Sample records for access control mechanism

  1. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  2. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  3. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  4. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  5. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  6. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms

  7. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  8. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  9. Information Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study

    ERIC Educational Resources Information Center

    Antony, Laljith

    2016-01-01

    Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…

  10. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  11. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  12. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This

  13. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  14. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  15. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  16. Speed control system for an access gate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bzorgi, Fariborz M

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the outputmore » element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.« less

  17. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  18. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  19. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  20. Traffic management mechanism for intranets with available-bit-rate access to the Internet

    NASA Astrophysics Data System (ADS)

    Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed

    1997-10-01

    The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.

  1. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  2. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent

    NASA Technical Reports Server (NTRS)

    Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.

    2013-01-01

    This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.

  4. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  5. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  6. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  7. Formalization of the Access Control on ARM-Android Platform with the B Method

    NASA Astrophysics Data System (ADS)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  8. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  9. Mechanisms that improve referential access*

    PubMed Central

    Gernsbacher, Morton Ann

    2015-01-01

    Two mechanisms, suppression and enhancement, are proposed to improve referential access. Enhancement improves the accessibility of previously mentioned concepts by increasing or boosting their activation; suppression improves concepts’ accessibility by decreasing or dampening the activation of other concepts. Presumably, these mechanisms are triggered by the informational content of anaphors. Six experiments investigated this proposal by manipulating whether an anaphoric reference was made with a very explicit, repeated name anaphor or a less explicit pronoun. Subjects read sentences that introduced two participants in their first clauses, for example, “Ann predicted that Pam would lose the track race,” and the sentences referred to one of the two participants in their second clauses, “but Pam/she came in first very easily.” While subjects read each sentence, the activation level of the two participants was measured by a probe verification task. The first two experiments demonstrated that explicit, repeated name anaphors immediately trigger the enhancement of their own antecedents and immediately trigger the suppression of other (nonantecedent) participants. The third experiment demonstrated that less explicit, pronoun anaphors also trigger the suppression of other nonantecedents, but they do so less quickly—even when, as in the fourth experiment, the semantic information to identify their antecedents occurs prior to the pronouns (e.g., “Ann predicted that Pam would lose the track race. But after winning the race, she …”). The fifth experiment demonstrated that more explicit pronouns – pronouns that match the gender of only one participant—trigger suppression more powerfully. A final experiment demonstrated that it is not only rementioned participants who improve their referential access by triggering the suppression of other participants; newly introduced participants do so too (e.g., “Ann predicted that Pam would lose the track race, but

  10. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  11. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  12. Simple measurement-based admission control for DiffServ access networks

    NASA Astrophysics Data System (ADS)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  13. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  14. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  15. Speaking Two Languages for the Price of One: Bypassing Language Control Mechanisms via Accessibility-Driven Switches

    PubMed Central

    Kleinman, Daniel; Gollan, Tamar H.

    2016-01-01

    How do bilinguals switch easily between languages in everyday conversation, when thousands of studies have found that switching slows responses? Previous research has not considered that although switches may happen for different reasons, only some switches – including those typically studied in laboratory experiments – might be costly. Using a repeated picture naming task, we show that bilinguals can maintain and use two languages as efficiently as a single language, switching between them frequently without any cost, if they switch only when a word is more accessible in the other language. These results suggest that language switch costs arise during lexical selection, that top-down language control mechanisms can be suspended, and that language-mixing efficiency can be strategically increased with instruction. Thus, bilinguals might switch languages spontaneously because doing so is not always costly, and there appears to be greater flexibility and efficiency in the cognitive mechanisms that enable switching than previously assumed. PMID:27016240

  16. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  17. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  18. Hormone-dependent control of developmental timing through regulation of chromatin accessibility

    PubMed Central

    Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.

    2017-01-01

    Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147

  19. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  20. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  1. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  2. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  3. System access control study

    DOT National Transportation Integrated Search

    1974-06-01

    The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...

  4. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    NASA Astrophysics Data System (ADS)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  5. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  6. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  7. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  8. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  9. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  10. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  11. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  12. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  13. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  14. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  15. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  16. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  17. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  18. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  19. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  20. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  1. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    PubMed

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  2. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    PubMed Central

    Huarte, Maider; Romaña, Pedro

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338

  3. 45. DETAIL INTERIOR VIEW OF WICKET GATE CONTROL MECHANISM FOR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    45. DETAIL INTERIOR VIEW OF WICKET GATE CONTROL MECHANISM FOR TURBINE/GENERATOR UNIT ACCESSIBLE FROM LEVEL +37 OF POWERHOUSE #1. - Bonneville Project, Powerhouse No.1, Spanning Bradford Slough, from Bradford Island, Bonneville, Multnomah County, OR

  4. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  5. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  6. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  7. Mechanical code comparator

    DOEpatents

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  8. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  9. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  10. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  11. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  12. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  13. A New Data Access Mechanism for HDFS

    NASA Astrophysics Data System (ADS)

    Li, Qiang; Sun, Zhenyu; Wei, Zhanchen; Sun, Gongxing

    2017-10-01

    With the era of big data emerging, Hadoop has become the de facto standard of big data processing platform. However, it is still difficult to get legacy applications, such as High Energy Physics (HEP) applications, to run efficiently on Hadoop platform. There are two reasons which lead to the difficulties mentioned above: firstly, random access is not supported on Hadoop File System (HDFS), secondly, it is difficult to make legacy applications adopt to HDFS streaming data processing mode. In order to address the two issues, a new read and write mechanism of HDFS is proposed. With this mechanism, data access is done on the local file system instead of through HDFS streaming interfaces. To enable files modified by users, three attributes including permissions, owner and group are imposed on Block objects. Blocks stored on Datanodes have the same attributes as the file they are owned by. Users can modify blocks when the Map task running locally, and HDFS is responsible to update the rest replicas later after the block modification finished. To further improve the performance of Hadoop system, a complete localization task execution mechanism is implemented for I/O intensive jobs. Test results show that average CPU utilization is improved by 10% with the new task selection strategy, data read and write performances are improved by about 10% and 30% separately.

  14. Review of SDDOT's highway access control process

    DOT National Transportation Integrated Search

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  15. Typing for Conflict Detection in Access Control Policies

    NASA Astrophysics Data System (ADS)

    Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge

    In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.

  16. LTE-advanced random access mechanism for M2M communication: A review

    NASA Astrophysics Data System (ADS)

    Mustafa, Rashid; Sarowa, Sandeep; Jaglan, Reena Rathee; Khan, Mohammad Junaid; Agrawal, Sunil

    2016-03-01

    Machine Type Communications (MTC) enables one or more self-sufficient machines to communicate directly with one another without human interference. MTC applications include smart grid, security, e-Health and intelligent automation system. To support huge numbers of MTC devices, one of the challenging issues is to provide a competent way for numerous access in the network and to minimize network overload. In this article, the different control mechanisms for overload random access are reviewed to avoid congestion caused by random access channel (RACH) of MTC devices. However, past and present wireless technologies have been engineered for Human-to-Human (H2H) communications, in particular, for transmission of voice. Consequently the Long Term Evolution (LTE) -Advanced is expected to play a central role in communicating Machine to Machine (M2M) and are very optimistic about H2H communications. Distinct and unique characteristics of M2M communications create new challenges from those in H2H communications. In this article, we investigate the impact of massive M2M terminals attempting random access to LTE-Advanced all at once. We discuss and review the solutions to alleviate the overload problem by Third Generation Partnership Project (3GPP). As a result, we evaluate and compare these solutions that can effectively eliminate the congestion on the random access channel for M2M communications without affecting H2H communications.

  17. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  18. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  19. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  20. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  1. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  2. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  3. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.

  4. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  5. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  6. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  7. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  8. NASA Access Mechanism - Graphical user interface information retrieval system

    NASA Technical Reports Server (NTRS)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  9. NASA access mechanism: Graphical user interface information retrieval system

    NASA Technical Reports Server (NTRS)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  10. Programmable Direct-Memory-Access Controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F.

    1990-01-01

    Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.

  11. Protecting Files Hosted on Virtual Machines With Out-of-Guest Access Control

    DTIC Science & Technology

    2017-12-01

    analyzes the design and methodology of the implemented mechanism, while Chapter 4 explains the test methodology, test cases, and performance testing ...SACL, we verify that the user or group accessing the file has sufficient permissions. If that is correct, the callback function returns control to...ferify. In the first section, we validate our design of ferify. Next, we explain the tests we performed to verify that ferify has the results we expected

  12. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  13. Poor readers' retrieval mechanism: efficient access is not dependent on reading skill

    PubMed Central

    Johns, Clinton L.; Matsuki, Kazunaga; Van Dyke, Julie A.

    2015-01-01

    A substantial body of evidence points to a cue-based direct-access retrieval mechanism as a crucial component of skilled adult reading. We report two experiments aimed at examining whether poor readers are able to make use of the same retrieval mechanism. This is significant in light of findings that poor readers have difficulty retrieving linguistic information (e.g., Perfetti, 1985). Our experiments are based on a previous demonstration of direct-access retrieval in language processing, presented in McElree et al. (2003). Experiment 1 replicates the original result using an auditory implementation of the Speed-Accuracy Tradeoff (SAT) method. This finding represents a significant methodological advance, as it opens up the possibility of exploring retrieval speeds in non-reading populations. Experiment 2 provides evidence that poor readers do use a direct-access retrieval mechanism during listening comprehension, despite overall poorer accuracy and slower retrieval speeds relative to skilled readers. The findings are discussed with respect to hypotheses about the source of poor reading comprehension. PMID:26528212

  14. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    DTIC Science & Technology

    2013-09-16

    fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011

  15. HYDRAULIC SERVO CONTROL MECHANISM

    DOEpatents

    Hussey, R.B.; Gottsche, M.J. Jr.

    1963-09-17

    A hydraulic servo control mechanism of compact construction and low fluid requirements is described. The mechanism consists of a main hydraulic piston, comprising the drive output, which is connected mechanically for feedback purposes to a servo control piston. A control sleeve having control slots for the system encloses the servo piston, which acts to cover or uncover the slots as a means of controlling the operation of the system. This operation permits only a small amount of fluid to regulate the operation of the mechanism, which, as a result, is compact and relatively light. This mechanism is particuiarly adaptable to the drive and control of control rods in nuclear reactors. (auth)

  16. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  17. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  18. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  19. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  20. Control and formation mechanism of extended nanochannel geometry in colloidal mesoporous silica particles.

    PubMed

    Sokolov, I; Kalaparthi, V; Volkov, D O; Palantavida, S; Mordvinova, N E; Lebedev, O I; Owens, J

    2017-01-04

    A large class of colloidal multi-micron mesoporous silica particles have well-defined cylindrical nanopores, nanochannels which self-assembled in the templated sol-gel process. These particles are of broad interest in photonics, for timed drug release, enzyme stabilization, separation and filtration technologies, catalysis, etc. Although the pore geometry and mechanism of pore formation of such particles has been widely investigated at the nanoscale, their pore geometry and its formation mechanism at a larger (extended) scale is still under debate. The extended geometry of nanochannels is paramount for all aforementioned applications because it defines accessibility of nanochannels, and subsequently, kinetics of interaction of the nanochannel content with the particle surrounding. Here we present both experimental and theoretical investigation of the extended geometry and its formation mechanism in colloidal multi-micron mesoporous silica particles. We demonstrate that disordered (and consequently, well accessible) nanochannels in the initially formed colloidal particles gradually align and form extended self-sealed channels. This knowledge allows to control the percentage of disordered versus self-sealed nanochannels, which defines accessibility of nanochannels in such particles. We further show that the observed aligning the channels is in agreement with theory; it is thermodynamically favored as it decreases the Gibbs free energy of the particles. Besides the practical use of the obtained results, developing a fundamental understanding of the mechanisms of morphogenesis of complex geometry of nanopores will open doors to efficient and controllable synthesis that will, in turn, further fuel the practical utilization of these particles.

  1. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  2. The influence of patriarchal behavior on birth control access and use among recent Hispanic immigrants.

    PubMed

    Gonzalez, Eleazar U; Sable, Marjorie R; Campbell, James D; Dannerbeck, Anne

    2010-08-01

    It is commonly assumed that Hispanic immigrants in the United States subscribe to a patriarchal ideology that keeps women subordinated to men, often through violence and exploitative reproductive behaviors. If this assumption is true, we might expect to find that in the Hispanic culture patriarchal males control decision-making about access to and use of birth control. Structured interviews of 100 Hispanic men and 100 Hispanic women who were recent immigrants to a Midwest community were conducted to examine this assumption. Results did not support this assumption among this study population. We found no patriarchal ideology supporting women's subordination to men, violence as a mechanism of control, reproduction as a way of exploitation, or cultural influences discouraging access to and use of birth control in the Hispanic community. Rather, these immigrants revealed adequate knowledge of birth control use and positive perceptions of gender equality. Gaining a better understanding of the limited influence of patriarchal ideology on the use of birth control and family planning services among this Hispanic community may inform the development of family planning services tailored for new Hispanic immigrants.

  3. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  4. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  5. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  6. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  7. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  8. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  9. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  10. Biomedical Big Data: New Models of Control Over Access, Use and Governance.

    PubMed

    Vayena, Effy; Blasimme, Alessandro

    2017-12-01

    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated in informed consent documents or be implicit in the norms of confidentiality that govern the relationships of patients and healthcare professionals. However, with medicine becoming a data-intense enterprise, informed consent and medical confidentiality, as mechanisms of control, are put under pressure. In this paper we explore emerging models of informational control in data-intense healthcare and clinical research, which can compensate for the limitations of currently available instruments. More specifically, we discuss three approaches that hold promise in increasing individual control: the emergence of data portability rights as means to control data access, new mechanisms of informed consent as tools to control data use, and finally, new participatory governance schemes that allow individuals to control their data through direct involvement in data governance. We conclude by suggesting that, despite the impression that biomedical big data diminish individual control, the synergistic effect of new data management models can in fact improve it.

  11. Antiretroviral therapy (ART) rationing and access mechanisms and their impact on youth ART utilization in Malawi.

    PubMed

    Dixon, Jimmy-Gama; Gibson, Sarah; McPake, Barbara; Maleta, Ken

    2011-06-01

    The World Health Organization (WHO) staging is a commonly used rationing mechanism for highly active antiretroviral therapy (HAART) among various HIV infected populations including youths in most developing countries. Rationing is defined as any policy or practice that restricts consumption of or access to certain goods due to its limited supply. However, as HIV prevalence is rapidly increasing among youth, understanding the capacity of the staging approach to achieve HAART uptake in youth is of considerable importance. This study aimed to explore how HAART rationing and access mechanisms impact on youth's utilization of HAART in Malawi. The study used mixed methods with quantitative analysis of existing Ministry of Health Clinical HIV Unit data used to determine existing levels of youth HAART use. Qualitative methods employed in-depth interviews that interviewed nine ART providers, nine HIV positive youth on HAART and nine HIV positive youth not on HAART; and field observations to nine ART clinics were used to understand HAART rationing and access mechanisms and how such mechanisms impact youth uptake of HAART. The findings revealed that ART providers use both explicit rationing mechanisms like WHO clinical staging and implicit rationing mechanisms like use of waiting lists, queues and referral in ART provision. However, the WHO staging approach had some challenges in its implementation. It was also observed that factors like non-comprehensive approach to HAART provision, costs incurred to access HAART, negative beliefs and misconceptions about HAART and HIV were among the key factors that limit youth access to HAART. The study recommends that while WHO staging is successful as a rationing mechanism in Malawi, measures should be put in place to improve access to CD4 assessment for clients who may need it. ART providers also need to be made aware of the implicit rationing mechanisms that may affect HAART access. There is also need to improve monitoring of those HIV

  12. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  13. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as

  14. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  15. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  16. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  17. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  18. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  19. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  20. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  1. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    NASA Astrophysics Data System (ADS)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  2. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  3. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  4. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  5. Energy-efficient rings mechanism for greening multisegment fiber-wireless access networks

    NASA Astrophysics Data System (ADS)

    Gong, Xiaoxue; Guo, Lei; Hou, Weigang; Zhang, Lincong

    2013-07-01

    Through integrating advantages of optical and wireless communications, the Fiber-Wireless (FiWi) has become a promising solution for the "last-mile" broadband access. In particular, greening FiWi has attained extensive attention, because the access network is a main energy contributor in the whole infrastructure. However, prior solutions of greening FiWi shut down or sleep unused/minimally used optical network units for a single segment, where we deploy only one optical linear terminal. We propose a green mechanism referred to as energy-efficient ring (EER) for multisegment FiWi access networks. We utilize an integer linear programming model and a generic algorithm to generate clusters, each having the shortest distance of fully connected segments of its own. Leveraging the backtracking method for each cluster, we then connect segments through fiber links, and the shortest distance fiber ring is constructed. Finally, we sleep low load segments and forward affected traffic to other active segments on the same fiber ring by our sleeping scheme. Experimental results show that our EER mechanism significantly reduces the energy consumption at the slightly additional cost of deploying fiber links.

  6. Macro-mechanics controls quantum mechanics: mechanically controllable quantum conductance switching of an electrochemically fabricated atomic-scale point contact.

    PubMed

    Staiger, Torben; Wertz, Florian; Xie, Fangqing; Heinze, Marcel; Schmieder, Philipp; Lutzweiler, Christian; Schimmel, Thomas

    2018-01-12

    Here, we present a silver atomic-scale device fabricated and operated by a combined technique of electrochemical control (EC) and mechanically controllable break junction (MCBJ). With this EC-MCBJ technique, we can perform mechanically controllable bistable quantum conductance switching of a silver quantum point contact (QPC) in an electrochemical environment at room temperature. Furthermore, the silver QPC of the device can be controlled both mechanically and electrochemically, and the operating mode can be changed from 'electrochemical' to 'mechanical', which expands the operating mode for controlling QPCs. These experimental results offer the perspective that a silver QPC may be used as a contact for a nanoelectromechanical relay.

  7. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  8. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  9. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  10. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  11. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  12. Evaluation of modified work zone traffic control devices at business accesses

    DOT National Transportation Integrated Search

    2001-01-01

    Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...

  13. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  14. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  15. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  16. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  17. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  18. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  19. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  20. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  1. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  2. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  3. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  4. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  5. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  6. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  7. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  8. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  9. Macro-mechanics controls quantum mechanics: mechanically controllable quantum conductance switching of an electrochemically fabricated atomic-scale point contact

    NASA Astrophysics Data System (ADS)

    Staiger, Torben; Wertz, Florian; Xie, Fangqing; Heinze, Marcel; Schmieder, Philipp; Lutzweiler, Christian; Schimmel, Thomas

    2018-01-01

    Here, we present a silver atomic-scale device fabricated and operated by a combined technique of electrochemical control (EC) and mechanically controllable break junction (MCBJ). With this EC-MCBJ technique, we can perform mechanically controllable bistable quantum conductance switching of a silver quantum point contact (QPC) in an electrochemical environment at room temperature. Furthermore, the silver QPC of the device can be controlled both mechanically and electrochemically, and the operating mode can be changed from ‘electrochemical’ to ‘mechanical’, which expands the operating mode for controlling QPCs. These experimental results offer the perspective that a silver QPC may be used as a contact for a nanoelectromechanical relay.

  10. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  13. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  14. Automating Access Control Logics in Simple Type Theory with LEO-II

    NASA Astrophysics Data System (ADS)

    Benzmüller, Christoph

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.

  15. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  16. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  17. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  18. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  19. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  20. Basic mechanisms in the laser control of non-Markovian dynamics

    NASA Astrophysics Data System (ADS)

    Puthumpally-Joseph, R.; Mangaud, E.; Chevet, V.; Desouter-Lecomte, M.; Sugny, D.; Atabek, O.

    2018-03-01

    Referring to a Fano-type model qualitative analogy we develop a comprehensive basic mechanism for the laser control of the non-Markovian bath response and fully implement it in a realistic control scheme, in strongly coupled open quantum systems. Converged hierarchical equations of motion are worked out to numerically solve the master equation of a spin-boson Hamiltonian to reach the reduced electronic density matrix of a heterojunction in the presence of strong terahertz laser pulses. Robust and efficient control is achieved increasing by a factor of 2 the non-Markovianity measured by the time evolution of the volume of accessible states. The consequences of such fields on the central system populations and coherence are examined, putting the emphasis on the relation between the increase of non-Markovianity and the slowing down of decoherence processes.

  1. REACTOR CONTROL MECHANISM

    DOEpatents

    Lane, J.A.; Engberg, R.E.; Welch, J.M.

    1959-05-12

    A quick-releasing mechanism is described which may be used to rapidiy drop a device supported from beneath during normal use, such as a safety rod in a nuclear reactor. In accordance with this invention an electrical control signal, such as may be provided by radiation detection or other alarm condition sensing devices, is delivered to an electromagnetic solenoid, the armature of which is coupled to an actuating mechanism. The solenoid is energized when the mechanism is in its upper or cocked position. In such position, the mechanism engages a plurality of retaining balls, forcing them outward into engagement with a shoulder or recess in a corresponding section of a tubular extension on the upheld device. When the control signal to the solenoid suddenly ceases, the armature drops out, allowing the actuating mechanism to move slightly but rapidly under the force of a compressed spring. The weight of the device will urge the balls inward against a beveled portion of the actuating mechanism and away from the engaging section on the tubular extension, thus allowing the upheld device to fall freely under the influence of gravity.

  2. Neural Mechanisms Underlying Individual Differences in Control-Averse Behavior.

    PubMed

    Rudorf, Sarah; Schmelz, Katrin; Baumgartner, Thomas; Wiest, Roland; Fischbacher, Urs; Knoch, Daria

    2018-05-30

    , when designing policies aimed at increasing compliance with vaccination recommendations, and is therefore a highly relevant research goal. Here, we identify a neural mechanism between parietal and prefrontal brain regions that can explain individual differences in control-averse behavior. This mechanism provides novel insights into control aversion beyond what is accessible through self-reports. Copyright © 2018 Rudorf et al.

  3. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  4. NASA Access Mechanism: Lessons learned document

    NASA Technical Reports Server (NTRS)

    Burdick, Lisa; Dunbar, Rick; Duncan, Denise; Generous, Curtis; Hunter, Judy; Lycas, John; Taber-Dudas, Ardeth

    1994-01-01

    The six-month beta test of the NASA Access Mechanism (NAM) prototype was completed on June 30, 1993. This report documents the lessons learned from the use of this Graphical User Interface to NASA databases such as the NASA STI Database, outside databases, Internet resources, and peers in the NASA R&D community. Design decisions, such as the use of XWindows software, a client-server distributed architecture, and use of the NASA Science Internet, are explained. Users' reactions to the interface and suggestions for design changes are reported, as are the changes made by the software developers based on new technology for information discovery and retrieval. The lessons learned section also reports reactions from the public, both at demonstrations and in response to articles in the trade press and journals. Recommendations are included for future versions, such as a World Wide Web (WWW) and Mosaic based interface to heterogeneous databases, and NAM-Lite, a version which allows customization to include utilities provided locally at NASA Centers.

  5. Global Access-controlled Transfer e-frame (GATe)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  6. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  7. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    PubMed

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  8. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    PubMed Central

    Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152

  9. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  10. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. Sun-mediated mechanical LINC between nucleus and cytoskeleton regulates βcatenin nuclear access.

    PubMed

    Uzer, Gunes; Bas, Guniz; Sen, Buer; Xie, Zhihui; Birks, Scott; Olcum, Melis; McGrath, Cody; Styner, Maya; Rubin, Janet

    2018-06-06

    βcatenin acts as a primary intracellular signal transducer for mechanical and Wnt signaling pathways to control cell function and fate. Regulation of βcatenin in the cytoplasm has been well studied but βcatenin nuclear trafficking and function remains unclear. In a previous study we showed that, in mesenchymal stem cells (MSC), mechanical blockade of adipogenesis relied on inhibition of βcatenin destruction complex element GSK3β (glycogen synthase kinase 3β) to increase nuclear βcatenin as well as the function of Linker of Cytoskeleton and Nucleoskeleton (LINC) complexes, suggesting that these two mechanisms may be linked. Here we show that shortly after inactivation of GSK3β due to either low intensity vibration (LIV), substrate strain or pharmacologic inhibition, βcatenin associates with the nucleoskeleton, defined as the insoluble nuclear fraction that provides structure to the integrated nuclear envelope, nuclear lamina and chromatin. Co-depleting LINC elements Sun-1 and Sun-2 interfered with both nucleoskeletal association and nuclear entry of βcatenin, resulting in decreased nuclear βcatenin levels. Our findings reveal that the insoluble structural nucleoskeleton actively participates in βcatenin dynamics. As the cytoskeleton transmits applied mechanical force to the nuclear surface to influence the nucleoskeleton and its LINC mediated interaction, our results suggest a pathway by which LINC mediated connectivity may play a role in signaling pathways that depend on nuclear access of βcatenin. Copyright © 2018 Elsevier Ltd. All rights reserved.

  13. Intestinal Master Transcription Factor CDX2 Controls Chromatin Access for Partner Transcription Factor Binding

    PubMed Central

    Verzi, Michael P.; Shin, Hyunjin; San Roman, Adrianna K.

    2013-01-01

    Tissue-specific gene expression requires modulation of nucleosomes, allowing transcription factors to occupy cis elements that are accessible only in selected tissues. Master transcription factors control cell-specific genes and define cellular identities, but it is unclear if they possess special abilities to regulate cell-specific chromatin and if such abilities might underlie lineage determination and maintenance. One prevailing view is that several transcription factors enable chromatin access in combination. The homeodomain protein CDX2 specifies the embryonic intestinal epithelium, through unknown mechanisms, and partners with transcription factors such as HNF4A in the adult intestine. We examined enhancer chromatin and gene expression following Cdx2 or Hnf4a excision in mouse intestines. HNF4A loss did not affect CDX2 binding or chromatin, whereas CDX2 depletion modified chromatin significantly at CDX2-bound enhancers, disrupted HNF4A occupancy, and abrogated expression of neighboring genes. Thus, CDX2 maintains transcription-permissive chromatin, illustrating a powerful and dominant effect on enhancer configuration in an adult tissue. Similar, hierarchical control of cell-specific chromatin states is probably a general property of master transcription factors. PMID:23129810

  14. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  15. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  16. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  17. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  18. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  19. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  20. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...

  1. Access Control for Home Data Sharing: Attitudes, Needs and Practices

    DTIC Science & Technology

    2009-10-01

    cameras, mobile phones and portable music players make creating and interacting with this content easy. Home users are increasingly interested in...messages, photos, home videos, journal files and home musical recordings. Many participants considered unauthorized access by strangers, acquaintances...configuration does not allow users to share different subsets of music with different people. Facebook supplies rich, customizable access controls for

  2. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420...

  3. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  4. The OPL Access Control Policy Language

    NASA Astrophysics Data System (ADS)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  5. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...

  6. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  7. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  8. Advanced electrodynamic mechanisms for the nanoscale control of light by light

    NASA Astrophysics Data System (ADS)

    Andrews, David L.; Leeder, Jamie M.; Bradshaw, David S.

    2015-08-01

    A wide range of mechanisms is available for achieving rapid optical responsivity in material components. Amongst them, some of the most promising for potential device applications are those associated with an ultrafast response and a short cycle time. These twin criteria for photoresponsive action substantially favor optical, over most other, forms of response such as those fundamentally associated with photothermal, photochemical or optomechanical processes. The engagement of nonlinear mechanisms to actively control the characteristics of optical materials is not new. Indeed, it has been known for over fifty years that polarization effects of this nature occur in the optical Kerr effect - although in fluid media the involvement of a molecular reorientation mechanism leads to a significant response time. It has more recently emerged that there are other, less familiar forms of optical nonlinearity that can provide a means for one beam of light to instantly influence another. In particular, major material properties such as absorptivity or emissivity can be subjected to instant and highly localized control by the transmission of light with an off-resonant wavelength. This presentation introduces and compares the key electrodynamic mechanisms, discussing the features that suggest the most attractive possibilities for exploitation. The most significant of such mechanistic features include the off-resonant activation of optical emission, the control of excited-state lifetimes, the access of dark states, the inhibition or re-direction of exciton migration, and a coupling of stimulated emission with coherent scattering. It is shown that these offer a variety of new possibilities for ultrafast optical switching and transistor action, ultimately providing all-optical control with nanoscale precision.

  9. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...

  10. 14 CFR 27.691 - Autorotation control mechanism.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... AIRCRAFT AIRWORTHINESS STANDARDS: NORMAL CATEGORY ROTORCRAFT Design and Construction Control Systems § 27.691 Autorotation control mechanism. Each main rotor blade pitch control mechanism must allow rapid... 14 Aeronautics and Space 1 2013-01-01 2013-01-01 false Autorotation control mechanism. 27.691...

  11. 14 CFR 29.691 - Autorotation control mechanism.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... AIRCRAFT AIRWORTHINESS STANDARDS: TRANSPORT CATEGORY ROTORCRAFT Design and Construction Control Systems § 29.691 Autorotation control mechanism. Each main rotor blade pitch control mechanism must allow rapid... 14 Aeronautics and Space 1 2013-01-01 2013-01-01 false Autorotation control mechanism. 29.691...

  12. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  13. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    PubMed Central

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  14. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  15. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    PubMed

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  16. Tethered satellite control mechanism

    NASA Technical Reports Server (NTRS)

    Kyrias, G. M.

    1983-01-01

    The tethered satellite control mechanisms consist of four major subsystems. The reel drive mechanism stores the tether. It is motor driven and includes a level wind to uniformly feed the tether to the reel. The lower boom mechanism serves two primary functions: (1) it measures tether length and velocity as the tether runs through the mechanism, and (2) it reads the tether tension at the reel. It also provides change the direction for the tether from the reel to the upper boom mechanism. The deployment boom positions the upper boom mechanism with satellite out of the cargo bay. The deployment function places the 500-kg satellite 20 m away from the Space Shuttle (producing a small natural gravity gradient force), impacts an initial velocity to the satellite for deployment, and allows for satellite docking at a safe distance from the body of the Space Shuttle. The upper boom mechanism (UBM) services three functions: (1) it provides tether control to the satellite as the satellite swings in and out of plane; (2) it reads tether tension in the low range during the early deployment and final retrieval parts of the mission; and (3) it produces additional tether tension at the reel when tether tension to the satellite is in the low range.

  17. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  18. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  19. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  20. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications

    PubMed Central

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  1. Mechanisms controlling the impact of multi-year drought on mountain hydrology.

    PubMed

    Bales, Roger C; Goulden, Michael L; Hunsaker, Carolyn T; Conklin, Martha H; Hartsough, Peter C; O'Geen, Anthony T; Hopmans, Jan W; Safeeq, Mohammad

    2018-01-12

    Mountain runoff ultimately reflects the difference between precipitation (P) and evapotranspiration (ET), as modulated by biogeophysical mechanisms that intensify or alleviate drought impacts. These modulating mechanisms are seldom measured and not fully understood. The impact of the warm 2012-15 California drought on the heavily instrumented Kings River basin provides an extraordinary opportunity to enumerate four mechanisms that controlled the impact of drought on mountain hydrology. Two mechanisms intensified the impact: (i) evaporative processes have first access to local precipitation, which decreased the fractional allocation of P to runoff in 2012-15 and reduced P-ET by 30% relative to previous years, and (ii) 2012-15 was 1 °C warmer than the previous decade, which increased ET relative to previous years and reduced P-ET by 5%. The other two mechanisms alleviated the impact: (iii) spatial heterogeneity and the continuing supply of runoff from higher elevations increased 2012-15 P-ET by 10% relative to that expected for a homogenous basin, and iv) drought-associated dieback and wildfire thinned the forest and decreased ET, which increased 2016 P-ET by 15%. These mechanisms are all important and may offset each other; analyses that neglect one or more will over or underestimate the impact of drought and warming on mountain runoff.

  2. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  3. Session Types for Access and Information Flow Control

    NASA Astrophysics Data System (ADS)

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.

  4. Long-Range Control of Gene Expression: Emerging Mechanisms and Disruption in Disease

    PubMed Central

    Kleinjan, Dirk A.; van Heyningen, Veronica

    2005-01-01

    Transcriptional control is a major mechanism for regulating gene expression. The complex machinery required to effect this control is still emerging from functional and evolutionary analysis of genomic architecture. In addition to the promoter, many other regulatory elements are required for spatiotemporally and quantitatively correct gene expression. Enhancer and repressor elements may reside in introns or up- and downstream of the transcription unit. For some genes with highly complex expression patterns—often those that function as key developmental control genes—the cis-regulatory domain can extend long distances outside the transcription unit. Some of the earliest hints of this came from disease-associated chromosomal breaks positioned well outside the relevant gene. With the availability of wide-ranging genome sequence comparisons, strong conservation of many noncoding regions became obvious. Functional studies have shown many of these conserved sites to be transcriptional regulatory elements that sometimes reside inside unrelated neighboring genes. Such sequence-conserved elements generally harbor sites for tissue-specific DNA-binding proteins. Developmentally variable chromatin conformation can control protein access to these sites and can regulate transcription. Disruption of these finely tuned mechanisms can cause disease. Some regulatory element mutations will be associated with phenotypes distinct from any identified for coding-region mutations. PMID:15549674

  5. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  6. A novel asynchronous access method with binary interfaces

    PubMed Central

    2008-01-01

    Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation. PMID:18959797

  7. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  8. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  9. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  10. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  13. An antenna-pointing mechanism for the ETS-6 K-band Single Access (KSA) antenna

    NASA Technical Reports Server (NTRS)

    Takada, Noboru; Amano, Takahiro; Ohhashi, Toshiro; Wachi, Shigeo

    1991-01-01

    Both the design philosophy for the Antenna Pointing Mechanism (APM) to be used for the K-band Single Access (KSA) antenna system and experimental results of the APM Engineering Model (EM) tests are described. The KSA antenna system will be flown on the Engineering Test Satellite 6 (ETS-6).

  14. Trends in communicative access solutions for children with cerebral palsy.

    PubMed

    Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom

    2014-08-01

    Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.

  15. Universal Controller for Spacecraft Mechanisms

    NASA Technical Reports Server (NTRS)

    Levanas, Greg; McCarthy, Thomas; Hunter, Don; Buchanan, Christine; Johnson, Michael; Cozy, Raymond; Morgan, Albert; Tran, Hung

    2006-01-01

    An electronic control unit has been fabricated and tested that can be replicated as a universal interface between the electronic infrastructure of a spacecraft and a brushless-motor (or other electromechanical actuator) driven mechanism that performs a specific mechanical function within the overall spacecraft system. The unit includes interfaces to a variety of spacecraft sensors, power outputs, and has selectable actuator control parameters making the assembly a mechanism controller. Several control topologies are selectable and reconfigurable at any time. This allows the same actuator to perform different functions during the mission life of the spacecraft. The unit includes complementary metal oxide/semiconductor electronic components on a circuit board of a type called rigid flex (signifying flexible printed wiring along with a rigid substrate). The rigid flex board is folded to make the unit fit into a housing on the back of a motor. The assembly has redundant critical interfaces, allowing the controller to perform time-critical operations when no human interface with the hardware is possible. The controller is designed to function over a wide temperature range without the need for thermal control, including withstanding significant thermal cycling, making it usable in nearly all environments that spacecraft or landers will endure. A prototype has withstood 1,500 thermal cycles between 120 and +85 C without significant deterioration of its packaging or electronic function. Because there is no need for thermal control and the unit is addressed through a serial bus interface, the cabling and other system hardware are substantially reduced in quantity and complexity, with corresponding reductions in overall spacecraft mass and cost.

  16. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  17. Privacy, security and access with sensitive health information.

    PubMed

    Croll, Peter

    2010-01-01

    This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.

  18. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility.

    PubMed

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I; Hantschel, Oliver

    2014-11-17

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  19. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  20. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  1. In Situ Microstructural Control and Mechanical Testing Inside the Transmission Electron Microscope at Elevated Temperatures

    NASA Astrophysics Data System (ADS)

    Wang, Baoming; Haque, M. A.

    2015-08-01

    With atomic-scale imaging and analytical capabilities such as electron diffraction and energy-loss spectroscopy, the transmission electron microscope has allowed access to the internal microstructure of materials like no other microscopy. It has been mostly a passive or post-mortem analysis tool, but that trend is changing with in situ straining, heating and electrical biasing. In this study, we design and demonstrate a multi-functional microchip that integrates actuators, sensors, heaters and electrodes with freestanding electron transparent specimens. In addition to mechanical testing at elevated temperatures, the chip can actively control microstructures (grain growth and phase change) of the specimen material. Using nano-crystalline aluminum, nickel and zirconium as specimen materials, we demonstrate these novel capabilities inside the microscope. Our approach of active microstructural control and quantitative testing with real-time visualization can influence mechanistic modeling by providing direct and accurate evidence of the fundamental mechanisms behind materials behavior.

  2. Robust control of multi-jointed arm with a decentralized autonomous control mechanism

    NASA Technical Reports Server (NTRS)

    Kimura, Shinichi; Miyazaki, Ken; Suzuki, Yoshiaki

    1994-01-01

    A decentralized autonomous control mechanism applied to the control of three dimensional manipulators and its robustness to partial damage was assessed by computer simulation. Decentralized control structures are believed to be quite robust to time delay between the operator and the target system. A 10-jointed manipulator based on our control mechanism was able to continue its positioning task in three-dimensional space without revision of the control program, even after some of its joints were damaged. These results suggest that this control mechanism can be effectively applied to space telerobots, which are associated with serious time delay between the operator and the target system, and which cannot be easily repaired after being partially damaged.

  3. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  4. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  5. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 2: Switches and Environmental Controls. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…

  6. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  7. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  8. Brain Mechanisms of Attentional Control.

    ERIC Educational Resources Information Center

    Wilke, Thomas

    Lack of attentional control--inability to concentrate--has often made the difference between successful and unsuccessful performance on the part of athletes. Attention is controlled neurologically by a very complex interaction of a large portion of the cerebrum and is not localized to any one structure. The mechanism involves a memory retrieval…

  9. Secure web-based access to radiology: forms and databases for fast queries

    NASA Astrophysics Data System (ADS)

    McColl, Roderick W.; Lane, Thomas J.

    2002-05-01

    Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

  10. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  11. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  12. Access Control and Processing Studies for Ground Satellite Mobile Communications/Surveillance Systems

    DOT National Transportation Integrated Search

    1974-06-01

    The report synthesizes a set of satellite communications systems configurations to provide services to aircraft flying oceanic routes. These configurations are combined with access control methods to form complete systems. These systems are analyzed ...

  13. Remote controlled vacuum joint closure mechanism

    DOEpatents

    Doll, David W.; Hager, E. Randolph

    1986-01-01

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange.

  14. Mechanical perturbation control of cardiac alternans

    NASA Astrophysics Data System (ADS)

    Hazim, Azzam; Belhamadia, Youssef; Dubljevic, Stevan

    2018-05-01

    Cardiac alternans is a disturbance in heart rhythm that is linked to the onset of lethal cardiac arrhythmias. Mechanical perturbation control has been recently used to suppress alternans in cardiac tissue of relevant size. In this control strategy, cardiac tissue mechanics are perturbed via active tension generated by the heart's electrical activity, which alters the tissue's electric wave profile through mechanoelectric coupling. We analyze the effects of mechanical perturbation on the dynamics of a map model that couples the membrane voltage and active tension systems at the cellular level. Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. To this end, a bidirectional coupling between the membrane voltage and active tension systems in a single cardiac cell is provided, and a discrete form of the proposed control algorithm, that can be incorporated in the coupled maps, is derived. In addition, a realistic electromechanical model of cardiac tissue is employed to explore the feasibility of suppressing alternans at cellular and tissue levels. Electrical activity is represented in two detailed ionic models, the Luo-Rudy 1 and the Fox models, while two active contractile tension models, namely a smooth variant of the Nash-Panfilov model and the Niederer-Hunter-Smith model, are used to represent mechanical activity in the heart. The Mooney-Rivlin passive elasticity model is employed to describe passive mechanical behavior of the myocardium.

  15. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  16. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  17. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  18. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  19. Mechanical Control of Tissue Morphogenesis

    PubMed Central

    Patwari, Parth; Lee, Richard T.

    2008-01-01

    Mechanical forces participate in morphogenesis from the level of individual cells to whole organism patterning. This manuscript reviews recent research that has identified specific roles for mechanical forces in important developmental events. One well-defined example is that dynein-driven cilia create fluid flow that determines left-right patterning in the early mammalian embryo. Fluid flow is also important for vasculogenesis, and evidence suggests that fluid shear stress rather than fluid transport is primarily required for remodeling the early vasculature. Contraction of the actin cytoskeleton, driven by nonmuscle myosins and regulated by the Rho family GTPases, is a recurring mechanism for controlling morphogenesis throughout development, from gastrulation to cardiogenesis. Finally, novel experimental approaches suggest critical roles for the actin cytoskeleton and the mechanical environment in determining differentiation of mesenchymal stem cells. Insights into the mechanisms linking mechanical forces to cell and tissue differentiation pathways are important for understanding many congenital diseases and for developing regenerative medicine strategies. PMID:18669930

  20. Remote controlled vacuum joint closure mechanism

    DOEpatents

    Doll, D.W.; Hager, E.R.

    1984-02-22

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange and maintain the high vacuum seal established by the displacement of the flange assembly and extension of the bellows without displacing the entire duct.

  1. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  2. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  3. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  4. International Space Station Mechanisms and Maintenance Flight Control Documentation and Training Development

    NASA Technical Reports Server (NTRS)

    Daugherty, Colin C.

    2010-01-01

    International Space Station (ISS) crew and flight controller training documentation is used to aid in training operations. The Generic Simulations References SharePoint (Gen Sim) site is a database used as an aid during flight simulations. The Gen Sim site is used to make individual mission segment timelines, data, and flight information easily accessible to instructors. The Waste and Hygiene Compartment (WHC) training schematic includes simple and complex fluid schematics, as well as overall hardware locations. It is used as a teaching aid during WHC lessons for both ISS crew and flight controllers. ISS flight control documentation is used to support all aspects of ISS mission operations. The Quick Look Database and Consolidated Tool Page are imagery-based references used in real-time to help the Operations Support Officer (OSO) find data faster and improve discussions with the Flight Director and Capsule Communicator (CAPCOM). A Quick Look page was created for the Permanent Multipurpose Module (PMM) by locating photos of the module interior, labeling specific hardware, and organizing them in schematic form to match the layout of the PMM interior. A Tool Page was created for the Maintenance Work Area (MWA) by gathering images, detailed drawings, safety information, procedures, certifications, demonstration videos, and general facts of each MWA component and displaying them in an easily accessible and consistent format. Participation in ISS mechanisms and maintenance lessons, mission simulation On-the-Job Training (OJT), and real-time flight OJT was used as an opportunity to train for day-to-day operations as an OSO, as well as learn how to effectively respond to failures and emergencies during mission simulations and real-time flight operations.

  5. The Controllable Ball Joint Mechanism

    NASA Astrophysics Data System (ADS)

    Tung, Yung Cheng; Chieng, Wei-Hua; Ho, Shrwai

    A controllable ball joint mechanism with three rotational degrees of freedom is proposed in this paper. The mechanism is composed of three bevel gears, one of which rotates with respect to a fixed frame and the others rotate with respect to individual floating frames. The output is the resultant motion of the differential motions by the motors that rotates the bevel gears at the fixed frame and the floating frames. The mechanism is capable of a large rotation, and the structure is potentially compact. The necessary inverse and forward kinematic analyses as well as the derivation of kinematic singularity are provided according to the kinematical equivalent structure described in this paper.

  6. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    PubMed Central

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  7. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    PubMed

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  8. Why build limited access highways?.

    DOT National Transportation Integrated Search

    1991-01-01

    This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...

  9. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    PubMed

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  10. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

    PubMed Central

    Yang, Yixian; Shi, Yuxiang

    2018-01-01

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269

  11. The assessment of exploitation process of power for access control system

    NASA Astrophysics Data System (ADS)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  12. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  13. A mirror control mechanism for space telescope

    NASA Astrophysics Data System (ADS)

    Cadiergues, L.; Bourdit, C.; Trouchet, D.; Larcher, V.; Sugranes, P.; Leletty, R.; Barillot, F.

    2003-09-01

    The high resolution optical instruments require more and more stability on the relative position between their different mirrors. The use of a mirror control mechanism (MCM) allows to correct in flight the position of the mirror (in particular the focusing and the 2 tilts). The mechanism described hereafter is designed for a Cassegrain telescope secondary mirror. The selected concept is based on 3 vertical actuators which produce the focusing and tilts movements, and three horizontal actuators which produce the transverse movements. This architecture offers 5 degrees of freedom which guarantee the absence of rejection for any kind of correction. After the design phase, a demonstrator was manufactured and characterised by functional and mechanical tests. This mechanism is able to control any type of axisymmetric mirror within 5 degrees of freedom. The mass of the model presented is 3.5kg with overall dimensions ø280mm/H77mm (except electronics). This concept can be adapted to smaller versions of mirror requiring an active control, and in a more general way to equipments for which the pointing precision is a key requirement.

  14. Mechanisms Involved in Nematode Control by Endophytic Fungi.

    PubMed

    Schouten, Alexander

    2016-08-04

    Colonization of plants by particular endophytic fungi can provide plants with improved defenses toward nematodes. Evidently, such endophytes can be important in developing more sustainable agricultural practices. The mechanisms playing a role in this quantitative antagonism are poorly understood but most likely multifactorial. This knowledge gap obstructs the progress regarding the development of endophytes or endophyte-derived constituents into biocontrol agents. In part, this may be caused by the fact that endophytic fungi form a rather heterogeneous group. By combining the knowledge of the currently characterized antagonistic endophytic fungi and their effects on nematode behavior and biology with the knowledge of microbial competition and induced plant defenses, the various mechanisms by which this nematode antagonism operates or may operate are discussed. Now that new technologies are becoming available and more accessible, the currently unresolved mechanisms can be studied in greater detail than ever before.

  15. Control mechanisms in mitochondrial oxidative phosphorylation.

    PubMed

    Hroudová, Jana; Fišar, Zdeněk

    2013-02-05

    Distribution and activity of mitochondria are key factors in neuronal development, synaptic plasticity and axogenesis. The majority of energy sources, necessary for cellular functions, originate from oxidative phosphorylation located in the inner mitochondrial membrane. The adenosine-5'- triphosphate production is regulated by many control mechanism-firstly by oxygen, substrate level, adenosine-5'-diphosphate level, mitochondrial membrane potential, and rate of coupling and proton leak. Recently, these mechanisms have been implemented by "second control mechanisms," such as reversible phosphorylation of the tricarboxylic acid cycle enzymes and electron transport chain complexes, allosteric inhibition of cytochrome c oxidase, thyroid hormones, effects of fatty acids and uncoupling proteins. Impaired function of mitochondria is implicated in many diseases ranging from mitochondrial myopathies to bipolar disorder and schizophrenia. Mitochondrial dysfunctions are usually related to the ability of mitochondria to generate adenosine-5'-triphosphate in response to energy demands. Large amounts of reactive oxygen species are released by defective mitochondria, similarly, decline of antioxidative enzyme activities (e.g. in the elderly) enhances reactive oxygen species production. We reviewed data concerning neuroplasticity, physiology, and control of mitochondrial oxidative phosphorylation and reactive oxygen species production.

  16. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  17. BIOPACK: the ground controlled late access biological research facility.

    PubMed

    van Loon, Jack J W A

    2004-03-01

    Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.

  18. Control mechanism of double-rotator-structure ternary optical computer

    NASA Astrophysics Data System (ADS)

    Kai, SONG; Liping, YAN

    2017-03-01

    Double-rotator-structure ternary optical processor (DRSTOP) has two characteristics, namely, giant data-bits parallel computing and reconfigurable processor, which can handle thousands of data bits in parallel, and can run much faster than computers and other optical computer systems so far. In order to put DRSTOP into practical application, this paper established a series of methods, namely, task classification method, data-bits allocation method, control information generation method, control information formatting and sending method, and decoded results obtaining method and so on. These methods form the control mechanism of DRSTOP. This control mechanism makes DRSTOP become an automated computing platform. Compared with the traditional calculation tools, DRSTOP computing platform can ease the contradiction between high energy consumption and big data computing due to greatly reducing the cost of communications and I/O. Finally, the paper designed a set of experiments for DRSTOP control mechanism to verify its feasibility and correctness. Experimental results showed that the control mechanism is correct, feasible and efficient.

  19. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  20. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The individual...

  1. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    PubMed

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  2. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    PubMed Central

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  3. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  4. Controlling the opto-mechanics of a cantilever in an interferometer via cavity loss

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schmidsfeld, A. von, E-mail: avonschm@uos.de; Reichling, M., E-mail: reichling@uos.de

    2015-09-21

    In a non-contact atomic force microscope, based on interferometric cantilever displacement detection, the optical return loss of the system is tunable via the distance between the fiber end and the cantilever. We utilize this for tuning the interferometer from a predominant Michelson to a predominant Fabry-Pérot characteristics and introduce the Fabry-Pérot enhancement factor as a quantitative measure for multibeam interference in the cavity. This experimentally easily accessible and adjustable parameter provides a control of the opto-mechanical interaction between the cavity light field and the cantilever. The quantitative assessment of the light pressure acting on the cantilever oscillating in the cavitymore » via the frequency shift allows an in-situ measurement of the cantilever stiffness with remarkable precision.« less

  5. Effect of Information and Telephone-Guided Access to Community Support for People with Chronic Kidney Disease: Randomised Controlled Trial

    PubMed Central

    Blakeman, Tom; Blickem, Christian; Kennedy, Anne; Reeves, David; Bower, Peter; Gaffney, Hannah; Gardner, Caroline; Lee, Victoria; Jariwala, Praksha; Dawson, Shoba; Mossabir, Rahena; Brooks, Helen; Richardson, Gerry; Spackman, Eldon; Vassilev, Ivaylo; Chew-Graham, Carolyn; Rogers, Anne

    2014-01-01

    Background Implementation of self-management support in traditional primary care settings has proved difficult, encouraging the development of alternative models which actively link to community resources. Chronic kidney disease (CKD) is a common condition usually diagnosed in the presence of other co-morbidities. This trial aimed to determine the effectiveness of an intervention to provide information and telephone-guided access to community support versus usual care for patients with stage 3 CKD. Methods and Findings In a pragmatic, two-arm, patient level randomised controlled trial 436 patients with a diagnosis of stage 3 CKD were recruited from 24 general practices in Greater Manchester. Patients were randomised to intervention (215) or usual care (221). Primary outcome measures were health related quality of life (EQ-5D health questionnaire), blood pressure control, and positive and active engagement in life (heiQ) at 6 months. At 6 months, mean health related quality of life was significantly higher for the intervention group (adjusted mean difference = 0.05; 95% CI = 0.01, 0.08) and blood pressure was controlled for a significantly greater proportion of patients in the intervention group (adjusted odds-ratio = 1.85; 95% CI = 1.25, 2.72). Patients did not differ significantly in positive and active engagement in life. The intervention group reported a reduction in costs compared with control. Conclusions An intervention to provide tailored information and telephone-guided access to community resources was associated with modest but significant improvements in health related quality of life and better maintenance of blood pressure control for patients with stage 3 CKD compared with usual care. However, further research is required to identify the mechanisms of action of the intervention. Trial Registration Controlled-Trials.com ISRCTN45433299 PMID:25330169

  6. Expanding the Enzyme Universe: Accessing Non-Natural Reactions by Mechanism-Guided Directed Evolution

    PubMed Central

    Renata, Hans; Wang, Z. Jane

    2015-01-01

    High selectivities and exquisite control over reaction outcomes entice chemists to use biocatalysts in organic synthesis. However, many useful reactions are not accessible because they are not in nature’s known repertoire. We will use this review to outline an evolutionary approach to engineering enzymes to catalyze reactions not found in nature. We begin with examples of how nature has discovered new catalytic functions and how such evolutionary progressions have been recapitulated in the laboratory starting from extant enzymes. We then examine non-native enzyme activities that have been discovered and exploited for chemical synthesis, emphasizing reactions that do not have natural counterparts. The new functions have mechanistic parallels to the native reaction mechanisms that often manifest as catalytic promiscuity and the ability to convert from one function to the other with minimal mutation. We present examples of how non-natural activities have been improved by directed evolution, mimicking the process used by nature to create new catalysts. Examples of new enzyme functions include epoxide opening reactions with non-natural nucleophiles catalyzed by a laboratory-evolved halohydrin dehalogenase, cyclopropanation and other carbene transfer reactions catalyzed by cytochrome P450 variants, and non-natural modes of cyclization by a modified terpene synthase. Lastly, we describe discoveries of non-native catalytic functions that may provide future opportunities for expanding the enzyme universe. PMID:25649694

  7. Burn Control Mechanisms in Tokamaks

    NASA Astrophysics Data System (ADS)

    Hill, M. A.; Stacey, W. M.

    2015-11-01

    Burn control and passive safety in accident scenarios will be an important design consideration in future tokamak reactors, in particular fusion-fission hybrid reactors, e.g. the Subcritical Advanced Burner Reactor. We are developing a burning plasma dynamics code to explore various aspects of burn control, with the intent to identify feedback mechanisms that would prevent power excursions. This code solves the coupled set of global density and temperature equations, using scaling relations from experimental fits. Predictions of densities and temperatures have been benchmarked against DIII-D data. We are examining several potential feedback mechanisms to limit power excursions: i) ion-orbit loss, ii) thermal instability density limits, iii) MHD instability limits, iv) the degradation of alpha-particle confinement, v) modifications to the radial current profile, vi) ``divertor choking'' and vii) Type 1 ELMs. Work supported by the US DOE under DE-FG02-00ER54538, DE-FC02-04ER54698.

  8. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  9. The Use of a Computer-Controlled Random Access Slide Projector for Rapid Information Display.

    ERIC Educational Resources Information Center

    Muller, Mark T.

    A 35mm random access slide projector operated in conjunction with a computer terminal was adapted to meet the need for a more rapid and complex graphic display mechanism than is currently available with teletypewriter terminals. The model projector can be operated manually to provide for a maintenance checkout of the electromechanical system.…

  10. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  11. Urban search mobile platform modeling in hindered access conditions

    NASA Astrophysics Data System (ADS)

    Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.

    2018-05-01

    The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.

  12. Mechanical Thrombectomy in Perioperative Strokes: A Case-Control Study.

    PubMed

    Premat, Kévin; Clovet, Olivier; Frasca Polara, Giulia; Shotar, Eimad; Bartolini, Bruno; Yger, Marion; Di Maria, Federico; Baronnet, Flore; Pistocchi, Silvia; Le Bouc, Raphaël; Pires, Christine; Sourour, Nader; Alamowitch, Sonia; Samson, Yves; Degos, Vincent; Clarençon, Frédéric

    2017-11-01

    Perioperative strokes (POS) are rare but serious complications for which mechanical thrombectomy could be beneficial. We aimed to compare the technical results and patients outcomes in a population of POS versus non-POS (nPOS) treated by mechanical thrombectomy. From 2010 to 2017, 25 patients with POS (ie, acute ischemic stroke occurring during or within 30 days after a procedure) who underwent mechanical thrombectomy (POS group) were enrolled and paired with 50 consecutive patients with nPOS (control group), based on the occlusion's site, National Institute of Health Stroke Scale, and age. Respectively, mean age was 68.3±16.6 versus 67.2±16.6 years ( P =0.70), and median National Institute of Health Stroke Scale score at admission was 20 (interquartile range, 15-25) versus 19 (interquartile range, 17-25; P =0.79). Good clinical outcome (modified Rankin Scale score of 0-2 at 3 months) was achieved by 33.3% (POS) versus 56.5% (nPOS) of patients ( P =0.055). Successful reperfusion (modified Thrombolysis In Cerebral Infarction score of ≥2b) was obtained in 76% (POS) versus 86% (nPOS) of cases ( P =0.22). Mortality at 3 months was 33.3% in the POS group versus 4.2% (nPOS) ( P =0.002). The rate of major procedural complications was 4% (POS) versus 6% (nPOS); none were lethal. Average time from symptoms' onset to reperfusion was 4.9 hours (±2.0) in POS versus 5.2 hours (±2.6). Successful reperfusion seems accessible in POS within a reasonable amount of time and with a good level of safety. However, favorable outcome was achieved with a lower rate than in nPOS, owing to a higher mortality rate. © 2017 American Heart Association, Inc.

  13. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  14. Biomass accessibility analysis using electron tomography

    DOE PAGES

    Hinkle, Jacob D.; Ciesielski, Peter N.; Gruchalla, Kenny; ...

    2015-12-25

    Substrate accessibility to catalysts has been a dominant theme in theories of biomass deconstruction. Furthermore, current methods of quantifying accessibility do not elucidate mechanisms for increased accessibility due to changes in microstructure following pretreatment.

  15. A dual closed-loop control system for mechanical ventilation.

    PubMed

    Tehrani, Fleur; Rogers, Mark; Lo, Takkin; Malinowski, Thomas; Afuwape, Samuel; Lum, Michael; Grundl, Brett; Terry, Michael

    2004-04-01

    Closed-loop mechanical ventilation has the potential to provide more effective ventilatory support to patients with less complexity than conventional ventilation. The purpose of this study was to investigate the effectiveness of an automatic technique for mechanical ventilation. Two closed-loop control systems for mechanical ventilation are combined in this study. In one of the control systems several physiological data are used to automatically adjust the frequency and tidal volume of breaths of a patient. This method, which is patented under US Patent number 4986268, uses the criterion of minimal respiratory work rate to provide the patient with a natural pattern of breathing. The inputs to the system include data representing CO2 and O2 levels of the patient as well as respiratory compliance and airway resistance. The I:E ratio is adjusted on the basis of the respiratory time constant to allow for effective emptying of the lungs in expiration and to avoid intrinsic positive end expiratory pressure (PEEP). This system is combined with another closed-loop control system for automatic adjustment of the inspired fraction of oxygen of the patient. This controller uses the feedback of arterial oxygen saturation of the patient and combines a rapid stepwise control procedure with a proportional-integral-derivative (PID) control algorithm to automatically adjust the oxygen concentration in the patient's inspired gas. The dual closed-loop control system has been examined by using mechanical lung studies, computer simulations and animal experiments. In the mechanical lung studies, the ventilation controller adjusted the breathing frequency and tidal volume in a clinically appropriate manner in response to changes in respiratory mechanics. The results of computer simulations and animal studies under induced disturbances showed that blood gases were returned to the normal physiologic range in less than 25 s by the control system. In the animal experiments understeady

  16. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  17. Fully Mechanically Controlled Automated Electron Microscopic Tomography

    DOE PAGES

    Liu, Jinxin; Li, Hongchang; Zhang, Lei; ...

    2016-07-11

    Knowledge of three-dimensional (3D) structures of each individual particles of asymmetric and flexible proteins is essential in understanding those proteins' functions; but their structures are difficult to determine. Electron tomography (ET) provides a tool for imaging a single and unique biological object from a series of tilted angles, but it is challenging to image a single protein for three-dimensional (3D) reconstruction due to the imperfect mechanical control capability of the specimen goniometer under both a medium to high magnification (approximately 50,000-160,000×) and an optimized beam coherence condition. Here, we report a fully mechanical control method for automating ET data acquisitionmore » without using beam tilt/shift processes. This method could reduce the accumulation of beam tilt/shift that used to compensate the error from the mechanical control, but downgraded the beam coherence. Our method was developed by minimizing the error of the target object center during the tilting process through a closed-loop proportional-integral (PI) control algorithm. The validations by both negative staining (NS) and cryo-electron microscopy (cryo-EM) suggest that this method has a comparable capability to other ET methods in tracking target proteins while maintaining optimized beam coherence conditions for imaging.« less

  18. Age Related Decline in Postural Control Mechanisms.

    ERIC Educational Resources Information Center

    Stelmach, George E.; And Others

    1989-01-01

    Studied voluntary and reflexive mechanisms of postural control of young (N=8) and elderly (N=8) adults through measurement of reflexive reactions to large-fast and small-slow ankle rotation postural disturbances. Found reflexive mechanisms relatively intact for both groups although elderly appeared more disadvantaged when posture was under the…

  19. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  20. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  1. A review of promoting access to medicines in China - problems and recommendations.

    PubMed

    Sun, Jing; Hu, Cecile Jia; Stuntz, Mark; Hogerzeil, Hans; Liu, Yuanli

    2018-02-20

    Despite recent reforms, distorting funding mechanisms and over-prescribing still maintain severe financial barriers to medicines access in China. Complicated and interrelated problems in the pharmaceutical sector require a common framework to be resolved as fragmented solutions do not work. We present a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and propose policy recommendations for promoting universal access to medicines in China. Drawing on multiple sources of information, including a review of published literatures and official national data, field investigations in six provinces and interviews with key opinion leaders, this paper presents a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and proposes policy recommendations for promoting universal access to medicines in China. Public expenditure on medicines has been strictly controlled since the national healthcare reforms of 2009. Yet total pharmaceutical expenditure (TPE) and total health expenditure growth rates continuously outpaced the growth of gross domestic product (GDP). With 2.4% of GDP, TPE now exceeds that of most high income countries. The distorted provider and consumer incentives in the Chinese health system have not fundamentally changed. Price-setting and reimbursement mechanisms do not promote cost-effective use of medicines. Inappropriate price controls and perverse financial incentives are the un-resolved root causes of preference of originator brands for some major diseases and shortages of low-cost and low-consumption medicines. In addition, access to expensive life-saving medicines is yet systematically addressed. The complicated and interdependent problems interact in a way that leads to significant system problems in China, which create dual challenges that both the developing country and the developed countries are facing. To further promote access to medicines, China should speed up

  2. Biomechanics and energetics of walking in powered ankle exoskeletons using myoelectric control versus mechanically intrinsic control.

    PubMed

    Koller, Jeffrey R; Remy, C David; Ferris, Daniel P

    2018-05-25

    Controllers for assistive robotic devices can be divided into two main categories: controllers using neural signals and controllers using mechanically intrinsic signals. Both approaches are prevalent in research devices, but a direct comparison between the two could provide insight into their relative advantages and disadvantages. We studied subjects walking with robotic ankle exoskeletons using two different control modes: dynamic gain proportional myoelectric control based on soleus muscle activity (neural signal), and timing-based mechanically intrinsic control based on gait events (mechanically intrinsic signal). We hypothesized that subjects would have different measures of metabolic work rate between the two controllers as we predicted subjects would use each controller in a unique manner due to one being dependent on muscle recruitment and the other not. The two controllers had the same average actuation signal as we used the control signals from walking with the myoelectric controller to shape the mechanically intrinsic control signal. The difference being the myoelectric controller allowed step-to-step variation in the actuation signals controlled by the user's soleus muscle recruitment while the timing-based controller had the same actuation signal with each step regardless of muscle recruitment. We observed no statistically significant difference in metabolic work rate between the two controllers. Subjects walked with 11% less soleus activity during mid and late stance and significantly less peak soleus recruitment when using the timing-based controller than when using the myoelectric controller. While walking with the myoelectric controller, subjects walked with significantly higher average positive and negative total ankle power compared to walking with the timing-based controller. We interpret the reduced ankle power and muscle activity with the timing-based controller relative to the myoelectric controller to result from greater slacking effects

  3. 14 CFR 27.923 - Rotor drive system and control mechanism tests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 1 2012-01-01 2012-01-01 false Rotor drive system and control mechanism....923 Rotor drive system and control mechanism tests. (a) Each part tested as prescribed in this section... affect test results may be conducted. (b) Each rotor drive system and control mechanism must be tested...

  4. 14 CFR 27.923 - Rotor drive system and control mechanism tests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 1 2014-01-01 2014-01-01 false Rotor drive system and control mechanism....923 Rotor drive system and control mechanism tests. (a) Each part tested as prescribed in this section... affect test results may be conducted. (b) Each rotor drive system and control mechanism must be tested...

  5. The Mechanisms of Alcohol Control

    PubMed Central

    Carpenter, Christopher S.; Dobkin, Carlos; Warman, Casey

    2015-01-01

    A substantial economics literature documents that tighter alcohol controls reduce alcohol-related harms, but far less is known about mechanisms. We use the universe of Canadian mortality records to document that Canada’s Minimum Legal Drinking Age (MLDA) significantly reduces mortality rates of young men but has much smaller effects on women. Using drinking data that are far more detailed than in prior work, we document that the MLDA substantially reduces ‘extreme’ drinking among men but not women. Our results suggest that alcohol control efforts targeting young adults should focus on reducing extreme drinking behavior. PMID:27127308

  6. Mechanical control of Renilla luciferase.

    PubMed

    Tseng, Chiao-Yu; Zocchi, Giovanni

    2013-08-14

    We report experiments where the activity of the enzyme luciferase from Renilla reniformis is controlled through a DNA spring attached to the enzyme. In the wake of previous work on kinases, these results establish that mechanical stress applied through the DNA springs is indeed a general method for the artificial control of enzymes, and for the quantitative study of mechano-chemical coupling in these molecules. We also show proof of concept of the luciferase construct as a sensitive molecular probe, detecting a specific DNA target sequence in an easy, one-step, homogeneous assay, as well as SNP detection without melting curve analysis.

  7. Potential Mechanisms of Cancer Prevention by Weight Control

    NASA Astrophysics Data System (ADS)

    Jiang, Yu; Wang, Weiqun

    Weight control via dietary caloric restriction and/or physical activity has been demonstrated in animal models for cancer prevention. However, the underlying mechanisms are not fully understood. Body weight loss due to negative energy balance significantly reduces some metabolic growth factors and endocrinal hormones such as IGF-1, leptin, and adiponectin, but enhances glucocorticoids, that may be associated with anti-cancer mechanisms. In this review, we summarized the recent studies related to weight control and growth factors. The potential molecular targets focused on those growth factors- and hormones-dependent cellular signaling pathways are further discussed. It appears that multiple factors and multiple signaling cascades, especially for Ras-MAPK-proliferation and PI3K-Akt-anti-apoptosis, could be involved in response to weight change by dietary calorie restriction and/or exercise training. Considering prevalence of obesity or overweight that becomes apparent over the world, understanding the underlying mechanisms among weight control, endocrine change and cancer risk is critically important. Future studies using "-omics" technologies will be warrant for a broader and deeper mechanistic information regarding cancer prevention by weight control.

  8. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  9. Controlling Hydrogel Mechanics via Bio-Inspired Polymer-Nanoparticle Bond Dynamics.

    PubMed

    Li, Qiaochu; Barrett, Devin G; Messersmith, Phillip B; Holten-Andersen, Niels

    2016-01-26

    Interactions between polymer molecules and inorganic nanoparticles can play a dominant role in nanocomposite material mechanics, yet control of such interfacial interaction dynamics remains a significant challenge particularly in water. This study presents insights on how to engineer hydrogel material mechanics via nanoparticle interface-controlled cross-link dynamics. Inspired by the adhesive chemistry in mussel threads, we have incorporated iron oxide nanoparticles (Fe3O4 NPs) into a catechol-modified polymer network to obtain hydrogels cross-linked via reversible metal-coordination bonds at Fe3O4 NP surfaces. Unique material mechanics result from the supra-molecular cross-link structure dynamics in the gels; in contrast to the previously reported fluid-like dynamics of transient catechol-Fe(3+) cross-links, the catechol-Fe3O4 NP structures provide solid-like yet reversible hydrogel mechanics. The structurally controlled hierarchical mechanics presented here suggest how to develop hydrogels with remote-controlled self-healing dynamics.

  10. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  11. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  12. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  13. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  14. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  15. 17. Perimeter acquisition radar building room #105, mechanical equipment room ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    17. Perimeter acquisition radar building room #105, mechanical equipment room no. 1; sign reads: Heat exchangers (shell and tube type). Provide precise temperature control of water for cooling critical electronic equipment - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND

  16. Growth Control and Disease Mechanisms in Computational Embryogeny

    NASA Technical Reports Server (NTRS)

    Shapiro, Andrew A.; Yogev, Or; Antonsson, Erik K.

    2008-01-01

    This paper presents novel approach to applying growth control and diseases mechanisms in computational embryogeny. Our method, which mimics fundamental processes from biology, enables individuals to reach maturity in a controlled process through a stochastic environment. Three different mechanisms were implemented; disease mechanisms, gene suppression, and thermodynamic balancing. This approach was integrated as part of a structural evolutionary model. The model evolved continuum 3-D structures which support an external load. By using these mechanisms we were able to evolve individuals that reached a fixed size limit through the growth process. The growth process was an integral part of the complete development process. The size of the individuals was determined purely by the evolutionary process where different individuals matured to different sizes. Individuals which evolved with these characteristics have been found to be very robust for supporting a wide range of external loads.

  17. An Improved Call Admission Control Mechanism with Prioritized Handoff Queuing Scheme for BWA Networks

    NASA Astrophysics Data System (ADS)

    Chowdhury, Prasun; Saha Misra, Iti

    2014-10-01

    Nowadays, due to increased demand for using the Broadband Wireless Access (BWA) networks in a satisfactory manner a promised Quality of Service (QoS) is required to manage the seamless transmission of the heterogeneous handoff calls. To this end, this paper proposes an improved Call Admission Control (CAC) mechanism with prioritized handoff queuing scheme that aims to reduce dropping probability of handoff calls. Handoff calls are queued when no bandwidth is available even after the allowable bandwidth degradation of the ongoing calls and get admitted into the network when an ongoing call is terminated with a higher priority than the newly originated call. An analytical Markov model for the proposed CAC mechanism is developed to analyze various performance parameters. Analytical results show that our proposed CAC with handoff queuing scheme prioritizes the handoff calls effectively and reduces dropping probability of the system by 78.57% for real-time traffic without degrading the number of failed new call attempts. This results in the increased bandwidth utilization of the network.

  18. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    PubMed

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  19. Mechanical Backup For Fly-By-Wire Control System

    NASA Technical Reports Server (NTRS)

    Stewart, Eric C.

    1992-01-01

    Mechanical device eliminates need for redundant fly-by-wire subsystems. Main components are two linkages. One connected to control column in conventional, reversible control system. Other slides inside first linkage and connected to pilot's control wheel. In addition to aircraft applications, design used in control systems in which computer control desirable but safety backup systems required; for example, in boat rudders, engine controls in boats and automobiles, and controls in construction equipment.

  20. Can mechanics control pattern formation in plants?

    PubMed

    Dumais, Jacques

    2007-02-01

    Development of the plant body entails many pattern forming events at scales ranging from the cellular level to the whole plant. Recent evidence suggests that mechanical forces play a role in establishing some of these patterns. The development of cellular configurations in glandular trichomes and the rippling of leaf surfaces are discussed in depth to illustrate how intricate patterns can emerge from simple and well-established molecular and cellular processes. The ability of plants to sense and transduce mechanical signals suggests that complex interactions between mechanics and chemistry are possible during plant development. The inclusion of mechanics alongside traditional molecular controls offers a more comprehensive view of developmental processes.

  1. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  2. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  3. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  4. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  5. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  6. A methodology for identification and control of electro-mechanical actuators

    PubMed Central

    Tutunji, Tarek A.; Saleem, Ashraf

    2015-01-01

    Mechatronic systems are fully-integrated engineering systems that are composed of mechanical, electronic, and computer control sub-systems. These integrated systems use electro-mechanical actuators to cause the required motion. Therefore, the design of appropriate controllers for these actuators are an essential step in mechatronic system design. In this paper, a three-stage methodology for real-time identification and control of electro-mechanical actuator plants is presented, tested, and validated. First, identification models are constructed from experimental data to approximate the plants’ response. Second, the identified model is used in a simulation environment for the purpose of designing a suitable controller. Finally, the designed controller is applied and tested on the real plant through Hardware-in-the-Loop (HIL) environment. The described three-stage methodology provides the following practical contributions: • Establishes an easy-to-follow methodology for controller design of electro-mechanical actuators. • Combines off-line and on-line controller design for practical performance. • Modifies the HIL concept by using physical plants with computer control (rather than virtual plants with physical controllers). Simulated and experimental results for two case studies, induction motor and vehicle drive system, are presented in order to validate the proposed methodology. These results showed that electromechanical actuators can be identified and controlled using an easy-to-duplicate and flexible procedure. PMID:26150992

  7. A methodology for identification and control of electro-mechanical actuators.

    PubMed

    Tutunji, Tarek A; Saleem, Ashraf

    2015-01-01

    Mechatronic systems are fully-integrated engineering systems that are composed of mechanical, electronic, and computer control sub-systems. These integrated systems use electro-mechanical actuators to cause the required motion. Therefore, the design of appropriate controllers for these actuators are an essential step in mechatronic system design. In this paper, a three-stage methodology for real-time identification and control of electro-mechanical actuator plants is presented, tested, and validated. First, identification models are constructed from experimental data to approximate the plants' response. Second, the identified model is used in a simulation environment for the purpose of designing a suitable controller. Finally, the designed controller is applied and tested on the real plant through Hardware-in-the-Loop (HIL) environment. The described three-stage methodology provides the following practical contributions: •Establishes an easy-to-follow methodology for controller design of electro-mechanical actuators.•Combines off-line and on-line controller design for practical performance.•Modifies the HIL concept by using physical plants with computer control (rather than virtual plants with physical controllers). Simulated and experimental results for two case studies, induction motor and vehicle drive system, are presented in order to validate the proposed methodology. These results showed that electromechanical actuators can be identified and controlled using an easy-to-duplicate and flexible procedure.

  8. Acquisition of Dynamic Mechanical Analyzer and Stress-Controlled Rheometer for the Mechanical Characterization of Advanced Materials

    DTIC Science & Technology

    2017-06-27

    Distribution Unlimited UU UU UU UU 27-06-2017 1-May-2016 30-Apr-2017 Final Report: Acquisition of Dynamic Mechanical Analyzer and Stress -ControlledRheometer...and Stress -Controlled Rheometer for the Mechanical Characterization of Advanced Materials ARO Grant # W911NF-16-1-0205 K. Wagener (PI) Chemistry

  9. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  10. t-PA power-pulse spray with rheolytic mechanical thrombectomy using cross-sectional image-guided portal vein access for single setting treatment of subacute superior mesenteric vein thrombosis.

    PubMed

    Syed, Mubin I; Gallagher, Ryan M; Ahmed, Rukan S; Shaikh, Azim; Roberto, Edward; Patel, Sumeet

    2018-01-01

    Isolated superior mesenteric vein (SMV) thrombosis is a rare but potentially fatal condition if untreated. Current treatments include transjugular or transhepatic approaches for rheolytic mechanical thrombectomy and subsequent infusions of thrombolytics. Tissue plasminogen activator (t-PA) power-pulse spray can provide benefit in a single setting without thrombolytic infusions. Computed tomography (CT) guidance for portal vein access is underutilized in this setting. Case 1 discusses acute SMV thrombosis treated with rheolytic mechanical thrombectomy alone using ultrasound guidance for portal vein access. Case 2 discusses subacute SMV thrombosis treated with the addition of t-PA power-pulse spray to the rheolytic mechanical thrombectomy, using CT guidance for portal vein access. With rheolytic mechanical thrombectomy alone, the patient in Case 1 had significant improvement in abdominal pain. Follow-up CT demonstrated no residual SMV thrombosis and the patient continued to do well in long-term follow-up. With the addition of t-PA power-pulse spray to rheolytic mechanical thrombectomy, the patient in Case 2 with subacute SMV thrombosis dramatically improved postprocedure with resolution of abdominal pain. Follow-up imaging demonstrated patency to the SMV and partial resolution of thrombus. The patient continued to do well at 2-year follow-up. Adding t-PA power-pulse spray to rheolytic mechanical thrombectomy can provide benefit in a single setting versus mechanical thrombectomy alone and prevent the need for subsequent infusions of thrombolytic therapy. CT guidance is a useful alternative of localization for portal vein access via the transhepatic route that is nonoperator-dependent and helpful in the case of obese patients.

  11. Endoscope shaft-rigidity control mechanism: "FORGUIDE".

    PubMed

    Loeve, Arjo J; Plettenburg, Dick H; Breedveld, Paul; Dankelman, Jenny

    2012-02-01

    Recent developments in flexible endoscopy and other fields of medical technology have raised the need for compact slender shafts that can be made rigid and compliant at will. A novel compact mechanism, named FORGUIDE, with this functionality was developed. The FORGUIDE shaft rigidifies due to friction between a ring of cables situated between a spring and an inflated tube. A mathematical model for the FORGUIDE mechanism working principle was made and used to obtain understanding of this mechanism, predict the maximum rigidity of a FORGUIDE shaft design, and tune its design variables. The mathematical model gave suggestions for significant performance improvement by fine-tuning the design. A prototype FORGUIDE shaft was built and put to a series of bench tests. These tests showed that the FORGUIDE mechanism provides a reliable and simple way to control the rigidity of a flexible shaft. © 2011 IEEE

  12. Kinetics and mechanical stability of the fibril state control fibril formation time of polypeptide chains: A computational study

    NASA Astrophysics Data System (ADS)

    Kouza, Maksim; Co, Nguyen Truong; Li, Mai Suan; Kmiecik, Sebastian; Kolinski, Andrzej; Kloczkowski, Andrzej; Buhimschi, Irina Alexandra

    2018-06-01

    Fibril formation resulting from protein misfolding and aggregation is a hallmark of several neurodegenerative diseases such as Alzheimer's and Parkinson's diseases. Despite much progress in the understanding of the protein aggregation process, the factors governing fibril formation rates and fibril stability have not been fully understood. Using lattice models, we have shown that the fibril formation time is controlled by the kinetic stability of the fibril state but not by its energy. Having performed all-atom explicit solvent molecular dynamics simulations with the GROMOS43a1 force field for full-length amyloid beta peptides Aβ40 and Aβ42 and truncated peptides, we demonstrated that kinetic stability can be accessed via mechanical stability in such a way that the higher the mechanical stability or the kinetic stability, the faster the fibril formation. This result opens up a new way for predicting fibril formation rates based on mechanical stability that may be easily estimated by steered molecular dynamics.

  13. An Integrated Model of Cognitive Control in Task Switching

    ERIC Educational Resources Information Center

    Altmann, Erik M.; Gray, Wayne D.

    2008-01-01

    A model of cognitive control in task switching is developed in which controlled performance depends on the system maintaining access to a code in episodic memory representing the most recently cued task. The main constraint on access to the current task code is proactive interference from old task codes. This interference and the mechanisms that…

  14. Temperature-Controlled Clamping and Releasing Mechanism

    NASA Technical Reports Server (NTRS)

    Rosing, David; Ford, Virginia

    2005-01-01

    A report describes the development of a mechanism that automatically clamps upon warming and releases upon cooling between temperature limits of approx. =180 K and approx. =293 K. The mechanism satisfied a need specific to a program that involved repeated excursions of a spectrometer between a room-temperature atmospheric environment and a cryogenic vacuum testing environment. The mechanism was also to be utilized in the intended application of the spectrometer, in which the spectrometer would be clamped for protection during launch of a spacecraft and released in the cold of outer space to allow it to assume its nominal configuration for scientific observations. The mechanism is passive in the sense that its operation does not depend on a control system and does not require any power other than that incidental to heating and cooling. The clamping and releasing action is effected by bolt-preloaded stacks of shape-memory-alloy (SMA) cylinders. In designing this mechanism, as in designing other, similar SMA mechanisms, it was necessary to account for the complex interplay among thermal expansion, elastic and inelastic deformation under load, and SMA thermomechanical properties.

  15. Apparatus, method and system to control accessibility of platform resources based on an integrity level

    DOEpatents

    Jenkins, Chris; Pierson, Lyndon G.

    2016-10-25

    Techniques and mechanism to selectively provide resource access to a functional domain of a platform. In an embodiment, the platform includes both a report domain to monitor the functional domain and a policy domain to identify, based on such monitoring, a transition of the functional domain from a first integrity level to a second integrity level. In response to a change in integrity level, the policy domain may configure the enforcement domain to enforce against the functional domain one or more resource accessibility rules corresponding to the second integrity level. In another embodiment, the policy domain automatically initiates operations in aid of transitioning the platform from the second integrity level to a higher integrity level.

  16. Control mechanisms in mitochondrial oxidative phosphorylation☆

    PubMed Central

    Hroudová, Jana; Fišar, Zdeněk

    2013-01-01

    Distribution and activity of mitochondria are key factors in neuronal development, synaptic plasticity and axogenesis. The majority of energy sources, necessary for cellular functions, originate from oxidative phosphorylation located in the inner mitochondrial membrane. The adenosine-5’- triphosphate production is regulated by many control mechanism–firstly by oxygen, substrate level, adenosine-5’-diphosphate level, mitochondrial membrane potential, and rate of coupling and proton leak. Recently, these mechanisms have been implemented by “second control mechanisms,” such as reversible phosphorylation of the tricarboxylic acid cycle enzymes and electron transport chain complexes, allosteric inhibition of cytochrome c oxidase, thyroid hormones, effects of fatty acids and uncoupling proteins. Impaired function of mitochondria is implicated in many diseases ranging from mitochondrial myopathies to bipolar disorder and schizophrenia. Mitochondrial dysfunctions are usually related to the ability of mitochondria to generate adenosine-5’-triphosphate in response to energy demands. Large amounts of reactive oxygen species are released by defective mitochondria, similarly, decline of antioxidative enzyme activities (e.g. in the elderly) enhances reactive oxygen species production. We reviewed data concerning neuroplasticity, physiology, and control of mitochondrial oxidative phosphorylation and reactive oxygen species production. PMID:25206677

  17. Helicopter Pitch-Control Mechanism Reduces Vibration

    NASA Technical Reports Server (NTRS)

    Lemont, H.

    1986-01-01

    Large forces accommodated without increasing weight of helicopter structure. New mechanism yields stiffer control and improves accuracy of pitch changes under load. As result, heavy casting not for gearbox, nor extra reinforcing members needed for fuselage bulkheads, stringers, skin, and other parts. In new mechanism, reaction forces developed in rotor hub. Long load paths to gearbox and fuselage elminated. Reaction member rigidly attached to hub and rotates with it. At lower end of reaction member, bearing forms bridge to fuselage through stationary beam and antirotation link. Beam connected to reaction plate through rods.

  18. Advance of Mechanically Controllable Break Junction for Molecular Electronics.

    PubMed

    Wang, Lu; Wang, Ling; Zhang, Lei; Xiang, Dong

    2017-06-01

    Molecular electronics stands for the ultimate size of functional elements, keeping up with an unstoppable trend over the past few decades. As a vital component of molecular electronics, single molecular junctions have attracted significant attention from research groups all over the world. Due to its pronounced superiority, the mechanically controllable break junctions (MCBJ) technique has been widely applied to characterize the dynamic performance of single molecular junctions. This review presents a system analysis for single-molecule junctions and offers an overview of four test-beds for single-molecule junctions, thus offering more insight into the mechanisms of electron transport. We mainly focus on the development of state-of-the-art mechanically controlled break junctions. The three-terminal gated MCBJ approaches are introduced to manipulate the electron transport of molecules, and MCBJs are combined with characterization techniques. Additionally, applications of MCBJs and remarkable properties of single molecules are addressed. Finally, the challenges and perspective for the mechanically controllable break junctions technique are provided.

  19. An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.

    PubMed

    Li, Huaming; Tan, Jindong

    2005-01-01

    In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.

  20. Evaluation of Standards for Access Control Enabling PHR-S Federation.

    PubMed

    Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan

    2017-01-01

    The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.

  1. Incentive-Rewarding Mechanism for User-position Control in Mobile Services

    NASA Astrophysics Data System (ADS)

    Yoshino, Makoto; Sato, Kenichiro; Shinkuma, Ryoichi; Takahashi, Tatsuro

    When the number of users in a service area increases in mobile multimedia services, no individual user can obtain satisfactory radio resources such as bandwidth and signal power because the resources are limited and shared. A solution for such a problem is user-position control. In the user-position control, the operator informs users of better communication areas (or spots) and navigates them to these positions. However, because of subjective costs caused by subjects moving from their original to a new position, they do not always attempt to move. To motivate users to contribute their resources in network services that require resource contributions for users, incentive-rewarding mechanisms have been proposed. However, there are no mechanisms that distribute rewards appropriately according to various subjective factors involving users. Furthermore, since the conventional mechanisms limit how rewards are paid, they are applicable only for the network service they targeted. In this paper, we propose a novel incentive-rewarding mechanism to solve these problems, using an external evaluator and interactive learning agents. We also investigated ways of appropriately controlling rewards based on user contributions and system service quality. We applied the proposed mechanism and reward control to the user-position control, and demonstrated its validity.

  2. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    NASA Astrophysics Data System (ADS)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  3. Applying Workspace Limitations in a Velocity-Controlled Robotic Mechanism

    NASA Technical Reports Server (NTRS)

    Abdallah, Muhammad E. (Inventor); Hargrave, Brian (Inventor); Platt, Robert J., Jr. (Inventor)

    2014-01-01

    A robotic system includes a robotic mechanism responsive to velocity control signals, and a permissible workspace defined by a convex-polygon boundary. A host machine determines a position of a reference point on the mechanism with respect to the boundary, and includes an algorithm for enforcing the boundary by automatically shaping the velocity control signals as a function of the position, thereby providing smooth and unperturbed operation of the mechanism along the edges and corners of the boundary. The algorithm is suited for application with higher speeds and/or external forces. A host machine includes an algorithm for enforcing the boundary by shaping the velocity control signals as a function of the reference point position, and a hardware module for executing the algorithm. A method for enforcing the convex-polygon boundary is also provided that shapes a velocity control signal via a host machine as a function of the reference point position.

  4. Adaptive mechanism-based congestion control for networked systems

    NASA Astrophysics Data System (ADS)

    Liu, Zhi; Zhang, Yun; Chen, C. L. Philip

    2013-03-01

    In order to assure the communication quality in network systems with heavy traffic and limited bandwidth, a new ATRED (adaptive thresholds random early detection) congestion control algorithm is proposed for the congestion avoidance and resource management of network systems. Different to the traditional AQM (active queue management) algorithms, the control parameters of ATRED are not configured statically, but dynamically adjusted by the adaptive mechanism. By integrating with the adaptive strategy, ATRED alleviates the tuning difficulty of RED (random early detection) and shows a better control on the queue management, and achieve a more robust performance than RED under varying network conditions. Furthermore, a dynamic transmission control protocol-AQM control system using ATRED controller is introduced for the systematic analysis. It is proved that the stability of the network system can be guaranteed when the adaptive mechanism is finely designed. Simulation studies show the proposed ATRED algorithm achieves a good performance in varying network environments, which is superior to the RED and Gentle-RED algorithm, and providing more reliable service under varying network conditions.

  5. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  6. Mechanics of human voice production and control

    PubMed Central

    Zhang, Zhaoyan

    2016-01-01

    As the primary means of communication, voice plays an important role in daily life. Voice also conveys personal information such as social status, personal traits, and the emotional state of the speaker. Mechanically, voice production involves complex fluid-structure interaction within the glottis and its control by laryngeal muscle activation. An important goal of voice research is to establish a causal theory linking voice physiology and biomechanics to how speakers use and control voice to communicate meaning and personal information. Establishing such a causal theory has important implications for clinical voice management, voice training, and many speech technology applications. This paper provides a review of voice physiology and biomechanics, the physics of vocal fold vibration and sound production, and laryngeal muscular control of the fundamental frequency of voice, vocal intensity, and voice quality. Current efforts to develop mechanical and computational models of voice production are also critically reviewed. Finally, issues and future challenges in developing a causal theory of voice production and perception are discussed. PMID:27794319

  7. Mechanics of human voice production and control.

    PubMed

    Zhang, Zhaoyan

    2016-10-01

    As the primary means of communication, voice plays an important role in daily life. Voice also conveys personal information such as social status, personal traits, and the emotional state of the speaker. Mechanically, voice production involves complex fluid-structure interaction within the glottis and its control by laryngeal muscle activation. An important goal of voice research is to establish a causal theory linking voice physiology and biomechanics to how speakers use and control voice to communicate meaning and personal information. Establishing such a causal theory has important implications for clinical voice management, voice training, and many speech technology applications. This paper provides a review of voice physiology and biomechanics, the physics of vocal fold vibration and sound production, and laryngeal muscular control of the fundamental frequency of voice, vocal intensity, and voice quality. Current efforts to develop mechanical and computational models of voice production are also critically reviewed. Finally, issues and future challenges in developing a causal theory of voice production and perception are discussed.

  8. An Open-Source Arduino-based Controller for Mechanical Rain Simulators

    NASA Astrophysics Data System (ADS)

    Cantilina, K. K.

    2017-12-01

    Many commercial rain simulators currently used in hydrology rely on inflexible and outdated controller designs. These analog controllers typically only allow a handful of discrete parameter options, and do not support internal timing functions or continuously-changing parameters. A desire for finer control of rain simulation events necessitated the design and construction of a microcontroller-based controller, using widely available off-the-shelf components. A menu driven interface allows users to fine-tune simulation parameters without the need for training or experience with microcontrollers, and the accessibility of the Arduino IDE allows users with a minimum of programming and hardware experience to modify the controller program to suit the needs of individual experiments.

  9. Damper mechanism for nuclear reactor control elements

    DOEpatents

    Taft, William Elwood

    1976-01-01

    A damper mechanism which provides a nuclear reactor control element decelerating function at the end of the scram stroke. The total damping function is produced by the combination of two assemblies, which operate in sequence. First, a tapered dashram assembly decelerates the control element to a lower velocity, after which a spring hydraulic damper assembly takes over to complete the final damping.

  10. Decentralized control mechanism underlying interlimb coordination of millipedes.

    PubMed

    Kano, Takeshi; Sakai, Kazuhiko; Yasui, Kotaro; Owaki, Dai; Ishiguro, Akio

    2017-04-04

    Legged animals exhibit adaptive and resilient locomotion through interlimb coordination. The long-term goal of this study is to clarify the relationship between the number of legs and the inherent decentralized control mechanism for interlimb coordination. As a preliminary step, the study focuses on millipedes as they represent the species with the greatest number of legs among various animal species. A decentralized control mechanism involving local force feedback was proposed based on the qualitative findings of behavioural experiments in which responses to the removal of part of the terrain and leg amputation were observed. The proposed mechanism was implemented in a developed millipede-like robot to demonstrate that the robot can adapt to the removal of the part of the terrain and leg amputation in a manner similar to that in behavioural experiments.

  11. Manual, mechanical, and cultural control methds and tools

    Treesearch

    Steven Manning; James Miller

    2011-01-01

    There are many land management scenarios where chemicals are not the ideal choice for controlling invasive plants. More often than not, the best approach is the use of integrated pest management involving a variety of control methods. Maximizing the value of mechanical, manual, and cultural control methods with the added benefit of selective herbicides can offer the...

  12. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  13. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases.

    PubMed

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F L; Utzinger, Jürg; Kristensen, Thomas K; Vounatsou, Penelope

    2011-12-01

    After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature'), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded

  14. Antenna Mechanism of Length Control of Actin Cables.

    PubMed

    Mohapatra, Lishibanya; Goode, Bruce L; Kondev, Jane

    2015-06-01

    Actin cables are linear cytoskeletal structures that serve as tracks for myosin-based intracellular transport of vesicles and organelles in both yeast and mammalian cells. In a yeast cell undergoing budding, cables are in constant dynamic turnover yet some cables grow from the bud neck toward the back of the mother cell until their length roughly equals the diameter of the mother cell. This raises the question: how is the length of these cables controlled? Here we describe a novel molecular mechanism for cable length control inspired by recent experimental observations in cells. This "antenna mechanism" involves three key proteins: formins, which polymerize actin, Smy1 proteins, which bind formins and inhibit actin polymerization, and myosin motors, which deliver Smy1 to formins, leading to a length-dependent actin polymerization rate. We compute the probability distribution of cable lengths as a function of several experimentally tuneable parameters such as the formin-binding affinity of Smy1 and the concentration of myosin motors delivering Smy1. These results provide testable predictions of the antenna mechanism of actin-cable length control.

  15. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks.

    PubMed

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-10-12

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  16. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    PubMed Central

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-01-01

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel. PMID:27754316

  17. Education as a Social Control Mechanism.

    ERIC Educational Resources Information Center

    Bacchus, M. K.

    1979-01-01

    With the abolition of slavery, most West Indian planters dramatically changed their attitudes toward education for Blacks, suddenly favoring it. This paper examines reasons behind the attitudinal changes, the planters' perceptions on the role of education for Blacks, and the use of education as a mechanism for social control. (DS)

  18. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  19. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  20. Access control design on highway interchanges.

    DOT National Transportation Integrated Search

    2008-01-01

    The adequate spacing and design of access to crossroads in the vicinity of freeway ramps are critical to the safety and traffic operations of both the freeway and the crossroad. The research presented in this report develops a methodology to evaluate...

  1. Mechanism And Control Of The Quadruped Walking Robot

    NASA Astrophysics Data System (ADS)

    Adachi, Hironori; Nakano, Eiji; Koyachi, Noriho

    1987-10-01

    This paper provides a description of the quadruped walking robot "TURTLE-1". A new link mechanism named ASTBALLEM is used for the legs of this robot. With this mechanism highly rigid and easily controllable legs are constructed. Each leg has two degrees of freedom and is driven by two DC servo motors. The motion of the legs is controlled by a micro computer and various gaits are generated. Static stability is maintained as the robot walks. Moreover, its walk is quasi-dynamic; that is, it has a manner of walking that has a two legged supporting period.

  2. Racial and socioeconomic disparities in access to mechanical revascularization procedures for acute ischemic stroke.

    PubMed

    Attenello, Frank J; Adamczyk, Peter; Wen, Ge; He, Shuhan; Zhang, Katie; Russin, Jonathan J; Sanossian, Nerses; Amar, Arun P; Mack, William J

    2014-02-01

    Mechanical revascularization procedures performed for treatment of acute ischemic stroke have increased in recent years. Data suggest association between operative volume and mortality rates. Understanding procedural allocation and patient access patterns is critical. Few studies have examined these demographics. Data were collected from the 2008 Nationwide Inpatient Sample database. Patients hospitalized with ischemic stroke and the subset of individuals who underwent mechanical thrombectomy were characterized by race, payer source, population density, and median wealth of the patient's zip code. Demographic data among patients undergoing mechanical thrombectomy procedures were examined. Stroke admission demographics were analyzed according to thrombectomy volume at admitting centers and patient demographics assessed according to the thrombectomy volume at treating centers. Significant allocation differences with respect to frequency of mechanical thrombectomy procedures among stroke patients existed according to race, expected payer, population density, and wealth of the patient's zip code (P < .0001). White, Hispanic, and Asian/Pacific Islander patients received endovascular treatment at higher rates than black and Native American patients. Compared with the white stroke patients, black (P < .001), Hispanic (P < .001), Asian/Pacific Islander (P < .001), and Native American stroke patients (P < .001) all demonstrated decreased frequency of admission to hospitals performing mechanical thrombectomy procedures at high volumes. Among treated patients, blacks (P = .0876), Hispanics (P = .0335), and Asian/Pacific Islanders (P < .001) demonstrated decreased frequency in mechanical thrombectomy procedures performed at high-volume centers when compared with whites. While present, socioeconomic disparities were not as consistent or pronounced as racial differences. We demonstrate variances in endovascular acute stroke treatment allocation according to racial and

  3. Achieving fertility control through woman’s autonomy and access to maternal healthcare: Are we on track? In-depth analysis of PDHS-2012-13

    PubMed Central

    Hassan, Sehar-un-Nisa; Siddiqui, Salma; Mahmood, Ayeshah

    2015-01-01

    Background and Objective: Fertility control preferences and maternal healthcare have recently become a major concern for developing nations with evidence suggesting that low fertility control rates and poor maternal healthcare are among major obstructions in ensuring health and social status for women. Our objective was toanalyze the factors that influence women’s autonomy, access to maternal healthcare, and fertility control preferences in Pakistan. Methods: Data consisted of 11,761 ever-married women of ages 15-49 years from PDHS, 2012-13. Variables included socio-demographics, women’s autonomy, fertility control preferences and access to maternal healthcare. Results: Findings from multivariate analysis showed that women’s younger age, having less than three number of children and independent or joint decision-making (indicators of high autonomy) remained the most significant predictors for access to better quality maternal healthcare and better fertility control preferences when other variables were controlled. Conclusion: Women’s access to good quality maternal health care and fertility control preferences are directly and indirectly influenced by their demographic characteristics and decision-making patterns in domestic affairs. PMID:26870096

  4. Free choice access to multipoint wellness education and related services positively impacts employee wellness: a randomized and controlled trial.

    PubMed

    Sforzo, Gary A; Kaye, Miranda P; Calleri, David; Ngai, Nancy

    2012-04-01

    Examine effects of voluntary participation in employer-sponsored, multipoint wellness education programming on employee wellness. A randomized and controlled design was used to organize 96 participants into an education + access group; an access-only group, and control group. Outcome measures were made at start and end of a 12-week intervention period. Education + access improved wellness knowledge, which, in turn, enhanced life satisfaction, employee morale, and energy, and nearly improved stress level. Those who received facility access without educational programming did not reap health benefits. Employees voluntarily used the fitness facility and healthy meal cards only 1.3 and 1.5 times per week, respectively. Participants made limited and likely inadequate use of wellness opportunities. As a result, physical health benefits (eg, blood pressure, fitness parameters) were not seen in the present study. However, multipoint wellness education resulted in psychosocial health benefits in 12 weeks.

  5. Active Control of Mixing and Combustion, from Mechanisms to Implementation

    NASA Astrophysics Data System (ADS)

    Ghoniem, Ahmed F.

    2001-11-01

    Implementation of active control in complex processes, of the type encountered in high Reynolds number mixing and combustion, is predicated upon the identification of the underlying mechanisms and the construction of reduced order models that capture their essential characteristics. The mechanisms of interest must be shown to be amenable to external actuations, allowing optimal control strategies to exploit the delicate interactions that lead to the desired outcome. Reduced order models are utilized in defining the form and requisite attributes of actuation, its relationship to the monitoring system and the relevant control algorithms embedded in a feedforward or a feedback loop. The talk will review recent work on active control of mixing in combustion devices in which strong shear zones concur with mixing, combustion stabilization and flame anchoring. The underlying mechanisms, e.g., stability of shear flows, formation/evolution of large vortical structures in separating and swirling flows, their mutual interactions with acoustic fields, flame fronts and chemical kinetics, etc., are discussed in light of their key roles in mixing, burning enhancement/suppression, and combustion instability. Subtle attributes of combustion mechanisms are used to suggest the requisite control strategies.

  6. Overview: Mechanism and Control of a Prosthetic Arm.

    PubMed

    Kulkarni, Tushar; Uddanwadiker, Rashmi

    2015-09-01

    Continuous growth in industrialization and lack of awareness in safety parameters the cases of amputations are growing. The search of safer, simpler and automated prosthetic arms for managing upper limbs is expected. Continuous efforts have been made to design and develop prosthetic arms ranging from simple harness actuated to automated mechanisms with various control options. However due the cost constraints, the automated prosthetic arms are still out of the reach of needy people. Recent data have shown that there is a wide scope to develop a low cost and light weight upper limb prosthesis. This review summarizes the various designs methodologies, mechanisms and control system developed by the researchers and the advances therein. Educating the patient to develop acceptability to prosthesis and using the same for the most basic desired functions of human hand, post amputation care and to improve patient's independent life is equally important. In conclusion it can be interpreted that there is a wide scope in design in an adaptive mechanism for opening and closing of the fingers using other methods of path and position synthesis. Simple mechanisms and less parts may optimize the cost factor. Reduction in the weight of the prosthesis may be achieved using polymers used for engineering applications. Control system will remain never ending challenge for the researchers, but it is essential to maintain the simplicity from the patients perspective.

  7. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  8. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    NASA Astrophysics Data System (ADS)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  9. A novel auto-tuning PID control mechanism for nonlinear systems.

    PubMed

    Cetin, Meric; Iplikci, Serdar

    2015-09-01

    In this paper, a novel Runge-Kutta (RK) discretization-based model-predictive auto-tuning proportional-integral-derivative controller (RK-PID) is introduced for the control of continuous-time nonlinear systems. The parameters of the PID controller are tuned using RK model of the system through prediction error-square minimization where the predicted information of tracking error provides an enhanced tuning of the parameters. Based on the model-predictive control (MPC) approach, the proposed mechanism provides necessary PID parameter adaptations while generating additive correction terms to assist the initially inadequate PID controller. Efficiency of the proposed mechanism has been tested on two experimental real-time systems: an unstable single-input single-output (SISO) nonlinear magnetic-levitation system and a nonlinear multi-input multi-output (MIMO) liquid-level system. RK-PID has been compared to standard PID, standard nonlinear MPC (NMPC), RK-MPC and conventional sliding-mode control (SMC) methods in terms of control performance, robustness, computational complexity and design issue. The proposed mechanism exhibits acceptable tuning and control performance with very small steady-state tracking errors, and provides very short settling time for parameter convergence. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  10. A Quality Control Mechanism Coordinates Meiotic Prophase Events to Promote Crossover Assurance

    PubMed Central

    Deshong, Alison J.; Ye, Alice L.; Lamelza, Piero; Bhalla, Needhi

    2014-01-01

    Meiotic chromosome segregation relies on homologous chromosomes being linked by at least one crossover, the obligate crossover. Homolog pairing, synapsis and meiosis specific DNA repair mechanisms are required for crossovers but how they are coordinated to promote the obligate crossover is not well understood. PCH-2 is a highly conserved meiotic AAA+-ATPase that has been assigned a variety of functions; whether these functions reflect its conserved role has been difficult to determine. We show that PCH-2 restrains pairing, synapsis and recombination in C. elegans. Loss of pch-2 results in the acceleration of synapsis and homolog-dependent meiotic DNA repair, producing a subtle increase in meiotic defects, and suppresses pairing, synapsis and recombination defects in some mutant backgrounds. Some defects in pch-2 mutants can be suppressed by incubation at lower temperature and these defects increase in frequency in wildtype worms grown at higher temperature, suggesting that PCH-2 introduces a kinetic barrier to the formation of intermediates that support pairing, synapsis or crossover recombination. We hypothesize that this kinetic barrier contributes to quality control during meiotic prophase. Consistent with this possibility, defects in pch-2 mutants become more severe when another quality control mechanism, germline apoptosis, is abrogated or meiotic DNA repair is mildly disrupted. PCH-2 is expressed in germline nuclei immediately preceding the onset of stable homolog pairing and synapsis. Once chromosomes are synapsed, PCH-2 localizes to the SC and is removed in late pachytene, prior to SC disassembly, correlating with when homolog-dependent DNA repair mechanisms predominate in the germline. Indeed, loss of pch-2 results in premature loss of homolog access. Altogether, our data indicate that PCH-2 coordinates pairing, synapsis and recombination to promote crossover assurance. Specifically, we propose that the conserved function of PCH-2 is to destabilize pairing

  11. Registered access: a 'Triple-A' approach.

    PubMed

    Dyke, Stephanie O M; Kirby, Emily; Shabani, Mahsa; Thorogood, Adrian; Kato, Kazuto; Knoppers, Bartha M

    2016-12-01

    We propose a standard model for a novel data access tier - registered access - to facilitate access to data that cannot be published in open access archives owing to ethical and legal risk. Based on an analysis of applicable research ethics and other legal and administrative frameworks, we discuss the general characteristics of this Registered Access Model, which would comprise a three-stage approval process: Authentication, Attestation and Authorization. We are piloting registered access with the Demonstration Projects of the Global Alliance for Genomics and Health for which it may provide a suitable mechanism for access to certain data types and to different types of data users.

  12. Analysis and Simulation of Traffic Control for Resource Management in DVB-Based Broadband Satellite Access Networks

    NASA Astrophysics Data System (ADS)

    Impemba, Ernesto; Inzerilli, Tiziano

    2003-07-01

    Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.

  13. The control of the controller: molecular mechanisms for robust perfect adaptation and temperature compensation.

    PubMed

    Ni, Xiao Yu; Drengstig, Tormod; Ruoff, Peter

    2009-09-02

    Organisms have the property to adapt to a changing environment and keep certain components within a cell regulated at the same level (homeostasis). "Perfect adaptation" describes an organism's response to an external stepwise perturbation by regulating some of its variables/components precisely to their original preperturbation values. Numerous examples of perfect adaptation/homeostasis have been found, as for example, in bacterial chemotaxis, photoreceptor responses, MAP kinase activities, or in metal-ion homeostasis. Two concepts have evolved to explain how perfect adaptation may be understood: In one approach (robust perfect adaptation), the adaptation is a network property, which is mostly, but not entirely, independent of rate constant values; in the other approach (nonrobust perfect adaptation), a fine-tuning of rate constant values is needed. Here we identify two classes of robust molecular homeostatic mechanisms, which compensate for environmental variations in a controlled variable's inflow or outflow fluxes, and allow for the presence of robust temperature compensation. These two classes of homeostatic mechanisms arise due to the fact that concentrations must have positive values. We show that the concept of integral control (or integral feedback), which leads to robust homeostasis, is associated with a control species that has to work under zero-order flux conditions and does not necessarily require the presence of a physico-chemical feedback structure. There are interesting links between the two identified classes of homeostatic mechanisms and molecular mechanisms found in mammalian iron and calcium homeostasis, indicating that homeostatic mechanisms may underlie similar molecular control structures.

  14. Autoregulatory mechanisms controlling the Microprocessor.

    PubMed

    Triboulet, Robinson; Gregory, Richard I

    2010-01-01

    The Microprocessor, comprising the ribonuclease Drosha and its essential cofactor, the double-stranded RNA-binding protein, DGCR8, is essential for the first step of the miRNA biogenesis pathway. It specifically cleaves double-stranded RNA within stem-loop structures of primary miRNA transcripts (pri-miRNAs) to generate precursor (pre-miRNA) intermediates. Pre-miRNAs are subsequently processed by Dicer to their mature 22 nt form. Thus, Microprocessor is essential for miRNA maturation, and pri-miRNA cleavage by this complex defines one end of the mature miRNA. Moreover, it is emerging that dysregulation of the Microprocessor is associated with various human diseases. It is therefore important to understand the mechanisms by which the expression of the subunits of the Microprocessor is regulated. Recent findings have uncovered a post-transcriptional mechanism that maintains the integrity of the Microprocessor. These studies revealed that the Microprocessor is involved in the processing of the messenger RNA (mRNA) that encodes DGCR8. This regulatory feedback loop, along with the reported role played by DGCR8 in the stabilization of Drosha protein, is part ofa newly identified regulatory mechanism controlling Microprocessor activity.

  15. Autoregulatory mechanisms controlling the microprocessor.

    PubMed

    Triboulet, Robinson; Gregory, Richard I

    2011-01-01

    The Microprocessor, comprising the ribonuclease Drosha and its essential cofactor, the double-stranded RNA-binding protein, DGCR8, is essential for the first step of the miRNA biogenesis pathway. It specifically cleaves double-stranded RNA within stem-loop structures of primary miRNA transcripts (pri-miRNAs) to generate precursor (pre-miRNA) intermediates. Pre-miRNAs are subsequently processed by Dicer to their mature ∼22 nt form. Thus, Microprocessor is essential for miRNA maturation, and pri-miRNA cleavage by this complex defines one end of the mature miRNA. Moreover, it is emerging that dysregulation of the Microprocessor is associated with various human diseases. It is therefore important to understand the mechanisms by which the expression of the subunits of the Microprocessor is regulated. Recent findings have uncovered a post-transcriptional mechanism that maintains the integrity of the Microprocessor. These studies revealed that the Microprocessor is involved in the processing of the messenger RNA (mRNA) that encodes DGCR8. This regulatory feedback loop, along with the reported role played by DGCR8 in the stabilization of Drosha protein, is part of a newly identified regulatory mechanism controlling Microprocessor activity.

  16. Capacity allocation mechanism based on differentiated QoS in 60 GHz radio-over-fiber local access network

    NASA Astrophysics Data System (ADS)

    Kou, Yanbin; Liu, Siming; Zhang, Weiheng; Shen, Guansheng; Tian, Huiping

    2017-03-01

    We present a dynamic capacity allocation mechanism based on the Quality of Service (QoS) for different mobile users (MU) in 60 GHz radio-over-fiber (RoF) local access networks. The proposed mechanism is capable for collecting the request information of MUs to build a full list of MU capacity demands and service types at the Central Office (CO). A hybrid algorithm is introduced to implement the capacity allocation which can satisfy the requirements of different MUs at different network traffic loads. Compared with the weight dynamic frames assignment (WDFA) scheme, the Hybrid scheme can keep high priority MUs in low delay and maintain the packet loss rate less than 1% simultaneously. At the same time, low priority MUs have a relatively better performance.

  17. A comparison of Percutaneous femoral access in Endovascular Repair versus Open femoral access (PiERO): study protocol for a randomized controlled trial.

    PubMed

    Vierhout, Bastiaan P; Saleem, Ben R; Ott, Alewijn; van Dijl, Jan Maarten; de Kempenaer, Ties D van Andringa; Pierie, Maurice E N; Bottema, Jan T; Zeebregts, Clark J

    2015-09-14

    Access for endovascular repair of abdominal aortic aneurysms (EVAR) is obtained through surgical cutdown or percutaneously. The only devices suitable for percutaneous closure of the 20 French arteriotomies of the common femoral artery (CFA) are the Prostar(™) and Proglide(™) devices (Abbott Vascular). Positive effects of these devices seem to consist of a lower infection rate, and shorter operation time and hospital stay. This conclusion was published in previous reports comparing techniques in patients in two different groups (cohort or randomized). Access techniques were never compared in one and the same patient; this research simplifies comparison because patient characteristics will be similar in both groups. Percutaneous access of the CFA is compared to surgical cutdown in a single patient; in EVAR surgery, access is necessary in both groins in each patient. Randomization is performed on the introduction site of the larger main device of the endoprosthesis. The contralateral device of the endoprosthesis is smaller. When we use this type of randomization, both groups will contain a similar number of main and contralateral devices. Preoperative nose cultures and perineal cultures are obtained, to compare colonization with postoperative wound cultures (in case of a surgical site infection). Furthermore, patient comfort will be considered, using VAS-scores (Visual analog scale). Punch biopsies of the groin will be harvested to retrospectively compare skin of patients who suffered a surgical site infection (SSI) to patients who did not have an SSI. The PiERO trial is a multicenter randomized controlled clinical trial designed to show the consequences of using percutaneous access in EVAR surgery and focuses on the occurrence of surgical site infections. NTR4257 10 November 2013, NL44578.042.13.

  18. 76 FR 78866 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-20

    ... initiated a rulemaking proceeding in accordance with provisions added by the Digital Millennium Copyright... available in digital copies. Proponent: The Open Book Alliance. 2. Literary works, distributed electronically, that: (1) Contain digital rights management and/or other access controls which either prevent the...

  19. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. RM 2008-8] Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final Rule; correction. SUMMARY: The Copyright Office makes a...

  20. Access management for Kentucky.

    DOT National Transportation Integrated Search

    2004-02-01

    The Access Management Manual published by the Transportation Research Board in 2003 defines access management as the "systematic control of the location, spacing, design, and operation of driveways, median openings, interchanges, and street connectio...

  1. The Application of LOGO! in Control System of a Transmission and Sorting Mechanism

    NASA Astrophysics Data System (ADS)

    Liu, Jian; Lv, Yuan-Jun

    Logic programming of general logic control module LOGO! has been recommended the application in transmission and sorting mechanism. First, the structure and operating principle of the mechanism had been introduced. Then the pneumatic loop of the mechanism had been plotted in the software of FluidSIM-P. At last, pneumatic loop and motors had been control by LOGO!, which makes the control process simple and clear instead of the complicated control of ordinary relay. LOGO! can achieve the complicated interlock control composed of inter relays and time relays. In the control process, the logic control function of LOGO! is fully used to logic programming so that the system realizes the control of air cylinder and motor. It is reliable and adjustable mechanism after application.

  2. Control of hierarchical polymer mechanics with bioinspired metal-coordination dynamics

    PubMed Central

    Grindy, Scott C.; Learsch, Robert; Mozhdehi, Davoud; Cheng, Jing; Barrett, Devin G.; Guan, Zhibin; Messersmith, Phillip B.; Holten-Andersen, Niels

    2015-01-01

    In conventional polymer materials, mechanical performance is traditionally engineered via material structure, using motifs such as polymer molecular weight, polymer branching, or copolymer-block design1. Here, by means of a model system of 4-arm poly(ethylene glycol) hydrogels crosslinked with multiple, kinetically distinct dynamic metal-ligand coordinate complexes, we show that polymer materials with decoupled spatial structure and mechanical performance can be designed. By tuning the relative concentration of two types of metal-ligand crosslinks, we demonstrate control over the material’s mechanical hierarchy of energy-dissipating modes under dynamic mechanical loading, and therefore the ability to engineer a priori the viscoelastic properties of these materials by controlling the types of crosslinks rather than by modifying the polymer itself. This strategy to decouple material mechanics from structure may inform the design of soft materials for use in complex mechanical environments. PMID:26322715

  3. Cognitive Control Mechanisms, Emotion & Memory: A neural perspective with implications for psychopathology

    PubMed Central

    Banich, Marie T.; Mackiewicz, Kristen L.; Depue, Brendan E.; Whitmer, Anson; Miller, Gregory A.; Heller, Wendy

    2009-01-01

    In this paper we provide a focused review of the literature examining neural mechanisms involved in cognitive control over memory processes that can influence, and in turn are influenced, by emotional processes. The review is divided into two parts, the first focusing on working memory and the second on long-term memory. With regard to working memory, we discuss the neural bases of 1) control mechanisms that can select against distracting emotional information, 2) mechanisms that can regulate emotional reactions or responses, 3) how mood state influences cognitive control, and 4) individual differences in control mechanisms. For long-term memory, we briefly review 1) the neural substrates of emotional memory, 2) the cognitive and neural mechanisms that are involved in controlling emotional memories and 3) how these systems are altered in post-traumatic stress disorder. Finally, we consider tentative generalizations that can be drawn from this relatively unexplored conjunction of research endeavors. PMID:18948135

  4. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  5. Neural mechanisms of motivated forgetting

    PubMed Central

    Anderson, Michael C.; Hanslmayr, Simon

    2014-01-01

    Not all memories are equally welcome in awareness. People limit the time they spend thinking about unpleasant experiences, a process that begins during encoding, but that continues when cues later remind someone of the memory. Here, we review the emerging behavioural and neuroimaging evidence that suppressing awareness of an unwelcome memory, at encoding or retrieval, is achieved by inhibitory control processes mediated by the lateral prefrontal cortex. These mechanisms interact with neural structures that represent experiences in memory, disrupting traces that support retention. Thus, mechanisms engaged to regulate momentary awareness introduce lasting biases in which experiences remain accessible. We argue that theories of forgetting that neglect the motivated control of awareness omit a powerful force shaping the retention of our past. PMID:24747000

  6. An Analytical Dynamics Approach to the Control of Mechanical Systems

    NASA Astrophysics Data System (ADS)

    Mylapilli, Harshavardhan

    A new and novel approach to the control of nonlinear mechanical systems is presented in this study. The approach is inspired by recent results in analytical dynamics that deal with the theory of constrained motion. The control requirements on the dynamical system are viewed from an analytical dynamics perspective and the theory of constrained motion is used to recast these control requirements as constraints on the dynamical system. Explicit closed form expressions for the generalized nonlinear control forces are obtained by using the fundamental equation of mechanics. The control so obtained is optimal at each instant of time and causes the constraints to be exactly satisfied. No linearizations and/or approximations of the nonlinear dynamical system are made, and no a priori structure is imposed on the nature of nonlinear controller. Three examples dealing with highly nonlinear complex dynamical systems that are chosen from diverse areas of discrete and continuum mechanics are presented to demonstrate the control approach. The first example deals with the energy control of underactuated inhomogeneous nonlinear lattices (or chains), the second example deals with the synchronization of the motion of multiple coupled slave gyros with that of a master gyro, and the final example deals with the control of incompressible hyperelastic rubber-like thin cantilever beams. Numerical simulations accompanying these examples show the ease, simplicity and the efficacy with which the control methodology can be applied and the accuracy with which the desired control objectives can be met.

  7. Diagrammatic guide signs for use on controlled access highways. Volume 1, Recommendations for diagrammatic guide signs

    DOT National Transportation Integrated Search

    1972-12-01

    The purpose of the diagrammatic signing research project was to develop warrants and standards for the use of diagrammatic guide signs on controlled access highways. Volume 1 summarizes the entire diagrammatic signing research program objectives spon...

  8. Rule-based mechanisms of learning for intelligent adaptive flight control

    NASA Technical Reports Server (NTRS)

    Handelman, David A.; Stengel, Robert F.

    1990-01-01

    How certain aspects of human learning can be used to characterize learning in intelligent adaptive control systems is investigated. Reflexive and declarative memory and learning are described. It is shown that model-based systems-theoretic adaptive control methods exhibit attributes of reflexive learning, whereas the problem-solving capabilities of knowledge-based systems of artificial intelligence are naturally suited for implementing declarative learning. Issues related to learning in knowledge-based control systems are addressed, with particular attention given to rule-based systems. A mechanism for real-time rule-based knowledge acquisition is suggested, and utilization of this mechanism within the context of failure diagnosis for fault-tolerant flight control is demonstrated.

  9. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  10. Design and control of a high precision drive mechanism

    NASA Astrophysics Data System (ADS)

    Pan, Bo; He, Yongqiang; Wang, Haowei; Zhang, Shuyang; Zhang, Donghua; Wei, Xiaorong; Jiang, Zhihong

    2017-01-01

    This paper summarizes the development of a high precision drive mechanism (HPDM) for space application, such as the directional antenna, the laser communication device, the mobile camera and other pointing mechanisms. In view of the great practical significance of high precision drive system, control technology for permanent magnet synchronous motor (PMSM) servo system is also studied and a PMSM servo controller is designed in this paper. And the software alignment was applied to the controller to eliminate the steady error of the optical encoder, which helps to realize the 1 arcsec (1σ) control precision. To assess its capabilities, the qualification environment testing including the thermal vacuum cycling testing, and the sinusoidal and random vibration were carried out. The testing results show that the performance of the HPDM is almost the same between the former and the end of each testing.

  11. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...

  12. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...

  13. COAXIAL CONTROL ROD DRIVE MECHANISM FOR NEUTRONIC REACTORS

    DOEpatents

    Fox, R.J.; Oakes, L.C.

    1959-04-14

    A drive mechanism is presented for the control rod or a nuclear reactor. In this device the control rod is coupled to a drive shaft which extends coaxially through the rotor of an electric motor for relative rotation with respect thereto. A gear reduction mehanism is coupled between the rotor and the drive shaft to convert the rotary motion of the motor into linear motion of the shaft with a comparatively great reduction in speed, thereby providing relatively glow linear movement of the shaft and control rod for control purposes.

  14. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and facilities; (4) Granting access to only those responding to the security incident or threat... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security...

  15. Controlling mechanisms over the internet

    NASA Astrophysics Data System (ADS)

    Lumia, Ronald

    1997-01-01

    The internet, widely available throughout the world, can be used to control robots, machine tools, and other mechanisms. This paper will describe a low-cost virtual collaborative environment (VCE) which will connect users with distant equipment. The system is based on PC technology, and incorporates off-line-programming with on-line execution. A remote user programs the systems graphically and simulates the motions and actions of the mechanism until satisfied with the functionality of the program. The program is then transferred from the remote site to the local site where the real equipment exists. At the local site, the simulation is run again to check the program from a safety standpoint. Then, the local user runs the program on the real equipment. During execution, a camera in the real workspace provides an image back to the remote user through a teleconferencing system. The system costs approximately 12,500 dollars and represents a low-cost alternative to the Sandia National Laboratories VCE.

  16. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  17. Abiotic and Biotic Mechanisms Controlling In Situ Remediation of NDMA

    DTIC Science & Technology

    2009-05-01

    FINAL REPORT Abiotic and Biotic Mechanisms Controlling In Situ Remediation of NDMA SERDP Project ER-1421 MAY 2009 James E. Szecsody...00-2009 4. TITLE AND SUBTITLE Abiotic and Biotic Mechanisms Controlling In Situ Remediation of NDMA 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...investigate whether in situ coupled abiotic/biotic degradation of N-nitrosodimethylamine ( NDMA , an emerging contaminant) could be used as a permeable

  18. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...

  19. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...

  20. Automatized alignment control of wing mechanization in aerodynamic contour of aircraft

    NASA Astrophysics Data System (ADS)

    Odnokurtsev, K. A.

    2018-05-01

    The method of automatized control of accuracy of an aircraft aerodynamic contour when mounting wing mechanization elements is described in the article. A control device in the stand of the wing assembling, equipped with the distance sensors, is suggested to be used. The measurement of control points’ inaccuracies is made automatically in a special computer program. Two kinds of sensor calibration are made in advance in order to increase the accuracy of measurements. As a result, the duration of control and adjustment of mechanization elements is reduced.

  1. Accessing memory

    DOEpatents

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  2. 14 CFR 27.923 - Rotor drive system and control mechanism tests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the position that will give maximum longitudinal cyclic pitch change to simulate forward flight. The... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Rotor drive system and control mechanism....923 Rotor drive system and control mechanism tests. (a) Each part tested as prescribed in this section...

  3. Vehicle barrier with access delay

    DOEpatents

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  4. A Randomized Controlled Comparison of the Internal Jugular Vein and the Subclavian Vein as Access Sites for Central Venous Catheterization in Pediatric Cardiac Surgery.

    PubMed

    Camkiran Firat, Aynur; Zeyneloglu, Pinar; Ozkan, Murat; Pirat, Arash

    2016-09-01

    To compare internal jugular vein and subclavian vein access for central venous catheterization in terms of success rate and complications. A 1:1 randomized controlled trial. Baskent University Medical Center. Pediatric patients scheduled for cardiac surgery. Two hundred and eighty children undergoing central venous catheterization were randomly allocated to the internal jugular vein or subclavian vein group during a period of 18 months. The primary outcome was the first-attempt success rate of central venous catheterization through either approach. The secondary outcomes were the rates of infectious and mechanical complications. The central venous catheterization success rate at the first attempt was not significantly different between the subclavian vein (69%) and internal jugular vein (64%) groups (p = 0.448). However, the overall success rate was significantly higher through the subclavian vein (91%) than the internal jugular vein (82%) (p = 0.037). The overall frequency of mechanical complications was not significantly different between the internal jugular vein (25%) and subclavian vein (31%) (p = 0.456). However, the rate of arterial puncture was significantly higher with internal jugular vein (8% vs 2%; p = 0.03) and that of catheter malposition was significantly higher with subclavian vein (17% vs 1%; p < 0.001). The rates per 1,000 catheter days for both positive catheter-tip cultures (26.1% vs 3.6%; p < 0.001) and central-line bloodstream infection (6.9 vs 0; p < 0.001) were significantly higher with internal jugular vein. There were no significant differences between the groups in the length of ICU and hospital stays or in-hospital mortality rates (p > 0.05 for all). Central venous catheterization through the internal jugular vein and subclavian vein was not significantly different in terms of success at the first attempt. Although the types of mechanical complications were different, the overall rate was similar between internal jugular vein and

  5. Infection control in hemodialysis units: a quick access to essential elements.

    PubMed

    Karkar, Ayman; Bouhaha, Betty Mandin; Dammang, Mienalyn Lim

    2014-05-01

    Infection is the most common cause of hospitalization and the second most common cause of mortality among hemodialysis (HD) patients, after cardiovascular disease. HD patients as well as the dialysis staff are vulnerable to contracting health-care-associated infections (HAIs) due to frequent and prolonged exposure to many possible contaminants in the dialysis environment. The extracorporeal nature of the therapy, the associated common environmental conditions and the immune compromised status of HD patients are major predisposing factors. The evident increased potential for transmission of infections in the HD settings led to the creation and implementation of specific and stricter infection prevention and control measures in addition to the usual standard precautions. Different international organizations have generated guidelines and recommendations on infection prevention and control for implementation in the HD settings. These include the Centers for Disease Control and Prevention (CDC), the Association of Professionals in Infection Control (APIC), the Kidney Disease Outcomes Quality Initiative (K/DOQI), the European Best Practice Guidelines/European Renal Best Practice (EBPG/ERBP) and the Kidney Disease: Improving Global Outcomes (KDIGO). However, these guidelines are extensive and sometimes vary among different guideline-producing bodies. Our aim in this review is to facilitate the access, increase the awareness and encourage implementation among dialysis providers by reviewing, extracting and comparing the essential elements of guidelines and recommendations on infection prevention and control in HD units.

  6. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    PubMed Central

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  7. Control of mechanical systems with rolling constraints: Application to dynamic control of mobile robots

    NASA Technical Reports Server (NTRS)

    Sarkar, Nilanjan; Yun, Xiaoping; Kumar, Vijay

    1994-01-01

    There are many examples of mechanical systems that require rolling contacts between two or more rigid bodies. Rolling contacts engender nonholonomic constraints in an otherwise holonomic system. In this article, we develop a unified approach to the control of mechanical systems subject to both holonomic and nonholonomic constraints. We first present a state space realization of a constrained system. We then discuss the input-output linearization and zero dynamics of the system. This approach is applied to the dynamic control of mobile robots. Two types of control algorithms for mobile robots are investigated: trajectory tracking and path following. In each case, a smooth nonlinear feedback is obtained to achieve asymptotic input-output stability and Lagrange stability of the overall system. Simulation results are presented to demonstrate the effectiveness of the control algorithms and to compare the performane of trajectory-tracking and path-following algorithms.

  8. Semantically Enriched Data Access Policies in eHealth.

    PubMed

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  9. OASIS: A Data Fusion System Optimized for Access to Distributed Archives

    NASA Astrophysics Data System (ADS)

    Berriman, G. B.; Kong, M.; Good, J. C.

    2002-05-01

    The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.

  10. Controlling the dual mechanisms of oxide interface doping

    NASA Astrophysics Data System (ADS)

    Dai, Weitao; Cen, Cheng

    The formation of two dimensional electron gas (2DEG) at LaAlO3/SrTiO3 interfaces involves multiple electronic and structural causes. The interplay between them makes the investigation of individual mechanism very challenging. Here we demonstrate the nanoscale selective control of two interface doping pathways: charge transfers from surface adsorbed protons and oxygen vacancies created in LaAlO3 layers. The selective control is achieved by combining intensive electric field generated by conducting AFM probe which controls both the creation/migration of oxygen vacancies and the surface proton density, with plasma assisted surface hydroxylation and solvent based proton solvation that act mainly on surface adsorbates. Robust nanoscale reversible metal-insulator transition was achieved at the interfaces with the LaAlO3 layer thicker than the critic thickness. Different combinations of the experimental methods and doping mechanisms enable highly flexible tuning of the 2DEG's carrier density, mobility and sensitivity to ambient environments. The reversible and independent controls of surface states and vacancies add to the fundamental material research capabilities and can benefit future exploration of designed 2DEG nanoelectronics.

  11. The views of stakeholders on controlled access schemes for high-cost antirheumatic biological medicines in Australia

    PubMed Central

    Lu, Christine Y; Ritchie, Jan; Williams, Ken; Day, Ric

    2007-01-01

    Background In Australia, government-subsidised access to high-cost medicines is "targeted" to particular sub-sets of patients under the Pharmaceutical Benefits Scheme to achieve cost-effective use. In order to determine how this access system could be improved, the opinions of key stakeholders on access to biological agents for rheumatoid arthritis were explored. Methods Thirty-six semi-structured interviews were conducted with persons from relevant stakeholder groups. These were transcribed verbatim, and analysed thematically. Results Controlled access to expensive medicines was considered to be equitable and practical; however, there was disagreement as to the method of defining the target patient populations. Other concerns included timeliness of access, excessive bureaucracy, and the need for additional resources to facilitate the scheme. Collaboration between stakeholders was deemed important because it allows more equitable distribution of limited resources. The majority considered that stakeholder consultation should have been broader. Most wanted increased transparency of the decision-making process, ongoing and timely review of access criteria, and an increased provision of information for patients. More structured communication between stakeholders was proposed. Conclusion The Pharmaceutical Benefit Scheme is adapting to meet the changing needs of patients. Provision of subsidised access to high-cost medicines in a manner that is affordable for individuals and society, and that is equitable and efficiently managed is challenging. The views of stakeholders on targeted access to anti-rheumatic biological medicines in Australia acknowledged this challenge and provided a number of suggestions for modifications. These could serve as a basis to inform the debate on how to change the processes and policies so as to improve the scheme. PMID:18096055

  12. Does walking explain associations between access to greenspace and lower mortality?

    PubMed Central

    Lachowycz, Kate; Jones, Andy P.

    2014-01-01

    Despite emerging evidence that access to greenspace is associated with longer life expectancy, little is understood about what causal mechanisms may explain this relationship. Based on social-ecological theories of health, greenspace has multifaceted potential to influence mortality but the potential alternative mediating pathways have not been empirically tested. This study evaluates relationships between access to greenspace, walking and mortality. Firstly, we test for an association between access to greenspace and self-reported levels of walking using a survey of 165,424 adults across England collected during 2007 and 2008. Negative binomial regression multilevel models were used to examine associations between greenspace access and self reported number of days walked in the last month, in total and for recreational and health purposes, after controlling for relevant confounders. Secondly we use an area level analysis of 6781 middle super output areas across England to examine if recreational walking mediates relationships between greenspace access and reduced premature mortality from circulatory disease. Results show clear evidence of better greenspace access being associated with higher reported recreational walking. There were between 13% and 18% more days of recreational walking in the greenest quintile compared with the least green after adjustment for confounders. Tests for mediation found no evidence that recreational walking explain the associations between greenspace and mortality. Futhermore, whilst the relationship between greenspace access and walking was observed for all areas, the relationship between greenspace access and reduced mortality was only apparent in the most deprived areas. These findings indicate that the association between greenspace and mortality, if causal, may be explained by mediators other than walking, such as psychosocial factors. Future research should concentrate on understanding the causal mechanisms underlying observed

  13. High efficiency and simple technique for controlling mechanisms by EMG signals

    NASA Astrophysics Data System (ADS)

    Dugarte, N.; Álvarez, A.; Balacco, J.; Mercado, G.; Gonzalez, A.; Dugarte, E.; Javier, F.; Ceballos, G.; Olivares, A.

    2016-04-01

    This article reports the development of a simple and efficient system that allows control of mechanisms through electromyography (EMG) signals. The novelty about this instrument is focused on individual control of each motion vector mechanism through independent electronic circuits. Each of electronic circuit does positions a motor according to intensity of EMG signal captured. This action defines movement in one mechanical axis considered from an initial point, based on increased muscle tension. The final displacement of mechanism depends on individual’s ability to handle the levels of muscle tension at different body parts. This is the design of a robotic arm where each degree of freedom is handled with a specific microcontroller that responds to signals taken from a defined muscle. The biophysical interaction between the person and the final positioning of the robotic arm is used as feedback. Preliminary tests showed that the control operates with minimal positioning error margins. The constant use of system with the same operator showed that the person adapts and progressively improves at control technique.

  14. Stirling engine control mechanism and method

    DOEpatents

    Dineen, John J.

    1983-01-01

    A reciprocating-to-rotating motion conversion and power control device for a Stirling engine includes a hub mounted on an offset portion of the output shaft for rotation relative to the shaft and for sliding motion therealong which causes the hub to tilt relative to the axis of rotation of the shaft. This changes the angle of inclination of the hub relative to the shaft axis and changes the axial stroke of a set of arms connected to the hub and nutating therewith. A hydraulic actuating mechanism is connected to the hub for moving its axial position along the shaft. A balancing wheel is linked to the hub and changes its angle of inclination as the angle of inclination of the hub changes to maintain the mechanism in perfect balance throughout its range of motion.

  15. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ...., 1150 18th Street NW., Suite 910, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: The RTCA... (202) 833-9434, or Web site at http://www.rtca.org . SUPPLEMENTARY INFORMATION: Pursuant to section 10... Security System Standard for Airport Access Control, RTCA Paper No. 168-13/SC224-048 TOR Review--Status of...

  16. DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military Installations (REDACTED)

    DTIC Science & Technology

    2016-04-01

    DEPARTMENT OF THE ARMY SUBJECT: DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military...public tenants who leased DoD privatized housing before granting those tenants unescorted access to military installations. In addition, DoD officials...Military Housing Privatization Initiative (MHPI). Specifically, our objective was to determine whether DoD was effectively screening civilian tenants

  17. Analysis of DNA replication associated chromatin decondensation: in vivo assay for understanding chromatin remodeling mechanisms of selected proteins.

    PubMed

    Borysov, Sergiy; Bryant, Victoria L; Alexandrow, Mark G

    2015-01-01

    Of critical importance to many of the events underlying transcriptional control of gene expression are modifications to core and linker histones that regulate the accessibility of trans-acting factors to the DNA substrate within the context of chromatin. Likewise, control over the initiation of DNA replication, as well as the ability of the replication machinery to proceed during elongation through the multiple levels of chromatin condensation that are likely to be encountered, is known to involve the creation of chromatin accessibility. In the latter case, chromatin access will likely need to be a transient event so as to prevent total genomic unraveling of the chromatin that would be deleterious to cells. While there are many molecular and biochemical approaches in use to study histone changes and their relationship to transcription and chromatin accessibility, few techniques exist that allow a molecular dissection of the events underlying DNA replication control as it pertains to chromatin changes and accessibility. Here, we outline a novel experimental strategy for addressing the ability of specific proteins to induce large-scale chromatin unfolding (decondensation) in vivo upon site-specific targeting to an engineered locus. Our laboratory has used this powerful system in novel ways to directly address the ability of DNA replication proteins to create chromatin accessibility, and have incorporated modifications to the basic approach that allow for a molecular genetic analysis of the mechanisms and associated factors involved in causing chromatin decondensation by a protein of interest. Alternative approaches involving co-expression of other proteins (competitors or stimulators), concurrent drug treatments, and analysis of co-localizing histone modifications are also addressed, all of which are illustrative of the utility of this experimental system for extending basic findings to physiologically relevant mechanisms. Although used by our group to analyze

  18. Rock mechanics. Superplastic nanofibrous slip zones control seismogenic fault friction.

    PubMed

    Verberne, Berend A; Plümper, Oliver; de Winter, D A Matthijs; Spiers, Christopher J

    2014-12-12

    Understanding the internal mechanisms controlling fault friction is crucial for understanding seismogenic slip on active faults. Displacement in such fault zones is frequently localized on highly reflective (mirrorlike) slip surfaces, coated with thin films of nanogranular fault rock. We show that mirror-slip surfaces developed in experimentally simulated calcite faults consist of aligned nanogranular chains or fibers that are ductile at room conditions. These microstructures and associated frictional data suggest a fault-slip mechanism resembling classical Ashby-Verrall superplasticity, capable of producing unstable fault slip. Diffusive mass transfer in nanocrystalline calcite gouge is shown to be fast enough for this mechanism to control seismogenesis in limestone terrains. With nanogranular fault surfaces becoming increasingly recognized in crustal faults, the proposed mechanism may be generally relevant to crustal seismogenesis. Copyright © 2014, American Association for the Advancement of Science.

  19. Using routinely recorded data in the UK to assess outcomes in a randomised controlled trial: The Trials of Access.

    PubMed

    Powell, G A; Bonnett, L J; Tudur-Smith, C; Hughes, D A; Williamson, P R; Marson, A G

    2017-08-23

    In the UK, routinely recorded data may benefit prospective studies including randomised controlled trials (RCTs). In an on-going study, we aim to assess the feasibility of access and agreement of routinely recorded clinical and non-clinical data compared to data collected during a RCT using standard prospective methods. This paper will summarise available UK routinely recorded data sources and discuss our experience with the feasibility of accessing routinely recorded data for participants of a RCT before finally proposing recommendations for improving the access and implementation of routinely recorded data in RCTs. Setting: the case study RCT is the Standard and New Antiepileptic Drugs II (SANAD II) trial, a pragmatic, UK, multicentre, phase IV RCT assessing the clinical and cost-effectiveness of antiepileptic drug treatments for newly diagnosed epilepsy. 98 participants have provided written consent to permit the request of routinely recorded data. Study procedures: routinely recorded clinical and non-clinical data were identified and data requested through formal applications from available data holders for the duration that participants have been recruited into SANAD II. The feasibility of accessing routinely recorded data during a RCT is assessed and recommendations for improving access proposed. Secondary-care clinical and socioeconomic data is recorded on a national basis and can be accessed, although there are limitations in the application process. Primary-care data are recorded by a number of organisations on a de-identified basis but access for specific individuals has not been feasible. Access to data recorded by non-clinical sources, including The Department for Work and Pensions and The Driving and Vehicle Licensing Agency, was not successful. Recommendations discussed include further research to assess the attributes of routinely recorded data, an assessment of public perceptions and the development of strategies to collaboratively improve access to

  20. Benefits of detailed models of muscle activation and mechanics

    NASA Technical Reports Server (NTRS)

    Lehman, S. L.; Stark, L.

    1981-01-01

    Recent biophysical and physiological studies identified some of the detailed mechanisms involved in excitation-contraction coupling, muscle contraction, and deactivation. Mathematical models incorporating these mechanisms allow independent estimates of key parameters, direct interplay between basic muscle research and the study of motor control, and realistic model behaviors, some of which are not accessible to previous, simpler, models. The existence of previously unmodeled behaviors has important implications for strategies of motor control and identification of neural signals. New developments in the analysis of differential equations make the more detailed models feasible for simulation in realistic experimental situations.

  1. Edge Mechanisms for Power Excursion Control in Burning Plasmas

    NASA Astrophysics Data System (ADS)

    Hill, M. D.; Stacey, W. M.

    2017-10-01

    ITER must have active and preferably also passive control mechanisms that will limit inadvertent plasma power excursions which could trigger runaway fusion heating. We are identifying and investigating the potential of ion-orbit loss, impurity seeding, and various divertor ``choking'' phenomena to control or limit sudden increases in plasma density or temperature by reducing energy confinement, increasing radiation loss, etc., with the idea that such mechanisms could be tested on DIII-D and other existing tokamaks. We are assembling an edge-divertor code (GTEDGE-2) with a neutral transport model and a burn dynamics code, for this purpose. One potential control mechanism is the enhanced ion orbit loss from the thermalized ion distribution that would result from heating of the thermalized plasma ion distribution. Another possibility is impurity seeding with ions whose emissivity would increase sharply if the edge temperature increased. Enhanced radiative losses should also reduce the thermal energy flux across the separatrix, perhaps dropping the plasma into the poorer L-mode confinement regime. We will present some initial calculations to quantify these ideas. Work supported by US DOE under DE-FC02-04ER54698.

  2. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    EPA Pesticide Factsheets

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  3. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  4. Antenna Mechanism of Length Control of Actin Cables

    PubMed Central

    Mohapatra, Lishibanya; Goode, Bruce L.; Kondev, Jane

    2015-01-01

    Actin cables are linear cytoskeletal structures that serve as tracks for myosin-based intracellular transport of vesicles and organelles in both yeast and mammalian cells. In a yeast cell undergoing budding, cables are in constant dynamic turnover yet some cables grow from the bud neck toward the back of the mother cell until their length roughly equals the diameter of the mother cell. This raises the question: how is the length of these cables controlled? Here we describe a novel molecular mechanism for cable length control inspired by recent experimental observations in cells. This “antenna mechanism” involves three key proteins: formins, which polymerize actin, Smy1 proteins, which bind formins and inhibit actin polymerization, and myosin motors, which deliver Smy1 to formins, leading to a length-dependent actin polymerization rate. We compute the probability distribution of cable lengths as a function of several experimentally tuneable parameters such as the formin-binding affinity of Smy1 and the concentration of myosin motors delivering Smy1. These results provide testable predictions of the antenna mechanism of actin-cable length control. PMID:26107518

  5. Worktime control access, need and use in relation to work-home interference, fatigue, and job motivation.

    PubMed

    Nijp, Hylco H; Beckers, Debby G J; Kompier, Michiel A J; van den Bossche, Seth N J; Geurts, Sabine A E

    2015-07-01

    Worktime control (WTC) has been suggested as a tool to reduce employees' work-home interference and fatigue and improve job motivation. The purpose of this study was twofold: (i) to examine the prevalence of employees' need for, access to, and use of WTC, as well as the incongruence between need for and access to WTC (ie, mismatch); and (ii) to examine the associations of this mismatch and the use of WTC with employees' work-home interference (WHI), fatigue and job motivation. Questionnaire data were collected among a large (N=2420) quasi-representative sample of Dutch employees. The prevalence of WTC need, access, use, and mismatch was assessed by means of descriptive statistics. Associations with employees' outcomes were assessed by analyses of covariance. The need for WTC was highly prevalent. For many employees, we observed a negative mismatch between access to and need for WTC (ie, accessaccess to WTC and assess employees' (mis)match between components of WTC. For practice, we recommend to introduce WTC on an organizational level and assess employees' need for WTC on an individual basis.

  6. Estimation and modeling of coal pore accessibility using small angle neutron scattering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Rui; Liu, Shimin; Bahadur, Jitendra

    Gas diffusion in coal is controlled by nano-structure of the pores. The interconnectivity of pores not only determines the dynamics of gas transport in the coal matrix but also influences the mechanical strength. In this study, small angle neutron scattering (SANS) was employed to quantify pore accessibility for two coal samples, one of sub-bituminous rank and the other of anthracite rank. Moreover, a theoretical pore accessibility model was proposed based on scattering intensities under both vacuum and zero average contrast (ZAC) conditions. Our results show that scattering intensity decreases with increasing gas pressure using deuterated methane (CD 4) at lowmore » Q values for both coals. Pores smaller than 40 nm in radius are less accessible for anthracite than sub-bituminous coal. On the contrary, when the pore radius is larger than 40 nm, the pore accessibility of anthracite becomes larger than that of sub-bituminous coal. Only 20% of pores are accessible to CD 4 for anthracite and 37% for sub-bituminous coal, where the pore radius is 16 nm. For these two coals, pore accessibility and pore radius follows a power-law relationship.« less

  7. Estimation and modeling of coal pore accessibility using small angle neutron scattering

    DOE PAGES

    Zhang, Rui; Liu, Shimin; Bahadur, Jitendra; ...

    2015-09-04

    Gas diffusion in coal is controlled by nano-structure of the pores. The interconnectivity of pores not only determines the dynamics of gas transport in the coal matrix but also influences the mechanical strength. In this study, small angle neutron scattering (SANS) was employed to quantify pore accessibility for two coal samples, one of sub-bituminous rank and the other of anthracite rank. Moreover, a theoretical pore accessibility model was proposed based on scattering intensities under both vacuum and zero average contrast (ZAC) conditions. Our results show that scattering intensity decreases with increasing gas pressure using deuterated methane (CD 4) at lowmore » Q values for both coals. Pores smaller than 40 nm in radius are less accessible for anthracite than sub-bituminous coal. On the contrary, when the pore radius is larger than 40 nm, the pore accessibility of anthracite becomes larger than that of sub-bituminous coal. Only 20% of pores are accessible to CD 4 for anthracite and 37% for sub-bituminous coal, where the pore radius is 16 nm. For these two coals, pore accessibility and pore radius follows a power-law relationship.« less

  8. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  9. Designing Crane Controls with Applied Mechanical and Electrical Safety Features

    NASA Technical Reports Server (NTRS)

    Lytle, Bradford P.; Walczak, Thomas A.

    2002-01-01

    The use of overhead traveling bridge cranes in many varied applications is common practice. In particular, the use of cranes in the nuclear, military, commercial, aerospace, and other industries can involve safety critical situations. Considerations for Human Injury or Casualty, Loss of Assets, Endangering the Environment, or Economic Reduction must be addressed. Traditionally, in order to achieve additional safety in these applications, mechanical systems have been augmented with a variety of devices. These devices assure that a mechanical component failure shall reduce the risk of a catastrophic loss of the correct and/or safe load carrying capability. ASME NOG-1-1998, (Rules for Construction of Overhead and Gantry Cranes, Top Running Bridge, and Multiple Girder), provides design standards for cranes in safety critical areas. Over and above the minimum safety requirements of todays design standards, users struggle with obtaining a higher degree of reliability through more precise functional specifications while attempting to provide "smart" safety systems. Electrical control systems also may be equipped with protective devices similar to the mechanical design features. Demands for improvement of the cranes "control system" is often recognized, but difficult to quantify for this traditionally "mechanically" oriented market. Finite details for each operation must be examined and understood. As an example, load drift (or small motions) at close tolerances can be unacceptable (and considered critical). To meet these high functional demands encoders and other devices are independently added to control systems to provide motion and velocity feedback to the control drive. This paper will examine the implementation of Programmable Electronic Systems (PES). PES is a term this paper will use to describe any control system utilizing any programmable electronic device such as Programmable Logic Controllers (PLC), or an Adjustable Frequency Drive (AID) 'smart' programmable

  10. Mechanical control of tissue-engineered bone.

    PubMed

    Hung, Ben P; Hutton, Daphne L; Grayson, Warren L

    2013-01-31

    Bone is a load-bearing tissue and physical forces play key roles in the development and maintenance of its structure. Mechanical cues can stimulate the expression of an osteogenic phenotype, enhance matrix and mineral deposition, and influence tissue organization to improve the functional outcome of engineered bone grafts. In recent years, a number of studies have investigated the effects of biophysical forces on the bone formation properties of osteoprogenitor cells. The application of physiologically relevant stimuli to tissue-engineered bone may be determined through observation and understanding of forces to which osteoblasts, osteoclasts, and osteocytes are exposed in native bone. Subsequently, these cues may be parameterized and their effects studied in well-defined in vitro systems. The osteo-inductive effects of three specific mechanical cues - shear stress, substrate rigidity, and nanotopography - on cells cultured in monolayer or in three-dimensional biomaterial scaffolds in vitro are reviewed. Additionally, we address the time-dependent effects of mechanical cues on vascular infiltration and de novo bone formation in acellular scaffolds implanted into load-bearing sites in vivo. Recent studies employing cutting-edge advances in biomaterial fabrication and bioreactor design have provided key insights into the role of mechanical cues on cellular fate and tissue properties of engineered bone grafts. By providing mechanistic understanding, future studies may go beyond empirical approaches to rational design of engineering systems to control tissue development.

  11. 11. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF MECHANICAL ROOM. VIEW ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    11. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF MECHANICAL ROOM. VIEW TO SOUTHEAST. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO

  12. EPA GHG certification of medium- and heavy-duty vehicles: Development of road grade profiles representative of US controlled access highways

    DOE PAGES

    Wood, Eric; Duran, Adam; Kelly, Kenneth

    2016-09-27

    In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less

  13. EPA GHG certification of medium- and heavy-duty vehicles: Development of road grade profiles representative of US controlled access highways

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wood, Eric; Duran, Adam; Kelly, Kenneth

    In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less

  14. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  15. Evaluation of innovative devices to control traffic entering from low-volume access points within a land closure.

    DOT National Transportation Integrated Search

    2014-04-01

    This report describes the methodology and results of analyses performed to identify and evaluate : alternative methods to control traffic entering a lane closure on a two-lane, two-way road from low-volume : access points. Researchers documented the ...

  16. Provider responses to patients controlling access to their electronic health records: a prospective cohort study in primary care.

    PubMed

    Tierney, William M; Alpert, Sheri A; Byrket, Amy; Caine, Kelly; Leventhal, Jeremy C; Meslin, Eric M; Schwartz, Peter H

    2015-01-01

    Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data. We designed a program that captures patients' preferences for provider access to an urban health system's EHR. Patients could allow or restrict providers' access to all data (diagnoses, medications, test results, reports, etc.) or only highly sensitive data (sexually transmitted infections, HIV/AIDS, drugs/alcohol, mental or reproductive health). Except for information in free-text reports, we redacted EHR data shown to providers according to patients' preferences. Providers could "break the glass" to display redacted information. We prospectively studied this system in one primary care clinic, noting redactions and when users "broke the glass," and surveyed providers about their experiences and opinions. Eight of nine eligible clinic physicians and all 23 clinic staff participated. All 105 patients who enrolled completed the preference program. Providers did not know which of their patients were enrolled, nor their preferences for accessing their EHRs. During the 6-month prospective study, 92 study patients (88 %) returned 261 times, during which providers viewed their EHRs 126 times (48 %). Providers "broke the glass" 102 times, 92 times for patients not in the study and ten times for six returning study patients, all of whom had restricted EHR access. Providers "broke the glass" for six (14 %) of 43 returning study patients with redacted data vs. zero among 49 study patients without redactions (p = 0.01). Although 54 % of providers agreed that patients should have control over who sees their EHR information, 58 % believed restricting EHR access could harm provider-patient relationships and 71 % felt quality of care would suffer. Patients frequently preferred restricting provider access to their EHRs. Providers infrequently overrode patients' preferences to view hidden data. Providers believed that restricting EHR access

  17. Development of Ti microalloyed high strength steel plate by controlling thermo-mechanical control process schedule

    NASA Astrophysics Data System (ADS)

    Xia, Jinian; Huo, Xiangdong; Li, Liejun; Peng, Zhengwu; Chen, Songjun

    2017-12-01

    In this study, the TMCP parameters including non-recrystallization temperature (Tnr) and optimal isothermal temperature were determined by thermal simulation experiments, and a new Ti microalloyed high strength steel plate was developed by controlling thermo-mechanical control process (TMCP) schedule. The effects of TMCP process on microstructural features, precipitation behavior and mechanical properties of Ti microalloyed high strength steel plate were investigated. The results revealed that the double-stage rolling process consist of rolling in the γ recrystallization region and the γ non-recrystallization region was benefical to promoting the mechanical properties of Ti microalloyed steel by achieving grain refinement. It was also found that large amounts of fine TiC (<10 nm) particles were precipitated during the isothermal treatment at 600 °C, which generated a 215 MPa precipitation strengthening effect.

  18. Derived virtual devices: a secure distributed file system mechanism

    NASA Technical Reports Server (NTRS)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  19. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  20. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  1. Adaptively Adjusted Event-Triggering Mechanism on Fault Detection for Networked Control Systems.

    PubMed

    Wang, Yu-Long; Lim, Cheng-Chew; Shi, Peng

    2016-12-08

    This paper studies the problem of adaptively adjusted event-triggering mechanism-based fault detection for a class of discrete-time networked control system (NCS) with applications to aircraft dynamics. By taking into account the fault occurrence detection progress and the fault occurrence probability, and introducing an adaptively adjusted event-triggering parameter, a novel event-triggering mechanism is proposed to achieve the efficient utilization of the communication network bandwidth. Both the sensor-to-control station and the control station-to-actuator network-induced delays are taken into account. The event-triggered sensor and the event-triggered control station are utilized simultaneously to establish new network-based closed-loop models for the NCS subject to faults. Based on the established models, the event-triggered simultaneous design of fault detection filter (FDF) and controller is presented. A new algorithm for handling the adaptively adjusted event-triggering parameter is proposed. Performance analysis verifies the effectiveness of the adaptively adjusted event-triggering mechanism, and the simultaneous design of FDF and controller.

  2. Self-Healing Nanocomposite Hydrogel with Well-Controlled Dynamic Mechanics

    NASA Astrophysics Data System (ADS)

    Li, Qiaochu; Mishra, Sumeet; Chen, Pangkuan; Tracy, Joseph; Holten-Andersen, Niels

    Network dynamics is a crucial factor that determines the macroscopic self-healing rate and efficiency in polymeric hydrogel materials, yet its controllability is seldom studied in most reported self-healing hydrogel systems. Inspired by mussel's adhesion chemistry, we developed a novel approach to assemble inorganic nanoparticles and catechol-decorated PEG polymer into a hydrogel network. When utilized as reversible polymer-particle crosslinks, catechol-metal coordination bonds yield a unique gel network with dynamic mechanics controlled directly by interfacial crosslink structure. Taking advantage of this structure-property relationship at polymer-particle interfaces, we next designed a hierarchically structured hybrid gel with two distinct relaxation timescales. By tuning the relative contribution of the two hierarchical relaxation modes, we are able to finely control the gel's dynamic mechanical behavior from a viscoelastic fluid to a stiff solid, yet preserving its fast self-healing property without the need for external stimuli.

  3. Experimental opto-mechanics with levitated nanoparticles: towards quantum control and thermodynamic cycles (Presentation Recording)

    NASA Astrophysics Data System (ADS)

    Kiesel, Nikolai; Blaser, Florian; Delic, Uros; Grass, David; Dechant, Andreas; Lutz, Eric; Bathaee, Marzieh; Aspelmeyer, Markus

    2015-08-01

    Combining optical levitation and cavity optomechanics constitutes a promising approach to prepare and control the motional quantum state of massive objects (>10^9 amu). This, in turn, would represent a completely new type of light-matter interface and has, for example, been predicted to enable experimental tests of macrorealistic models or of non-Newtonian gravity at small length scales. Such ideas have triggered significant experimental efforts to realizing such novel systems. To this end, we have recently successfully demonstrated cavity-cooling of a levitated sub-micron silica particle in a classical regime at a pressure of approximately 1mbar. Access to higher vacuum of approx. 10^-6 mbar has been demonstrated using 3D-feedback cooling in optical tweezers without cavity-coupling. Here we will illustrate our strategy towards trapping, 3D-cooling and quantum control of nanoparticles in ultra-high vacuum using cavity-based feedback cooling methods and clean particle loading with hollow-core photonic crystal fibers. We will also discuss the current experimental progress both in 3D-cavity cooling and HCPCF-based transport of nanoparticles. As yet another application of cavity-controlled levitated nanoparticles we will show how to implement a thermodynamic Sterling cycle operating in the underdamped regime. We present optimized protocols with respect to efficiency at maximum power in this little explored regime. We also show that the excellent level of control in our system will allow reproducing all relevant features of such optimized protocols. In a next step, this will enable studies of thermodynamics cycles in a regime where the quantization of the mechanical motion becomes relevant.

  4. Integrating conflict detection and attentional control mechanisms.

    PubMed

    Walsh, Bong J; Buonocore, Michael H; Carter, Cameron S; Mangun, George R

    2011-09-01

    Human behavior involves monitoring and adjusting performance to meet established goals. Performance-monitoring systems that act by detecting conflict in stimulus and response processing have been hypothesized to influence cortical control systems to adjust and improve performance. Here we used fMRI to investigate the neural mechanisms of conflict monitoring and resolution during voluntary spatial attention. We tested the hypothesis that the ACC would be sensitive to conflict during attentional orienting and influence activity in the frontoparietal attentional control network that selectively modulates visual information processing. We found that activity in ACC increased monotonically with increasing attentional conflict. This increased conflict detection activity was correlated with both increased activity in the attentional control network and improved speed and accuracy from one trial to the next. These results establish a long hypothesized interaction between conflict detection systems and neural systems supporting voluntary control of visual attention.

  5. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  6. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  7. Dynamic Information Management and Exchange for Command and Control Applications, Modelling and Enforcing Category-Based Access Control via Term Rewriting

    DTIC Science & Technology

    2015-03-01

    a hotel and a hospital. 2. Event handler for emergency policies (item 2 above): this has been implemented in two UG projects, one project developed a...Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia, Brazil , September 2014. Electronic Notes in Theoretical Computer Science (to...Brasilia, Brazil , September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on

  8. Simultaneous measurement of chromatin accessibility, DNA methylation, and nucleosome phasing in single cells

    PubMed Central

    Pott, Sebastian

    2017-01-01

    Gaining insights into the regulatory mechanisms that underlie the transcriptional variation observed between individual cells necessitates the development of methods that measure chromatin organization in single cells. Here I adapted Nucleosome Occupancy and Methylome-sequencing (NOMe-seq) to measure chromatin accessibility and endogenous DNA methylation in single cells (scNOMe-seq). scNOMe-seq recovered characteristic accessibility and DNA methylation patterns at DNase hypersensitive sites (DHSs). An advantage of scNOMe-seq is that sequencing reads are sampled independently of the accessibility measurement. scNOMe-seq therefore controlled for fragment loss, which enabled direct estimation of the fraction of accessible DHSs within individual cells. In addition, scNOMe-seq provided high resolution of chromatin accessibility within individual loci which was exploited to detect footprints of CTCF binding events and to estimate the average nucleosome phasing distances in single cells. scNOMe-seq is therefore well-suited to characterize the chromatin organization of single cells in heterogeneous cellular mixtures. DOI: http://dx.doi.org/10.7554/eLife.23203.001 PMID:28653622

  9. Development of safe mechanism for surgical robots using equilibrium point control method.

    PubMed

    Park, Shinsuk; Lim, Hokjin; Kim, Byeong-sang; Song, Jae-bok

    2006-01-01

    This paper introduces a novel mechanism for surgical robotic systems to generate human arm-like compliant motion. The mechanism is based on the idea of the equilibrium point control hypothesis which claims that multi-joint limb movements are achieved by shifting the limbs' equilibrium positions defined by neuromuscular activity. The equilibrium point control can be implemented on a robot manipulator by installing two actuators at each joint of the manipulator, one to control the joint position, and the other to control the joint stiffness. This double-actuator mechanism allows us to arbitrarily manipulate the stiffness (or impedance) of a robotic manipulator as well as its position. Also, the force at the end-effector can be estimated based on joint stiffness and joint angle changes without using force transducers. A two-link manipulator and a three-link manipulator with the double-actuator units have been developed, and experiments and simulation results show the potential of the proposed approach. By creating the human arm-like behavior, this mechanism can improve the performance of robot manipulators to execute stable and safe movement in surgical environments by using a simple control scheme.

  10. Mechanical stress-controlled tunable active frequency-selective surface

    NASA Astrophysics Data System (ADS)

    Huang, Bo-Cin; Hong, Jian-Wei; Lo, Cheng-Yao

    2017-01-01

    This study proposes a tunable active frequency-selective surface (AFSS) realized by mechanically expanding or contracting a split-ring resonator (SRR) array. The proposed AFSS transfers mechanical stress from its elastic substrate to the top of the SRR, thereby achieving electromagnetic (EM) modulation without the need for an additional external power supply, meeting the requirements for the target application: the invisibility cloak. The operating mechanism of the proposed AFSS differs from those of other AFSSs, supporting modulations in arbitrary frequencies in the target range. The proposed stress-controlled or strain-induced EM modulation proves the existence of an identical and linear relationship between the strain gradient and the frequency shift, implying its suitability for other EM modulation ranges and applications.

  11. Geometric control of capillary architecture via cell-matrix mechanical interactions.

    PubMed

    Sun, Jian; Jamilpour, Nima; Wang, Fei-Yue; Wong, Pak Kin

    2014-03-01

    Capillary morphogenesis is a multistage, multicellular activity that plays a pivotal role in various developmental and pathological situations. In-depth understanding of the regulatory mechanism along with the capability of controlling the morphogenic process will have direct implications on tissue engineering and therapeutic angiogenesis. Extensive research has been devoted to elucidate the biochemical factors that regulate capillary morphogenesis. The roles of geometric confinement and cell-matrix mechanical interactions on the capillary architecture, nevertheless, remain largely unknown. Here, we show geometric control of endothelial network topology by creating physical confinements with microfabricated fences and wells. Decreasing the thickness of the matrix also results in comparable modulation of the network architecture, supporting the boundary effect is mediated mechanically. The regulatory role of cell-matrix mechanical interaction on the network topology is further supported by alternating the matrix stiffness by a cell-inert PEG-dextran hydrogel. Furthermore, reducing the cell traction force with a Rho-associated protein kinase inhibitor diminishes the boundary effect. Computational biomechanical analysis delineates the relationship between geometric confinement and cell-matrix mechanical interaction. Collectively, these results reveal a mechanoregulation scheme of endothelial cells to regulate the capillary network architecture via cell-matrix mechanical interactions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Expanded Access Programs

    PubMed Central

    Van Campen, Luann E.; Garnett, Timothy

    2015-01-01

    Expanded access is a regulatory mechanism by which an investigational drug can be made available outside of a clinical trial to treat patients with serious or life-threatening conditions for which there are no satisfactory treatment options. An expanded access program (EAP) is the formal plan under which preapproval access to an investigational drug can be provided to a group of patients. Although an EAP is a regulated program, the decision to authorize an EAP is the responsibility of the biopharmaceutical sponsor. Because of the significant impact an EAP can have on current patients, drug development, and future patients, we propose that a sponsor’s decision must be based not only on regulatory criteria but also on ethical and practical considerations regarding implementation of an EAP. Such an approach will help ensure that decisions and plans uphold ethical precepts such as fairness, promoting good, and minimizing risk of harm. PMID:29473010

  13. Linear association between household income and metabolic control in children with insulin-dependent diabetes mellitus despite free access to health care.

    PubMed

    Deladoëy, Johnny; Henderson, Mélanie; Geoffroy, Louis

    2013-05-01

    In health care systems with a user fee, the impact of socioeconomic factors on pediatric insulin-dependent diabetes mellitus (IDDM) control could be due to the cost of accessing care. There is a linear association between household income and the average glycosylated hemoglobin (HbA1c) of children and adolescents with IDDM despite free access to health care. We used a linear regression model to examine the association between normalized average HbA1c of 1766 diabetic children (diagnosed at our institution from 1980 to 2011 before 17 years of age) and the median household income of their neighborhoods (obtained from Statistics Canada, 2006 Census data). We found a negative linear association (P < .001; r = -0.2) between the level of income and metabolic control assessed by HbA1c after controlling for sex, age at diagnosis, duration of diabetes, ethnicity, geographical factors, frequency of visits, current age (as a proxy for change in practice over time), and change of measurement methods of HbA1c across time. For every increase of $15,000 in annual income, HbA1c decreased by 0.1%. We report a linear association of household income with metabolic control of IDDM in childhood. Given that Canada has a system of free universal access to health care, confounding by access to care is unlikely. Considering the impact of poorly controlled IDDM in childhood on the development of long-term complications, our findings suggest that the higher complication rate found in adults of low socioeconomic status might originate from the poor control that they experienced in childhood. Support for the care of IDDM children from low-income neighborhoods should be increased.

  14. Integrating Software Modules For Robot Control

    NASA Technical Reports Server (NTRS)

    Volpe, Richard A.; Khosla, Pradeep; Stewart, David B.

    1993-01-01

    Reconfigurable, sensor-based control system uses state variables in systematic integration of reusable control modules. Designed for open-architecture hardware including many general-purpose microprocessors, each having own local memory plus access to global shared memory. Implemented in software as extension of Chimera II real-time operating system. Provides transparent computing mechanism for intertask communication between control modules and generic process-module architecture for multiprocessor realtime computation. Used to control robot arm. Proves useful in variety of other control and robotic applications.

  15. Multi-function magnetic jack control drive mechanism

    DOEpatents

    Bollinger, L.R.; Crawford, D.C.

    1983-10-06

    A multi-function magnetic jack control drive mechanism for controlling a nuclear reactor is provided. The mechanism includes an elongate pressure housing in which a plurality of closely spaced drive rods are located. Each drive rod is connected to a rod which is insertable in the reactor core. An electromechanical stationary latch device is provided which is actuatable to hold each drive rod stationary with respect to the pressure housing. An electromechanical movable latch device is also provided for each one of the drive rods. Each movable latch device is provided with a base and is actuatable to hold a respective drive rod stationary with respect to the base. An electromechanical lift device is further provided for each base which is actuatable for moving a respective base longitudinally along the pressure housing. In this manner, one or more drive rods can be moved in the pressure housing by sequentially and repetitively operating the electromechanical devices. Preferably, each latch device includes a pair of opposed latches which grip teeth located on the respective drive rod. Two, three, or four drive rods can be located symmetrically about the longitudinal axis of the pressure housing.

  16. Multi-function magnetic jack control drive mechanism

    DOEpatents

    Bollinger, Lawrence R.; Crawford, Donald C.

    1986-01-01

    A multi-function magnetic jack control drive mechanism for controlling a nuclear reactor is provided. The mechanism includes an elongate pressure housing in which a plurality of closely spaced drive rods are located. Each drive rod is connected to a rod which is insertable in the reactor core. An electromechanical stationary latch device is provided which is actuatable to hold each drive rod stationary with respect to the pressure housing. An electromechanical movable latch device is also provided for each one of the drive rods. Each movable latch device is provided with a base and is actuatable to hold a respective drive rod stationary with respect to the base. An electromechanical lift device is further provided for each base which is actuatable for moving a respective base longitudinally along the pressure housing. In this manner, one or more drive rods can be moved in the pressure housing by sequentially and repetitively operating the electromechanical devices. Preferably, each latch device includes a pair of opposed latches which grip teeth located on the respective drive rod. Two, three, or four drive rods can be located symmetrically about the longitudinal axis of the pressure housing.

  17. Power and energy ratios in mechanical CVT drive control

    NASA Astrophysics Data System (ADS)

    Balakin, P. D.; Stripling, L. O.

    2017-06-01

    Being based on the principle of providing the systems with adaptation property to the real parameters and operational condition, the mechanical system capable to control automatically the components of convertible power is offered and this allows providing stationary operation of the vehicle engine in the terms of variable external loading. This is achieved by drive control integrated in the power transmission, which implements an additional degree of freedom and operates on the basis of the laws of motion, with the energy of the main power flow by changing automatically the kinematic characteristics of the power transmission, this system being named CVT. The power and energy ratios found allow performing the necessary design calculations of the sections and the links of the mechanical CVT scheme.

  18. Dynamic Inversion based Control of a Docking Mechanism

    NASA Technical Reports Server (NTRS)

    Kulkarni, Nilesh V.; Ippolito, Corey; Krishnakumar, Kalmanje

    2006-01-01

    The problem of position and attitude control of the Stewart platform based docking mechanism is considered motivated by its future application in space missions requiring the autonomous docking capability. The control design is initiated based on the framework of the intelligent flight control architecture being developed at NASA Ames Research Center. In this paper, the baseline position and attitude control system is designed using dynamic inversion with proportional-integral augmentation. The inverse dynamics uses a Newton-Euler formulation that includes the platform dynamics, the dynamics of the individual legs along with viscous friction in the joints. Simulation results are presented using forward dynamics simulated by a commercial physics engine that builds the system as individual elements with appropriate joints and uses constrained numerical integration,

  19. Breathing mechanics during exercise with added dead space reflect mechanisms of ventilatory control.

    PubMed

    Wood, Helen E; Mitchell, Gordon S; Babb, Tony G

    2009-09-30

    Small increases in external dead space (V(D)) augment the exercise ventilatory response via a neural mechanism known as short-term modulation (STM). We hypothesized that breathing mechanics would differ during exercise, increased V(D) and STM. Men were studied at rest and during cycle exercise (10-50W) without (Control) and with added V(D) (200-600ml). With added V(D), V(T) increased via increased end-inspiratory lung volume (EILV), with no change in end-expiratory lung volume (EELV), indicating recruitment of inspiratory muscles only. With exercise, V(T) increased via both decreased EELV and increased EILV, indicating recruitment of both expiratory and inspiratory muscles. A significant interaction between the effects of exercise and V(D) on mean inspiratory flow indicated that the augmented exercise ventilatory response with added V(D) (i.e. STM) resulted from increased drive to the inspiratory muscles. These results reveal different patterns of respiratory muscle recruitment among experimental conditions. Hence, we conclude that fundamental differences exist in the neural control of ventilatory responses during exercise, increased V(D) and STM.

  20. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  1. Web accessibility and open source software.

    PubMed

    Obrenović, Zeljko

    2009-07-01

    A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long-term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities, for which existing browsers tend to provide only partial solutions. Although functionality for Web accessibility can be found as open source and free software components, their reuse and integration is complex because they were developed in diverse implementation environments, following standards and conventions incompatible with the Web. To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility. The first of these activities is the development of Adaptable Multi-Interface COmmunicator (AMICO):WEB, an infrastructure that facilitates efficient reuse and integration of open source software components into the Web environment. The main contribution of AMICO:WEB is in enabling the syntactic and semantic interoperability between Web extension mechanisms and a variety of integration mechanisms used by open source and free software components. Its design is based on our experiences in solving practical problems where we have used open source components to improve accessibility of rich media Web applications. The second of our activities involves improving education, where we have used our platform to teach students how to build advanced accessibility solutions from diverse open-source software. We are also partially involved in the recently started Eclipse projects called Accessibility Tools Framework (ACTF), the aim of which is development of extensible infrastructure, upon which developers can build a variety of utilities that help to evaluate and enhance the accessibility of applications and content for people with disabilities. In this article we briefly report on these activities.

  2. Control of cardiac alternans by mechanical and electrical feedback.

    PubMed

    Yapari, Felicia; Deshpande, Dipen; Belhamadia, Youssef; Dubljevic, Stevan

    2014-07-01

    A persistent alternation in the cardiac action potential duration has been linked to the onset of ventricular arrhythmia, which may lead to sudden cardiac death. A coupling between these cardiac alternans and the intracellular calcium dynamics has also been identified in previous studies. In this paper, the system of PDEs describing the small amplitude of alternans and the alternation of peak intracellular Ca(2+) are stabilized by optimal boundary and spatially distributed actuation. A simulation study demonstrating the successful annihilation of both alternans on a one-dimensional cable of cardiac cells by utilizing the full-state feedback controller is presented. Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. The coupled model includes the active stress which defines the mechanical properties of the tissue and is utilized in the feedback algorithm as an independent input from the pacing based controller realization in alternans annihilation. Simulation studies of both control methods demonstrate that the proposed methods can successfully annihilate alternans in cables that are significantly longer than 1 cm, thus overcoming the limitations of earlier control efforts.

  3. Channel Access in Erlang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less

  4. Biometrics: Accessibility challenge or opportunity?

    PubMed

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  5. Biometrics: Accessibility challenge or opportunity?

    PubMed Central

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  6. Control of Maillard Reactions in Foods: Strategies and Chemical Mechanisms.

    PubMed

    Lund, Marianne N; Ray, Colin A

    2017-06-14

    Maillard reactions lead to changes in food color, organoleptic properties, protein functionality, and protein digestibility. Numerous different strategies for controlling Maillard reactions in foods have been attempted during the past decades. In this paper, recent advances in strategies for controlling the Maillard reaction and subsequent downstream reaction products in food systems are critically reviewed. The underlying mechanisms at play are presented, strengths and weaknesses of each strategy are discussed, and reasonable reaction mechanisms are proposed to reinforce the evaluations. The review includes strategies involving addition of functional ingredients, such as plant polyphenols and vitamins, as well as enzymes. The resulting trapping or modification of Maillard targets, reactive intermediates, and advanced glycation endproducts (AGEs) are presented with their potential unwanted side effects. Finally, recent advances in processing for control of Maillard reactions are discussed.

  7. 49 CFR 38.125 - Mobility aid accessibility.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... mechanical, electrical or other system operates to ensure that cars do not move when the lift is in use. (3... SPECIFICATIONS FOR TRANSPORTATION VEHICLES Intercity Rail Cars and Systems § 38.125 Mobility aid accessibility. (a)(1) General. All intercity rail cars, other than level entry cars, required to be accessible by...

  8. 49 CFR 38.125 - Mobility aid accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... mechanical, electrical or other system operates to ensure that cars do not move when the lift is in use. (3... SPECIFICATIONS FOR TRANSPORTATION VEHICLES Intercity Rail Cars and Systems § 38.125 Mobility aid accessibility. (a)(1) General. All intercity rail cars, other than level entry cars, required to be accessible by...

  9. 49 CFR 38.125 - Mobility aid accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... mechanical, electrical or other system operates to ensure that cars do not move when the lift is in use. (3... SPECIFICATIONS FOR TRANSPORTATION VEHICLES Intercity Rail Cars and Systems § 38.125 Mobility aid accessibility. (a)(1) General. All intercity rail cars, other than level entry cars, required to be accessible by...

  10. 49 CFR 38.95 - Mobility aid accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SPECIFICATIONS FOR TRANSPORTATION VEHICLES Commuter Rail Cars and Systems § 38.95 Mobility aid accessibility... rail cars, other than level entry cars, covered by this subpart shall provide a level-change mechanism... accessible, or mini-high platforms complying with § 38.93(d) are provided, the car is not required to be...

  11. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    NASA Astrophysics Data System (ADS)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  12. Fluid Mechanics of Wing Adaptation for Separation Control

    NASA Technical Reports Server (NTRS)

    Chandrasekhara, M. S.; Wilder, M. C.; Carr, L. W.; Davis, Sanford S. (Technical Monitor)

    1997-01-01

    The unsteady fluid mechanics associated with use of a dynamically deforming leading edge airfoil for achieving compressible flow separation control has been experimentally studied. Changing the leading edge curvature at rapid rates dramatically alters the flow vorticity dynamics which is responsible for the many effects observed in the flow.

  13. The impact of free access to the scientific literature: a review of recent research.

    PubMed

    Davis, Philip M; Walters, William H

    2011-07-01

    The paper reviews recent studies that evaluate the impact of free access (open access) on the behavior of scientists as authors, readers, and citers in developed and developing nations. It also examines the extent to which the biomedical literature is used by the general public. The paper is a critical review of the literature, with systematic description of key studies. Researchers report that their access to the scientific literature is generally good and improving. For authors, the access status of a journal is not an important consideration when deciding where to publish. There is clear evidence that free access increases the number of article downloads, although its impact on article citations is not clear. Recent studies indicate that large citation advantages are simply artifacts of the failure to adequately control for confounding variables. The effect of free access on the general public's use of the primary medical literature has not been thoroughly evaluated. Recent studies provide little evidence to support the idea that there is a crisis in access to the scholarly literature. Further research is needed to investigate whether free access is making a difference in non-research contexts and to better understand the dissemination of scientific literature through peer-to-peer networks and other informal mechanisms.

  14. The impact of free access to the scientific literature: a review of recent research

    PubMed Central

    Walters, William H

    2011-01-01

    Objectives: The paper reviews recent studies that evaluate the impact of free access (open access) on the behavior of scientists as authors, readers, and citers in developed and developing nations. It also examines the extent to which the biomedical literature is used by the general public. Method: The paper is a critical review of the literature, with systematic description of key studies. Results: Researchers report that their access to the scientific literature is generally good and improving. For authors, the access status of a journal is not an important consideration when deciding where to publish. There is clear evidence that free access increases the number of article downloads, although its impact on article citations is not clear. Recent studies indicate that large citation advantages are simply artifacts of the failure to adequately control for confounding variables. The effect of free access on the general public's use of the primary medical literature has not been thoroughly evaluated. Conclusions: Recent studies provide little evidence to support the idea that there is a crisis in access to the scholarly literature. Further research is needed to investigate whether free access is making a difference in non-research contexts and to better understand the dissemination of scientific literature through peer-to-peer networks and other informal mechanisms. PMID:21753913

  15. Multi-finger prehension: control of a redundant mechanical system.

    PubMed

    Latash, Mark L; Zatsiorsky, Vladimir M

    2009-01-01

    The human hand has been a fascinating object of study for researchers in both biomechanics and motor control. Studies of human prehension have contributed significantly to the progress in addressing the famous problem of motor redundancy. After a brief review of the hand mechanics, we present results of recent studies that support a general view that the apparently redundant design of the hand is not a source of computational problems but a rich apparatus that allows performing a variety of tasks in a reliable and flexible way (the principle of abundance). Multi-digit synergies have been analyzed at two levels of a hypothetical hierarchy involved in the control of prehensile actions. At the upper level, forces and moments produced by the thumb and virtual finger (an imagined finger with a mechanical action equal to the combined mechanical action of all four fingers of the hand) co-vary to stabilize the gripping action and the orientation of the hand-held object. These results support the principle of superposition suggested earlier in robotics with respect to the control of artificial grippers. At the lower level of the hierarchy, forces and moments produced by individual fingers co-vary to stabilize the magnitude and direction of the force vector and the moment of force produced by the virtual finger. Adjustments to changes in task constraints (such as, for example, friction under individual digits) may be local and synergic. The latter reflect multi-digit prehension synergies and may be analyzed with the so-called chain effects: Sequences of relatively straightforward cause-effect links directly related to mechanical constraints leading to non-trivial strong co-variation between pairs of elemental variables. Analysis of grip force adjustments during motion of hand-held objects suggests that the central nervous system adjusts to gravitational and inertial loads differently. The human hand is a gold mine for researchers interested in the control of natural human

  16. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  17. Cardea: Providing Support for Dynamic Resource Access in a Distributed Computing Environment

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2003-01-01

    The environment framing the modem authorization process span domains of administration, relies on many different authentication sources, and manages complex attributes as part of the authorization process. Cardea facilitates dynamic access control within this environment as a central function of an inter-operable authorization framework. The system departs from the traditional authorization model by separating the authentication and authorization processes, distributing the responsibility for authorization data and allowing collaborating domains to retain control over their implementation mechanisms. Critical features of the system architecture and its handling of the authorization process differentiate the system from existing authorization components by addressing common needs not adequately addressed by existing systems. Continuing system research seeks to enhance the implementation of the current authorization model employed in Cardea, increase the robustness of current features, further the framework for establishing trust and promote interoperability with existing security mechanisms.

  18. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  19. Analysis of Noise Mechanisms in Cell-Size Control.

    PubMed

    Modi, Saurabh; Vargas-Garcia, Cesar Augusto; Ghusinga, Khem Raj; Singh, Abhyudai

    2017-06-06

    At the single-cell level, noise arises from multiple sources, such as inherent stochasticity of biomolecular processes, random partitioning of resources at division, and fluctuations in cellular growth rates. How these diverse noise mechanisms combine to drive variations in cell size within an isoclonal population is not well understood. Here, we investigate the contributions of different noise sources in well-known paradigms of cell-size control, such as adder (division occurs after adding a fixed size from birth), sizer (division occurs after reaching a size threshold), and timer (division occurs after a fixed time from birth). Analysis reveals that variation in cell size is most sensitive to errors in partitioning of volume among daughter cells, and not surprisingly, this process is well regulated among microbes. Moreover, depending on the dominant noise mechanism, different size-control strategies (or a combination of them) provide efficient buffering of size variations. We further explore mixer models of size control, where a timer phase precedes/follows an adder, as has been proposed in Caulobacter crescentus. Although mixing a timer and an adder can sometimes attenuate size variations, it invariably leads to higher-order moments growing unboundedly over time. This results in a power-law distribution for the cell size, with an exponent that depends inversely on the noise in the timer phase. Consistent with theory, we find evidence of power-law statistics in the tail of C. crescentus cell-size distribution, although there is a discrepancy between the observed power-law exponent and that predicted from the noise parameters. The discrepancy, however, is removed after data reveal that the size added by individual newborns in the adder phase itself exhibits power-law statistics. Taken together, this study provides key insights into the role of noise mechanisms in size homeostasis, and suggests an inextricable link between timer-based models of size control and

  20. Compulsory Licenses for Cancer Drugs: Does Circumventing Patent Rights Improve Access to Oncology Medications?

    PubMed Central

    Bognar, Cinthia Leite Frizzera Borges; Bychkovsky, Brittany L.

    2016-01-01

    Worldwide, there are enormous inequities in cancer control that cause poor outcomes among patients with cancer who live in low- and middle-income countries (LMICs). One of the biggest challenges that oncology faces today is how to increase patient access to expensive, but life-saving, therapies in LMICs. Access to cancer medications in LMICs is a major problem, especially in recent years, as the costs of these therapies continue to rise exponentially. One mechanism available to LMICs to improve access to cancer medications allows a country to pursue a compulsory license for a given drug. Here, we will review how the legal framework in the World Trade Organization's Trade-Related Aspects of Intellectual Property Rights Agreement and the Doha Declaration supports countries to circumvent patent laws and acquire compulsory licenses for essential medicines. We will also discuss the current and future role of compulsory licenses in oncology and how compulsory licenses may improve access to cancer drugs in LMICs. PMID:28717715

  1. The JPL telerobotic Manipulator Control and Mechanization (MCM) subsystem

    NASA Technical Reports Server (NTRS)

    Hayati, Samad; Lee, Thomas S.; Tso, Kam; Backes, Paul; Kan, Edwin; Lloyd, J.

    1989-01-01

    The Manipulator Control and Mechanization (MCM) subsystem of the telerobot system provides the real-time control of the robot manipulators in autonomous and teleoperated modes and real time input/output for a variety of sensors and actuators. Substantial hardware and software are included in this subsystem which interfaces in the hierarchy of the telerobot system with the other subsystems. The other subsystems are: run time control, task planning and reasoning, sensing and perception, and operator control subsystem. The architecture of the MCM subsystem, its capabilities, and details of various hardware and software elements are described. Important improvements in the MCM subsystem over the first version are: dual arm coordinated trajectory generation and control, addition of integrated teleoperation, shared control capability, replacement of the ultimate controllers with motor controllers, and substantial increase in real time processing capability.

  2. Early access programs: Benefits, challenges, and key considerations for successful implementation

    PubMed Central

    Patil, Sanjaykumar

    2016-01-01

    Early access programs, (EAPs) are adopted by an increasing number of pharma companies due to several benefits offered by these programs. EAPs offer ethical, compliant, and controlled mechanisms of access to investigational drugs outside of the clinical trial space and before the commercial launch of the drug, to patients with life-threatening diseases having no treatment options available. In addition to the development of positive relationships with key opinion leaders (KOL), patients, advocacy groups and regulators, the data captured from the implementation of EAPs supports in the formulation of global commercialization strategies. This white paper outlines various circumstances to be considered for the implementation of EAPs named patient programs, the regulatory landscape, the benefits and challenges associated with implementing these programs and the key considerations for their successful implementation. PMID:26955570

  3. Universal mechanisms of sound production and control in birds and mammals.

    PubMed

    Elemans, C P H; Rasmussen, J H; Herbst, C T; Düring, D N; Zollinger, S A; Brumm, H; Srivastava, K; Svane, N; Ding, M; Larsen, O N; Sober, S J; Švec, J G

    2015-11-27

    As animals vocalize, their vocal organ transforms motor commands into vocalizations for social communication. In birds, the physical mechanisms by which vocalizations are produced and controlled remain unresolved because of the extreme difficulty in obtaining in vivo measurements. Here, we introduce an ex vivo preparation of the avian vocal organ that allows simultaneous high-speed imaging, muscle stimulation and kinematic and acoustic analyses to reveal the mechanisms of vocal production in birds across a wide range of taxa. Remarkably, we show that all species tested employ the myoelastic-aerodynamic (MEAD) mechanism, the same mechanism used to produce human speech. Furthermore, we show substantial redundancy in the control of key vocal parameters ex vivo, suggesting that in vivo vocalizations may also not be specified by unique motor commands. We propose that such motor redundancy can aid vocal learning and is common to MEAD sound production across birds and mammals, including humans.

  4. Integrated semiconductor-magnetic random access memory system

    NASA Technical Reports Server (NTRS)

    Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)

    2001-01-01

    The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.

  5. Privacy aware access controls for medical data disclosure on European healthgrids.

    PubMed

    Rahmouni, Hanene Boussi; Solomonides, Tony; Mont, Marco Casassa; Shiu, Simon

    2010-01-01

    To be processed within a healthgrid environment, medical data goes through a complete lifecycle and several stages until it is finally used for the primary reason it has been collected for. This stage is not always the final occurrence of when the data would have been manipulated. The data could rather continue to be needed for secondary purposes of legitimate or non legitimate nature. Although other privacy issues are related to the processing of patient data while it is residing on a healthgrid environment, the control of data disclosure is our primary interest. When sharing medical data between different Healthcare and biomedical research organizations in Europe, it is important that the different parties involved in the sharing handle the data in the same way indicated by the legislation of the member state where the data was originally collected as the requirements might differ from one state to another. Privacy requirements, such as patient consent, may be subject to conflicting conditions between different national frameworks as well as between different legal and ethical frameworks within a single member state. These circumstances have made the compliance management process in European healthgrid very challenging. In this paper we are presenting an approach to tackle these issues by relying on several technologies contained in the semantic web stack. Our work suggests a direct mapping from high level legislation on privacy and data protection to operational level privacy aware controls. Additionally we suggest an architecture for the enforcement of these controls on access control models adopted by healthgrids security infrastructures.

  6. Mechanical Response of DNA–Nanoparticle Crystals to Controlled Deformation

    DOE PAGES

    Lequieu, Joshua; Córdoba, Andrés; Hinckley, Daniel; ...

    2016-08-17

    The self-assembly of DNA-conjugated nanoparticles represents a promising avenue toward the design of engineered hierarchical materials. By using DNA to encode nanoscale interactions, macroscale crystals can be formed with mechanical properties that can, at least in principle, be tuned. Here we present in silico evidence that the mechanical response of these assemblies can indeed be controlled, and that subtle modifications of the linking DNA sequences can change the Young’s modulus from 97 kPa to 2.1 MPa. We rely on a detailed molecular model to quantify the energetics of DNA–nanoparticle assembly and demonstrate that the mechanical response is governed by entropic,more » rather than enthalpic, contributions and that the response of the entire network can be estimated from the elastic properties of an individual nanoparticle. The results here provide a first step toward the mechanical characterization of DNA–nanoparticle assemblies, and suggest the possibility of mechanical metamaterials constructed using DNA.« less

  7. Mechanical Response of DNA–Nanoparticle Crystals to Controlled Deformation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lequieu, Joshua; Córdoba, Andrés; Hinckley, Daniel

    The self-assembly of DNA-conjugated nanoparticles represents a promising avenue toward the design of engineered hierarchical materials. By using DNA to encode nanoscale interactions, macroscale crystals can be formed with mechanical properties that can, at least in principle, be tuned. Here we present in silico evidence that the mechanical response of these assemblies can indeed be controlled, and that subtle modifications of the linking DNA sequences can change the Young’s modulus from 97 kPa to 2.1 MPa. We rely on a detailed molecular model to quantify the energetics of DNA–nanoparticle assembly and demonstrate that the mechanical response is governed by entropic,more » rather than enthalpic, contributions and that the response of the entire network can be estimated from the elastic properties of an individual nanoparticle. The results here provide a first step toward the mechanical characterization of DNA–nanoparticle assemblies, and suggest the possibility of mechanical metamaterials constructed using DNA.« less

  8. Innovative dressing and securement of tunneled central venous access devices in pediatrics: a pilot randomized controlled trial.

    PubMed

    Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2017-08-30

    Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture

  9. EU accession: A policy window opportunity for nursing?

    PubMed

    De Raeve, Paul; Rafferty, Anne-Marie; Bariball, Louise; Young, Ruth; Boiko, Olga

    2017-03-01

    European enlargement has been studied in a wide range of policy areas within and beyond health. Yet the impact of EU enlargement upon one of the largest health professions, nursing, has been largely neglected. This paper aims to explore nurse leadership using a comparative case study method in two former Communist countries, Romania and Croatia. Specifically, it considers the extent to which engagement in the EU accession policy-making process provided a policy window for the leaders to formulate and implement a professional agenda while negotiating EU accession. Findings of qualitative interviews and documentary analysis indicate that the mechanisms used to facilitate the accession process were not successful in achieving compliance with the education standards in the Community Acquis, as highlighted in the criteria on the mutual recognition of professional qualifications set out in Directive 2005/36/EC. EU accession capacity building and accession funds were not deployed efficiently to upgrade Romanian and Croatian nursing education towards meeting EU standards. Conflicting views on accession held by the various nursing stakeholders (nursing regulator, nursing union, governmental chief nurse and the professional association) inhibited the setting of a common policy agenda to achieve compliance with EU standards. The study findings suggest a need to critically review EU accession mechanisms and better align leadership at all governance levels. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. An Extended Role-Based Access Control Model for Delegating Obligations

    NASA Astrophysics Data System (ADS)

    Ben-Ghorbel-Talbi, Meriam; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Bouhoula, Adel

    The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the administration and delegation of obligations. Managing such delegations implies more requirements than managing traditional privileges delegation. In fact, delegating obligations may include two interpretations: the delegation of the obligation and the delegation of the responsibility related to this obligation. Therefore, it is important to deal with these two notions separately. Moreover, since delegating an obligation involves the delegation of sanctions, then the consent of the user who receives this delegation may be required in some cases. We address in this paper these requirements and we propose a formalism to deal with them.

  11. Automatic control of arterial carbon dioxide tension in mechanically ventilated patients.

    PubMed

    Fernando, Tyrone; Cade, John; Packer, John

    2002-12-01

    This paper presents a method of controlling the arterial carbon dioxide tension of patients receiving mechanical ventilation. Controlling of the CO2 tension is achieved by regulating the ventilator initiated breath frequency and also volume per breath.

  12. Quasivelocities and Optimal Control for underactuated Mechanical Systems

    NASA Astrophysics Data System (ADS)

    Colombo, L.; de Diego, D. Martín

    2010-07-01

    This paper is concerned with the application of the theory of quasivelocities for optimal control for underactuated mechanical systems. Using this theory, we convert the original problem in a variational second-order lagrangian system subjected to constraints. The equations of motion are geometrically derived using an adaptation of the classical Skinner and Rusk formalism.

  13. Quasivelocities and Optimal Control for underactuated Mechanical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Colombo, L.; Martin de Diego, D.

    2010-07-28

    This paper is concerned with the application of the theory of quasivelocities for optimal control for underactuated mechanical systems. Using this theory, we convert the original problem in a variational second-order lagrangian system subjected to constraints. The equations of motion are geometrically derived using an adaptation of the classical Skinner and Rusk formalism.

  14. Newly Identified Wild Rice Accessions Conferring High Salt Tolerance Might Use a Tissue Tolerance Mechanism in Leaf.

    PubMed

    Prusty, Manas R; Kim, Sung-Ryul; Vinarao, Ricky; Entila, Frederickson; Egdane, James; Diaz, Maria G Q; Jena, Kshirod K

    2018-01-01

    Cultivated rice ( Oryza sativa L.) is very sensitive to salt stress. So far a few rice landraces have been identified as a source of salt tolerance and utilized in rice improvement. These tolerant lines primarily use Na + exclusion mechanism in root which removes Na + from the xylem stream by membrane Na + and K + transporters, and resulted in low Na + accumulation in shoot. Identification of a new donor source conferring high salt tolerance is imperative. Wild relatives of rice having wide genetic diversity are regarded as a potential source for crop improvement. However, they have been less exploited against salt stress. Here, we simultaneously evaluated all 22 wild Oryza species along with the cultivated tolerant lines including Pokkali, Nona Bokra, and FL478, and sensitive check varieties under high salinity (240 mM NaCl). Based on the visual salt injury score, three species ( O . alta, O . latifolia , and O . coarctata ) and four species ( O . rhizomatis, O . eichingeri, O . minuta , and O . grandiglumis ) showed higher and similar level of tolerance compared to the tolerant checks, respectively. All three CCDD genome species exhibited salt tolerance, suggesting that the CCDD genome might possess the common genetic factors for salt tolerance. Physiological and biochemical experiments were conducted using the newly isolated tolerant species together with checks under 180 mM NaCl. Interestingly, all wild species showed high Na + concentration in shoot and low concentration in root unlike the tolerant checks. In addition, the wild-tolerant accessions showed a tendency of a high tissue tolerance in leaf, low malondialdehyde level in shoot, and high retention of chlorophyll in the young leaves. These results suggest that the wild species employ tissue tolerance mechanism to manage salt stress. Gene expression analyses of the key salt tolerance-related genes suggested that high Na + in leaf of wild species might be affected by OsHKT1;4 -mediated Na + exclusion in

  15. Newly Identified Wild Rice Accessions Conferring High Salt Tolerance Might Use a Tissue Tolerance Mechanism in Leaf

    PubMed Central

    Prusty, Manas R.; Kim, Sung-Ryul; Vinarao, Ricky; Entila, Frederickson; Egdane, James; Diaz, Maria G. Q.; Jena, Kshirod K.

    2018-01-01

    Cultivated rice (Oryza sativa L.) is very sensitive to salt stress. So far a few rice landraces have been identified as a source of salt tolerance and utilized in rice improvement. These tolerant lines primarily use Na+ exclusion mechanism in root which removes Na+ from the xylem stream by membrane Na+ and K+ transporters, and resulted in low Na+ accumulation in shoot. Identification of a new donor source conferring high salt tolerance is imperative. Wild relatives of rice having wide genetic diversity are regarded as a potential source for crop improvement. However, they have been less exploited against salt stress. Here, we simultaneously evaluated all 22 wild Oryza species along with the cultivated tolerant lines including Pokkali, Nona Bokra, and FL478, and sensitive check varieties under high salinity (240 mM NaCl). Based on the visual salt injury score, three species (O. alta, O. latifolia, and O. coarctata) and four species (O. rhizomatis, O. eichingeri, O. minuta, and O. grandiglumis) showed higher and similar level of tolerance compared to the tolerant checks, respectively. All three CCDD genome species exhibited salt tolerance, suggesting that the CCDD genome might possess the common genetic factors for salt tolerance. Physiological and biochemical experiments were conducted using the newly isolated tolerant species together with checks under 180 mM NaCl. Interestingly, all wild species showed high Na+ concentration in shoot and low concentration in root unlike the tolerant checks. In addition, the wild-tolerant accessions showed a tendency of a high tissue tolerance in leaf, low malondialdehyde level in shoot, and high retention of chlorophyll in the young leaves. These results suggest that the wild species employ tissue tolerance mechanism to manage salt stress. Gene expression analyses of the key salt tolerance-related genes suggested that high Na+ in leaf of wild species might be affected by OsHKT1;4-mediated Na+ exclusion in leaf and the following Na

  16. Oscillatory mechanisms of process binding in memory.

    PubMed

    Klimesch, Wolfgang; Freunberger, Roman; Sauseng, Paul

    2010-06-01

    A central topic in cognitive neuroscience is the question, which processes underlie large scale communication within and between different neural networks. The basic assumption is that oscillatory phase synchronization plays an important role for process binding--the transient linking of different cognitive processes--which may be considered a special type of large scale communication. We investigate this question for memory processes on the basis of different types of oscillatory synchronization mechanisms. The reviewed findings suggest that theta and alpha phase coupling (and phase reorganization) reflect control processes in two large memory systems, a working memory and a complex knowledge system that comprises semantic long-term memory. It is suggested that alpha phase synchronization may be interpreted in terms of processes that coordinate top-down control (a process guided by expectancy to focus on relevant search areas) and access to memory traces (a process leading to the activation of a memory trace). An analogous interpretation is suggested for theta oscillations and the controlled access to episodic memories. Copyright (c) 2009 Elsevier Ltd. All rights reserved.

  17. Universal mechanisms of sound production and control in birds and mammals

    PubMed Central

    Elemans, C.P.H; Rasmussen, J.H.; Herbst, C.T.; Düring, D.N.; Zollinger, S.A.; Brumm, H.; Srivastava, K.; Svane, N.; Ding, M.; Larsen, O.N.; Sober, S.J.; Švec, J.G.

    2015-01-01

    As animals vocalize, their vocal organ transforms motor commands into vocalizations for social communication. In birds, the physical mechanisms by which vocalizations are produced and controlled remain unresolved because of the extreme difficulty in obtaining in vivo measurements. Here, we introduce an ex vivo preparation of the avian vocal organ that allows simultaneous high-speed imaging, muscle stimulation and kinematic and acoustic analyses to reveal the mechanisms of vocal production in birds across a wide range of taxa. Remarkably, we show that all species tested employ the myoelastic-aerodynamic (MEAD) mechanism, the same mechanism used to produce human speech. Furthermore, we show substantial redundancy in the control of key vocal parameters ex vivo, suggesting that in vivo vocalizations may also not be specified by unique motor commands. We propose that such motor redundancy can aid vocal learning and is common to MEAD sound production across birds and mammals, including humans. PMID:26612008

  18. Atypical Opioid Mechanisms of Control of Injury-Induced Cutaneous Pain by Delta Receptors

    DTIC Science & Technology

    2017-07-01

    AWARD NUMBER: W81XWH-15-1-0076 TITLE: Atypical Opioid Mechanisms of Control of Injury-Induced Cutaneous Pain by Delta Receptors PRINCIPAL...subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT...SUBTITLE Atypical Opioid Mechanisms of Control of Injury-Induced 5a. CONTRACT NUMBER Cutaneous Pain by Delta Receptors 5b. GRANT NUMBER 5c. PROGRAM

  19. Neural mechanisms underlying cognitive control of men with lifelong antisocial behavior.

    PubMed

    Schiffer, Boris; Pawliczek, Christina; Mu Ller, Bernhard; Forsting, Michael; Gizewski, Elke; Leygraf, Norbert; Hodgins, Sheilagh

    2014-04-30

    Results of meta-analyses suggested subtle deficits in cognitive control among antisocial individuals. Because almost all studies focused on children with conduct problems or adult psychopaths, however, little is known about cognitive control mechanisms among the majority of persistent violent offenders who present an antisocial personality disorder (ASPD). The present study aimed to determine whether offenders with ASPD, relative to non-offenders, display dysfunction in the neural mechanisms underlying cognitive control and to assess the extent to which these dysfunctions are associated with psychopathic traits and trait impulsivity. Participants comprised 21 violent offenders and 23 non-offenders who underwent event-related functional magnetic resonance imaging while performing a non-verbal Stroop task. The offenders, relative to the non-offenders, exhibited reduced response time interference and a different pattern of conflict- and error-related activity in brain areas involved in cognitive control, attention, language, and emotion processing, that is, the anterior cingulate, dorsolateral prefrontal, superior temporal and postcentral cortices, putamen, thalamus, and amygdala. Moreover, between-group differences in behavioural and neural responses revealed associations with core features of psychopathy and attentional impulsivity. Thus, the results of the present study confirmed the hypothesis that offenders with ASPD display alterations in the neural mechanisms underlying cognitive control and that those alterations relate, at least in part, to personality characteristics. Copyright © 2014. Published by Elsevier Ireland Ltd.

  20. Limb Dominance Results from Asymmetries in Predictive and Impedance Control Mechanisms

    PubMed Central

    Yadav, Vivek; Sainburg, Robert L.

    2014-01-01

    Handedness is a pronounced feature of human motor behavior, yet the underlying neural mechanisms remain unclear. We hypothesize that motor lateralization results from asymmetries in predictive control of task dynamics and in control of limb impedance. To test this hypothesis, we present an experiment with two different force field environments, a field with a predictable magnitude that varies with the square of velocity, and a field with a less predictable magnitude that varies linearly with velocity. These fields were designed to be compatible with controllers that are specialized in predicting limb and task dynamics, and modulating position and velocity dependent impedance, respectively. Because the velocity square field does not change the form of the equations of motion for the reaching arm, we reasoned that a forward dynamic-type controller should perform well in this field, while control of linear damping and stiffness terms should be less effective. In contrast, the unpredictable linear field should be most compatible with impedance control, but incompatible with predictive dynamics control. We measured steady state final position accuracy and 3 trajectory features during exposure to these fields: Mean squared jerk, Straightness, and Movement time. Our results confirmed that each arm made straighter, smoother, and quicker movements in its compatible field. Both arms showed similar final position accuracies, which were achieved using more extensive corrective sub-movements when either arm performed in its incompatible field. Finally, each arm showed limited adaptation to its incompatible field. Analysis of the dependence of trajectory errors on field magnitude suggested that dominant arm adaptation occurred by prediction of the mean field, thus exploiting predictive mechanisms for adaptation to the unpredictable field. Overall, our results support the hypothesis that motor lateralization reflects asymmetries in specific motor control mechanisms associated

  1. Controllable Growth and Formation Mechanisms of Dislocated WS2 Spirals.

    PubMed

    Fan, Xiaopeng; Zhao, Yuzhou; Zheng, Weihao; Li, Honglai; Wu, Xueping; Hu, Xuelu; Zhang, Xuehong; Zhu, Xiaoli; Zhang, Qinglin; Wang, Xiao; Yang, Bin; Chen, Jianghua; Jin, Song; Pan, Anlian

    2018-06-13

    Two-dimensional (2D) layered metal dichalcogenides can form spiral nanostructures by a screw-dislocation-driven mechanism, which leads to changes in crystal symmetry and layer stackings that introduce attractive physical properties different from their bulk and few-layer nanostructures. However, controllable growth of spirals is challenging and their growth mechanisms are poorly understood. Here, we report the controllable growth of WS 2 spiral nanoplates with different stackings by a vapor phase deposition route and investigate their formation mechanisms by combining atomic force microscopy with second harmonic generation imaging. Previously not observed "spiral arm" features could be explained as covered dislocation spiral steps, and the number of spiral arms correlates with the number of screw dislocations initiated at the bottom plane. The supersaturation-dependent growth can generate new screw dislocations from the existing layers, or even new layers templated by existing screw dislocations. Different number of dislocations and orientation of new layers result in distinct morphologies, different layer stackings, and more complex nanostructures, such as triangular spiral nanoplates with hexagonal spiral pattern on top. This work provides the understanding and control of dislocation-driven growth of 2D nanostructures. These spiral nanostructures offer diverse candidates for probing the physical properties of layered materials and exploring new applications in functional nanoelectronic and optoelectronic devices.

  2. Scaling the Drosophila Wing: TOR-Dependent Target Gene Access by the Hippo Pathway Transducer Yorkie

    PubMed Central

    Parker, Joseph; Struhl, Gary

    2015-01-01

    Organ growth is controlled by patterning signals that operate locally (e.g., Wingless/Ints [Wnts], Bone Morphogenetic Proteins [BMPs], and Hedgehogs [Hhs]) and scaled by nutrient-dependent signals that act systemically (e.g., Insulin-like peptides [ILPs] transduced by the Target of Rapamycin [TOR] pathway). How cells integrate these distinct inputs to generate organs of the appropriate size and shape is largely unknown. The transcriptional coactivator Yorkie (Yki, a YES-Associated Protein, or YAP) acts downstream of patterning morphogens and other tissue-intrinsic signals to promote organ growth. Yki activity is regulated primarily by the Warts/Hippo (Wts/Hpo) tumour suppressor pathway, which impedes nuclear access of Yki by a cytoplasmic tethering mechanism. Here, we show that the TOR pathway regulates Yki by a separate and novel mechanism in the Drosophila wing. Instead of controlling Yki nuclear access, TOR signaling governs Yki action after it reaches the nucleus by allowing it to gain access to its target genes. When TOR activity is inhibited, Yki accumulates in the nucleus but is sequestered from its normal growth-promoting target genes—a phenomenon we term “nuclear seclusion.” Hence, we posit that in addition to its well-known role in stimulating cellular metabolism in response to nutrients, TOR also promotes wing growth by liberating Yki from nuclear seclusion, a parallel pathway that we propose contributes to the scaling of wing size with nutrient availability. PMID:26474042

  3. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    NASA Astrophysics Data System (ADS)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  4. Experimental and numerical investigation of a phase-only control mechanism in the linear intensity regime.

    PubMed

    Brühl, Elisabeth; Buckup, Tiago; Motzkus, Marcus

    2018-06-07

    Mechanisms and optimal experimental conditions in coherent control still intensely stimulate debates. In this work, a phase-only control mechanism in an open quantum system is investigated experimentally and numerically. Several parameterizations for femtosecond pulse shaping (combination of chirp and multipulses) are exploited in transient absorption of a prototype organic molecule to control population and vibrational coherence in ground and excited states. Experimental results are further numerically simulated and corroborated with a four-level density-matrix model, which reveals a phase-only control mechanism based on the interaction between the tailored phase of the excitation pulse and the induced transient absorption. In spite of performing experiment and numerical simulations in the linear regime of excitation, the control effect amplitude depends non-linearly on the excitation energy and is explained as a pump-dump control mechanism. No evidence of single-photon control is observed with the model. Moreover, our results also show that the control effect on the population and vibrational coherence is highly dependent on the spectral detuning of the excitation spectrum. Contrary to the popular belief in coherent control experiments, spectrally resonant tailored excitation will lead to the control of the excited state only for very specific conditions.

  5. Mechanical control of tissue and organ development

    PubMed Central

    Mammoto, Tadanori; Ingber, Donald E.

    2010-01-01

    Many genes and molecules that drive tissue patterning during organogenesis and tissue regeneration have been discovered. Yet, we still lack a full understanding of how these chemical cues induce the formation of living tissues with their unique shapes and material properties. Here, we review work based on the convergence of physics, engineering and biology that suggests that mechanical forces generated by living cells are as crucial as genes and chemical signals for the control of embryological development, morphogenesis and tissue patterning. PMID:20388652

  6. Mechanically controllable break junctions for molecular electronics.

    PubMed

    Xiang, Dong; Jeong, Hyunhak; Lee, Takhee; Mayer, Dirk

    2013-09-20

    A mechanically controllable break junction (MCBJ) represents a fundamental technique for the investigation of molecular electronic junctions, especially for the study of the electronic properties of single molecules. With unique advantages, the MCBJ technique has provided substantial insight into charge transport processes in molecules. In this review, the techniques for sample fabrication, operation and the various applications of MCBJs are introduced and the history, challenges and future of MCBJs are discussed. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Control and regulatory mechanisms associated with thermogenesis in flying insects and birds.

    PubMed

    Loli, Denise; Bicudo, José Eduardo P W

    2005-01-01

    Most insects and birds are able to fly. The chitin made exoskeleton of insects poses them several constraints, and this is one the reasons they are in general small sized animals. On the other hand, because birds possess an endoskeleton made of bones they may grow much larger when compared to insects. The two taxa are quite different with regards to their general "design" platform, in particular with respect to their respiratory and circulatory systems. However, because they fly, they may share in common several traits, namely those associated with the control and regulatory mechanisms governing thermogenesis. High core temperatures are essential for animal flight irrespective of the taxa they belong to. Birds and insects have thus evolved mechanisms which allowed them to control and regulate high rates of heat fluxes. This article discusses possible convergent thermogenic control and regulatory mechanisms associated with flight in insects and birds.

  8. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  9. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  10. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  11. Expanding the enzyme universe: accessing non-natural reactions by mechanism-guided directed evolution.

    PubMed

    Renata, Hans; Wang, Z Jane; Arnold, Frances H

    2015-03-09

    High selectivity and exquisite control over the outcome of reactions entice chemists to use biocatalysts in organic synthesis. However, many useful reactions are not accessible because they are not in nature's known repertoire. In this Review, we outline an evolutionary approach to engineering enzymes to catalyze reactions not found in nature. We begin with examples of how nature has discovered new catalytic functions and how such evolutionary progression has been recapitulated in the laboratory starting from extant enzymes. We then examine non-native enzyme activities that have been exploited for chemical synthesis, with an emphasis on reactions that do not have natural counterparts. Non-natural activities can be improved by directed evolution, thus mimicking the process used by nature to create new catalysts. Finally, we describe the discovery of non-native catalytic functions that may provide future opportunities for the expansion of the enzyme universe. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Universal programming interface with concurrent access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alferov, Oleg

    2004-10-07

    There exist a number of devices with a positioning nature of operation, such as mechanical linear stages, temperature controllers, or filterwheels with discrete state, and most of them have different programming interfaces. The Universal Positioner software suggests the way to handle all of them is with a single approach, whereby a particular hardware driver is created from the template and by translating the actual commands used by the hardware to and from the universal programming interface. The software contains the universal API module itself, the demo simulation of hardware, and the front-end programs to help developers write their own softwaremore » drivers along with example drivers for actual hardware controllers. The software allows user application programs to call devices simultaneously without race conditions (multitasking and concurrent access). The template suggested in this package permits developers to integrate various devices easily into their applications using the same API. The drivers can be stacked; i.e., they can call each other via the same interface.« less

  13. Life Extending Control. [mechanical fatigue in reusable rocket engines

    NASA Technical Reports Server (NTRS)

    Lorenzo, Carl F.; Merrill, Walter C.

    1991-01-01

    The concept of Life Extending Control is defined. Life is defined in terms of mechanical fatigue life. A brief description is given of the current approach to life prediction using a local, cyclic, stress-strain approach for a critical system component. An alternative approach to life prediction based on a continuous functional relationship to component performance is proposed. Based on cyclic life prediction, an approach to life extending control, called the Life Management Approach, is proposed. A second approach, also based on cyclic life prediction, called the implicit approach, is presented. Assuming the existence of the alternative functional life prediction approach, two additional concepts for Life Extending Control are presented.

  14. Parallel Systems Laboratory: Access, Allocation, and Control

    DTIC Science & Technology

    1992-06-30

    boog Eae...4d READ ISTRUCTIONSREPORT DOCUMENTATIO PAGE BEFOR COMPLETNG FORM I. REPORT NUMNER 2. GOVT ACCESSION NO 3- RECIPINT’S CATALOG NUMR9 . TITLE (an...a summary of the salient results of this research in capsule form which is followed by an extensive list of publications, dissertations and theses...because it provides the asymptotic use of currently wasted cycles. To do so, we examine a distribution of w(u It) in a very simple form and for

  15. Left Ventrolateral Prefrontal Cortex and the Cognitive Control of Memory

    ERIC Educational Resources Information Center

    Badre, David; Wagner, Anthony D.

    2007-01-01

    Cognitive control mechanisms permit memory to be accessed strategically, and so aid in bringing knowledge to mind that is relevant to current goals and actions. In this review, we consider the contribution of left ventrolateral prefrontal cortex (VLPFC) to the cognitive control of memory. Reviewed evidence supports a two-process model of mnemonic…

  16. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    PubMed

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.

  17. 33 CFR 104.107 - Employee access area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...

  18. 33 CFR 104.107 - Employee access area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...

  19. 33 CFR 104.107 - Employee access area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...

  20. 33 CFR 104.106 - Passenger access area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...