informed consent. Secondary outcomes are MacCAT-CR measures of understanding, appreciation and reasoning, and comparison with cognitively normal older adult norms. AD intervention and control groups were similar in terms of age, education, and cognitive status. The intervention group was more likely to be judged competent than control group and had higher scores on MacCAT-CR measure of understanding. The intervention had no effect on the measures of appreciation or reasoning. A consent process that addresses the deficits in memory and attention of a patient with AD can improve capacity to give informed consent for early phase AD research. The results also validate the MacCAT-CR as an instrument to measure capacity, especially the understanding subscale. ClinicalTrials.Gov#NCT00105612, http://clinicaltrials.gov/show/NCT00105612.
Automating Access Control Logics in Simple Type Theory with LEO-II
NASA Astrophysics Data System (ADS)
Benzmüller, Christoph
Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.
ERIC Educational Resources Information Center
MacAllister, James
2014-01-01
In this article I discuss the philosophy of John MacMurray, and in particular, his little-examined writings on discipline and emotion education. It is argued that discipline is a vital element in the emotion education MacMurray thought central to learning to be human, because for him it takes concerted effort to overcome the human tendency toward…
Bhat, Manohar; Sharma, Anupama; Sharma, Rajesh
2015-01-01
ABSTRACT Objective: The aim of this study was to assess the safety and efficiency of MacLennan splint in symphysis and parasymphysis mandibular fractures in children. Study design: Six patients (four boys and two girls, mean age 3 years, range between 2 and 5 years) were operated on parasymphysis fractures of children. The mean follow-up time was 12 months. MacLennan splint was applied in these case upto 3 weeks. Results: Primary healing of the fractured mandible was observed in all patients. Postoperative complications were minor and transient. The outcome of the operation was not endangered. Adverse tissue reaction like infection, malocclusion, swelling and growth restrictions did not occur during observation period. Conclusion: MacLennan splint is having various advantages like faster mobilization and the avoidance of secondary removal operations. Based on this preliminary results MacLennan splints are safe and efficient in the treatment of pediatric mandible fracture. How to cite this article: Khairwa A, Bhat M, Sharma A, Sharma R. Management of Symphysis and Parasymphysis Mandibular Fractures in Children Treated with MacLennan Splint: Stability and Early Results. Int J Clin Pediatr Dent 2015;8(2):127-132. PMID:26379381
The MacArthur Foundation in Nigeria: Report on Activities
ERIC Educational Resources Information Center
John D. and Catherine T. MacArthur Foundation, 2009
2009-01-01
In 2007, Nigeria passed an important milestone: one elected government passed power to another for the first time in the nation's history. Though imperfect, the poll demonstrated powerfully that Nigeria's representative democracy was not a transient phase between periods of military repression but a growing reality. For 20 years, the MacArthur…
Controlling user access to electronic resources without password
Smith, Fred Hewitt
2015-06-16
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.
2017-01-01
We have calculated the excess free energy of mixing of 1053 binary mixtures with the OPLS-AA force field using two different methods: thermodynamic integration (TI) of molecular dynamics simulations and the Pair Configuration to Molecular Activity Coefficient (PAC-MAC) method. PAC-MAC is a force field based quasi-chemical method for predicting miscibility properties of various binary mixtures. The TI calculations yield a root mean squared error (RMSE) compared to experimental data of 0.132 kBT (0.37 kJ/mol). PAC-MAC shows a RMSE of 0.151 kBT with a calculation speed being potentially 1.0 × 104 times greater than TI. OPLS-AA force field parameters are optimized using PAC-MAC based on vapor–liquid equilibrium data, instead of enthalpies of vaporization or densities. The RMSE of PAC-MAC is reduced to 0.099 kBT by optimizing 50 force field parameters. The resulting OPLS-PM force field has a comparable accuracy as the OPLS-AA force field in the calculation of mixing free energies using TI. PMID:28418655
Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel
2016-12-01
Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
POD/MAC-Based Modal Basis Selection for a Reduced Order Nonlinear Response Analysis
NASA Technical Reports Server (NTRS)
Rizzi, Stephen A.; Przekop, Adam
2007-01-01
A feasibility study was conducted to explore the applicability of a POD/MAC basis selection technique to a nonlinear structural response analysis. For the case studied the application of the POD/MAC technique resulted in a substantial improvement of the reduced order simulation when compared to a classic approach utilizing only low frequency modes present in the excitation bandwidth. Further studies are aimed to expand application of the presented technique to more complex structures including non-planar and two-dimensional configurations. For non-planar structures the separation of different displacement components may not be necessary or desirable.
Gautreau, G; Winans, P
1999-01-01
This paper profiles Alena Jean MacMaster, an extraordinary nurse leader, activist, visionary and humanitarian from New Brunswick. Her determination and drive were instrumental in fostering the development and progression of health care, nursing education and nursing services at the local, provincial, federal and international levels. "First, loyalty to the institution in which you serve. The patient is the most important person in the entire institution," was Miss MacMaster's guiding principle throughout her career.
Comments on MacDowell-Mansouri gravity and torsion
NASA Astrophysics Data System (ADS)
López-Domínguez, J. C.; Rosales-Quintero, J. E.; Sabido, M.
Starting with the MacDowell-Mansouri formulation of gravity with a SO(4, 1) gauge group, we introduce new parameters into the action to include the nondynamical Holst term, and the topological Nieh-Yan and Pontryagin classes. Then, we consider the new parameters as fields and analyze the solutions coming from their equations of motion. The new fields introduce torsional contributions to the theory that modify Einstein’s equations.
Controlling user access to electronic resources without password
Smith, Fred Hewitt
2017-08-22
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.
Global Access-controlled Transfer e-frame (GATe)
DOE Office of Scientific and Technical Information (OSTI.GOV)
2012-05-30
Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)
2013-07-01
Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of
Testing Evolutionary Hypotheses in the Classroom with MacClade Software.
ERIC Educational Resources Information Center
Codella, Sylvio G.
2002-01-01
Introduces MacClade which is a Macintosh-based software package that uses the techniques of cladistic analysis to explore evolutionary patterns. Describes a novel and effective exercise that allows undergraduate biology majors to test a hypothesis about behavioral evolution in insects. (Contains 13 references.) (Author/YDS)
Gonzalez-Rodriguez, J; Pelcastre, E L; Tovilla-Canales, J L; Garcia-Ortiz, J E; Amato-Almanza, M; Villanueva-Mendoza, C; Espinosa-Mattar, Z; Zenteno, J C
2010-08-01
Microphthalmia-anophthalmia-coloboma (MAC) are congenital eye malformations causing a significant percentage of visually impairments in children. Although these anomalies can arise from prenatal exposure to teratogens, mutations in well-defined genes originate potentially heritable forms of MAC. Mutations in genes such as CHX10, GDF6, RAX, SOX2 and OTX2, among others, have been recognised in dominant or recessive MAC. SOX2 and OTX2 are the two most commonly mutated genes in monogenic MAC. However, as more numerous samples of MAC subjects would be analysed, a better estimation of the actual involvement of specific MAC-genes could be made. Here, a comprehensive mutational analysis of the CHX10, GDF6, RAX, SOX2 and OTX2 genes was performed in 50 MAC subjects. PCR amplification and direct automated DNA sequencing of all five genes in 50 unrelated subjects. Eight mutations (16% prevalence) were recognised, including four GDF6 mutations (one novel), two novel RAX mutations, one novel OTX2 mutation and one SOX2 mutation. Anophthalmia and nanophthalmia, not previously associated with GDF6 mutations, were observed in two subjects carrying defects in this gene, expanding the spectrum of GDF6-linked ocular anomalies. Our study underscores the importance of genotyping large groups of patients from distinct ethnic origins for improving the estimation of the global involvement of particular MAC-causing genes.
An improved task-role-based access control model for G-CSCW applications
NASA Astrophysics Data System (ADS)
He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang
2005-10-01
Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.
36 CFR 1256.70 - What controls access to national security-classified information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...
Type-Based Access Control in Data-Centric Systems
NASA Astrophysics Data System (ADS)
Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio
Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 3 2014-07-01 2014-07-01 false Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Tampa Bay south of MacDill Air Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...
Lange, Nicholas D; Buttaccio, Daniel R; Davelaar, Eddy J; Thomas, Rick P
2014-02-01
Research investigating top-down capture has demonstrated a coupling of working memory content with attention and eye movements. By capitalizing on this relationship, we have developed a novel methodology, called the memory activation capture (MAC) procedure, for measuring the dynamics of working memory content supporting complex cognitive tasks (e.g., decision making, problem solving). The MAC procedure employs briefly presented visual arrays containing task-relevant information at critical points in a task. By observing which items are preferentially fixated, we gain a measure of working memory content as the task evolves through time. The efficacy of the MAC procedure was demonstrated in a dynamic hypothesis generation task in which some of its advantages over existing methods for measuring changes in the contents of working memory over time are highlighted. In two experiments, the MAC procedure was able to detect the hypothesis that was retrieved and placed into working memory. Moreover, the results from Experiment 2 suggest a two-stage process following hypothesis retrieval, whereby the hypothesis undergoes a brief period of heightened activation before entering a lower activation state in which it is maintained for output. The results of both experiments are of additional general interest, as they represent the first demonstrations of top-down capture driven by participant-established WM content retrieved from long-term memory.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Los Angeles water was investigated as a possible source of Mycobacterium avium complex (MAC) infection in patients with AIDS. MAC consists of M.avium (MA), M. intracellulare (MI) and Mycobacterium X (MX)(positive for MAC by DNA probe but not MA or MI). The study included 13 reser...
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Simple measurement-based admission control for DiffServ access networks
NASA Astrophysics Data System (ADS)
Lakkakorpi, Jani
2002-07-01
In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.
42 CFR 405.1104 - Request for MAC review when an ALJ does not issue a decision timely.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 2 2011-10-01 2011-10-01 false Request for MAC review when an ALJ does not issue a... under § 405.1016 may request MAC review if— (1) The appellant files a written request with the ALJ to... escalation or 5 calendar days from the end of the applicable adjudication period set forth in § 405.1016. (b...
42 CFR 405.1104 - Request for MAC review when an ALJ does not issue a decision timely.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 2 2010-10-01 2010-10-01 false Request for MAC review when an ALJ does not issue a... under § 405.1016 may request MAC review if— (1) The appellant files a written request with the ALJ to... escalation or 5 calendar days from the end of the applicable adjudication period set forth in § 405.1016. (b...
1. Historic American Buildings Survey, E.P. MacFarland, Photographer May 4, ...
1. Historic American Buildings Survey, E.P. MacFarland, Photographer May 4, 1934, 8 WASHINGTON SQUARE AT EXTREME LEFT, 7 WASHINGTON SQUARE ADJOINING. - 8 Washington Square North (House), New York County, NY
Nurse practitioners and controlled substances prescriptive authority: improving access to care.
Ambrose, Michelle A; Tarlier, Denise S
2013-03-01
In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-23
... reductions in Freddie Mac's and Fannie Mae's loan purchase limits. In short, no final decision on loan... decision to direct the setting of new and lower loan purchase limits by the Enterprises. A Plan for Setting... FEDERAL HOUSING FINANCE AGENCY [No. 2013-N-18] Fannie Mae and Freddie Mac Loan Purchase Limits...
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
MAC/FAC: A Model of Similarity-Based Retrieval
1994-10-01
Grapes (0.28) 327 Sour Grapes, analog The Taming of the Shrew (0.22), Merry Wives 251 (0.18), S[11 stories], Sour Grapes (-0.19) Sour Grapes, literal... The Institute for the 0 1 Learning Sciences Northwestern University CD• 00 MAC/FAC: A MODEL OF SIMILARITY-BASED RETRIEVAL Kenneth D. Forbus Dedre...Gentner Keith Law Technical Report #59 • October 1994 94-35188 wit Establisthed in 1989 with the support of Andersen Consulting Form Approved REPORT
Breden, Torsten Marcus; Vollmann, Jochen
2004-12-01
This article gives a brief introduction to the MacArthur Competence Assessment Tool-Treatment (MacCAT-T) and critically examines its theoretical presuppositions. On the basis of empirical, methodological and ethical critique it is emphasised that the cognitive bias that underlies the MacCAT-T assessment needs to be modified. On the one hand it has to be admitted that the operationalisation of competence in terms of value-free categories, e.g. rational decision abilities, guarantees objectivity to a great extent; but on the other hand it bears severe problems. Firstly, the cognitive focus is in itself a normative convention in the process of anthropological value-attribution. Secondly, it misses the complexity of the decision process in real life. It is therefore suggested that values, emotions and other biographic and context specific aspects should be considered when interpreting the cognitive standards according to the MacArthur model. To fill the gap between cognitive and non-cognitive approaches the phenomenological theory of personal constructs is briefly introduced. In conclusion some main demands for further research to develop a multi-step model of competence assessment are outlined.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base... Force Base, Fla.; small-arms firing range and aircraft jettison, U.S. Air Force, MacDill Air Force Base...″, longitude 82°33′02.44″; and thence to a point on the shore line of MacDill Air Force Base at latitude 27°50...
76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...
Access Control for Home Data Sharing: Attitudes, Needs and Practices
2009-10-01
cameras, mobile phones and portable music players make creating and interacting with this content easy. Home users are increasingly interested in...messages, photos, home videos, journal files and home musical recordings. Many participants considered unauthorized access by strangers, acquaintances...configuration does not allow users to share different subsets of music with different people. Facebook supplies rich, customizable access controls for
MicMac GIS application: free open source
NASA Astrophysics Data System (ADS)
Duarte, L.; Moutinho, O.; Teodoro, A.
2016-10-01
The use of Remotely Piloted Aerial System (RPAS) for remote sensing applications is becoming more frequent as the technologies on on-board cameras and the platform itself are becoming a serious contender to satellite and airplane imagery. MicMac is a photogrammetric tool for image matching that can be used in different contexts. It is an open source software and it can be used as a command line or with a graphic interface (for each command). The main objective of this work was the integration of MicMac with QGIS, which is also an open source software, in order to create a new open source tool applied to photogrammetry/remote sensing. Python language was used to develop the application. This tool would be very useful in the manipulation and 3D modelling of a set of images. The main objective was to create a toolbar in QGIS with the basic functionalities with intuitive graphic interfaces. The toolbar is composed by three buttons: produce the points cloud, create the Digital Elevation Model (DEM) and produce the orthophoto of the study area. The application was tested considering 35 photos, a subset of images acquired by a RPAS in the Aguda beach area, Porto, Portugal. They were used in order to create a 3D terrain model and from this model obtain an orthophoto and the corresponding DEM. The code is open and can be modified according to the user requirements. This integration would be very useful in photogrammetry and remote sensing community combined with GIS capabilities.
14 CFR 420.53 - Control of public access.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420...
Beyond MACS: A Snapshot Survey of the Most Massive Clusters of Galaxies at z>0.5
NASA Astrophysics Data System (ADS)
Ebeling, Harald
2017-08-01
Truly massive galaxy clusters play a pivotal role for a wealth of extragalactic and cosmological research topics, and SNAPshot observations of these systems are ideally suited to identify the most promising cluster targets for further, in-depth study. The power of this approach was demonstrated by ACS/WFC3 SNAPshots of X-ray selected MACS and eMACS clusters at z>0.3 obtained by us in previous Cycles (44 of them in all of F606W, F814W, F110W, and F140W). Based on these data, the CLASH MCT program selected 16 out of 25 of their targets to be MACS clusters. Similarly, all but one of the six most powerful cluster lenses selected for in-depth study by the HST Frontier Fields initiative are MACS detections, and so are 16 of the 29 z>0.3 clusters targeted by the RELICS legacy program.We propose to extend our spectacularly successful SNAPshot survey of the most X-ray luminous distant clusters to a redshift-mass regime that is poorly sampled by any other project. Targeting only extremely massive clusters at z>0.5 from the X-ray selected eMACS sample (median velocity dispersion: 1180 km/s), the proposed program will (a) identify the most powerful gravitational telescopes at yet higher redshift for the next generation of in-depth studies of the distant Universe with HST and JWST, (b) provide constraints on the mass distribution within these extreme systems, (c) help improve our understanding of the physical nature of galaxy-galaxy and galaxy-gas interactions in cluster cores, and (d) unveil Balmer Break Galaxies at z 2 and Lyman-break galaxies at z>6 as F814W dropouts.Acknowledging the broad community interest in our sample we waive our data rights for these observations.
77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...
(NTF) National Transonic Facility Test 213-SFW Flow Control II,
2012-11-19
(NTF) National Transonic Facility Test 213-SFW Flow Control II, Fast-MAC Model: The fundamental Aerodynamics Subsonic Transonic-Modular Active Control (Fast-MAC) Model was tested for the 2nd time in the NTF. The objectives were to document the effects of Reynolds numbers on circulation control aerodynamics and to develop and open data set for CFD code validation. Image taken in building 1236, National Transonic Facility
Design of the frame structure for a multiservice interactive system using ATM-PON
NASA Astrophysics Data System (ADS)
Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae
1998-10-01
The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.
The OPL Access Control Policy Language
NASA Astrophysics Data System (ADS)
Alm, Christopher; Wolf, Ruben; Posegga, Joachim
Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.
76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs
NASA Astrophysics Data System (ADS)
Basalamah, Anas; Sato, Takuro
For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.
A contextual role-based access control authorization model for electronic patient record.
Motta, Gustavo H M B; Furuie, Sergio S
2003-09-01
The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.
Frontier Fields Clusters: Deep Chandra Observations of the Complex Merger MACS J1149.6+2223
Ogrean, G. A.; Weeren, R. J. van; Jones, C.; ...
2016-03-04
The Hubble Space Telescope Frontier Fields cluster MACS J1149.6+2223 is one of the most complex merging clusters, believed to consist of four dark matter halos. Here, we present results from deep (365 ks) Chandra observations of the cluster, which reveal the most distant cold front (z = 0.544) discovered to date. In the cluster outskirts, we also detect hints of a surface brightness edge that could be the bow shock preceding the cold front. The substructure analysis of the cluster identified several components with large relative radial velocities, thus indicating that at least some collisions occur almost along the linemore » of sight. The inclination of the mergers with respect to the plane of the sky poses significant observational challenges at X-ray wavelengths. MACS J1149.6+2223 possibly hosts a steep-spectrum radio halo. Lastly, if the steepness of the radio halo is confirmed, then the radio spectrum, combined with the relatively regular ICM morphology, could indicate that MACS J1149.6+2223 is an old merging cluster.« less
Shi, Jiao Yi; Wang, Chang An; Li, Zhi Jun; Wang, Qiong; Zhang, Yuan; Wang, Wei
2011-05-23
We report a new method for the synthesis of hollow-structured phenylene-bridged periodic mesoporous organosilica (PMO) spheres with a uniform particle size of 100-200 nm using α-Fe(2)O(3) as a hard template. Based on this method, the hollow-structured phenylene PMO could be easily functionalized with MacMillan catalyst (H-PhPMO-Mac) by a co-condensation process and a "click chemistry" post-modification. The synthesized H-PhPMO-Mac catalyst has been found to exhibit high catalytic activity (98% yield, 81% enantiomeric excess (ee) for endo and 81% ee for exo) in asymmetric Diels-Alder reactions with water as solvent. The catalyst could be reused for at least seven runs without a significant loss of catalytic activity. Our results have also indicated that hollow-structured PMO spheres exhibit higher catalytic efficiency than solid (non-hollow) PMO spheres, and that catalysts prepared by the co-condensation process and "click chemistry" post-modification exhibit higher catalytic efficiency than those prepared by a grafting method. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
50 CFR 648.262 - Effort-control program for red crab limited access vessels.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Baldridge, Tim
2005-01-01
The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.
ERIC Educational Resources Information Center
Novak, Glenn D.
The (CBS Radio) Columbia Workshop, formed in 1936, encouraged the writing and production of creative, non-traditional radio drama such as Archibald MacLeish's verse play "The Fall of the City," which aired on April 11, 1937. MacLeish considered radio the ideal medium for poetry because it offers only aural stimuli without competition…
MacBurn's cylinder test problem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shestakov, Aleksei I.
2016-02-29
This note describes test problem for MacBurn which illustrates its performance. The source is centered inside a cylinder with axial-extent-to-radius ratio s.t. each end receives 1/4 of the thermal energy. The source (fireball) is modeled as either a point or as disk of finite radius, as described by Marrs et al. For the latter, the disk is divided into 13 equal area segments, each approximated as a point source and models a partially occluded fireball. If the source is modeled as a single point, one obtains very nearly the expected deposition, e.g., 1/4 of the flux on each end andmore » energy is conserved. If the source is modeled as a disk, both conservation and energy fraction degrade. However, errors decrease if the source radius to domain size ratio decreases. Modeling the source as a disk increases run-times.« less
Health Information System Role-Based Access Control Current Security Trends and Challenges.
de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo
2018-01-01
This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
NASA Technical Reports Server (NTRS)
Hall, Edward; Magner, James
2011-01-01
This report is provided as part of ITT s NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: New ATM Requirements-Future Communications, C-Band and L-Band Communications Standard Development and was based on direction provided by FAA project-level agreements for New ATM Requirements-Future Communications. Task 7 included two subtasks. Subtask 7-1 addressed C-band (5091- to 5150-MHz) airport surface data communications standards development, systems engineering, test bed and prototype development, and tests and demonstrations to establish operational capability for the Aeronautical Mobile Airport Communications System (AeroMACS). Subtask 7-2 focused on systems engineering and development support of the L-band digital aeronautical communications system (L-DACS). Subtask 7-1 consisted of two phases. Phase I included development of AeroMACS concepts of use, requirements, architecture, and initial high-level safety risk assessment. Phase II builds on Phase I results and is presented in two volumes. Volume I is devoted to concepts of use, system requirements, and architecture, including AeroMACS design considerations. Volume II (this document) describes an AeroMACS prototype evaluation and presents final AeroMACS recommendations. This report also describes airport categorization and channelization methodologies. The purposes of the airport categorization task were (1) to facilitate initial AeroMACS architecture designs and enable budgetary projections by creating a set of airport categories based on common airport characteristics and design objectives, and (2) to offer high-level guidance to potential AeroMACS technology and policy development sponsors and service providers. A channelization plan methodology was developed because a common global methodology is needed to assure seamless interoperability among diverse AeroMACS services potentially supplied by multiple service providers.
NASA Astrophysics Data System (ADS)
Papaioannou, S.; Kalfas, G.; Vagionas, C.; Mitsolidou, C.; Maniotis, P.; Miliou, A.; Pleros, N.
2018-01-01
Analog optical fronthaul for 5G network architectures is currently being promoted as a bandwidth- and energy-efficient technology that can sustain the data-rate, latency and energy requirements of the emerging 5G era. This paper deals with a new optical fronthaul architecture that can effectively synergize optical transceiver, optical add/drop multiplexer and optical beamforming integrated photonics towards a DSP-assisted analog fronthaul for seamless and medium-transparent 5G small-cell networks. Its main application targets include dense and Hot-Spot Area networks, promoting the deployment of mmWave massive MIMO Remote Radio Heads (RRHs) that can offer wireless data-rates ranging from 25Gbps up to 400Gbps depending on the fronthaul technology employed. Small-cell access and resource allocation is ensured via a Medium-Transparent (MT-) MAC protocol that enables the transparent communication between the Central Office and the wireless end-users or the lamp-posts via roof-top-located V-band massive MIMO RRHs. The MTMAC is analysed in detail with simulation and analytical theoretical results being in good agreement and confirming its credentials to satisfy 5G network latency requirements by guaranteeing latency values lower than 1 ms for small- to midload conditions. Its extension towards supporting optical beamforming capabilities and mmWave massive MIMO antennas is discussed, while its performance is analysed for different fiber fronthaul link lengths and different optical channel capacities. Finally, different physical layer network architectures supporting the MT-MAC scheme are presented and adapted to different 5G use case scenarios, starting from PON-overlaid fronthaul solutions and gradually moving through Spatial Division Multiplexing up to Wavelength Division Multiplexing transport as the user density increases.
Lishko, Valeryi K.; Moreno, Benjamin; Podolnikova, Nataly P.; Ugarova, Tatiana P.
2016-01-01
LL-37, a cationic antimicrobial peptide, has numerous immune-modulating effects. However, the identity of a receptor(s) mediating the responses in immune cells remains uncertain. We have recently demonstrated that LL-37 interacts with the αMI-domain of integrin αMβ2 (Mac-1), a major receptor on the surface of myeloid cells, and induces a migratory response in Mac-1-expressing monocyte/macrophages as well as activation of Mac-1 on neutrophils. Here, we show that LL-37 and its C-terminal derivative supported strong adhesion of various Mac-1-expressing cells, including HEK293 cells stably transfected with Mac-1, human U937 monocytic cells and murine IC-21 macrophages. The cell adhesion to LL-37 was partially inhibited by specific Mac-1 antagonists, including mAb against the αM integrin subunit and neutrophil inhibitory factor, and completely blocked when anti-Mac-1 antibodies were combined with heparin, suggesting that cell surface heparan sulfate proteoglycans act cooperatively with integrin Mac-1. Coating both Gram-negative and Gram-positive bacteria with LL-37 significantly potentiated their phagocytosis by macrophages, and this process was blocked by a combination of anti-Mac-1 mAb and heparin. Furthermore, phagocytosis by wild-type murine peritoneal macrophages of LL-37-coated latex beads, a model of foreign surfaces, was several fold higher than that of untreated beads. By contrast, LL-37 failed to augment phagocytosis of beads by Mac-1-deficient macrophages. These results identify LL-37 as a novel ligand for integrin Mac-1 and demonstrate that the interaction between Mac-1 on macrophages and bacteria-bound LL-37 promotes phagocytosis. PMID:27990411
Pulmonary symptoms and diagnoses are associated with HIV in the MACS and WIHS cohorts.
Gingo, Matthew R; Balasubramani, Goundappa K; Rice, Thomas B; Kingsley, Lawrence; Kleerup, Eric C; Detels, Roger; Seaberg, Eric C; Greenblatt, Ruth M; Holman, Susan; Huang, Laurence; Sutton, Sarah H; Bertolet, Marnie; Morris, Alison
2014-04-30
Several lung diseases are increasingly recognized as comorbidities with HIV; however, few data exist related to the spectrum of respiratory symptoms, diagnostic testing, and diagnoses in the current HIV era. The objective of the study is to determine the impact of HIV on prevalence and incidence of respiratory disease in the current era of effective antiretroviral treatment. A pulmonary-specific questionnaire was administered yearly for three years to participants in the Multicenter AIDS Cohort Study (MACS) and Women's Interagency HIV Study (WIHS). Adjusted prevalence ratios for respiratory symptoms, testing, or diagnoses and adjusted incidence rate ratios for diagnoses in HIV-infected compared to HIV-uninfected participants were determined. Risk factors for outcomes in HIV-infected individuals were modeled. Baseline pulmonary questionnaires were completed by 907 HIV-infected and 989 HIV-uninfected participants in the MACS cohort and by 1405 HIV-infected and 571 HIV-uninfected participants in the WIHS cohort. In MACS, dyspnea, cough, wheezing, sleep apnea, and incident chronic obstructive pulmonary disease (COPD) were more common in HIV-infected participants. In WIHS, wheezing and sleep apnea were more common in HIV-infected participants. Smoking (MACS and WIHS) and greater body mass index (WIHS) were associated with more respiratory symptoms and diagnoses. While sputum studies, bronchoscopies, and chest computed tomography scans were more likely to be performed in HIV-infected participants, pulmonary function tests were no more common in HIV-infected individuals. Respiratory symptoms in HIV-infected individuals were associated with history of pneumonia, cardiovascular disease, or use of HAART. A diagnosis of asthma or COPD was associated with previous pneumonia. In these two cohorts, HIV is an independent risk factor for several respiratory symptoms and pulmonary diseases including COPD and sleep apnea. Despite a higher prevalence of chronic respiratory symptoms
78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...
Implementing desktop image access of GI images
NASA Astrophysics Data System (ADS)
Grevera, George J.; Feingold, Eric R.; Horii, Steven C.; Laufer, Igor
1996-05-01
In this paper we present a specific example of the current state-of-the-art in desktop image access in the GI section of the Department of Radiology at the Hospital of the University of Pennsylvania. We describe a system which allows physicians to view and manipulate images from a Philips digital fluoroscopy system at the workstations in their offices. Typically they manipulate and view these images on their desktop Macs and then submit the results for slide making or save the images in digital teaching files. In addition to a discussion of the current state-of-the-art here at HUP, we also discuss some future directions that we are pursuing.
Sakles, John C.; Mosier, Jarrod; Chiu, Stephen; Cosentino, Mari; Kalin, Leah
2015-01-01
Study objective We determine the proportion of successful intubations with the C-MAC video laryngoscope (C-MAC) compared with the direct laryngoscope in emergency department (ED) intubations. Methods This was a retrospective analysis of prospectively collected data entered into a continuous quality improvement database during a 28-month period in an academic ED. After each intubation, the operator completed a standardized data form evaluating multiple aspects of the intubation, including patient demographics, indication for intubation, device(s) used, reason for device selection, difficult airway characteristics, number of attempts, and outcome of each attempt. Intubation was considered ultimately successful if the endotracheal tube was correctly inserted into the trachea with the initial device. An attempt was defined as insertion of the device into the mouth regardless of whether there was an attempt to pass the tube. The primary outcome measure was ultimate success. Secondary outcome measures were first-attempt success, Cormack-Lehane view, and esophageal intubation. Multivariate logistic regression analyses, with the inclusion of a propensity score, were performed for the outcome variables ultimate success and first-attempt success. Results During the 28-month study period, 750 intubations were performed with either the C-MAC with a size 3 or 4 blade or a direct laryngoscope with a Macintosh size 3 or 4 blade. Of these, 255 were performed with the C-MAC as the initial device and 495 with a Macintosh direct laryngoscope as the initial device. The C-MAC resulted in successful intubation in 248 of 255 cases (97.3%; 95% confidence interval [CI] 94.4% to 98.9%). A direct laryngoscope resulted in successful intubation in 418 of 495 cases (84.4%; 95% CI 81.0% to 87.5%). In the multivariate regression model, with a propensity score included, the C-MAC was positively predictive of ultimate success (odds ratio 12.7; 95% CI 4.1 to 38.8) and first-attempt success (odds
1. Historic American Buildings Survey, E.P. MacFarland, Photographer May 4, ...
1. Historic American Buildings Survey, E.P. MacFarland, Photographer May 4, 1934, VIEW OF CORNER OF WASHINGTON SQUARE NORTH AND FIFTH AVE. (SHOWING ORIGINAL BALUSTRADE WHICH FORMERLY EXTENDED OVER ENTIRE 'ROW'). - Washington Square North (House), Washington Square North & Fifth Avenue, New York County, NY
Li, Guohong; Sanders, John M.; Bevard, Melissa H.; Sun, ZhiQi; Chumley, James W.; Galkina, Elena V.; Ley, Klaus; Sarembock, Ian J.
2008-01-01
High levels of circulating soluble CD40 ligand (sCD40L) are frequently found in patients with hypercholesterolemia, diabetes, ischemic stroke, or acute coronary syndromes, predicting an increased rate of atherosclerotic plaque rupture and restenosis after coronary/carotid interventions. Clinical restenosis is characterized in part by exaggerated neointima formation, but the underlying mechanism remains incompletely understood. This study investigated the role of elevated sCD40L in neointima formation in response to vascular injury in an atherogenic animal model and explored the molecular mechanisms involved. apoE−/− mice fed a Western diet developed severe hypercholesterolemia, significant hyperglycemia, and high levels of plasma sCD40L. Neointima formation after carotid denudation injury was exaggerated in the apoE−/− mice. In vivo, blocking CD40L with anti-CD40L monoclonal antibody attenuated the early accumulation of Ly-6G+ neutrophils and Gr-1+ monocytes (at 3 days) and the late accumulation of Mac-2+ macrophages (at 28 days) in the denudated arteries; it also reduced the exaggerated neointima formation at 28 days. In vitro, recombinant CD40L stimulated platelet P-selectin and neutrophil Mac-1 expression and platelet-neutrophil co-aggregation and adhesive interaction. These effects were abrogated by anti-CD40L or anti-Mac-1 monoclonal antibody. Moreover, recombinant CD40L stimulated neutrophil oxidative burst and release of matrix metalloproteinase-9 in vitro. We conclude that elevated sCD40L promotes platelet-leukocyte activation and recruitment and neointima formation after arterial injury, potentially through enhancement of platelet P-selectin and leukocyte Mac-1 expression and oxidative activity. PMID:18349125
Razaque, Abdul; Elleithy, Khaled
2015-07-06
Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes.
Das, Sudeshna; Mishra, K P; Ganju, Lilly; Singh, S B
2018-05-05
Brain, being the highest consumer of oxygen, is prone to increased risk of hypoxia-induced neurological insults. In response to hypoxia, microglia, the major resident immune cells of brain switches to an activated phenotype and promote inflammatory responses leading to tissue damage and loss of cognitive functions including working memory impairment. Till date, no proven clinical therapeutics is available to retard the progression of neurodegenerative memory impairment. In the present study, we investigated the therapeutic potential of intranasal small interfering RNA (siRNA) delivery in a mouse model of hypoxia-induced working memory impairment using microglial receptor, Mac-1 as a target gene. Here, we implicate Mac-1 scavenger receptor in microglial phenotype switching, neurodegeneration in prefrontal cortex, hippocampus and working memory impairment. RNA mediated silencing of Mac-1 in both in vitro and in vivo model showed significant impact of it on hypoxia induced altered expression of Mac-1 endogenous ligand, signaling cascade proteins, transcription factors and NADPH oxidase pathway. Efficient degradation of Mac-1 mRNA suppressed expression of M1 phenotypic markers, inflammatory chemokines, and cytokines, but on the other hand, it upregulated M2 phenotypic markers and anti-inflammatory cytokines. Neuronal viability and synaptic plasticity markers were also modulated significantly by this strategy. Behavioral study revealed significant downregulation in the number of working memory errors at a time-dependent manner after silencing the Mac-1 gene during continuous hypoxic exposure. The novel findings of this study for the very first time, unmasked the role of Mac-1 receptor in neurodegenerative disease progression under hypoxic condition and at the same time indicated the potential therapeutic value of this non-invasive siRNA delivery approach for treating working memory loss. Copyright © 2018 Elsevier Ltd. All rights reserved.
Convergence Analysis of Triangular MAC Schemes for Two Dimensional Stokes Equations
Wang, Ming; Zhong, Lin
2015-01-01
In this paper, we consider the use of H(div) elements in the velocity–pressure formulation to discretize Stokes equations in two dimensions. We address the error estimate of the element pair RT0–P0, which is known to be suboptimal, and render the error estimate optimal by the symmetry of the grids and by the superconvergence result of Lagrange inter-polant. By enlarging RT0 such that it becomes a modified BDM-type element, we develop a new discretization BDM1b–P0. We, therefore, generalize the classical MAC scheme on rectangular grids to triangular grids and retain all the desirable properties of the MAC scheme: exact divergence-free, solver-friendly, and local conservation of physical quantities. Further, we prove that the proposed discretization BDM1b–P0 achieves the optimal convergence rate for both velocity and pressure on general quasi-uniform grids, and one and half order convergence rate for the vorticity and a recovered pressure. We demonstrate the validity of theories developed here by numerical experiments. PMID:26041948
Bacteria belonging to the Mycobacterium avium complex (MAC), including Mycobacterium avium and M. intracellulare, are clinically relevant and cause a myriad of opportunistic infections. Children, the elderly, and persons with previous lung conditions or immune system dysfunction...
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
NASA Astrophysics Data System (ADS)
Sánchez-Artigas, Marc; García-López, Pedro
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
Session Types for Access and Information Flow Control
NASA Astrophysics Data System (ADS)
Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.
Berkeley Lab Scientist Named MacArthur "Genius" Fellow for Audio Preservation Research
DOE Office of Scientific and Technical Information (OSTI.GOV)
Haber, Carl
Audio Preservationist Carl Haber was named a MacArthur Fellow in 2013. The Fellowship is a $625,000, no-strings-attached grant for individuals who have shown exceptional creativity in their work and the promise to do more. Learn more at http://www.macfound.org/fellows.
There is no MacWilliams identity for convolutional codes. [transmission gain comparison
NASA Technical Reports Server (NTRS)
Shearer, J. B.; Mceliece, R. J.
1977-01-01
An example is provided of two convolutional codes that have the same transmission gain but whose dual codes do not. This shows that no analog of the MacWilliams identity for block codes can exist relating the transmission gains of a convolutional code and its dual.
Berkeley Lab Scientist Named MacArthur "Genius" Fellow for Audio Preservation Research
Haber, Carl
2018-05-16
Audio Preservationist Carl Haber was named a MacArthur Fellow in 2013. The Fellowship is a $625,000, no-strings-attached grant for individuals who have shown exceptional creativity in their work and the promise to do more. Learn more at http://www.macfound.org/fellows.
Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire
NASA Astrophysics Data System (ADS)
Gladyshev, Pavel; Almansoori, Afrah
RAM content acquisition is an important step in live forensic analysis of computer systems. FireWire offers an attractive way to acquire RAM content of Apple Mac computers equipped with a FireWire connection. However, the existing techniques for doing so require substantial knowledge of the target computer configuration and cannot be used reliably on a previously unknown computer in a crime scene. This paper proposes a novel method for acquiring RAM content of Apple Mac computers over FireWire, which automatically discovers necessary information about the target computer and can be used in the crime scene setting. As an application of the developed method, the techniques for recovery of AOL Instant Messenger (AIM) conversation fragments from RAM dumps are also discussed in this paper.
An action-based fine-grained access control mechanism for structured documents and its application.
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
A comparative study of upwind and MacCormack schemes for CAA benchmark problems
NASA Technical Reports Server (NTRS)
Viswanathan, K.; Sankar, L. N.
1995-01-01
In this study, upwind schemes and MacCormack schemes are evaluated as to their suitability for aeroacoustic applications. The governing equations are cast in a curvilinear coordinate system and discretized using finite volume concepts. A flux splitting procedure is used for the upwind schemes, where the signals crossing the cell faces are grouped into two categories: signals that bring information from outside into the cell, and signals that leave the cell. These signals may be computed in several ways, with the desired spatial and temporal accuracy achieved by choosing appropriate interpolating polynomials. The classical MacCormack schemes employed here are fourth order accurate in time and space. Results for categories 1, 4, and 6 of the workshop's benchmark problems are presented. Comparisons are also made with the exact solutions, where available. The main conclusions of this study are finally presented.
Development and validation of an ELISA kit (YF MAC-HD) to detect IgM to yellow fever virus.
Basile, Alison Jane; Goodman, Christin; Horiuchi, Kalanthe; Laven, Janeen; Panella, Amanda J; Kosoy, Olga; Lanciotti, Robert S; Johnson, Barbara W
2015-12-01
Yellow fever virus (YFV) is endemic in tropical and sub-tropical regions of the world, with around 180,000 human infections a year occurring in Africa. Serologic testing is the chief laboratory diagnostic means of identifying an outbreak and to inform the decision to commence a vaccination campaign. The World Health Organization disseminates the reagents for YFV testing to African reference laboratories, and the US Centers for Disease Control and Prevention (CDC) is charged with producing and providing these reagents. The CDC M-antibody capture ELISA is a 2-day test, requiring titration of reagents when new lots are received, which leads to inconsistency in testing and wastage of material. Here we describe the development of a kit-based assay (YF MAC-HD) based upon the CDC method, that is completed in approximately 3.5h, with equivocal samples being reflexed to an overnight protocol. The kit exhibits >90% accuracy when compared to the 2-day test. The kits were designed for use with a minimum of equipment and are stored at 4°C, removing the need for freezing capacity. This kit is capable of tolerating temporary sub-optimal storage conditions which will ease shipping or power outage concerns, and a shelf life of >6 months was demonstrated with no deterioration in accuracy. All reagents necessary to run the YF MAC-HD are included in the kit and are single-use, with 8 or 24 sample options per kit. Field trials are envisioned for the near future, which will enable refinement of the method. The use of the YF MAC-HD is anticipated to reduce materials wastage, and improve the quality and consistency of YFV serologic testing in endemic areas. Published by Elsevier B.V.
Arslan, Zehra İpek; Solak, Mine
2017-01-01
Objective Cricoid pressure is useful in fasted patients requiring emergency intubation. We compared the effect of cricoid pressure on laryngeal view during Macintosh, McGrath MAC X-Blade and GlideScope video laryngoscopy. Methods After obtaining approval from the Human Research Ethics Committee and written informed consent from patients, we enrolled 120 patients (American Society of Anesthesiologists I–II, age 18–65 years) undergoing elective surgery that required endotracheal intubation in this prospective randomised study. Patients were divided into three groups (Macintosh, McGrath MAC X-Blade and GlideScope). Results Demographic and airway variables were similar in the groups. Cormack-Lehane grades were improved or unchanged on using cricoid pressure in Macintosh and McGrath MAC X-Blade groups. However, laryngeal views worsened in 12 patients (30%), remained unchanged in 26 patients (65%) and improved in 2 patients (5%) in the GlideScope group (p<0.001). Insertion and intubation times for Macintosh and McGrath MAC X-Blade video laryngoscopes were similar. Insertion times for GlideScope and Macintosh video laryngoscopes were similar, but were longer than those for the McGrath MAC X-Blade video laryngoscope (p=0.02). Tracheal intubation took longer with the GlideScope video laryngoscope than with the other devices (p<0.001 and p=0.003). Mean arterial pressures after insertion increased significantly in Macintosh and GlideScope groups (p=0.004 and p=0.001, respectively) compared with post-induction values. Heart rates increased after insertion in all three groups compared with post-induction values (p<0.001). Need for optimisation manoeuvres and postoperative minor complications were comparable in all three groups. Conclusion Although all three devices are useful for normal or difficult intubation, cricoid pressure improved Cormack-Lehane grades of Macintosh and McGrath MAC X-Blade video laryngoscopes but statistically significantly worsened that of the Glide
Li, Limin; Xu, Yubin; Soong, Boon-Hee; Ma, Lin
2013-01-01
Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN). Moreover, for the media access control (MAC) scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS) embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience. PMID:24193101
Sucurovic, Snezana; Milutinovic, Veljko
2008-01-01
The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.
Abby, Sophie S.; Néron, Bertrand; Ménager, Hervé; Touchon, Marie; Rocha, Eduardo P. C.
2014-01-01
Motivation Biologists often wish to use their knowledge on a few experimental models of a given molecular system to identify homologs in genomic data. We developed a generic tool for this purpose. Results Macromolecular System Finder (MacSyFinder) provides a flexible framework to model the properties of molecular systems (cellular machinery or pathway) including their components, evolutionary associations with other systems and genetic architecture. Modelled features also include functional analogs, and the multiple uses of a same component by different systems. Models are used to search for molecular systems in complete genomes or in unstructured data like metagenomes. The components of the systems are searched by sequence similarity using Hidden Markov model (HMM) protein profiles. The assignment of hits to a given system is decided based on compliance with the content and organization of the system model. A graphical interface, MacSyView, facilitates the analysis of the results by showing overviews of component content and genomic context. To exemplify the use of MacSyFinder we built models to detect and class CRISPR-Cas systems following a previously established classification. We show that MacSyFinder allows to easily define an accurate “Cas-finder” using publicly available protein profiles. Availability and Implementation MacSyFinder is a standalone application implemented in Python. It requires Python 2.7, Hmmer and makeblastdb (version 2.2.28 or higher). It is freely available with its source code under a GPLv3 license at https://github.com/gem-pasteur/macsyfinder. It is compatible with all platforms supporting Python and Hmmer/makeblastdb. The “Cas-finder” (models and HMM profiles) is distributed as a compressed tarball archive as Supporting Information. PMID:25330359
Tool for Generation of MAC/GMC Representative Unit Cell for CMC/PMC Analysis
NASA Technical Reports Server (NTRS)
Murthy, Pappu L. N.; Pineda, Evan J.
2016-01-01
This document describes a recently developed analysis tool that enhances the resident capabilities of the Micromechanics Analysis Code with the Generalized Method of Cells (MAC/GMC) 4.0. This tool is especially useful in analyzing ceramic matrix composites (CMCs), where higher fidelity with improved accuracy of local response is needed. The tool, however, can be used for analyzing polymer matrix composites (PMCs) as well. MAC/GMC 4.0 is a composite material and laminate analysis software developed at NASA Glenn Research Center. The software package has been built around the concept of the generalized method of cells (GMC). The computer code is developed with a user friendly framework, along with a library of local inelastic, damage, and failure models. Further, application of simulated thermomechanical loading, generation of output results, and selection of architectures to represent the composite material have been automated to increase the user friendliness, as well as to make it more robust in terms of input preparation and code execution. Finally, classical lamination theory has been implemented within the software, wherein GMC is used to model the composite material response of each ply. Thus, the full range of GMC composite material capabilities is available for analysis of arbitrary laminate configurations as well. The primary focus of the current effort is to provide a graphical user interface (GUI) capability that generates a number of different user-defined repeating unit cells (RUCs). In addition, the code has provisions for generation of a MAC/GMC-compatible input text file that can be merged with any MAC/GMC input file tailored to analyze composite materials. Although the primary intention was to address the three different constituents and phases that are usually present in CMCs-namely, fibers, matrix, and interphase-it can be easily modified to address two-phase polymer matrix composite (PMC) materials where an interphase is absent. Currently, the
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection
Liu, Changyu; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840
Secure access control and large scale robust representation for online multimedia event detection.
Liu, Changyu; Lu, Bin; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.
Behavior Therapy for Pediatric Trichotillomania: A Randomized Controlled Trial
ERIC Educational Resources Information Center
Franklin, Martin E.; Edson, Aubrey L.; Ledley, Deborah A.; Cahill, Shawn P.
2011-01-01
Objective: To examine the efficacy and durability of a behavioral therapy (BT) protocol for pediatric TTM compared with a minimal attention control (MAC) condition. It was hypothesized that the BT condition would be superior to MAC at the end of acute treatment, and would also demonstrate durability of gains through the maintenance treatment…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Pulmonary symptoms and diagnoses are associated with HIV in the MACS and WIHS cohorts
2014-01-01
Background Several lung diseases are increasingly recognized as comorbidities with HIV; however, few data exist related to the spectrum of respiratory symptoms, diagnostic testing, and diagnoses in the current HIV era. The objective of the study is to determine the impact of HIV on prevalence and incidence of respiratory disease in the current era of effective antiretroviral treatment. Methods A pulmonary-specific questionnaire was administered yearly for three years to participants in the Multicenter AIDS Cohort Study (MACS) and Women’s Interagency HIV Study (WIHS). Adjusted prevalence ratios for respiratory symptoms, testing, or diagnoses and adjusted incidence rate ratios for diagnoses in HIV-infected compared to HIV-uninfected participants were determined. Risk factors for outcomes in HIV-infected individuals were modeled. Results Baseline pulmonary questionnaires were completed by 907 HIV-infected and 989 HIV-uninfected participants in the MACS cohort and by 1405 HIV-infected and 571 HIV-uninfected participants in the WIHS cohort. In MACS, dyspnea, cough, wheezing, sleep apnea, and incident chronic obstructive pulmonary disease (COPD) were more common in HIV-infected participants. In WIHS, wheezing and sleep apnea were more common in HIV-infected participants. Smoking (MACS and WIHS) and greater body mass index (WIHS) were associated with more respiratory symptoms and diagnoses. While sputum studies, bronchoscopies, and chest computed tomography scans were more likely to be performed in HIV-infected participants, pulmonary function tests were no more common in HIV-infected individuals. Respiratory symptoms in HIV-infected individuals were associated with history of pneumonia, cardiovascular disease, or use of HAART. A diagnosis of asthma or COPD was associated with previous pneumonia. Conclusions In these two cohorts, HIV is an independent risk factor for several respiratory symptoms and pulmonary diseases including COPD and sleep apnea. Despite a higher
Fan, Wen-Jie; Li, He-Ping; Zhu, He-Shui; Sui, Shi-Ping; Chen, Pei-Ge; Deng, Yue; Sui, Tong-Ming; Wang, Yue-Ying
2016-11-01
To determine the effect of NF-κB on cell proliferation and apoptosis, we investigate the expression of inflammation and apoptosis-related factors in the bovine mammary epithelial cell line, MAC-T. MAC-T cells were cultured in vitro and MTT and LDH assays used to determine the effects of lipopolysaccharide (LPS) on proliferation and cytotoxicity respectively. RT-PCR and western blotting were used to evaluate the effect of LPS and NF-κB inhibition [pyrrolidine dithiocarbamate (PDTC) treatment] on the expression of inflammation and apoptosis-related factors. LPS significantly inhibited MAC-T cell proliferation in a dose- and time-dependent manner. Furthermore, LPS promoted apoptosis while the NF-кB inhibitor PDTC attenuated this effect. After LPS treatment, the NF-кB signaling pathway was activated, and the expression of inflammation and apoptosis-related factors increased. When PDTC blocked NF-кB signaling, the expression of inflammation and apoptosis-related factors were decreased in MAC-T cells. LPS activates the TLR4/NF-κB signaling pathway, inhibits proliferation and promotes apoptosis in MAC-T cells. NF-кB inhibition attenuates MAC-T cell apoptosis and TLR4/NF-κB signaling pathway. NF-кB inhibitor alleviating MAC-T cell apoptosis is presumably modulated by NF-кB.
Distributed reservation control protocols for random access broadcasting channels
NASA Technical Reports Server (NTRS)
Greene, E. P.; Ephremides, A.
1981-01-01
Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.
Razaque, Abdul; Elleithy, Khaled
2015-01-01
Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes. PMID:26153768
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.
Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro
2018-02-13
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors
Huarte, Maider; Romaña, Pedro
2018-01-01
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338
Detecting DIF in Polytomous Items Using MACS, IRT and Ordinal Logistic Regression
ERIC Educational Resources Information Center
Elosua, Paula; Wells, Craig
2013-01-01
The purpose of the present study was to compare the Type I error rate and power of two model-based procedures, the mean and covariance structure model (MACS) and the item response theory (IRT), and an observed-score based procedure, ordinal logistic regression, for detecting differential item functioning (DIF) in polytomous items. A simulation…
Short-Form Versions of the Spanish MacArthur-Bates Communicative Development Inventories
ERIC Educational Resources Information Center
Jackson-Maldonodo, Donna; Marchman, Virginia A.; Fernald, Lia C. H.
2013-01-01
The Spanish-language MacArthur-Bates Communicative Development Inventories (S-CDIs) are well-established parent report tools for assessing the language development of Spanish-speaking children under 3 years. Here, we introduce the short-form versions of the S-CDIs (SFI and SFII), offered as alternatives to the long forms for screening purposes or…
The Mpi-M Aerosol Climatology (MAC)
NASA Astrophysics Data System (ADS)
Kinne, S.
2014-12-01
Monthly gridded global data-sets for aerosol optical properties (AOD, SSA and g) and for aerosol microphysical properties (CCN and IN) offer a (less complex) alternate path to include aerosol radiative effects and aerosol impacts on cloud-microphysics in global simulations. Based on merging AERONET sun-/sky-photometer data onto background maps provided by AeroCom phase 1 modeling output and AERONET sun-/the MPI-M Aerosol Climatology (MAC) version 1 was developed and applied in IPCC simulations with ECHAM and as ancillary data-set in satellite-based global data-sets. An updated version 2 of this climatology will be presented now applying central values from the more recent AeroCom phase 2 modeling and utilizing the better global coverage of trusted sun-photometer data - including statistics from the Marine Aerosol network (MAN). Applications include spatial distributions of estimates for aerosol direct and aerosol indirect radiative effects.
Nonaka, Motohiro; Ma, Bruce Yong; Imaeda, Hirotsugu; Kawabe, Keiko; Kawasaki, Nobuko; Hodohara, Keiko; Kawasaki, Nana; Andoh, Akira; Fujiyama, Yoshihide; Kawasaki, Toshisuke
2011-01-01
Dendritic cell (DC)-specific intercellular adhesion molecule-3-grabbing non-integrin (DC-SIGN) is a type II transmembrane C-type lectin expressed on DCs such as myeloid DCs and monocyte-derived DCs (MoDCs). Recently, we have reported that DC-SIGN interacts with carcinoembryonic antigen (CEA) expressed on colorectal carcinoma cells. CEA is one of the most widely used tumor markers for gastrointestinal cancers such as colorectal cancer. On the other hand, other groups have reported that the level of Mac-2-binding protein (Mac-2BP) increases in patients with pancreatic, breast, and lung cancers, virus infections such as human immunodeficiency virus and hepatitis C virus, and autoimmune diseases. Here, we first identified Mac-2BP expressed on several colorectal carcinoma cell lines as a novel DC-SIGN ligand through affinity chromatography and mass spectrometry. Interestingly, we found that DC-SIGN selectively recognizes Mac-2BP derived from some colorectal carcinomas but not from the other ones. Furthermore, we found that the α1-3,4-fucose moieties of Le glycans expressed on DC-SIGN-binding Mac-2BP were important for recognition. DC-SIGN-dependent cellular interactions between immature MoDCs and colorectal carcinoma cells significantly inhibited MoDC functional maturation, suggesting that Mac-2BP may provide a tolerogenic microenvironment for colorectal carcinoma cells through DC-SIGN-dependent recognition. Importantly, Mac-2BP was detected as a predominant DC-SIGN ligand expressed on some primary colorectal cancer tissues from certain parts of patients in comparison with CEA from other parts, suggesting that DC-SIGN-binding Mac-2BP bearing tumor-associated Le glycans may become a novel potential colorectal cancer biomarker for some patients instead of CEA. PMID:21515679
NASA Technical Reports Server (NTRS)
Hall, Edward; Isaacs, James; Henriksen, Steve; Zelkin, Natalie
2011-01-01
This report is provided as part of ITT s NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: New ATM Requirements-Future Communications, C-Band and L-Band Communications Standard Development and was based on direction provided by FAA project-level agreements for New ATM Requirements-Future Communications. Task 7 included two subtasks. Subtask 7-1 addressed C-band (5091- to 5150-MHz) airport surface data communications standards development, systems engineering, test bed and prototype development, and tests and demonstrations to establish operational capability for the Aeronautical Mobile Airport Communications System (AeroMACS). Subtask 7-2 focused on systems engineering and development support of the L-band digital aeronautical communications system (L-DACS). Subtask 7-1 consisted of two phases. Phase I included development of AeroMACS concepts of use, requirements, architecture, and initial high-level safety risk assessment. Phase II builds on Phase I results and is presented in two volumes. Volume I (this document) is devoted to concepts of use, system requirements, and architecture, including AeroMACS design considerations. Volume II describes an AeroMACS prototype evaluation and presents final AeroMACS recommendations. This report also describes airport categorization and channelization methodologies. The purposes of the airport categorization task were (1) to facilitate initial AeroMACS architecture designs and enable budgetary projections by creating a set of airport categories based on common airport characteristics and design objectives, and (2) to offer high-level guidance to potential AeroMACS technology and policy development sponsors and service providers. A channelization plan methodology was developed because a common global methodology is needed to assure seamless interoperability among diverse AeroMACS services potentially supplied by multiple service providers.
Application-Defined Decentralized Access Control
Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett
2014-01-01
DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493
NASA Astrophysics Data System (ADS)
Chirivì, G.; Suyu, S. H.; Grillo, C.; Halkola, A.; Balestra, I.; Caminha, G. B.; Mercurio, A.; Rosati, P.
2018-06-01
Exploiting the powerful tool of strong gravitational lensing by galaxy clusters to study the highest-redshift Universe and cluster mass distributions relies on precise lens mass modelling. In this work, we aim to present the first attempt at modelling line-of-sight (LOS) mass distribution in addition to that of the cluster, extending previous modelling techniques that assume mass distributions to be on a single lens plane. We have focussed on the Hubble Frontier Field cluster MACS J0416.1-2403, and our multi-plane model reproduces the observed image positions with a rms offset of 0.''53. Starting from this best-fitting model, we simulated a mock cluster that resembles MACS J0416.1-2403 in order to explore the effects of LOS structures on cluster mass modelling. By systematically analysing the mock cluster under different model assumptions, we find that neglecting the lensing environment has a significant impact on the reconstruction of image positions (rms 0.''3); accounting for LOS galaxies as if they were at the cluster redshift can partially reduce this offset. Moreover, foreground galaxies are more important to include into the model than the background ones. While the magnification factor of the lensed multiple images are recovered within 10% for 95% of them, those 5% that lie near critical curves can be significantly affected by the exclusion of the lensing environment in the models. In addition, LOS galaxies cannot explain the apparent discrepancy in the properties of massive sub-halos between MACS J0416.1-2403 and N-body simulated clusters. Since our model of MACS J0416.1-2403 with LOS galaxies only reduced modestly the rms offset in the image positions, we conclude that additional complexities would be needed in future models of MACS J0416.1-2403.
Teaching Justice after MacIntyre: Toward a Catholic Philosophy of Moral Education
ERIC Educational Resources Information Center
Bergman, Roger
2008-01-01
How is the commitment to social justice sustained over a lifetime? This would seem to be a matter of character, and that calls attention to the Aristotelian tradition in ethics. No one provides as much insight into the challenge of the contemporary appropriation of this tradition as Alasdair MacIntyre. Although a moral philosopher rather than a…
The Big Mac and Teaching about Japan. Footnotes. Volume 8, Number 5
ERIC Educational Resources Information Center
Ellington, Lucien
2003-01-01
The Big Mac can be effective tool in helping students achieve a better understanding of Japan. It can defeat Orientalist stereotypes about the Japanese--and also challenge young people who might have oversimplified notions of what exactly occurs when U.S. fast food chains take root in another culture. Many deride McDonald's as a villain…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-15
... Funding and Fiscal Affairs; Farmer Mac Investment Management; Effective Date AGENCY: Farm Credit... Board, issued a final rule amending its regulations governing investment management practices of the... governing investment management practices of the Federal Agricultural Mortgage Corporation. In accordance...
Elzakkers, Isis F F M; Danner, Unna N; Grisso, Thomas; Hoek, Hans W; van Elburg, Annemarie A
Informed consent requires adequate mental capacity to consent to treatment. Mental capacity (MC) to consent to treatment refers to the ability to make medical decisions. MC is assessed in a general psychiatric interview, but this clinical assessment is known to overestimate mental capacity in patients and the inter rater reliability is low. The MacArthur Competence Assessment Tool for Treatment (MacCAT-T) has emerged as the gold standard to assess mental capacity to consent to treatment. The MacCAT-T is a semi-structured interview designed to aid clinicians in this assessment and has shown good inter rater reliability in patients with schizophrenia and other mental disorders, but has hardly been studied in patients with anorexia nervosa. Patients with anorexia nervosa (AN) regularly avoid treatment, even when severely ill and discussion includes assessing MC to consent to treatment. The aim of this study is to compare clinical judgment and the MacCAT-T in evaluating MC in patients with AN which in turn may influence use of the MacCAT-T in daily practice. In a sample of 70 consecutively referred severely ill patients with AN with a mean BMI of 15.5 kg/m 2 and a mean duration of illness of 8.6 years, clinical assessment of MC by experienced psychiatrists and the outcome of the MacCAT-T interview were compared. Agreement (κ-value) was calculated. Agreement between clinical assessment and outcome of the MacCAT-T was questionable (κ 0.23). Unlike in other psychiatric populations, clinicians judged a high proportion of patients with AN as having diminished MC. The MacCAT-T can be useful in assessing MC in AN when used in addition to clinical judgment to aid clinicians in complex cases. Why clinicians judge a relatively high proportion of patients with AN as having diminished MC, in contrast to lower proportions in other psychiatric disorders, is an area in need of further research. Copyright © 2018 Elsevier Ltd. All rights reserved.
Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks.
Pérez-Solano, Juan J; Claver, Jose M; Ezpeleta, Santiago
2017-07-06
Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.
Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks
Claver, Jose M.; Ezpeleta, Santiago
2017-01-01
Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments. PMID:28684666
Debating Inclusion in Synecdoche, New York: A Response to Gresham and MacMillan.
ERIC Educational Resources Information Center
Ferguson, Dianne L.; Ferguson, Philip M.
1997-01-01
A comprehensive review of the debate over the inclusion of children with disabilities in educational programs needs to explore research and issues beyond those considered by F. Gresham and D. MacMillan. Some of those issues are reviewed, focusing on a shift away from the medical deficit model. (SLD)
Searleman, Adam C.; Iliuk, Anton B.; Collier, Timothy S.; Chodosh, Lewis A.; Tao, W. Andy; Bose, Ron
2014-01-01
Altered protein phosphorylation is a feature of many human cancers that can be targeted therapeutically. Phosphopeptide enrichment is a critical step for maximizing the depth of phosphoproteome coverage by MS, but remains challenging for tissue specimens because of their high complexity. We describe the first analysis of a tissue phosphoproteome using polymer-based metal ion affinity capture (PolyMAC), a nanopolymer that has excellent yield and specificity for phosphopeptide enrichment, on a transgenic mouse model of HER2-driven breast cancer. By combining phosphotyrosine immunoprecipitation with PolyMAC, 411 unique peptides with 139 phosphotyrosine, 45 phosphoserine, and 29 phosphothreonine sites were identified from five LC-MS/MS runs. Combining reverse phase liquid chromatography fractionation at pH 8.0 with PolyMAC identified 1571 unique peptides with 1279 phosphoserine, 213 phosphothreonine, and 21 phosphotyrosine sites from eight LC-MS/MS runs. Linear motif analysis indicated that many of the phosphosites correspond to well-known phosphorylation motifs. Analysis of the tyrosine phosphoproteome with the Drug Gene Interaction database uncovered a network of potential therapeutic targets centered on Src family kinases with inhibitors that are either FDA-approved or in clinical development. These results demonstrate that PolyMAC is well suited for phosphoproteomic analysis of tissue specimens. PMID:24723360
Hernando Robles, P; Lechuga Pérez, X; Solé Llop, P; Diestre, G; Mariné Torrent, A; Rodríguez Jornet, A; Marquina Parra, D; Colomer Mirabell, O
2012-01-01
Capacity assessment is an essential element of the informed consent process and is the duty of the physician. The MacCAT-T instrument explores four skills needed to consent a treatment. There is no Spanish version, and the main objective of this work is to validate, adapt and translate the MacCAT-T into Spanish. The MacCAT-T was translated into Spanish and then back-translated into English. It was validated as regards its appearance and content (by 15 experts), construct (inter-rater reliability and internal consistency) and criteria (the validity of an instrument by comparing it to some external criterion, in this case the Mini Examen Cognoscitivo de Lobo). Ninety medical and surgical outpatients over 18 years were included with no deficits of expression and/or severe disorders of consciousness that did not allow them to be interviewed. They have been optimal considering different types of validity. The average application time was between 9 and 13minutes. Data are consistent with those obtained in other applications of MacCAT-T in the English language and facilitate the provision of a Spanish tool for assessing capacity. Copyright © 2011 SECA. Published by Elsevier Espana. All rights reserved.