Sample records for access control models

  1. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  2. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  3. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  4. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  5. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  6. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  7. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  8. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  9. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    PubMed

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  10. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    PubMed Central

    Huarte, Maider; Romaña, Pedro

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338

  11. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  12. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  13. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  14. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  15. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  16. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  17. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  18. Typing for Conflict Detection in Access Control Policies

    NASA Astrophysics Data System (ADS)

    Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge

    In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.

  19. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  20. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  1. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  2. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  3. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  4. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  5. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  6. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  7. An Extended Role-Based Access Control Model for Delegating Obligations

    NASA Astrophysics Data System (ADS)

    Ben-Ghorbel-Talbi, Meriam; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Bouhoula, Adel

    The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the administration and delegation of obligations. Managing such delegations implies more requirements than managing traditional privileges delegation. In fact, delegating obligations may include two interpretations: the delegation of the obligation and the delegation of the responsibility related to this obligation. Therefore, it is important to deal with these two notions separately. Moreover, since delegating an obligation involves the delegation of sanctions, then the consent of the user who receives this delegation may be required in some cases. We address in this paper these requirements and we propose a formalism to deal with them.

  8. Biomedical Big Data: New Models of Control Over Access, Use and Governance.

    PubMed

    Vayena, Effy; Blasimme, Alessandro

    2017-12-01

    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated in informed consent documents or be implicit in the norms of confidentiality that govern the relationships of patients and healthcare professionals. However, with medicine becoming a data-intense enterprise, informed consent and medical confidentiality, as mechanisms of control, are put under pressure. In this paper we explore emerging models of informational control in data-intense healthcare and clinical research, which can compensate for the limitations of currently available instruments. More specifically, we discuss three approaches that hold promise in increasing individual control: the emergence of data portability rights as means to control data access, new mechanisms of informed consent as tools to control data use, and finally, new participatory governance schemes that allow individuals to control their data through direct involvement in data governance. We conclude by suggesting that, despite the impression that biomedical big data diminish individual control, the synergistic effect of new data management models can in fact improve it.

  9. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  10. Formalization of the Access Control on ARM-Android Platform with the B Method

    NASA Astrophysics Data System (ADS)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  11. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  12. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  13. Dynamic Information Management and Exchange for Command and Control Applications, Modelling and Enforcing Category-Based Access Control via Term Rewriting

    DTIC Science & Technology

    2015-03-01

    a hotel and a hospital. 2. Event handler for emergency policies (item 2 above): this has been implemented in two UG projects, one project developed a...Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia, Brazil , September 2014. Electronic Notes in Theoretical Computer Science (to...Brasilia, Brazil , September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on

  14. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  15. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  16. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  17. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  18. System access control study

    DOT National Transportation Integrated Search

    1974-06-01

    The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...

  19. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  20. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  1. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  2. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  3. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  4. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  5. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  6. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  7. Accession Gaming Model (AGAM).

    DTIC Science & Technology

    1980-08-01

    k D-A009 160 NAVY PERSONNEL RESEARCH AND DEVELOPMENT CENTER SAN 0--ETC F/6 5/9 ACCESSION GAMING MODEL (AGAM).(U) UA 80 A WHISNAN, Y YEN, M...RECIPIENT’SCATALOG NUMBER NPRDC-TR_8 - vA - c I _ _ _ _ _ _ _ *:TITLE (and Suabitle) S. TYPE OF REPORT& PERIOD COVERED /ACCESSION GAMING MODEL (AG AM) ’C Final FY79 S...billet, trained personnel, and untrained personnel requirements, and the development of an Accession Gaming Model (AGAM), an optimization model that

  8. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  9. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms

  10. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This

  11. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  12. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  13. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  14. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  15. Hormone-dependent control of developmental timing through regulation of chromatin accessibility

    PubMed Central

    Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.

    2017-01-01

    Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147

  16. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    PubMed Central

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  17. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  18. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  19. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  20. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  1. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  2. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  3. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  4. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  5. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  6. REVIEW: Widespread access to predictive models in the motor system: a short review

    NASA Astrophysics Data System (ADS)

    Davidson, Paul R.; Wolpert, Daniel M.

    2005-09-01

    Recent behavioural and computational studies suggest that access to internal predictive models of arm and object dynamics is widespread in the sensorimotor system. Several systems, including those responsible for oculomotor and skeletomotor control, perceptual processing, postural control and mental imagery, are able to access predictions of the motion of the arm. A capacity to make and use predictions of object dynamics is similarly widespread. Here, we review recent studies looking at the predictive capacity of the central nervous system which reveal pervasive access to forward models of the environment.

  7. Propulsive Reaction Control System Model

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Phan, Linh H.; Serricchio, Frederick; San Martin, Alejandro M.

    2011-01-01

    This software models a propulsive reaction control system (RCS) for guidance, navigation, and control simulation purposes. The model includes the drive electronics, the electromechanical valve dynamics, the combustion dynamics, and thrust. This innovation follows the Mars Science Laboratory entry reaction control system design, and has been created to meet the Mars Science Laboratory (MSL) entry, descent, and landing simulation needs. It has been built to be plug-and-play on multiple MSL testbeds [analysis, Monte Carlo, flight software development, hardware-in-the-loop, and ATLO (assembly, test and launch operations) testbeds]. This RCS model is a C language program. It contains two main functions: the RCS electronics model function that models the RCS FPGA (field-programmable-gate-array) processing and commanding of the RCS valve, and the RCS dynamic model function that models the valve and combustion dynamics. In addition, this software provides support functions to initialize the model states, set parameters, access model telemetry, and access calculated thruster forces.

  8. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  9. Modeling rural landowners' hunter access policies in East Texas, USA

    NASA Astrophysics Data System (ADS)

    Wright, Brett A.; Fesenmaier, Daniel R.

    1988-03-01

    Private landowners in East Texas, USA, were aggregated into one of four policy categories according to the degree of access allowed to their lands for hunting. Based on these categories, a logistic regression model of possible determinants of access policy was developed and probabilities of policy adoption were calculated. Overwhelmingly, attitudes toward hunting as a sport, incentives, and control over the actions of hunters were most predictive of landowners' policies. Additionally, the availability of deer was found to be negatively correlated with access, thereby suggesting management efforts to increase deer populations may be counter to increasing access. Further, probabilities derived from the model indicated that there was almost a 7 in 10 chance (0.66) that landowners would adopt policies commensurate with allowing family and personal acquaintances to hunt on their property. However, the probability of increasing access beyond this level, where access was provided for the general public, dropped off drastically to less than 5% (0.04).

  10. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  11. Urban search mobile platform modeling in hindered access conditions

    NASA Astrophysics Data System (ADS)

    Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.

    2018-05-01

    The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.

  12. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    NASA Astrophysics Data System (ADS)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  13. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  14. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  15. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  16. Review of SDDOT's highway access control process

    DOT National Transportation Integrated Search

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  17. Mathematic Model of Digital Control System with PID Regulator and Regular Step of Quantization with Information Transfer via the Channel of Plural Access

    NASA Astrophysics Data System (ADS)

    Abramov, G. V.; Emeljanov, A. E.; Ivashin, A. L.

    Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.

  18. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  19. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  20. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  1. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  2. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  3. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  4. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  5. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  6. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  7. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  8. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  9. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  10. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  11. Programmable Direct-Memory-Access Controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F.

    1990-01-01

    Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.

  12. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  13. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    DTIC Science & Technology

    2013-09-16

    fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011

  14. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  15. Speed control system for an access gate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bzorgi, Fariborz M

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the outputmore » element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.« less

  16. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  17. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  18. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  19. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    NASA Astrophysics Data System (ADS)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  20. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  1. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  2. An Integrated Model of Cognitive Control in Task Switching

    ERIC Educational Resources Information Center

    Altmann, Erik M.; Gray, Wayne D.

    2008-01-01

    A model of cognitive control in task switching is developed in which controlled performance depends on the system maintaining access to a code in episodic memory representing the most recently cued task. The main constraint on access to the current task code is proactive interference from old task codes. This interference and the mechanisms that…

  3. Stellar Atmospheric Modelling for the ACCESS Program

    NASA Astrophysics Data System (ADS)

    Morris, Matthew; Kaiser, Mary Elizabeth; Bohlin, Ralph; Kurucz, Robert; ACCESS Team

    2018-01-01

    A goal of the ACCESS program (Absolute Color Calibration Experiment for Standard Stars) is to enable greater discrimination between theoretical astrophysical models and observations, where the comparison is limited by systematic errors associated with the relative flux calibration of the targets. To achieve these goals, ACCESS has been designed as a sub-orbital rocket borne payload and ground calibration program, to establish absolute flux calibration of stellar targets at <1 % precision, with a resolving power of 500 across the 0.35 to 1.7 micron bandpass.In order to obtain higher resolution spectroscopy in the optical and near-infrared range than either the ACCESS payload or CALSPEC observations provide, the ACCESS team has conducted a multi-instrument observing program at Apache Point Observatory. Using these calibrated high resolution spectra in addition to the HST/CALSPEC data, we have generated stellar atmosphere models for ACCESS flight candidates, as well as a selection of A and G stars from the CALSPEC database. Stellar atmosphere models were generated using Atlas 9 and Atlas 12 Kurucz stellar atmosphere software. The effective temperature, log(g), metallicity, and redenning were varied and the chi-squared statistic was minimized to obtain a best-fit model. A comparison of these models and the results from interpolation between grids of existing models will be presented. The impact of the flexibility of the Atlas 12 input parameters (e.g. solar metallicity fraction, abundances, microturbulent velocity) is being explored.

  4. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  5. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  6. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  7. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  8. Modeling Pilot Pulse Control

    NASA Technical Reports Server (NTRS)

    Bachelder, Edward; Hess, Ronald; Godfroy-Cooper, Martine; Aponso, Bimal

    2017-01-01

    In this study, behavioral models are developed that closely reproduced pulsive control response of two pilots from the experimental pool using markedly different control techniques (styles) while conducting a tracking task. An intriguing find was that the pilots appeared to: 1) produce a continuous, internally-generated stick signal that they integrated in time; 2) integrate the actual stick position; and 3) compare the two integrations to issue and cease pulse commands. This suggests that the pilots utilized kinesthetic feedback in order to perceive and integrate stick position, supporting the hypothesis that pilots can access and employ the proprioceptive inner feedback loop proposed by Hess' pilot Structural Model. The Pulse Models used in conjunction with the pilot Structural Model closely recreated the pilot data both in the frequency and time domains during closed-loop simulation. This indicates that for the range of tasks and control styles encountered, the models captured the fundamental mechanisms governing pulsive and control processes. The pilot Pulse Models give important insight for the amount of remnant (stick output uncorrelated with the forcing function) that arises from nonlinear pilot technique, and for the remaining remnant arising from different sources unrelated to tracking control (i.e. neuromuscular tremor, reallocation of cognitive resources, etc.).

  9. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as

  10. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  11. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  13. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  14. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  15. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  16. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  17. Global access to surgical care: a modelling study.

    PubMed

    Alkire, Blake C; Raykar, Nakul P; Shrime, Mark G; Weiser, Thomas G; Bickler, Stephen W; Rose, John A; Nutt, Cameron T; Greenberg, Sarah L M; Kotagal, Meera; Riesel, Johanna N; Esquivel, Micaela; Uribe-Leitz, Tarsicio; Molina, George; Roy, Nobhojit; Meara, John G; Farmer, Paul E

    2015-06-01

    More than 2 billion people are unable to receive surgical care based on operating theatre density alone. The vision of the Lancet Commission on Global Surgery is universal access to safe, affordable surgical and anaesthesia care when needed. We aimed to estimate the number of individuals worldwide without access to surgical services as defined by the Commission's vision. We modelled access to surgical services in 196 countries with respect to four dimensions: timeliness, surgical capacity, safety, and affordability. We built a chance tree for each country to model the probability of surgical access with respect to each dimension, and from this we constructed a statistical model to estimate the proportion of the population in each country that does not have access to surgical services. We accounted for uncertainty with one-way sensitivity analyses, multiple imputation for missing data, and probabilistic sensitivity analysis. At least 4·8 billion people (95% posterior credible interval 4·6-5·0 [67%, 64-70]) of the world's population do not have access to surgery. The proportion of the population without access varied widely when stratified by epidemiological region: greater than 95% of the population in south Asia and central, eastern, and western sub-Saharan Africa do not have access to care, whereas less than 5% of the population in Australasia, high-income North America, and western Europe lack access. Most of the world's population does not have access to surgical care, and access is inequitably distributed. The near absence of access in many low-income and middle-income countries represents a crisis, and as the global health community continues to support the advancement of universal health coverage, increasing access to surgical services will play a central role in ensuring health care for all. None. Copyright © 2015 Alkire et al. Open Access article distributed under the terms of CC BY. Published by Elsevier Ltd.. All rights reserved.

  18. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  19. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  20. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  1. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  2. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  3. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  4. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  5. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  6. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  7. Evaluation of modified work zone traffic control devices at business accesses

    DOT National Transportation Integrated Search

    2001-01-01

    Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...

  8. Modeling spatial accessibility of immigrants to culturally diverse family physicians.

    PubMed

    Wanga, Lu; Roisman, Deborah

    2011-01-01

    This article uses accessibility as an analytical tool to examine health care access among immigrants in a multicultural urban setting. It applies and improves on two widely used accessibility models—the gravity model and the two-step floating catchment area model—in measuring spatial accessibility by Mainland Chinese immigrants in the Toronto Census Metropolitan Area. Empirical data on physician-seeking behaviors are collected through two rounds of questionnaire surveys. Attention is focused on journey to physician location and utilization of linguistically matched family physicians. Based on the survey data, a two-zone accessibility model is developed by relaxing the travel threshold and distance impedance parameters that are traditionally treated as a constant in the accessibility models. General linear models are used to identify relationships among spatial accessibility, geography, and socioeconomic characteristics of Mainland Chinese immigrants. The results suggest a spatial mismatch in the supply of and demand for culturally sensitive care, and residential location is the primary factor that determines spatial accessibility to family physicians. The article yields important policy implications.

  9. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  10. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  11. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  12. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  13. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  14. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  15. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  16. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  17. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  18. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  19. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  20. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  1. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  2. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  3. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  4. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  5. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  6. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  7. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  8. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  9. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  10. Automating Access Control Logics in Simple Type Theory with LEO-II

    NASA Astrophysics Data System (ADS)

    Benzmüller, Christoph

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.

  11. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  12. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  13. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  14. Estimation and modeling of coal pore accessibility using small angle neutron scattering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Rui; Liu, Shimin; Bahadur, Jitendra

    Gas diffusion in coal is controlled by nano-structure of the pores. The interconnectivity of pores not only determines the dynamics of gas transport in the coal matrix but also influences the mechanical strength. In this study, small angle neutron scattering (SANS) was employed to quantify pore accessibility for two coal samples, one of sub-bituminous rank and the other of anthracite rank. Moreover, a theoretical pore accessibility model was proposed based on scattering intensities under both vacuum and zero average contrast (ZAC) conditions. Our results show that scattering intensity decreases with increasing gas pressure using deuterated methane (CD 4) at lowmore » Q values for both coals. Pores smaller than 40 nm in radius are less accessible for anthracite than sub-bituminous coal. On the contrary, when the pore radius is larger than 40 nm, the pore accessibility of anthracite becomes larger than that of sub-bituminous coal. Only 20% of pores are accessible to CD 4 for anthracite and 37% for sub-bituminous coal, where the pore radius is 16 nm. For these two coals, pore accessibility and pore radius follows a power-law relationship.« less

  15. Estimation and modeling of coal pore accessibility using small angle neutron scattering

    DOE PAGES

    Zhang, Rui; Liu, Shimin; Bahadur, Jitendra; ...

    2015-09-04

    Gas diffusion in coal is controlled by nano-structure of the pores. The interconnectivity of pores not only determines the dynamics of gas transport in the coal matrix but also influences the mechanical strength. In this study, small angle neutron scattering (SANS) was employed to quantify pore accessibility for two coal samples, one of sub-bituminous rank and the other of anthracite rank. Moreover, a theoretical pore accessibility model was proposed based on scattering intensities under both vacuum and zero average contrast (ZAC) conditions. Our results show that scattering intensity decreases with increasing gas pressure using deuterated methane (CD 4) at lowmore » Q values for both coals. Pores smaller than 40 nm in radius are less accessible for anthracite than sub-bituminous coal. On the contrary, when the pore radius is larger than 40 nm, the pore accessibility of anthracite becomes larger than that of sub-bituminous coal. Only 20% of pores are accessible to CD 4 for anthracite and 37% for sub-bituminous coal, where the pore radius is 16 nm. For these two coals, pore accessibility and pore radius follows a power-law relationship.« less

  16. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  17. Canonical formalism for modelling and control of rigid body dynamics.

    PubMed

    Gurfil, P

    2005-12-01

    This paper develops a new paradigm for stabilization of rigid-body dynamics. The state-space model is formulated using canonical elements, known as the Serret-Andoyer (SA) variables, thus far scarcely used for engineering applications. The main feature of the SA formalism is the reduction of the dynamics via the underlying symmetry stemming from conservation of angular momentum and rotational kinetic energy. The controllability of the system model is examined using the notion of accessibility, and is shown to be accessible from all points. Based on the accessibility proof, two nonlinear asymptotic feedback stabilizers are developed: a damping feedback is designed based on the Jurdjevic-Quinn method, and a Hamiltonian controller is derived by using the Hamiltonian as a natural Lyapunov function for the closed-loop dynamics. It is shown that the Hamiltonian control is both passive and inverse optimal with respect to a meaningful performance index. The performance of the new controllers is examined and compared using simulations of realistic scenarios from the satellite attitude dynamics field.

  18. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  19. Global Access-controlled Transfer e-frame (GATe)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  20. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  1. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  2. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases.

    PubMed

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F L; Utzinger, Jürg; Kristensen, Thomas K; Vounatsou, Penelope

    2011-12-01

    After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature'), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded

  3. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  4. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  5. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  6. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  7. Leveraging Open Standard Interfaces in Accessing and Processing NASA Data Model Outputs

    NASA Astrophysics Data System (ADS)

    Falke, S. R.; Alameh, N. S.; Hoijarvi, K.; de La Beaujardiere, J.; Bambacus, M. J.

    2006-12-01

    An objective of NASA's Earth Science Division is to develop advanced information technologies for processing, archiving, accessing, visualizing, and communicating Earth Science data. To this end, NASA and other federal agencies have collaborated with the Open Geospatial Consortium (OGC) to research, develop, and test interoperability specifications within projects and testbeds benefiting the government, industry, and the public. This paper summarizes the results of a recent effort under the auspices of the OGC Web Services testbed phase 4 (OWS-4) to explore standardization approaches for accessing and processing the outputs of NASA models of physical phenomena. Within the OWS-4 context, experiments were designed to leverage the emerging OGC Web Processing Service (WPS) and Web Coverage Service (WCS) specifications to access, filter and manipulate the outputs of the NASA Goddard Earth Observing System (GEOS) and Goddard Chemistry Aerosol Radiation and Transport (GOCART) forecast models. In OWS-4, the intent is to provide the users with more control over the subsets of data that they can extract from the model results as well as over the final portrayal of that data. To meet that goal, experiments have been designed to test the suitability of use of OGC's Web Processing Service (WPS) and Web Coverage Service (WCS) for filtering, processing and portraying the model results (including slices by height or by time), and to identify any enhancements to the specs to meet the desired objectives. This paper summarizes the findings of the experiments highlighting the value of the Web Processing Service in providing standard interfaces for accessing and manipulating model data within spatial and temporal frameworks. The paper also points out the key shortcomings of the WPS especially in terms in comparison with a SOAP/WSDL approach towards solving the same problem.

  8. Simple measurement-based admission control for DiffServ access networks

    NASA Astrophysics Data System (ADS)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  9. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  10. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  11. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  12. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...

  13. Access Control for Home Data Sharing: Attitudes, Needs and Practices

    DTIC Science & Technology

    2009-10-01

    cameras, mobile phones and portable music players make creating and interacting with this content easy. Home users are increasingly interested in...messages, photos, home videos, journal files and home musical recordings. Many participants considered unauthorized access by strangers, acquaintances...configuration does not allow users to share different subsets of music with different people. Facebook supplies rich, customizable access controls for

  14. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420...

  15. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  16. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    NASA Astrophysics Data System (ADS)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  17. The OPL Access Control Policy Language

    NASA Astrophysics Data System (ADS)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  18. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...

  19. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  20. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...

  1. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  2. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  3. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  4. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    PubMed

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  5. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  6. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  7. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  8. Modeling spatial accessibility to parks: a national study.

    PubMed

    Zhang, Xingyou; Lu, Hua; Holt, James B

    2011-05-09

    Parks provide ideal open spaces for leisure-time physical activity and important venues to promote physical activity. The spatial configuration of parks, the number of parks and their spatial distribution across neighborhood areas or local regions, represents the basic park access potential for their residential populations. A new measure of spatial access to parks, population-weighted distance (PWD) to parks, combines the advantages of current park access approaches and incorporates the information processing theory and probability access surface model to more accurately quantify residential population's potential spatial access to parks. The PWD was constructed at the basic level of US census geography - blocks - using US park and population data. This new measure of population park accessibility was aggregated to census tract, county, state and national levels. On average, US residential populations are expected to travel 6.7 miles to access their local neighborhood parks. There are significant differences in the PWD to local parks among states. The District of Columbia and Connecticut have the best access to local neighborhood parks with PWD of 0.6 miles and 1.8 miles, respectively. Alaska, Montana, and Wyoming have the largest PWDs of 62.0, 37.4, and 32.8 miles, respectively. Rural states in the western and Midwestern US have lower neighborhood park access, while urban states have relatively higher park access. The PWD to parks provides a consistent platform for evaluating spatial equity of park access and linking with population health outcomes. It could be an informative evaluation tool for health professionals and policy makers. This new method could be applied to quantify geographic accessibility of other types of services or destinations, such as food, alcohol, and tobacco outlets.

  9. A hierarchical distributed control model for coordinating intelligent systems

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.

    1991-01-01

    A hierarchical distributed control (HDC) model for coordinating cooperative problem-solving among intelligent systems is described. The model was implemented using SOCIAL, an innovative object-oriented tool for integrating heterogeneous, distributed software systems. SOCIAL embeds applications in 'wrapper' objects called Agents, which supply predefined capabilities for distributed communication, control, data specification, and translation. The HDC model is realized in SOCIAL as a 'Manager'Agent that coordinates interactions among application Agents. The HDC Manager: indexes the capabilities of application Agents; routes request messages to suitable server Agents; and stores results in a commonly accessible 'Bulletin-Board'. This centralized control model is illustrated in a fault diagnosis application for launch operations support of the Space Shuttle fleet at NASA, Kennedy Space Center.

  10. A model for optimizing file access patterns using spatio-temporal parallelism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boonthanome, Nouanesengsy; Patchett, John; Geveci, Berk

    2013-01-01

    For many years now, I/O read time has been recognized as the primary bottleneck for parallel visualization and analysis of large-scale data. In this paper, we introduce a model that can estimate the read time for a file stored in a parallel filesystem when given the file access pattern. Read times ultimately depend on how the file is stored and the access pattern used to read the file. The file access pattern will be dictated by the type of parallel decomposition used. We employ spatio-temporal parallelism, which combines both spatial and temporal parallelism, to provide greater flexibility to possible filemore » access patterns. Using our model, we were able to configure the spatio-temporal parallelism to design optimized read access patterns that resulted in a speedup factor of approximately 400 over traditional file access patterns.« less

  11. A semi-automated vascular access system for preclinical models

    NASA Astrophysics Data System (ADS)

    Berry-Pusey, B. N.; Chang, Y. C.; Prince, S. W.; Chu, K.; David, J.; Taschereau, R.; Silverman, R. W.; Williams, D.; Ladno, W.; Stout, D.; Tsao, T. C.; Chatziioannou, A.

    2013-08-01

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice.

  12. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  13. Session Types for Access and Information Flow Control

    NASA Astrophysics Data System (ADS)

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.

  14. A Model for Trust-based Access Control and Delegation in Mobile Clouds (Post Print)

    DTIC Science & Technology

    2013-10-01

    the access-granter knowing the identity of access requester beforehand and authenticating the requester, can no longer be applied. Mobile Wallet Cloud...TktC) for a reservation and con- tacts the user’s mobile wallet provider (MobWC) to purchase the ticket from TktC. For accessing different services...receiving regular services. For example, the human user in our scenario can be an elite member with the mobile wallet service provider that

  15. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  16. Model learning for robot control: a survey.

    PubMed

    Nguyen-Tuong, Duy; Peters, Jan

    2011-11-01

    Models are among the most essential tools in robotics, such as kinematics and dynamics models of the robot's own body and controllable external objects. It is widely believed that intelligent mammals also rely on internal models in order to generate their actions. However, while classical robotics relies on manually generated models that are based on human insights into physics, future autonomous, cognitive robots need to be able to automatically generate models that are based on information which is extracted from the data streams accessible to the robot. In this paper, we survey the progress in model learning with a strong focus on robot control on a kinematic as well as dynamical level. Here, a model describes essential information about the behavior of the environment and the influence of an agent on this environment. In the context of model-based learning control, we view the model from three different perspectives. First, we need to study the different possible model learning architectures for robotics. Second, we discuss what kind of problems these architecture and the domain of robotics imply for the applicable learning methods. From this discussion, we deduce future directions of real-time learning algorithms. Third, we show where these scenarios have been used successfully in several case studies.

  17. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  18. Enabling Accessibility Through Model-Based User Interface Development.

    PubMed

    Ziegler, Daniel; Peissner, Matthias

    2017-01-01

    Adaptive user interfaces (AUIs) can increase the accessibility of interactive systems. They provide personalized display and interaction modes to fit individual user needs. Most AUI approaches rely on model-based development, which is considered relatively demanding. This paper explores strategies to make model-based development more attractive for mainstream developers.

  19. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  20. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  1. Access, excess, and ethics--towards a sustainable distribution model for antibiotics.

    PubMed

    Heyman, Gabriel; Cars, Otto; Bejarano, Maria-Teresa; Peterson, Stefan

    2014-05-01

    The increasing antibiotic resistance is a global threat to health care as we know it. Yet there is no model of distribution ready for a new antibiotic that balances access against excessive or inappropriate use in rural settings in low- and middle-income countries (LMICs) where the burden of communicable diseases is high and access to quality health care is low. Departing from a hypothetical scenario of rising antibiotic resistance among pneumococci, 11 stakeholders in the health systems of various LMICs were interviewed one-on-one to give their view on how a new effective antibiotic should be distributed to balance access against the risk of inappropriate use. Transcripts were subjected to qualitative 'framework' analysis. The analysis resulted in four main themes: Barriers to rational access to antibiotics; balancing access and excess; learning from other communicable diseases; and a system-wide intervention. The tension between access to antibiotics and rational use stems from shortcomings found in the health systems of LMICs. Constructing a sustainable yet accessible model of antibiotic distribution for LMICs is a task of health system-wide proportions, which is why we strongly suggest using systems thinking in future research on this issue.

  2. Access, excess, and ethics—towards a sustainable distribution model for antibiotics

    PubMed Central

    Heyman, Gabriel; Cars, Otto; Bejarano, Maria-Teresa

    2014-01-01

    The increasing antibiotic resistance is a global threat to health care as we know it. Yet there is no model of distribution ready for a new antibiotic that balances access against excessive or inappropriate use in rural settings in low- and middle-income countries (LMICs) where the burden of communicable diseases is high and access to quality health care is low. Departing from a hypothetical scenario of rising antibiotic resistance among pneumococci, 11 stakeholders in the health systems of various LMICs were interviewed one-on-one to give their view on how a new effective antibiotic should be distributed to balance access against the risk of inappropriate use. Transcripts were subjected to qualitative ‘framework’ analysis. The analysis resulted in four main themes: Barriers to rational access to antibiotics; balancing access and excess; learning from other communicable diseases; and a system-wide intervention. The tension between access to antibiotics and rational use stems from shortcomings found in the health systems of LMICs. Constructing a sustainable yet accessible model of antibiotic distribution for LMICs is a task of health system-wide proportions, which is why we strongly suggest using systems thinking in future research on this issue. PMID:24735111

  3. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  4. Providing School Students, Staff, and Parents with Access to Vendors of Goods and Services. A Model Policy and Rules, with Comments.

    ERIC Educational Resources Information Center

    Iowa State Dept. of Public Instruction, Des Moines.

    This model policy is designed to help local school officials provide vendors with the greatest reasonable opportunity to compete for access to the school community, while protecting the school's need for reasonable control of that access, so that students, parents, and staff can obtain the best goods and services at the best price. It is offered…

  5. Unified Information Access in Product Creation with an Integrated Control Desk

    NASA Astrophysics Data System (ADS)

    Wrasse, Kevin; Diener, Holger; Hayka, Haygazun; Stark, Rainer

    2017-06-01

    Customers demand for individualized products leads to a large variety of different products in small series and single-unit production. A high flexibility pressure in product creation is one result of this trend. In order to counteract the pressure, the information steadily increasing by Industry 4.0 must be made available at the workplace. Additionally, a better exchange of information between product development, production planning and production is necessary. The improvement of individual systems, like CAD, PDM, ERP and MES, can only achieve this to a limited extent. Since they mostly use systems from different manufacturers, the necessary deeper integration of information is only feasible for SMEs to a limited extend. The presented control desk helps to ensure a more flexible product creation as well as information exchange. It captures information from different IT systems in the production process and presents them integrated, task-oriented and oriented to the user’s mental model, e.g. information of the production combined with the 3D model of product parts, or information about product development on the 3D model of the production. The solution is a digital 3D model of the manufacturing environment, which is enriched by billboards for a quick information overview and web service windows to access detailed MES and PDM information. By this, the level of abstraction can be reduced and reacts to changed requirements in the short term, making informed decisions. The interaction with the control stands utilizes the touch skills of mobile and fixed systems such as smartphones, tablets and multitouch tables.

  6. EPA GHG certification of medium- and heavy-duty vehicles: Development of road grade profiles representative of US controlled access highways

    DOE PAGES

    Wood, Eric; Duran, Adam; Kelly, Kenneth

    2016-09-27

    In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less

  7. EPA GHG certification of medium- and heavy-duty vehicles: Development of road grade profiles representative of US controlled access highways

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wood, Eric; Duran, Adam; Kelly, Kenneth

    In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less

  8. Earth System Model Development and Analysis using FRE-Curator and Live Access Servers: On-demand analysis of climate model output with data provenance.

    NASA Astrophysics Data System (ADS)

    Radhakrishnan, A.; Balaji, V.; Schweitzer, R.; Nikonov, S.; O'Brien, K.; Vahlenkamp, H.; Burger, E. F.

    2016-12-01

    There are distinct phases in the development cycle of an Earth system model. During the model development phase, scientists make changes to code and parameters and require rapid access to results for evaluation. During the production phase, scientists may make an ensemble of runs with different settings, and produce large quantities of output, that must be further analyzed and quality controlled for scientific papers and submission to international projects such as the Climate Model Intercomparison Project (CMIP). During this phase, provenance is a key concern:being able to track back from outputs to inputs. We will discuss one of the paths taken at GFDL in delivering tools across this lifecycle, offering on-demand analysis of data by integrating the use of GFDL's in-house FRE-Curator, Unidata's THREDDS and NOAA PMEL's Live Access Servers (LAS).Experience over this lifecycle suggests that a major difficulty in developing analysis capabilities is only partially the scientific content, but often devoted to answering the questions "where is the data?" and "how do I get to it?". "FRE-Curator" is the name of a database-centric paradigm used at NOAA GFDL to ingest information about the model runs into an RDBMS (Curator database). The components of FRE-Curator are integrated into Flexible Runtime Environment workflow and can be invoked during climate model simulation. The front end to FRE-Curator, known as the Model Development Database Interface (MDBI) provides an in-house web-based access to GFDL experiments: metadata, analysis output and more. In order to provide on-demand visualization, MDBI uses Live Access Servers which is a highly configurable web server designed to provide flexible access to geo-referenced scientific data, that makes use of OPeNDAP. Model output saved in GFDL's tape archive, the size of the database and experiments, continuous model development initiatives with more dynamic configurations add complexity and challenges in providing an on

  9. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  10. Techniques to Access Databases and Integrate Data for Hydrologic Modeling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whelan, Gene; Tenney, Nathan D.; Pelton, Mitchell A.

    2009-06-17

    This document addresses techniques to access and integrate data for defining site-specific conditions and behaviors associated with ground-water and surface-water radionuclide transport applicable to U.S. Nuclear Regulatory Commission reviews. Environmental models typically require input data from multiple internal and external sources that may include, but are not limited to, stream and rainfall gage data, meteorological data, hydrogeological data, habitat data, and biological data. These data may be retrieved from a variety of organizations (e.g., federal, state, and regional) and source types (e.g., HTTP, FTP, and databases). Available data sources relevant to hydrologic analyses for reactor licensing are identified and reviewed.more » The data sources described can be useful to define model inputs and parameters, including site features (e.g., watershed boundaries, stream locations, reservoirs, site topography), site properties (e.g., surface conditions, subsurface hydraulic properties, water quality), and site boundary conditions, input forcings, and extreme events (e.g., stream discharge, lake levels, precipitation, recharge, flood and drought characteristics). Available software tools for accessing established databases, retrieving the data, and integrating it with models were identified and reviewed. The emphasis in this review was on existing software products with minimal required modifications to enable their use with the FRAMES modeling framework. The ability of four of these tools to access and retrieve the identified data sources was reviewed. These four software tools were the Hydrologic Data Acquisition and Processing System (HDAPS), Integrated Water Resources Modeling System (IWRMS) External Data Harvester, Data for Environmental Modeling Environmental Data Download Tool (D4EM EDDT), and the FRAMES Internet Database Tools. The IWRMS External Data Harvester and the D4EM EDDT were identified as the most promising tools based on their ability to

  11. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  12. Capacity Estimation Model for Signalized Intersections under the Impact of Access Point

    PubMed Central

    Zhao, Jing; Li, Peng; Zhou, Xizhao

    2016-01-01

    Highway Capacity Manual 2010 provides various factors to adjust the base saturation flow rate for the capacity analysis of signalized intersections. No factors, however, is considered for the potential change of signalized intersections capacity caused by the access point closeing to the signalized intersection. This paper presented a theoretical model to estimate the lane group capacity at signalized intersections with the consideration of the effects of access points. Two scenarios of access point locations, upstream or downstream of the signalized intersection, and impacts of six types of access traffic flow are taken into account. The proposed capacity model was validated based on VISSIM simulation. Results of extensive numerical analysis reveal the substantial impact of access point on the capacity, which has an inverse correlation with both the number of major street lanes and the distance between the intersection and access point. Moreover, among the six types of access traffic flows, the access traffic flow 1 (right-turning traffic from major street), flow 4 (left-turning traffic from access point), and flow 5 (left-turning traffic from major street) cause a more significant effect on lane group capacity than others. Some guidance on the mitigation of the negative effect is provided for practitioners. PMID:26726998

  13. SMC: SCENIC Model Control

    NASA Technical Reports Server (NTRS)

    Srivastava, Priyaka; Kraus, Jeff; Murawski, Robert; Golden, Bertsel, Jr.

    2015-01-01

    NASAs Space Communications and Navigation (SCaN) program manages three active networks: the Near Earth Network, the Space Network, and the Deep Space Network. These networks simultaneously support NASA missions and provide communications services to customers worldwide. To efficiently manage these resources and their capabilities, a team of student interns at the NASA Glenn Research Center is developing a distributed system to model the SCaN networks. Once complete, the system shall provide a platform that enables users to perform capacity modeling of current and prospective missions with finer-grained control of information between several simulation and modeling tools. This will enable the SCaN program to access a holistic view of its networks and simulate the effects of modifications in order to provide NASA with decisional information. The development of this capacity modeling system is managed by NASAs Strategic Center for Education, Networking, Integration, and Communication (SCENIC). Three primary third-party software tools offer their unique abilities in different stages of the simulation process. MagicDraw provides UMLSysML modeling, AGIs Systems Tool Kit simulates the physical transmission parameters and de-conflicts scheduled communication, and Riverbed Modeler (formerly OPNET) simulates communication protocols and packet-based networking. SCENIC developers are building custom software extensions to integrate these components in an end-to-end space communications modeling platform. A central control module acts as the hub for report-based messaging between client wrappers. Backend databases provide information related to mission parameters and ground station configurations, while the end user defines scenario-specific attributes for the model. The eight SCENIC interns are working under the direction of their mentors to complete an initial version of this capacity modeling system during the summer of 2015. The intern team is composed of four students in

  14. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  15. Information Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study

    ERIC Educational Resources Information Center

    Antony, Laljith

    2016-01-01

    Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…

  16. Establishing access to technology: an evaluation and intervention model to increase the participation of children with cerebral palsy.

    PubMed

    McCarty, Elizabeth; Morress, Claire

    2009-08-01

    Children with a diagnosis of cerebral palsy often have significant physical limitations that prevent exploration and full participation in the environment. Assistive technology systems can provide opportunities for children with physical limitations to interact with their world, enabling play, communication, and daily living skills. Efficient access to and control of the technology is critical for successful use; however, establishing consistent access is often difficult because of the nature of the movement patterns exhibited by children with cerebral palsy. This article describes a 3-phase model of evaluation and intervention developed and used by Assistive Technology Services at the Aaron W. Perlman Center, Cincinnati Children's Hospital Medical Center, to establish successful access to technology systems in children with cerebral palsy.

  17. Measuring Equity in Access to Pharmaceutical Services Using Concentration Curve; Model Development.

    PubMed

    Davari, Majid; Khorasani, Elahe; Bakhshizade, Zahra; Jafarian Jazi, Marzie; Ghaffari Darab, Mohsen; Maracy, Mohammad Reza

    2015-01-01

    This paper has two objectives. First, it establishes a model for scoring the access to pharmaceutical services. Second, it develops a model for measuring socioeconomic indicators independent of the time and place of study. These two measures are used for measuring equity in access to pharmaceutical services using concentration curve. We prepared an open-ended questionnaire and distributed it to academic experts to get their ideas to form access indicators and assign score to each indicator based on the pharmaceutical system. An extensive literature review was undertaken for the selection of indicators in order to determine the socioeconomic status (SES) of individuals. Experts' opinions were also considered for scoring these indicators. These indicators were weighted by the Stepwise Adoption of Weights and were used to develop a model for measuring SES independent of the time and place of study. Nine factors were introduced for assessing the access to pharmaceutical services, based on pharmaceutical systems in middle-income countries. Five indicators were selected for determining the SES of individuals. A model for income classification based on poverty line was established. Likewise, a model for scoring home status based on national minimum wage was introduced. In summary, five important findings emerged from this study. These findings may assist researchers in measuring equity in access to pharmaceutical services and also could help them to apply a model for determining SES independent of the time and place of study. These also could provide a good opportunity for researchers to compare the results of various studies in a reasonable way; particularly in middle-income countries.

  18. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  19. Web Accessibility and Accessibility Instruction

    ERIC Educational Resources Information Center

    Green, Ravonne A.; Huprich, Julia

    2009-01-01

    Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

  20. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 2: Switches and Environmental Controls. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…

  1. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  2. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  3. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    PubMed

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.

  4. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    NASA Astrophysics Data System (ADS)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  5. Finite-dimensional modeling of network-induced delays for real-time control systems

    NASA Technical Reports Server (NTRS)

    Ray, Asok; Halevi, Yoram

    1988-01-01

    In integrated control systems (ICS), a feedback loop is closed by the common communication channel, which multiplexes digital data from the sensor to the controller and from the controller to the actuator along with the data traffic from other control loops and management functions. Due to asynchronous time-division multiplexing in the network access protocols, time-varying delays are introduced in the control loop, which degrade the system dynamic performance and are a potential source of instability. The delayed control system is represented by a finite-dimensional, time-varying, discrete-time model which is less complex than the existing continuous-time models for time-varying delays; this approach allows for simpler schemes for analysis and simulation of the ICS.

  6. Optimization modeling to maximize population access to comprehensive stroke centers

    PubMed Central

    Branas, Charles C.; Kasner, Scott E.; Wolff, Catherine; Williams, Justin C.; Albright, Karen C.; Carr, Brendan G.

    2015-01-01

    Objective: The location of comprehensive stroke centers (CSCs) is critical to ensuring rapid access to acute stroke therapies; we conducted a population-level virtual trial simulating change in access to CSCs using optimization modeling to selectively convert primary stroke centers (PSCs) to CSCs. Methods: Up to 20 certified PSCs per state were selected for conversion to maximize the population with 60-minute CSC access by ground and air. Access was compared across states based on region and the presence of state-level emergency medical service policies preferentially routing patients to stroke centers. Results: In 2010, there were 811 Joint Commission PSCs and 0 CSCs in the United States. Of the US population, 65.8% had 60-minute ground access to PSCs. After adding up to 20 optimally located CSCs per state, 63.1% of the US population had 60-minute ground access and 86.0% had 60-minute ground/air access to a CSC. Across states, median CSC access was 55.7% by ground (interquartile range 35.7%–71.5%) and 85.3% by ground/air (interquartile range 59.8%–92.1%). Ground access was lower in Stroke Belt states compared with non–Stroke Belt states (32.0% vs 58.6%, p = 0.02) and lower in states without emergency medical service routing policies (52.7% vs 68.3%, p = 0.04). Conclusion: Optimal system simulation can be used to develop efficient care systems that maximize accessibility. Under optimal conditions, a large proportion of the US population will be unable to access a CSC within 60 minutes. PMID:25740858

  7. Optimization modeling to maximize population access to comprehensive stroke centers.

    PubMed

    Mullen, Michael T; Branas, Charles C; Kasner, Scott E; Wolff, Catherine; Williams, Justin C; Albright, Karen C; Carr, Brendan G

    2015-03-24

    The location of comprehensive stroke centers (CSCs) is critical to ensuring rapid access to acute stroke therapies; we conducted a population-level virtual trial simulating change in access to CSCs using optimization modeling to selectively convert primary stroke centers (PSCs) to CSCs. Up to 20 certified PSCs per state were selected for conversion to maximize the population with 60-minute CSC access by ground and air. Access was compared across states based on region and the presence of state-level emergency medical service policies preferentially routing patients to stroke centers. In 2010, there were 811 Joint Commission PSCs and 0 CSCs in the United States. Of the US population, 65.8% had 60-minute ground access to PSCs. After adding up to 20 optimally located CSCs per state, 63.1% of the US population had 60-minute ground access and 86.0% had 60-minute ground/air access to a CSC. Across states, median CSC access was 55.7% by ground (interquartile range 35.7%-71.5%) and 85.3% by ground/air (interquartile range 59.8%-92.1%). Ground access was lower in Stroke Belt states compared with non-Stroke Belt states (32.0% vs 58.6%, p = 0.02) and lower in states without emergency medical service routing policies (52.7% vs 68.3%, p = 0.04). Optimal system simulation can be used to develop efficient care systems that maximize accessibility. Under optimal conditions, a large proportion of the US population will be unable to access a CSC within 60 minutes. © 2015 American Academy of Neurology.

  8. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  9. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  10. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  11. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  12. Survey of Airport Access Analysis Techniques - Models, Data and a Research Program

    DOT National Transportation Integrated Search

    1972-06-01

    The report points up the differences and similarities between airport access travel and general urban trip making. Models and surveys developed for, or applicable, to airport access planning are reviewed. A research program is proposed which would ge...

  13. Modeling coding-sequence evolution within the context of residue solvent accessibility.

    PubMed

    Scherrer, Michael P; Meyer, Austin G; Wilke, Claus O

    2012-09-12

    Protein structure mediates site-specific patterns of sequence divergence. In particular, residues in the core of a protein (solvent-inaccessible residues) tend to be more evolutionarily conserved than residues on the surface (solvent-accessible residues). Here, we present a model of sequence evolution that explicitly accounts for the relative solvent accessibility of each residue in a protein. Our model is a variant of the Goldman-Yang 1994 (GY94) model in which all model parameters can be functions of the relative solvent accessibility (RSA) of a residue. We apply this model to a data set comprised of nearly 600 yeast genes, and find that an evolutionary-rate ratio ω that varies linearly with RSA provides a better model fit than an RSA-independent ω or an ω that is estimated separately in individual RSA bins. We further show that the branch length t and the transition-transverion ratio κ also vary with RSA. The RSA-dependent GY94 model performs better than an RSA-dependent Muse-Gaut 1994 (MG94) model in which the synonymous and non-synonymous rates individually are linear functions of RSA. Finally, protein core size affects the slope of the linear relationship between ω and RSA, and gene expression level affects both the intercept and the slope. Structure-aware models of sequence evolution provide a significantly better fit than traditional models that neglect structure. The linear relationship between ω and RSA implies that genes are better characterized by their ω slope and intercept than by just their mean ω.

  14. Access Control and Processing Studies for Ground Satellite Mobile Communications/Surveillance Systems

    DOT National Transportation Integrated Search

    1974-06-01

    The report synthesizes a set of satellite communications systems configurations to provide services to aircraft flying oceanic routes. These configurations are combined with access control methods to form complete systems. These systems are analyzed ...

  15. Comparison of apical centring ability between incisal-shifted access and traditional lingual access for maxillary anterior teeth.

    PubMed

    Yahata, Yoshio; Masuda, Yoshiko; Komabayashi, Takashi

    2017-12-01

    The aim of this study was to compare the apical centring ability of incisal-shifted access (ISA) with that of traditional lingual access (TLA). Fifteen three-dimensional printed resin models were prepared from the computed tomography data for a human maxillary central incisor and divided into ISA (n = 7), TLA (n = 7) and control (n = 1) groups. After access preparation, these models were shaped to the working length using K-files up to #40, followed by step-back procedures. An apical portion of the model was removed at 0.5 mm coronal to the working length. Microscopic images of each cutting surface were taken to measure the preparation area and the distance of transportation. TLA created a larger preparation area than ISA (P < 0.05). The distance of transportation (mean ± standard deviation) was 0.4 ± 0.1 mm for ISA and 0.7 ± 0.1 mm for TLA (P < 0.05). Access cavity preparation has a significant effect on apical centring ability. ISA is beneficial to maintaining apical configuration. © 2017 Australian Society of Endodontology Inc.

  16. A novel asynchronous access method with binary interfaces

    PubMed Central

    2008-01-01

    Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation. PMID:18959797

  17. Models of the solvent-accessible surface of biopolymers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, R.E.

    1996-09-01

    Many biopolymers such as proteins, DNA, and RNA have been studied because they have important biomedical roles and may be good targets for therapeutic action in treating diseases. This report describes how plastic models of the solvent-accessible surface of biopolymers were made. Computer files containing sets of triangles were calculated, then used on a stereolithography machine to make the models. Small (2 in.) models were made to test whether the computer calculations were done correctly. Also, files of the type (.stl) required by any ISO 9001 rapid prototyping machine were written onto a CD-ROM for distribution to American companies.

  18. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  19. Equity Access Plans: A Regulatory and Educational State Response Model.

    ERIC Educational Resources Information Center

    DeLisle, James

    1984-01-01

    Introduces the basic notion of equity access plans as property-based solutions to the cash flow needs of elderly homeowners and then proposes a normative response model that states can adopt to help manage the risk exposures. The recommended model incorporates regulatory, information dissemination, and educational elements. (BH)

  20. Linear association between household income and metabolic control in children with insulin-dependent diabetes mellitus despite free access to health care.

    PubMed

    Deladoëy, Johnny; Henderson, Mélanie; Geoffroy, Louis

    2013-05-01

    In health care systems with a user fee, the impact of socioeconomic factors on pediatric insulin-dependent diabetes mellitus (IDDM) control could be due to the cost of accessing care. There is a linear association between household income and the average glycosylated hemoglobin (HbA1c) of children and adolescents with IDDM despite free access to health care. We used a linear regression model to examine the association between normalized average HbA1c of 1766 diabetic children (diagnosed at our institution from 1980 to 2011 before 17 years of age) and the median household income of their neighborhoods (obtained from Statistics Canada, 2006 Census data). We found a negative linear association (P < .001; r = -0.2) between the level of income and metabolic control assessed by HbA1c after controlling for sex, age at diagnosis, duration of diabetes, ethnicity, geographical factors, frequency of visits, current age (as a proxy for change in practice over time), and change of measurement methods of HbA1c across time. For every increase of $15,000 in annual income, HbA1c decreased by 0.1%. We report a linear association of household income with metabolic control of IDDM in childhood. Given that Canada has a system of free universal access to health care, confounding by access to care is unlikely. Considering the impact of poorly controlled IDDM in childhood on the development of long-term complications, our findings suggest that the higher complication rate found in adults of low socioeconomic status might originate from the poor control that they experienced in childhood. Support for the care of IDDM children from low-income neighborhoods should be increased.

  1. Improved glycemic control in veterans with poorly controlled diabetes mellitus using a Specialty Care Access Network-Extension for Community Healthcare Outcomes model at primary care clinics.

    PubMed

    Watts, Sharon A; Roush, Laura; Julius, Mary; Sood, Ajay

    2016-06-01

    An increasing number of patients with diabetes mellitus has created a need for innovative delivery of specialized care not only by diabetes specialists but also by primary care providers (PCPs) as well. A potential avenue to address this need is training of PCPs by specialists via telehealth. The Veteran Affairs (VA) Specialty Care Access Network-Extension for Community Healthcare Outcomes (SCAN-ECHO) program includes education and case-based learning for PCPs by a multidisciplinary specialty team utilizing videoconferencing technology. Two PCPs completed a year of SCAN-ECHO diabetes training. These two PCPs set up "diabetes mini-clinics" to treat difficult-to-control high-risk patients with diabetes mellitus from their own panel and from their colleagues in the same community-based outpatient clinic (CBOC). We utilized a retrospective program evaluation by t-test using pre/post glycated hemoglobin (HbA1c) lab values after being seen by the two PCPs. A total of 39 patients, all with HbA1c > 9.0%, were seen in the two PCP mini-clinics over 15 months. The mean HbA1c improved from 10.2 ± 1.4% to 8.4 ± 1.8% (p < 0.001) over the average follow-up period of five months. This was not explained by system-wide changes or improvements. Care of veteran patients with poorly controlled diabetes by PCPs who participated in SCAN-ECHO program leads to improvement in glycemic control. This model of health care delivery can be effective in remote or rural areas with limited availability of specialists. © The Author(s) 2015.

  2. SEED Servers: High-Performance Access to the SEED Genomes, Annotations, and Metabolic Models

    PubMed Central

    Aziz, Ramy K.; Devoid, Scott; Disz, Terrence; Edwards, Robert A.; Henry, Christopher S.; Olsen, Gary J.; Olson, Robert; Overbeek, Ross; Parrello, Bruce; Pusch, Gordon D.; Stevens, Rick L.; Vonstein, Veronika; Xia, Fangfang

    2012-01-01

    The remarkable advance in sequencing technology and the rising interest in medical and environmental microbiology, biotechnology, and synthetic biology resulted in a deluge of published microbial genomes. Yet, genome annotation, comparison, and modeling remain a major bottleneck to the translation of sequence information into biological knowledge, hence computational analysis tools are continuously being developed for rapid genome annotation and interpretation. Among the earliest, most comprehensive resources for prokaryotic genome analysis, the SEED project, initiated in 2003 as an integration of genomic data and analysis tools, now contains >5,000 complete genomes, a constantly updated set of curated annotations embodied in a large and growing collection of encoded subsystems, a derived set of protein families, and hundreds of genome-scale metabolic models. Until recently, however, maintaining current copies of the SEED code and data at remote locations has been a pressing issue. To allow high-performance remote access to the SEED database, we developed the SEED Servers (http://www.theseed.org/servers): four network-based servers intended to expose the data in the underlying relational database, support basic annotation services, offer programmatic access to the capabilities of the RAST annotation server, and provide access to a growing collection of metabolic models that support flux balance analysis. The SEED servers offer open access to regularly updated data, the ability to annotate prokaryotic genomes, the ability to create metabolic reconstructions and detailed models of metabolism, and access to hundreds of existing metabolic models. This work offers and supports a framework upon which other groups can build independent research efforts. Large integrations of genomic data represent one of the major intellectual resources driving research in biology, and programmatic access to the SEED data will provide significant utility to a broad collection of potential

  3. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  4. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  5. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  6. Evolving provider payment models and patient access to innovative medical technology.

    PubMed

    Long, Genia; Mortimer, Richard; Sanzenbacher, Geoffrey

    2014-12-01

    Abstract Objective: To investigate the evolving use and expected impact of pay-for-performance (P4P) and risk-based provider reimbursement on patient access to innovative medical technology. Structured interviews with leading private payers representing over 110 million commercially-insured lives exploring current and planned use of P4P provider payment models, evidence requirements for technology assessment and new technology coverage, and the evolving relationship between the two topics. Respondents reported rapid increases in the use of P4P and risk-sharing programs, with roughly half of commercial lives affected 3 years ago, just under two-thirds today, and an expected three-quarters in 3 years. All reported well-established systems for evaluating new technology coverage. Five of nine reported becoming more selective in the past 3 years in approving new technologies; four anticipated that in the next 3 years there will be a higher evidence requirement for new technology access. Similarly, four expected it will become more difficult for clinically appropriate but costly technologies to gain coverage. All reported planning to rely more on these types of provider payment incentives to control costs, but didn't see them as a substitute for payer technology reviews and coverage limitations; they each have a role to play. Interviews limited to nine leading payers with models in place; self-reported data. Likely implications include a more uncertain payment environment for providers, and indirectly for innovative medical technology and future investment, greater reliance on quality and financial metrics, and increased evidence requirements for favorable coverage and utilization decisions. Increasing provider financial risk may challenge the traditional technology adoption paradigm, where payers assumed a 'gatekeeping' role and providers a countervailing patient advocacy role with regard to access to new technology. Increased provider financial risk may result in an

  7. Privacy aware access controls for medical data disclosure on European healthgrids.

    PubMed

    Rahmouni, Hanene Boussi; Solomonides, Tony; Mont, Marco Casassa; Shiu, Simon

    2010-01-01

    To be processed within a healthgrid environment, medical data goes through a complete lifecycle and several stages until it is finally used for the primary reason it has been collected for. This stage is not always the final occurrence of when the data would have been manipulated. The data could rather continue to be needed for secondary purposes of legitimate or non legitimate nature. Although other privacy issues are related to the processing of patient data while it is residing on a healthgrid environment, the control of data disclosure is our primary interest. When sharing medical data between different Healthcare and biomedical research organizations in Europe, it is important that the different parties involved in the sharing handle the data in the same way indicated by the legislation of the member state where the data was originally collected as the requirements might differ from one state to another. Privacy requirements, such as patient consent, may be subject to conflicting conditions between different national frameworks as well as between different legal and ethical frameworks within a single member state. These circumstances have made the compliance management process in European healthgrid very challenging. In this paper we are presenting an approach to tackle these issues by relying on several technologies contained in the semantic web stack. Our work suggests a direct mapping from high level legislation on privacy and data protection to operational level privacy aware controls. Additionally we suggest an architecture for the enforcement of these controls on access control models adopted by healthgrids security infrastructures.

  8. A casemix model for estimating the impact of hospital access block on the emergency department.

    PubMed

    Stuart, Peter

    2004-06-01

    To determine the ED activity and costs resulting from access block. A casemix model (AWOOS) was developed to measure activity due to access block. Using data from four hospitals between 1998 and 2002, ED activity was measured using the urgency and disposition group (UDG) casemix model and the AWOOS model with the purpose of determining the change in ED activity due to access block. Whilst the mean length of stay in ED (admitted patients) increased by 93% between 1998 and 2002, mean UDG activity increased by 0.63% compared to a mean increase in AWOOS activity of 24.5%. The 23.9% difference between UDG and AWOOS activity represents the (unmeasured) increase in ED activity and costs for the period 1998-2002 resulting from access block. The UDG system significantly underestimates the activity in EDs experiencing marked access block.

  9. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  10. Why build limited access highways?.

    DOT National Transportation Integrated Search

    1991-01-01

    This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...

  11. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    PubMed

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  12. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

    PubMed Central

    Yang, Yixian; Shi, Yuxiang

    2018-01-01

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269

  13. Estimating spatial accessibility to facilities on the regional scale: an extended commuting-based interaction potential model

    PubMed Central

    2011-01-01

    Background There is growing interest in the study of the relationships between individual health-related behaviours (e.g. food intake and physical activity) and measurements of spatial accessibility to the associated facilities (e.g. food outlets and sport facilities). The aim of this study is to propose measurements of spatial accessibility to facilities on the regional scale, using aggregated data. We first used a potential accessibility model that partly makes it possible to overcome the limitations of the most frequently used indices such as the count of opportunities within a given neighbourhood. We then propose an extended model in order to take into account both home and work-based accessibility for a commuting population. Results Potential accessibility estimation provides a very different picture of the accessibility levels experienced by the population than the more classical "number of opportunities per census tract" index. The extended model for commuters increases the overall accessibility levels but this increase differs according to the urbanisation level. Strongest increases are observed in some rural municipalities with initial low accessibility levels. Distance to major urban poles seems to play an essential role. Conclusions Accessibility is a multi-dimensional concept that should integrate some aspects of travel behaviour. Our work supports the evidence that the choice of appropriate accessibility indices including both residential and non-residential environmental features is necessary. Such models have potential implications for providing relevant information to policy-makers in the field of public health. PMID:21219597

  14. The assessment of exploitation process of power for access control system

    NASA Astrophysics Data System (ADS)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  15. Programmatic access to logical models in the Cell Collective modeling environment via a REST API.

    PubMed

    Kowal, Bryan M; Schreier, Travis R; Dauer, Joseph T; Helikar, Tomáš

    2016-01-01

    Cell Collective (www.cellcollective.org) is a web-based interactive environment for constructing, simulating and analyzing logical models of biological systems. Herein, we present a Web service to access models, annotations, and simulation data in the Cell Collective platform through the Representational State Transfer (REST) Application Programming Interface (API). The REST API provides a convenient method for obtaining Cell Collective data through almost any programming language. To ensure easy processing of the retrieved data, the request output from the API is available in a standard JSON format. The Cell Collective REST API is freely available at http://thecellcollective.org/tccapi. All public models in Cell Collective are available through the REST API. For users interested in creating and accessing their own models through the REST API first need to create an account in Cell Collective (http://thecellcollective.org). thelikar2@unl.edu. Technical user documentation: https://goo.gl/U52GWo. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  16. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  17. Evidence that attitude accessibility augments the relationship between speeding attitudes and speeding behavior: a test of the MODE model in the context of driving.

    PubMed

    Elliott, Mark A; Lee, Emme; Robertson, Jamie S; Innes, Rhona

    2015-01-01

    According to the MODE model of attitude-to-behavior processes, attitude accessibility augments attitude-behavior correspondence, reflecting an automatic influence of attitudes on behavior. We therefore tested whether attitude accessibility moderates the attitude-behavior relationship in a context that is governed by characteristically automatic behavior, namely driving. In study 1 (correlational design), participants (N=130) completed online questionnaire measures of the valences and accessibilities of their attitudes towards speeding. Two weeks later, online questionnaire measures of subsequent speeding behavior were obtained. Attitude valence was a significantly better predictor of behavior at high (mean+1SD) versus low (mean-1SD) levels of attitude accessibility. In study 2 (experimental design), attitude accessibility was manipulated with a repeated attitude expression task. Immediately after the manipulation, participants (N=122) completed online questionnaire measures of attitude valence and accessibility, and two weeks later, subsequent speeding behavior. Increased attitude accessibility in the experimental (versus control) condition generated an increase in attitude-behavior correspondence. The findings are consistent with the MODE model's proposition that attitudes can exert an automatic influence on behavior. Interventions to reduce speeding could usefully increase the accessibility of anti-speeding attitudes and reduce the accessibility of pro-speeding attitudes. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Decentralized Adaptive Control of Systems with Uncertain Interconnections, Plant-Model Mismatch and Actuator Failures

    NASA Technical Reports Server (NTRS)

    Patre, Parag; Joshi, Suresh M.

    2011-01-01

    Decentralized adaptive control is considered for systems consisting of multiple interconnected subsystems. It is assumed that each subsystem s parameters are uncertain and the interconnection parameters are not known. In addition, mismatch can exist between each subsystem and its reference model. A strictly decentralized adaptive control scheme is developed, wherein each subsystem has access only to its own state but has the knowledge of all reference model states. The mismatch is estimated online for each subsystem and the mismatch estimates are used to adaptively modify the corresponding reference models. The adaptive control scheme is extended to the case with actuator failures in addition to mismatch.

  19. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  20. BIOPACK: the ground controlled late access biological research facility.

    PubMed

    van Loon, Jack J W A

    2004-03-01

    Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.

  1. Developing a Multicomponent Model of Nutritious Food Access and Related Implications for Community and Policy Practice.

    PubMed

    Freedman, Darcy A; Blake, Christine E; Liese, Angela D

    2013-01-01

    Access to nutritious foods is limited in disenfranchised communities in the United States. Policies are beginning to focus on improving nutritious food access in these contexts; yet, few theories are available to guide this work. We developed a conceptual model of nutritious food access based on the qualitative responses of food consumers in 2 different regions of the American South. Five domains (economic, service delivery, spatial-temporal, social, and personal) and related dimensions of nutritious food access were identified. The conceptual model provides practical guidance to researchers, policy makers, and practitioners working to improve nutritious food access in communities.

  2. Developing a Multicomponent Model of Nutritious Food Access and Related Implications for Community and Policy Practice

    PubMed Central

    FREEDMAN, DARCY A.; BLAKE, CHRISTINE E.; LIESE, ANGELA D.

    2014-01-01

    Access to nutritious foods is limited in disenfranchised communities in the United States. Policies are beginning to focus on improving nutritious food access in these contexts; yet, few theories are available to guide this work. We developed a conceptual model of nutritious food access based on the qualitative responses of food consumers in 2 different regions of the American South. Five domains (economic, service delivery, spatial–temporal, social, and personal) and related dimensions of nutritious food access were identified. The conceptual model provides practical guidance to researchers, policy makers, and practitioners working to improve nutritious food access in communities. PMID:24563605

  3. Development and Testing of a Conceptual Model Regarding Men's Access to Health Care.

    PubMed

    Leone, James E; Rovito, Michael J; Mullin, Elizabeth M; Mohammed, Shan D; Lee, Christina S

    2017-03-01

    Epidemiologic data suggest men often experience excessive morbidity and early mortality, possibly compromising family and community health over the lifespan. Moreover, the negative financial/economic consequences affected by poor male health outcomes also has been of great concern in the United States and abroad. Early and consistent access to preventative health care may improve health outcomes; however, men are far less likely to access these services. The purpose of this study was to understand what factors preclude men from accessing health care. We surveyed 485 participants using a 58-item online survey built from a conceptual model previously developed by the researchers using hegemonic masculinity theory, the theory of normative contentment, and the health belief model. For men, three items significantly ( ps < .05) predicted whether they had seen a health care provider in the past year: "I/Men do not access healthcare because I do not think there is anything wrong with me," "My health is only about me," and "I/Men do not access healthcare because most men in my family do not access healthcare." Other correlations of practical significance also were noted. Results suggest gender norms and masculine ideals may play a primary role in how men access preventative health care. Future programming targeting males should consider barriers and plan programs that are gender-sensitive in addition to being gender-specific. Clinical implications are discussed.

  4. Location-Allocation and Accessibility Models for Improving the Spatial Planning of Public Health Services

    PubMed Central

    Polo, Gina; Acosta, C. Mera; Ferreira, Fernando; Dias, Ricardo Augusto

    2015-01-01

    This study integrated accessibility and location-allocation models in geographic information systems as a proposed strategy to improve the spatial planning of public health services. To estimate the spatial accessibility, we modified the two-step floating catchment area (2SFCA) model with a different impedance function, a Gaussian weight for competition among service sites, a friction coefficient, distances along a street network based on the Dijkstra’s algorithm and by performing a vectorial analysis. To check the accuracy of the strategy, we used the data from the public sterilization program for the dogs and cats of Bogot´a, Colombia. Since the proposed strategy is independent of the service, it could also be applied to any other public intervention when the capacity of the service is known. The results of the accessibility model were consistent with the sterilization program data, revealing that the western, central and northern zones are the most isolated areas under the sterilization program. Spatial accessibility improvement was sought by relocating the sterilization sites using the maximum coverage with finite demand and the p-median models. The relocation proposed by the maximum coverage model more effectively maximized the spatial accessibility to the sterilization service given the non-uniform distribution of the populations of dogs and cats throughout the city. The implementation of the proposed strategy would provide direct benefits by improving the effectiveness of different public health interventions and the use of financial and human resources. PMID:25775411

  5. When Does Model-Based Control Pay Off?

    PubMed Central

    2016-01-01

    Many accounts of decision making and reinforcement learning posit the existence of two distinct systems that control choice: a fast, automatic system and a slow, deliberative system. Recent research formalizes this distinction by mapping these systems to “model-free” and “model-based” strategies in reinforcement learning. Model-free strategies are computationally cheap, but sometimes inaccurate, because action values can be accessed by inspecting a look-up table constructed through trial-and-error. In contrast, model-based strategies compute action values through planning in a causal model of the environment, which is more accurate but also more cognitively demanding. It is assumed that this trade-off between accuracy and computational demand plays an important role in the arbitration between the two strategies, but we show that the hallmark task for dissociating model-free and model-based strategies, as well as several related variants, do not embody such a trade-off. We describe five factors that reduce the effectiveness of the model-based strategy on these tasks by reducing its accuracy in estimating reward outcomes and decreasing the importance of its choices. Based on these observations, we describe a version of the task that formally and empirically obtains an accuracy-demand trade-off between model-free and model-based strategies. Moreover, we show that human participants spontaneously increase their reliance on model-based control on this task, compared to the original paradigm. Our novel task and our computational analyses may prove important in subsequent empirical investigations of how humans balance accuracy and demand. PMID:27564094

  6. When Does Model-Based Control Pay Off?

    PubMed

    Kool, Wouter; Cushman, Fiery A; Gershman, Samuel J

    2016-08-01

    Many accounts of decision making and reinforcement learning posit the existence of two distinct systems that control choice: a fast, automatic system and a slow, deliberative system. Recent research formalizes this distinction by mapping these systems to "model-free" and "model-based" strategies in reinforcement learning. Model-free strategies are computationally cheap, but sometimes inaccurate, because action values can be accessed by inspecting a look-up table constructed through trial-and-error. In contrast, model-based strategies compute action values through planning in a causal model of the environment, which is more accurate but also more cognitively demanding. It is assumed that this trade-off between accuracy and computational demand plays an important role in the arbitration between the two strategies, but we show that the hallmark task for dissociating model-free and model-based strategies, as well as several related variants, do not embody such a trade-off. We describe five factors that reduce the effectiveness of the model-based strategy on these tasks by reducing its accuracy in estimating reward outcomes and decreasing the importance of its choices. Based on these observations, we describe a version of the task that formally and empirically obtains an accuracy-demand trade-off between model-free and model-based strategies. Moreover, we show that human participants spontaneously increase their reliance on model-based control on this task, compared to the original paradigm. Our novel task and our computational analyses may prove important in subsequent empirical investigations of how humans balance accuracy and demand.

  7. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  8. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The individual...

  9. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    PubMed

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  10. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    PubMed Central

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  11. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  12. Making objective summaries of climate model behavior more accessible

    NASA Astrophysics Data System (ADS)

    Gleckler, P. J.

    2016-12-01

    For multiple reasons, a more efficient and systematic evaluation of publically available climate model simulations is urgently needed. The IPCC, national assessments, and an assortment of other public and policy-driven needs place taxing demands on researchers. While cutting edge research is essential to meeting these needs, so too are results from well-established analysis, and these should be more efficiently produced, widely accessible, and be highly traceable. Furthermore, the number of simulations used by the research community is already large and expected to dramatically increase with the 6th phase of the Coupled Model Intercomparison Project (CMIP6). To help meet the demands on the research community and synthesize results from the rapidly expanding number and complexity of model simulations, well-established characteristics from all CMIP DECK (Diagnosis, Evaluation and Characterization of Klima) experiments will be routinely produced and made accessible. This presentation highlights the PCMDI Metrics Package (PMP), a capability that is designed to provide a diverse suite of objective summary statistics across spatial and temporal scales, gauging the agreement between models and observations. In addition to the PMP, ESMValTool is being developed to broadly diagnose CMIP simulations, and a variety of other packages target specialized sets of analysis. The challenges and opportunities of working towards coordinating these community-based capabilities will be discussed.

  13. Beyond 'flood hotspots': Modelling emergency service accessibility during flooding in York, UK

    NASA Astrophysics Data System (ADS)

    Coles, Daniel; Yu, Dapeng; Wilby, Robert L.; Green, Daniel; Herring, Zara

    2017-03-01

    This paper describes the development of a method that couples flood modelling with network analysis to evaluate the accessibility of city districts by emergency responders during flood events. We integrate numerical modelling of flood inundation with geographical analysis of service areas for the Ambulance Service and the Fire & Rescue Service. The method was demonstrated for two flood events in the City of York, UK to assess the vulnerability of care homes and sheltered accommodation. We determine the feasibility of emergency services gaining access within the statutory 8- and 10-min targets for high-priority, life-threatening incidents 75% of the time, during flood episodes. A hydrodynamic flood inundation model (FloodMap) simulates the 2014 pluvial and 2015 fluvial flood events. Predicted floods (with depth >25 cm and areas >100 m2) were overlain on the road network to identify sites with potentially restricted access. Accessibility of the city to emergency responders during flooding was quantified and mapped using; (i) spatial coverage from individual emergency nodes within the legislated timeframes, and; (ii) response times from individual emergency service nodes to vulnerable care homes and sheltered accommodation under flood and non-flood conditions. Results show that, during the 2015 fluvial flood, the area covered by two of the three Fire & Rescue Service stations reduced by 14% and 39% respectively, while the remaining station needed to increase its coverage by 39%. This amounts to an overall reduction of 6% and 20% for modelled and observed floods respectively. During the 2014 surface water flood, 7 out of 22 care homes (32%) and 15 out of 43 sheltered accommodation nodes (35%) had modelled response times above the 8-min threshold from any Ambulance station. Overall, modelled surface water flooding has a larger spatial footprint than fluvial flood events. Hence, accessibility of emergency services may be impacted differently depending on flood mechanism

  14. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  15. Access to Orthopaedic Surgical Care in Northern Tanzania: A Modelling Study.

    PubMed

    Premkumar, Ajay; Ying, Xiaohan; Mack Hardaker, W; Massawe, Honest H; Mshahaba, David J; Mandari, Faiton; Pallangyo, Anthony; Temu, Rogers; Masenga, Gileard; Spiegel, David A; Sheth, Neil P

    2018-04-25

    The global burden of musculoskeletal disease and resulting disability is enormous and is expected to increase over the next few decades. In the world's poorest regions, the paucity of information defining and quantifying the current state of access to orthopaedic surgical care is a major problem in developing effective solutions. This study estimates the number of individuals in Northern Tanzania without adequate access to orthopaedic surgical services. A chance tree was created to model the probability of access to orthopaedic surgical services in the Northern Tanzanian regions of Arusha, Kilimanjaro, Tanga, Singida, and Manyara, with respect to four dimensions: timeliness, surgical capacity, safety, and affordability. Timeliness was estimated by the proportion of people living within a 4-h driving distance from a hospital with an orthopaedic surgeon, capacity by comparing number of surgeries performed to the number of surgeries indicated, safety by applying WHO Emergency and Essential Surgical Care infrastructure and equipment checklists, and affordability by approximating the proportion of the population protected from catastrophic out-of-pocket healthcare expenditure. We accounted for uncertainty in our model with one-way and probabilistic sensitivity analyses. Data sources included the Tanzanian National Bureau of Statistics and Ministry of Finance, World Bank, World Health Organization, New Zealand Ministry of Health, Google Corporation, NASA population estimator, and 2015 hospital records from Kilimanjaro Christian Medical Center, Machame Hospital, Nkoroanga Hospital, Mt. Meru Hospital, and Arusha Lutheran Medical Center. Under the most conservative assumptions, more than 90% of the Northern Tanzanian population does not have access to orthopaedic surgical services. There is a near absence of access to orthopaedic surgical care in Northern Tanzania. These findings utilize more precise country and region-specific data and are consistent with prior published

  16. A Control Theory Model of Smoking

    PubMed Central

    Bobashev, Georgiy; Holloway, John; Solano, Eric; Gutkin, Boris

    2017-01-01

    We present a heuristic control theory model that describes smoking under restricted and unrestricted access to cigarettes. The model is based on the allostasis theory and uses a formal representation of a multiscale opponent process. The model simulates smoking behavior of an individual and produces both short-term (“loading up” after not smoking for a while) and long-term smoking patterns (e.g., gradual transition from a few cigarettes to one pack a day). By introducing a formal representation of withdrawal- and craving-like processes, the model produces gradual increases over time in withdrawal- and craving-like signals associated with abstinence and shows that after 3 months of abstinence, craving disappears. The model was programmed as a computer application allowing users to select simulation scenarios. The application links images of brain regions that are activated during the binge/intoxication, withdrawal, or craving with corresponding simulated states. The model was calibrated to represent smoking patterns described in peer-reviewed literature; however, it is generic enough to be adapted to other drugs, including cocaine and opioids. Although the model does not mechanistically describe specific neurobiological processes, it can be useful in prevention and treatment practices as an illustration of drug-using behaviors and expected dynamics of withdrawal and craving during abstinence. PMID:28868531

  17. The transferability of safety-driven access management models for application to other sites.

    DOT National Transportation Integrated Search

    2001-01-01

    Several research studies have produced mathematical models that predict the safety impacts of selected access management techniques. Since new models require substantial resources to construct, this study evaluated five existing models with regard to...

  18. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  19. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  20. Interactive, open source, travel time scenario modelling: tools to facilitate participation in health service access analysis.

    PubMed

    Fisher, Rohan; Lassa, Jonatan

    2017-04-18

    Modelling travel time to services has become a common public health tool for planning service provision but the usefulness of these analyses is constrained by the availability of accurate input data and limitations inherent in the assumptions and parameterisation. This is particularly an issue in the developing world where access to basic data is limited and travel is often complex and multi-modal. Improving the accuracy and relevance in this context requires greater accessibility to, and flexibility in, travel time modelling tools to facilitate the incorporation of local knowledge and the rapid exploration of multiple travel scenarios. The aim of this work was to develop simple open source, adaptable, interactive travel time modelling tools to allow greater access to and participation in service access analysis. Described are three interconnected applications designed to reduce some of the barriers to the more wide-spread use of GIS analysis of service access and allow for complex spatial and temporal variations in service availability. These applications are an open source GIS tool-kit and two geo-simulation models. The development of these tools was guided by health service issues from a developing world context but they present a general approach to enabling greater access to and flexibility in health access modelling. The tools demonstrate a method that substantially simplifies the process for conducting travel time assessments and demonstrate a dynamic, interactive approach in an open source GIS format. In addition this paper provides examples from empirical experience where these tools have informed better policy and planning. Travel and health service access is complex and cannot be reduced to a few static modeled outputs. The approaches described in this paper use a unique set of tools to explore this complexity, promote discussion and build understanding with the goal of producing better planning outcomes. The accessible, flexible, interactive and

  1. The influence of patriarchal behavior on birth control access and use among recent Hispanic immigrants.

    PubMed

    Gonzalez, Eleazar U; Sable, Marjorie R; Campbell, James D; Dannerbeck, Anne

    2010-08-01

    It is commonly assumed that Hispanic immigrants in the United States subscribe to a patriarchal ideology that keeps women subordinated to men, often through violence and exploitative reproductive behaviors. If this assumption is true, we might expect to find that in the Hispanic culture patriarchal males control decision-making about access to and use of birth control. Structured interviews of 100 Hispanic men and 100 Hispanic women who were recent immigrants to a Midwest community were conducted to examine this assumption. Results did not support this assumption among this study population. We found no patriarchal ideology supporting women's subordination to men, violence as a mechanism of control, reproduction as a way of exploitation, or cultural influences discouraging access to and use of birth control in the Hispanic community. Rather, these immigrants revealed adequate knowledge of birth control use and positive perceptions of gender equality. Gaining a better understanding of the limited influence of patriarchal ideology on the use of birth control and family planning services among this Hispanic community may inform the development of family planning services tailored for new Hispanic immigrants.

  2. Fertility decline and social service access: reconciling behavioral and medical models.

    PubMed

    Weinstein, J

    1978-01-01

    In this summary of fertility literature the author attempts to differentiate between the effects of behavioral and medical models of family planning programs on the fertility rate. This is done by determining the effects of access to social welfare services by assessment of: the function of children within the family life survey conducted in the Cameroons are also used. It was found that 7 interdependent elements of social service are involved: 1) general health care; 2) social security for sick and aged; 3) employment training and opportunities for adults; 4) literacy and education; 5) communication and transportation systems; 6) housing and infrastructure; 7) child care and welfare. The presence of these elements is shown to accompany low fertility while their absence is expressed in high rates of child bearing. These elements are major variables in both the nomological and public policy senses. 2 additional components are knowledge of and favorable attitudes towards effective means of fertility control plus effective mechanical, chemical, or natural means of limiting fertility. The concept of fertility norm and its impact on the fertility rate is explained as being the result of the collective force which social affiliations exert on people to reproduce in a certain way. The "stopping rule" is that which will fulfill the fertility norm. An example of this is a culture which continues child bearing until a son has been born and then controls reproduction after this has happened. Such factors must be considered for family planning programs to succeed in these cultures. Therefore fertility levels are found to be the product of prevailing norms and technical ability to achieve these norms. Improvement in levels of access to social services can bring about the lowering of these norms.

  3. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  4. Hemodialysis Reliable Outflow (HeRO) device in end-stage dialysis access: a decision analysis model.

    PubMed

    Dageforde, Leigh Anne; Bream, Peter R; Moore, Derek E

    2012-09-01

    The Hemodialysis Reliable Outflow (HeRO) dialysis access device is a permanent tunneled dialysis graft connected to a central venous catheter and is used in patients with end-stage dialysis access (ESDA) issues secondary to central venous stenosis. The safety and effectiveness of the HeRO device has previously been proven, but no study thus far has compared the cost of its use with tunneled dialysis catheters (TDCs) and thigh grafts in patients with ESDA. A decision analytic model was developed to simulate outcomes for patients with ESDA undergoing placement of a HeRO dialysis access device, TDC, or thigh graft. Outcomes of interest were infection, thrombosis, and ischemic events. Baseline values, ranges, and costs were determined from a systematic review of the literature. Total costs were based on 1 year of post-procedure outcomes. Sensitivity analyses were conducted to test model strength. The HeRO dialysis access device is the least costly dialysis access with an average 1-year cost of $6521. The 1-year cost for a TDC was $8477. A thigh graft accounted for $9567 in a 1-year time period. The HeRO dialysis access device is the least costly method of ESDA. The primary determinants of cost in this model are infection in TDCs and leg ischemia necessitating amputation in thigh grafts. Further study is necessary to incorporate patient preference and quality of life into the model. Copyright © 2012 Elsevier Inc. All rights reserved.

  5. Public Libraries and Internet Public Access Models: Describing Possible Approaches.

    ERIC Educational Resources Information Center

    Tomasello, Tami K.; McClure, Charles R.

    2002-01-01

    Discusses ways of providing Internet access to the general public and analyzes eight models currently in use: public schools, public libraries, cybermobiles, public housing, community technology centers, community networks, kiosks, and cyber cafes. Concludes that public libraries may wish to develop collaborative strategies with other…

  6. Primary care access improvement: an empowerment-interaction model.

    PubMed

    Ledlow, G R; Bradshaw, D M; Shockley, C

    2000-05-01

    Improving community primary care access is a difficult and dynamic undertaking. Realizing a need to improve appointment availability, a systematic approach based on measurement, empowerment, and interaction was developed. The model fostered exchange of information and problem solving between interdependent staff sections within a managed care system. Measuring appointments demanded but not available proved to be a credible customer-focused approach to benchmark against set goals. Changing the organizational culture to become more sensitive to changing beneficiary needs was a paramount consideration. Dependent-group t tests were performed to compare the pretreatment and posttreatment effect. The empowerment-interaction model significantly improved the availability of routine and wellness-type appointments. The availability of urgent appointments improved but not significantly; a better prospective model needs to be developed. In aggregate, appointments demanded but not available (empowerment-interaction model) were more than 10% before the treatment and less than 3% with the treatment.

  7. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  8. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.

  9. The GeoDataPortal: A Standards-based Environmental Modeling Data Access and Manipulation Toolkit

    NASA Astrophysics Data System (ADS)

    Blodgett, D. L.; Kunicki, T.; Booth, N.; Suftin, I.; Zoerb, R.; Walker, J.

    2010-12-01

    Environmental modelers from fields of study such as climatology, hydrology, geology, and ecology rely on many data sources and processing methods that are common across these disciplines. Interest in inter-disciplinary, loosely coupled modeling and data sharing is increasing among scientists from the USGS, other agencies, and academia. For example, hydrologic modelers need downscaled climate change scenarios and land cover data summarized for the watersheds they are modeling. Subsequently, ecological modelers are interested in soil moisture information for a particular habitat type as predicted by the hydrologic modeler. The USGS Center for Integrated Data Analytics Geo Data Portal (GDP) project seeks to facilitate this loose model coupling data sharing through broadly applicable open-source web processing services. These services simplify and streamline the time consuming and resource intensive tasks that are barriers to inter-disciplinary collaboration. The GDP framework includes a catalog describing projects, models, data, processes, and how they relate. Using newly introduced data, or sources already known to the catalog, the GDP facilitates access to sub-sets and common derivatives of data in numerous formats on disparate web servers. The GDP performs many of the critical functions needed to summarize data sources into modeling units regardless of scale or volume. A user can specify their analysis zones or modeling units as an Open Geospatial Consortium (OGC) standard Web Feature Service (WFS). Utilities to cache Shapefiles and other common GIS input formats have been developed to aid in making the geometry available for processing via WFS. Dataset access in the GDP relies primarily on the Unidata NetCDF-Java library’s common data model. Data transfer relies on methods provided by Unidata’s Thematic Real-time Environmental Data Distribution System Data Server (TDS). TDS services of interest include the Open-source Project for a Network Data Access Protocol

  10. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  11. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  12. Do new and traditional models of primary care differ with regard to access?: Canadian QUALICOPC study.

    PubMed

    Miedema, Baukje; Easley, Julie; Thompson, Ashley E; Boivin, Antoine; Aubrey-Bassler, Kris; Katz, Alan; Hogg, William E; Breton, Mylaine; Francoeur, Danièle; Wong, Sabrina T; Wodchis, Walter P

    2016-01-01

    To examine access to primary care in new and traditional models using 2 dimensions of the concept of patient-centred access. An international survey examining the quality and costs of primary health care (the QUALICOPC study) was conducted in 2013 in Canada. This study adopted a descriptive cross-sectional survey method using data from practices across Canada. Each participating practice filled out the Family Physician Survey and the Practice Survey, and patients in each participating practice were asked to complete the Patient Experiences Survey. All 10 Canadian provinces. A total of 759 practices and 7172 patients. Independent t tests were conducted to examine differences between new and traditional models of care in terms of availability and accommodation, and affordability of care. Of the 759 practices, 407 were identified as having new models of care and 352 were identified as traditional. New models of care were distinct with respect to payment structure, opening hours, and having an interdisciplinary work force. Most participating practices were from large cities or suburban areas. There were few differences between new and traditional models of care regarding accessibility and accommodation in primary care. Patients under new models of care reported easier access to other physicians in the same practice, while patients from traditional models reported seeing their regular family physicians more frequently. There was no difference between the new and traditional models of care with regard to affordability of primary care. Patients attending clinics with new models of care reported that their physicians were more involved with them as a whole person than patients attending clinics based on traditional models did. Primary care access issues do not differ strongly between traditional and new models of care; however, patients in the new models of care believed that their physicians were more involved with them as people.

  13. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  14. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  15. Modelling high data rate communication network access protocol

    NASA Technical Reports Server (NTRS)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  16. Spatially explicit control of invasive species using a reaction-diffusion model

    USGS Publications Warehouse

    Bonneau, Mathieu; Johnson, Fred A.; Romagosa, Christina M.

    2016-01-01

    Invasive species, which can be responsible for severe economic and environmental damages, must often be managed over a wide area with limited resources, and the optimal allocation of effort in space and time can be challenging. If the spatial range of the invasive species is large, control actions might be applied only on some parcels of land, for example because of property type, accessibility, or limited human resources. Selecting the locations for control is critical and can significantly impact management efficiency. To help make decisions concerning the spatial allocation of control actions, we propose a simulation based approach, where the spatial distribution of the invader is approximated by a reaction–diffusion model. We extend the classic Fisher equation to incorporate the effect of control both in the diffusion and local growth of the invader. The modified reaction–diffusion model that we propose accounts for the effect of control, not only on the controlled locations, but on neighboring locations, which are based on the theoretical speed of the invasion front. Based on simulated examples, we show the superiority of our model compared to the state-of-the-art approach. We illustrate the use of this model for the management of Burmese pythons in the Everglades (Florida, USA). Thanks to the generality of the modified reaction–diffusion model, this framework is potentially suitable for a wide class of management problems and provides a tool for managers to predict the effects of different management strategies.

  17. Access to a Responsiveness to Intervention Model: Does Beginning Intervention in Kindergarten Matter?

    ERIC Educational Resources Information Center

    O'Connor, Rollanda E.; Bocian, Kathleen M.; Sanchez, Victoria; Beach, Kristen D.

    2014-01-01

    In this study, we tested the outcomes of access to a Response to Intervention (RtI) model in kindergarten or in first grade on end-of-Grade-2 reading achievement and placement in special education. Across five schools, 214 students who began having access to Tier 2 intervention in kindergarten or first grade were compared in Grades 1 and 2 with…

  18. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  19. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  20. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  1. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  2. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  3. Development and Testing of a Conceptual Model Regarding Men’s Access to Health Care

    PubMed Central

    Leone, James E.; Rovito, Michael J.; Mullin, Elizabeth M.; Mohammed, Shan D.; Lee, Christina S.

    2016-01-01

    Epidemiologic data suggest men often experience excessive morbidity and early mortality, possibly compromising family and community health over the lifespan. Moreover, the negative financial/economic consequences affected by poor male health outcomes also has been of great concern in the United States and abroad. Early and consistent access to preventative health care may improve health outcomes; however, men are far less likely to access these services. The purpose of this study was to understand what factors preclude men from accessing health care. We surveyed 485 participants using a 58-item online survey built from a conceptual model previously developed by the researchers using hegemonic masculinity theory, the theory of normative contentment, and the health belief model. For men, three items significantly (ps < .05) predicted whether they had seen a health care provider in the past year: “I/Men do not access healthcare because I do not think there is anything wrong with me,” “My health is only about me,” and “I/Men do not access healthcare because most men in my family do not access healthcare.” Other correlations of practical significance also were noted. Results suggest gender norms and masculine ideals may play a primary role in how men access preventative health care. Future programming targeting males should consider barriers and plan programs that are gender-sensitive in addition to being gender-specific. Clinical implications are discussed. PMID:27698256

  4. The climate4impact platform: Providing, tailoring and facilitating climate model data access

    NASA Astrophysics Data System (ADS)

    Pagé, Christian; Pagani, Andrea; Plieger, Maarten; Som de Cerff, Wim; Mihajlovski, Andrej; de Vreede, Ernst; Spinuso, Alessandro; Hutjes, Ronald; de Jong, Fokke; Bärring, Lars; Vega, Manuel; Cofiño, Antonio; d'Anca, Alessandro; Fiore, Sandro; Kolax, Michael

    2017-04-01

    One of the main objectives of climate4impact is to provide standardized web services and tools that are reusable in other portals. These services include web processing services, web coverage services and web mapping services (WPS, WCS and WMS). Tailored portals can be targeted to specific communities and/or countries/regions while making use of those services. Easier access to climate data is very important for the climate change impact communities. To fulfill this objective, the climate4impact (http://climate4impact.eu/) web portal and services has been developed, targeting climate change impact modellers, impact and adaptation consultants, as well as other experts using climate change data. It provides to users harmonized access to climate model data through tailored services. It features static and dynamic documentation, Use Cases and best practice examples, an advanced search interface, an integrated authentication and authorization system with the Earth System Grid Federation (ESGF), a visualization interface with ADAGUC web mapping tools. In the latest version, statistical downscaling services, provided by the Santander Meteorology Group Downscaling Portal, were integrated. An innovative interface to integrate statistical downscaling services will be released in the upcoming version. The latter will be a big step in bridging the gap between climate scientists and the climate change impact communities. The climate4impact portal builds on the infrastructure of an international distributed database that has been set to disseminate the results from the global climate model results of the Coupled Model Intercomparison project Phase 5 (CMIP5). This database, the ESGF, is an international collaboration that develops, deploys and maintains software infrastructure for the management, dissemination, and analysis of climate model data. The European FP7 project IS-ENES, Infrastructure for the European Network for Earth System modelling, supports the European

  5. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    PubMed

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  6. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  7. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  8. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  9. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  10. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  11. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  12. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  13. Model Based User's Access Requirement Analysis of E-Governance Systems

    NASA Astrophysics Data System (ADS)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  14. ViSA: a neurodynamic model for visuo-spatial working memory, attentional blink, and conscious access.

    PubMed

    Simione, Luca; Raffone, Antonino; Wolters, Gezinus; Salmas, Paola; Nakatani, Chie; Belardinelli, Marta Olivetti; van Leeuwen, Cees

    2012-10-01

    Two separate lines of study have clarified the role of selectivity in conscious access to visual information. Both involve presenting multiple targets and distracters: one simultaneously in a spatially distributed fashion, the other sequentially at a single location. To understand their findings in a unified framework, we propose a neurodynamic model for Visual Selection and Awareness (ViSA). ViSA supports the view that neural representations for conscious access and visuo-spatial working memory are globally distributed and are based on recurrent interactions between perceptual and access control processors. Its flexible global workspace mechanisms enable a unitary account of a broad range of effects: It accounts for the limited storage capacity of visuo-spatial working memory, attentional cueing, and efficient selection with multi-object displays, as well as for the attentional blink and associated sparing and masking effects. In particular, the speed of consolidation for storage in visuo-spatial working memory in ViSA is not fixed but depends adaptively on the input and recurrent signaling. Slowing down of consolidation due to weak bottom-up and recurrent input as a result of brief presentation and masking leads to the attentional blink. Thus, ViSA goes beyond earlier 2-stage and neuronal global workspace accounts of conscious processing limitations. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  15. An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.

    PubMed

    Li, Huaming; Tan, Jindong

    2005-01-01

    In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.

  16. Evaluation of Standards for Access Control Enabling PHR-S Federation.

    PubMed

    Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan

    2017-01-01

    The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.

  17. The Open Access Model of Meteorologische Zeitschrift and other meteorological journals

    NASA Astrophysics Data System (ADS)

    Emeis, S.

    2009-09-01

    Today's availability and possibilities of the internet have already brought significant changes to the means of scientific communication. This also affects the publication and reception of peer-reviewed papers in scientific journals. In pre-internet times, the publication of scientific journals was mainly financed through subscription fees paid by libraries and other subscribers. The readers went to the libraries of their institution to search, read, and photocopy these papers. Today, everybody expects to have scientific papers more or less freely available on their desktop computers and from their printers. This has forced the publishers to change the financial model for the publication of scientific papers. An increasing number of journals now publish papers whose production costs have to be paid before the publication by the author or its institution. Those "pre-paid” papers are then freely available from the internet. This publication model has become known as "Open Access (OA)” model. Also the 126-year old Meteorologische Zeitschrift has changed its publication model to an Optional Open Access model. The features of this model will be presented and compared to other OA models with meteorological journals. This change in the publication models with a shift of its payment from the end (libraries and subscribers) to the beginning of the publication process (authors) has also confronted the scientific research and funding institutions with some problems. They must now also change their structures in financing one of their major outputs, the publications of their researchers. A few aspects of the present state of this shift will be addressed.

  18. A Case-Series Test of the Interactive Two-Step Model of Lexical Access: Predicting Word Repetition from Picture Naming

    ERIC Educational Resources Information Center

    Dell, Gary S.; Martin, Nadine; Schwartz, Myrna F.

    2007-01-01

    Lexical access in language production, and particularly pathologies of lexical access, are often investigated by examining errors in picture naming and word repetition. In this article, we test a computational approach to lexical access, the two-step interactive model, by examining whether the model can quantitatively predict the repetition-error…

  19. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  20. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  1. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  2. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  3. Investigating Access Performance of Long Time Series with Restructured Big Model Data

    NASA Astrophysics Data System (ADS)

    Shen, S.; Ostrenga, D.; Vollmer, B.; Meyer, D. J.

    2017-12-01

    Data sets generated by models are substantially increasing in volume, due to increases in spatial and temporal resolution, and the number of output variables. Many users wish to download subsetted data in preferred data formats and structures, as it is getting increasingly difficult to handle the original full-size data files. For example, application research users, such as those involved with wind or solar energy, or extreme weather events, are likely only interested in daily or hourly model data at a single point or for a small area for a long time period, and prefer to have the data downloaded in a single file. With native model file structures, such as hourly data from NASA Modern-Era Retrospective analysis for Research and Applications Version-2 (MERRA-2), it may take over 10 hours for the extraction of interested parameters at a single point for 30 years. The NASA Goddard Earth Sciences Data and Information Services Center (GES DISC) is exploring methods to address this particular user need. One approach is to create value-added data by reconstructing the data files. Taking MERRA-2 data as an example, we have tested converting hourly data from one-day-per-file into different data cubes, such as one-month, one-year, or whole-mission. Performance are compared for reading local data files and accessing data through interoperable service, such as OPeNDAP. Results show that, compared to the original file structure, the new data cubes offer much better performance for accessing long time series. We have noticed that performance is associated with the cube size and structure, the compression method, and how the data are accessed. An optimized data cube structure will not only improve data access, but also may enable better online analytic services.

  4. Investigating Access Performance of Long Time Series with Restructured Big Model Data

    NASA Technical Reports Server (NTRS)

    Shen, Suhung; Ostrenga, Dana M.; Vollmer, Bruce E.; Meyer, Dave

    2017-01-01

    Data sets generated by models are substantially increasing in volume, due to increases in spatial and temporal resolution, and the number of output variables. Many users wish to download subsetted data in preferred data formats and structures, as it is getting increasingly difficult to handle the original full-size data files. For example, application research users such as those involved with wind or solar energy, or extreme weather events are likely only interested in daily or hourly model data at a single point (or for a small area) for a long time period, and prefer to have the data downloaded in a single file. With native model file structures, such as hourly data from NASA Modern-Era Retrospective analysis for Research and Applications Version-2 (MERRA-2), it may take over 10 hours for the extraction of parameters-of-interest at a single point for 30 years. The NASA Goddard Earth Sciences Data and Information Services Center (GES DISC) is exploring methods to address this particular user need. One approach is to create value-added data by reconstructing the data files. Taking MERRA-2 data as an example, we have tested converting hourly data from one-day-per-file into different data cubes, such as one-month, or one-year. Performance is compared for reading local data files and accessing data through interoperable services, such as OPeNDAP. Results show that, compared to the original file structure, the new data cubes offer much better performance for accessing long time series. We have noticed that performance is associated with the cube size and structure, the compression method, and how the data are accessed. An optimized data cube structure will not only improve data access, but also may enable better online analysis services

  5. Clinician accessible tools for GUI computational models of transcranial electrical stimulation: BONSAI and SPHERES.

    PubMed

    Truong, Dennis Q; Hüber, Mathias; Xie, Xihe; Datta, Abhishek; Rahman, Asif; Parra, Lucas C; Dmochowski, Jacek P; Bikson, Marom

    2014-01-01

    Computational models of brain current flow during transcranial electrical stimulation (tES), including transcranial direct current stimulation (tDCS) and transcranial alternating current stimulation (tACS), are increasingly used to understand and optimize clinical trials. We propose that broad dissemination requires a simple graphical user interface (GUI) software that allows users to explore and design montages in real-time, based on their own clinical/experimental experience and objectives. We introduce two complimentary open-source platforms for this purpose: BONSAI and SPHERES. BONSAI is a web (cloud) based application (available at neuralengr.com/bonsai) that can be accessed through any flash-supported browser interface. SPHERES (available at neuralengr.com/spheres) is a stand-alone GUI application that allow consideration of arbitrary montages on a concentric sphere model by leveraging an analytical solution. These open-source tES modeling platforms are designed go be upgraded and enhanced. Trade-offs between open-access approaches that balance ease of access, speed, and flexibility are discussed. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. Geometry Modeling and Adaptive Control of Air-Breathing Hypersonic Vehicles

    NASA Astrophysics Data System (ADS)

    Vick, Tyler Joseph

    Air-breathing hypersonic vehicles have the potential to provide global reach and affordable access to space. Recent technological advancements have made scramjet-powered flight achievable, as evidenced by the successes of the X-43A and X-51A flight test programs over the last decade. Air-breathing hypersonic vehicles present unique modeling and control challenges in large part due to the fact that scramjet propulsion systems are highly integrated into the airframe, resulting in strongly coupled and often unstable dynamics. Additionally, the extreme flight conditions and inability to test fully integrated vehicle systems larger than X-51 before flight leads to inherent uncertainty in hypersonic flight. This thesis presents a means to design vehicle geometries, simulate vehicle dynamics, and develop and analyze control systems for hypersonic vehicles. First, a software tool for generating three-dimensional watertight vehicle surface meshes from simple design parameters is developed. These surface meshes are compatible with existing vehicle analysis tools, with which databases of aerodynamic and propulsive forces and moments can be constructed. A six-degree-of-freedom nonlinear dynamics simulation model which incorporates this data is presented. Inner-loop longitudinal and lateral control systems are designed and analyzed utilizing the simulation model. The first is an output feedback proportional-integral linear controller designed using linear quadratic regulator techniques. The second is a model reference adaptive controller (MRAC) which augments this baseline linear controller with an adaptive element. The performance and robustness of each controller are analyzed through simulated time responses to angle-of-attack and bank angle commands, while various uncertainties are introduced. The MRAC architecture enables the controller to adapt in a nonlinear fashion to deviations from the desired response, allowing for improved tracking performance, stability, and

  7. Transcolonic Perirectal NOTES Access (PNA): A feasibility study with survival in swine model.

    PubMed

    Oliveira, André L A; Zorron, Ricardo; Oliveira, Flavio M M DE; Santos, Marcelo B Dos; Scheffer, Jussara P; Rios, Marcelo; Antunes, Fernanda

    2017-05-01

    Transrectal access still has some unsolved issues such as spatial orientation, infection, access and site closure. This study presents a simple technique to perform transcolonic access with survival in a swine model series. A new technique for NOTES perirectal access to perform retroperitoneoscopy, peritoneoscopy, liver and lymphnode biopsies was performed in 6 pigs, using Totally NOTES technique. The specimens were extracted transanally. The flexible endoscope was inserted through a posterior transmural incision and the retrorectal space. Cultures of bacteria were documented for the retroperitoneal space and intra abdominal cavity after 14 days. Rectal site was closed using non-absorbable sutures. There was no bowel cleansing, nor preoperative fasting. The procedures were performed in 6 pigs through transcolonic natural orifice access using available endoscopic flexible instruments. All animals survived 14 days without complications, and cultures were negative. Histopathologic examination of the rectal closure site showed adequate healing of suture line and no micro abscesses. The results of feasibility and safety of experimental Transcolonic NOTES potentially brings new frontiers and future wider applications for minimally invasive surgery. The treatment of colorectal, abdominal and retroperitoneal diseases through a flexible Perirectal NOTES Access (PNA) is a promising new approach.

  8. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks.

    PubMed

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-10-12

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  9. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    PubMed Central

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-01-01

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel. PMID:27754316

  10. Effect of Information and Telephone-Guided Access to Community Support for People with Chronic Kidney Disease: Randomised Controlled Trial

    PubMed Central

    Blakeman, Tom; Blickem, Christian; Kennedy, Anne; Reeves, David; Bower, Peter; Gaffney, Hannah; Gardner, Caroline; Lee, Victoria; Jariwala, Praksha; Dawson, Shoba; Mossabir, Rahena; Brooks, Helen; Richardson, Gerry; Spackman, Eldon; Vassilev, Ivaylo; Chew-Graham, Carolyn; Rogers, Anne

    2014-01-01

    Background Implementation of self-management support in traditional primary care settings has proved difficult, encouraging the development of alternative models which actively link to community resources. Chronic kidney disease (CKD) is a common condition usually diagnosed in the presence of other co-morbidities. This trial aimed to determine the effectiveness of an intervention to provide information and telephone-guided access to community support versus usual care for patients with stage 3 CKD. Methods and Findings In a pragmatic, two-arm, patient level randomised controlled trial 436 patients with a diagnosis of stage 3 CKD were recruited from 24 general practices in Greater Manchester. Patients were randomised to intervention (215) or usual care (221). Primary outcome measures were health related quality of life (EQ-5D health questionnaire), blood pressure control, and positive and active engagement in life (heiQ) at 6 months. At 6 months, mean health related quality of life was significantly higher for the intervention group (adjusted mean difference = 0.05; 95% CI = 0.01, 0.08) and blood pressure was controlled for a significantly greater proportion of patients in the intervention group (adjusted odds-ratio = 1.85; 95% CI = 1.25, 2.72). Patients did not differ significantly in positive and active engagement in life. The intervention group reported a reduction in costs compared with control. Conclusions An intervention to provide tailored information and telephone-guided access to community resources was associated with modest but significant improvements in health related quality of life and better maintenance of blood pressure control for patients with stage 3 CKD compared with usual care. However, further research is required to identify the mechanisms of action of the intervention. Trial Registration Controlled-Trials.com ISRCTN45433299 PMID:25330169

  11. Access control design on highway interchanges.

    DOT National Transportation Integrated Search

    2008-01-01

    The adequate spacing and design of access to crossroads in the vicinity of freeway ramps are critical to the safety and traffic operations of both the freeway and the crossroad. The research presented in this report develops a methodology to evaluate...

  12. Achieving fertility control through woman’s autonomy and access to maternal healthcare: Are we on track? In-depth analysis of PDHS-2012-13

    PubMed Central

    Hassan, Sehar-un-Nisa; Siddiqui, Salma; Mahmood, Ayeshah

    2015-01-01

    Background and Objective: Fertility control preferences and maternal healthcare have recently become a major concern for developing nations with evidence suggesting that low fertility control rates and poor maternal healthcare are among major obstructions in ensuring health and social status for women. Our objective was toanalyze the factors that influence women’s autonomy, access to maternal healthcare, and fertility control preferences in Pakistan. Methods: Data consisted of 11,761 ever-married women of ages 15-49 years from PDHS, 2012-13. Variables included socio-demographics, women’s autonomy, fertility control preferences and access to maternal healthcare. Results: Findings from multivariate analysis showed that women’s younger age, having less than three number of children and independent or joint decision-making (indicators of high autonomy) remained the most significant predictors for access to better quality maternal healthcare and better fertility control preferences when other variables were controlled. Conclusion: Women’s access to good quality maternal health care and fertility control preferences are directly and indirectly influenced by their demographic characteristics and decision-making patterns in domestic affairs. PMID:26870096

  13. Free choice access to multipoint wellness education and related services positively impacts employee wellness: a randomized and controlled trial.

    PubMed

    Sforzo, Gary A; Kaye, Miranda P; Calleri, David; Ngai, Nancy

    2012-04-01

    Examine effects of voluntary participation in employer-sponsored, multipoint wellness education programming on employee wellness. A randomized and controlled design was used to organize 96 participants into an education + access group; an access-only group, and control group. Outcome measures were made at start and end of a 12-week intervention period. Education + access improved wellness knowledge, which, in turn, enhanced life satisfaction, employee morale, and energy, and nearly improved stress level. Those who received facility access without educational programming did not reap health benefits. Employees voluntarily used the fitness facility and healthy meal cards only 1.3 and 1.5 times per week, respectively. Participants made limited and likely inadequate use of wellness opportunities. As a result, physical health benefits (eg, blood pressure, fitness parameters) were not seen in the present study. However, multipoint wellness education resulted in psychosocial health benefits in 12 weeks.

  14. Protecting Files Hosted on Virtual Machines With Out-of-Guest Access Control

    DTIC Science & Technology

    2017-12-01

    analyzes the design and methodology of the implemented mechanism, while Chapter 4 explains the test methodology, test cases, and performance testing ...SACL, we verify that the user or group accessing the file has sufficient permissions. If that is correct, the callback function returns control to...ferify. In the first section, we validate our design of ferify. Next, we explain the tests we performed to verify that ferify has the results we expected

  15. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    NASA Astrophysics Data System (ADS)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  16. Sparsity enabled cluster reduced-order models for control

    NASA Astrophysics Data System (ADS)

    Kaiser, Eurika; Morzyński, Marek; Daviller, Guillaume; Kutz, J. Nathan; Brunton, Bingni W.; Brunton, Steven L.

    2018-01-01

    Characterizing and controlling nonlinear, multi-scale phenomena are central goals in science and engineering. Cluster-based reduced-order modeling (CROM) was introduced to exploit the underlying low-dimensional dynamics of complex systems. CROM builds a data-driven discretization of the Perron-Frobenius operator, resulting in a probabilistic model for ensembles of trajectories. A key advantage of CROM is that it embeds nonlinear dynamics in a linear framework, which enables the application of standard linear techniques to the nonlinear system. CROM is typically computed on high-dimensional data; however, access to and computations on this full-state data limit the online implementation of CROM for prediction and control. Here, we address this key challenge by identifying a small subset of critical measurements to learn an efficient CROM, referred to as sparsity-enabled CROM. In particular, we leverage compressive measurements to faithfully embed the cluster geometry and preserve the probabilistic dynamics. Further, we show how to identify fewer optimized sensor locations tailored to a specific problem that outperform random measurements. Both of these sparsity-enabled sensing strategies significantly reduce the burden of data acquisition and processing for low-latency in-time estimation and control. We illustrate this unsupervised learning approach on three different high-dimensional nonlinear dynamical systems from fluids with increasing complexity, with one application in flow control. Sparsity-enabled CROM is a critical facilitator for real-time implementation on high-dimensional systems where full-state information may be inaccessible.

  17. The Virtual Watershed Observatory: Cyberinfrastructure for Model-Data Integration and Access

    NASA Astrophysics Data System (ADS)

    Duffy, C.; Leonard, L. N.; Giles, L.; Bhatt, G.; Yu, X.

    2011-12-01

    The Virtual Watershed Observatory (VWO) is a concept where scientists, water managers, educators and the general public can create a virtual observatory from integrated hydrologic model results, national databases and historical or real-time observations via web services. In this paper, we propose a prototype for automated and virtualized web services software using national data products for climate reanalysis, soils, geology, terrain and land cover. The VWO has the broad purpose of making accessible water resource simulations, real-time data assimilation, calibration and archival at the scale of HUC 12 watersheds (Hydrologic Unit Code) anywhere in the continental US. Our prototype for model-data integration focuses on creating tools for fast data storage from selected national databases, as well as the computational resources necessary for a dynamic, distributed watershed simulation. The paper will describe cyberinfrastructure tools and workflow that attempts to resolve the problem of model-data accessibility and scalability such that individuals, research teams, managers and educators can create a WVO in a desired context. Examples are given for the NSF-funded Shale Hills Critical Zone Observatory and the European Critical Zone Observatories within the SoilTrEC project. In the future implementation of WVO services will benefit from the development of a cloud cyber infrastructure as the prototype evolves to data and model intensive computation for continental scale water resource predictions.

  18. Multi-views storage model and access methods of conversation history in converged IP messaging system

    NASA Astrophysics Data System (ADS)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  19. Analysis and Simulation of Traffic Control for Resource Management in DVB-Based Broadband Satellite Access Networks

    NASA Astrophysics Data System (ADS)

    Impemba, Ernesto; Inzerilli, Tiziano

    2003-07-01

    Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.

  20. Impact of service delivery model on health care access among HIV-positive women in New York City.

    PubMed

    Pillai, Nandini V; Kupprat, Sandra A; Halkitis, Perry N

    2009-01-01

    As the New York City HIV=AIDS epidemic began generalizing beyond traditionally high-risk groups in the early 1990s, AIDS Service Organizations (ASO) sought to increase access to medical care and broaden service offerings to incorporate the needs of low-income women and their families. Strategies to achieve entry into and retention in medical care included the development of integrated care facilities, case management, and a myriad of supportive service offerings. This study examines a nonrandom sample of 60 HIV-positive women receiving case management and supportive services at New York City ASOs. Over 55% of the women interviewed reported high access to care, 43% reported the ability to access urgent care all of the time and 94% reported high satisfaction with obstetrics=gynecology (OB=GYN) care. This held true across race=ethnicity, income level, medical coverage, and service delivery model.Women who accessed services at integrated care facilities offering onsite medical care and case management=supportive services perceived lower access to medical specialists as compared to those who received services at nonintegrated sites. Data from this analysis indicate that supportive services increase access to and satisfaction with both HIV and non-HIV-related health care. Additionally, women who received services at a medical model agency were more likely to report accessing non-HIV care at a clinic compared to those receiving services at a nonmedical model agencies, these women were more likely to report receiving non-HIV care at a hospital.

  1. [Lack of access to information on oral health problems among adults: an approach based on the theoretical model for literacy in health].

    PubMed

    Roberto, Luana Leal; Noronha, Daniele Durães; Souza, Taiane Oliveira; Miranda, Ellen Janayne Primo; Martins, Andréa Maria Eleutério de Barros Lima; Paula, Alfredo Maurício Batista De; Ferreira, Efigênia Ferreira E; Haikal, Desirée Sant'ana

    2018-03-01

    This study sought to investigate factors associated with the lack of access to information on oral health among adults. It is a cross-sectional study, carried out among 831 adults (35-44 years of age). The dependent variable was access to information on how to avoid oral problems, and the independent variables were gathered into subgroups according to the theoretical model for literacy in health. Binary logistic regression was carried out, and results were corrected by the design effect. It was observed that 37.5% had no access to information about dental problems. The lack of access was higher among adults who had lower per capita income, were dissatisfied with the dental services provided, did not use dental floss, had unsatisfactory physical control of the quality of life, and self-perceived their oral health as fair/poor/very poor. The likelihood of not having access to information about dental problems among those dissatisfied with the dental services used was 3.28 times higher than for those satisfied with the dental services used. Thus, decreased access to information was related to unfavorable conditions among adults. Health services should ensure appropriate information to their users in order to increase health literacy levels and improve satisfaction and equity.

  2. Video Modeling and Observational Learning to Teach Gaming Access to Students with ASD

    ERIC Educational Resources Information Center

    Spriggs, Amy D.; Gast, David L.; Knight, Victoria F.

    2016-01-01

    The purpose of this study was to evaluate both video modeling and observational learning to teach age-appropriate recreation and leisure skills (i.e., accessing video games) to students with autism spectrum disorder. Effects of video modeling were evaluated via a multiple probe design across participants and criteria for mastery were based on…

  3. A comparison of Percutaneous femoral access in Endovascular Repair versus Open femoral access (PiERO): study protocol for a randomized controlled trial.

    PubMed

    Vierhout, Bastiaan P; Saleem, Ben R; Ott, Alewijn; van Dijl, Jan Maarten; de Kempenaer, Ties D van Andringa; Pierie, Maurice E N; Bottema, Jan T; Zeebregts, Clark J

    2015-09-14

    Access for endovascular repair of abdominal aortic aneurysms (EVAR) is obtained through surgical cutdown or percutaneously. The only devices suitable for percutaneous closure of the 20 French arteriotomies of the common femoral artery (CFA) are the Prostar(™) and Proglide(™) devices (Abbott Vascular). Positive effects of these devices seem to consist of a lower infection rate, and shorter operation time and hospital stay. This conclusion was published in previous reports comparing techniques in patients in two different groups (cohort or randomized). Access techniques were never compared in one and the same patient; this research simplifies comparison because patient characteristics will be similar in both groups. Percutaneous access of the CFA is compared to surgical cutdown in a single patient; in EVAR surgery, access is necessary in both groins in each patient. Randomization is performed on the introduction site of the larger main device of the endoprosthesis. The contralateral device of the endoprosthesis is smaller. When we use this type of randomization, both groups will contain a similar number of main and contralateral devices. Preoperative nose cultures and perineal cultures are obtained, to compare colonization with postoperative wound cultures (in case of a surgical site infection). Furthermore, patient comfort will be considered, using VAS-scores (Visual analog scale). Punch biopsies of the groin will be harvested to retrospectively compare skin of patients who suffered a surgical site infection (SSI) to patients who did not have an SSI. The PiERO trial is a multicenter randomized controlled clinical trial designed to show the consequences of using percutaneous access in EVAR surgery and focuses on the occurrence of surgical site infections. NTR4257 10 November 2013, NL44578.042.13.

  4. 76 FR 78866 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-20

    ... initiated a rulemaking proceeding in accordance with provisions added by the Digital Millennium Copyright... available in digital copies. Proponent: The Open Book Alliance. 2. Literary works, distributed electronically, that: (1) Contain digital rights management and/or other access controls which either prevent the...

  5. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. RM 2008-8] Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final Rule; correction. SUMMARY: The Copyright Office makes a...

  6. Access management for Kentucky.

    DOT National Transportation Integrated Search

    2004-02-01

    The Access Management Manual published by the Transportation Research Board in 2003 defines access management as the "systematic control of the location, spacing, design, and operation of driveways, median openings, interchanges, and street connectio...

  7. Accessing and Utilizing Remote Sensing Data for Vectorborne Infectious Diseases Surveillance and Modeling

    NASA Technical Reports Server (NTRS)

    Kiang, Richard; Adimi, Farida; Kempler, Steven

    2008-01-01

    Background: The transmission of vectorborne infectious diseases is often influenced by environmental, meteorological and climatic parameters, because the vector life cycle depends on these factors. For example, the geophysical parameters relevant to malaria transmission include precipitation, surface temperature, humidity, elevation, and vegetation type. Because these parameters are routinely measured by satellites, remote sensing is an important technological tool for predicting, preventing, and containing a number of vectorborne infectious diseases, such as malaria, dengue, West Nile virus, etc. Methods: A variety of NASA remote sensing data can be used for modeling vectorborne infectious disease transmission. We will discuss both the well known and less known remote sensing data, including Landsat, AVHRR (Advanced Very High Resolution Radiometer), MODIS (Moderate Resolution Imaging Spectroradiometer), TRMM (Tropical Rainfall Measuring Mission), ASTER (Advanced Spaceborne Thermal Emission and Reflection Radiometer), EO-1 (Earth Observing One) ALI (Advanced Land Imager), and SIESIP (Seasonal to Interannual Earth Science Information Partner) dataset. Giovanni is a Web-based application developed by the NASA Goddard Earth Sciences Data and Information Services Center. It provides a simple and intuitive way to visualize, analyze, and access vast amounts of Earth science remote sensing data. After remote sensing data is obtained, a variety of techniques, including generalized linear models and artificial intelligence oriented methods, t 3 can be used to model the dependency of disease transmission on these parameters. Results: The processes of accessing, visualizing and utilizing precipitation data using Giovanni, and acquiring other data at additional websites are illustrated. Malaria incidence time series for some parts of Thailand and Indonesia are used to demonstrate that malaria incidences are reasonably well modeled with generalized linear models and artificial

  8. Older teen attitudes toward birth control access in pharmacies: a qualitative study.

    PubMed

    Wilkinson, Tracey A; Miller, Courtney; Rafie, Samantha; Landau, Sharon Cohen; Rafie, Sally

    2018-03-01

    To examine adolescent attitudes toward accessing contraception through a new pharmacist prescribing model in the State of California. In-depth telephone interviews were conducted in summer 2015 with 30 females ages 18 to 19 in California. Participants were recruited using a social media advertisement. Semi-structured interviews utilized open-ended questions to understand teens' experiences with pharmacies, experiences obtaining contraception, and views on pharmacist prescribing of contraception. Responses were transcribed and qualitatively analyzed using an independent-coder method to identify salient themes. Participants were ethnically diverse and primarily living in suburban areas. All participants had completed high school and many had completed one year of college. Nearly all participants were supportive of California's new law allowing pharmacist prescribing of contraception. Thematic analyses revealed that while participants were satisfied with traditional service providers and valued those relationships, they appreciated the benefit of increased access and convenience of going directly to a pharmacy. Participants expected increased access to contraception in pharmacies would lead to both personal and societal benefits. They expressed concerns regarding parental involvement, as well as confidentiality in the pharmacy environment and with insurance disclosures. Older teens in California are very supportive of pharmacies and pharmacists as direct access points for contraception, but confidentiality concerns were noted. Policy makers and pharmacies can incorporate study findings when designing policies, services, and physical pharmacy spaces to better serve teens. Further research is warranted after pharmacies implement this new service to assess teen utilization and satisfaction as well as outcomes. Several states recently passed legislation enabling pharmacists to prescribe contraception and other states are considering similar legislation. Older teens are

  9. Increasing Energy Access in Sub-Saharan Africa: Exploring Public-Private Models for Intervention

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bazilian, Morgan; Pless, Jacquelyn

    This report, by Morgan Bazilian and Jacquelyn Pless, examines ways that Energy+ could make a large impact in providing energy access to the poor, focusing on four promising models. While there remains a focus on a technology (PV), and a region (SSA) in this report, the models the authors explore are amenable to other specifications as well. Thus, the models presented provide an opportunity for stakeholders and the international community to collaborate and leverage capacities, resources, and networks. Of course, these models are only a few of the very wide range of possible mechanisms. They also are somewhat focused onmore » engaging the private sector. The report does not provide a full context for the complex landscape of energy access and energy poverty. Rather, the paper is focused around the specifics of the interventions. It remains the case that the fundamental building blocks of capacity building, good governance and planning, and the ability to find funding for 'upfront' due diligence and analysis remain critical. Those items are, however, largely outside the scope of this short report.« less

  10. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  11. Where to go? Strategic modelling of access to emergency shelters in Mozambique.

    PubMed

    Gall, Melanie

    2004-03-01

    This paper, through spatial-analysis techniques, examines the accessibility of emergency shelters for vulnerable populations, and outlines the benefits of an extended and permanently established shelter network in central Mozambique. The raster-based modelling approach considers data on land cover, locations of accommodation centres in 2000, settlements and infrastructure. The shelter analysis is a two-step process determining access for vulnerable communities first, followed by a suitability analysis for additional emergency shelter sites. The results indicate the need for both retrofitting existing infrastructure (schools, health posts) to function as shelters during an emergency, and constructing new facilities - at best multi-purpose facilities that can serve as social infrastructure and shelter. Besides assessing the current situation in terms of availability and accessibility of emergency shelters, this paper provides an example of evaluating the effectiveness of humanitarian assistance without conventional mechanisms like food tonnage and number of beneficiaries.

  12. The TriLab, a Novel ICT Based Triple Access Mode Laboratory Education Model

    ERIC Educational Resources Information Center

    Abdulwahed, Mahmoud; Nagy, Zoltan K.

    2011-01-01

    This paper introduces a novel model of laboratory education, namely the TriLab. The model is based on recent advances in ICT and implements a three access modes to the laboratory experience (virtual, hands-on and remote) in one software package. A review of the three modes is provided with highlights of advantages and disadvantages of each mode.…

  13. Cancer control in developing countries: using health data and health services research to measure and improve access, quality and efficiency.

    PubMed

    Hanna, Timothy P; Kangolle, Alfred C T

    2010-10-13

    Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) PROCESS: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) OUTCOME: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international collaboration as well as political

  14. Cancer control in developing countries: using health data and health services research to measure and improve access, quality and efficiency

    PubMed Central

    2010-01-01

    Background Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. Discussion This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) Process: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) Outcome: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. Summary There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international

  15. The Effects of State Medicaid Expansion on Low-Income Individuals' Access to Health Care: Multilevel Modeling.

    PubMed

    Choi, Sunha; Lee, Sungkyu; Matejkowski, Jason

    2018-06-01

    This study aimed to examine how states' Medicaid expansion affected insurance status and access to health care among low-income expansion state residents in 2015, the second year of the expansion. Data from the 2012 and 2015 Behavioral Risk Factor Surveillance System were linked to state-level data. A nationally representative sample of 544,307 adults (ages 26-64 years) from 50 states and Washington, DC were analyzed using multilevel modeling. The results indicate substantial increases in health care access between 2012 and 2015 among low-income adults in Medicaid expansion states. The final conditional multilevel models with low-income adults who had income at or below 138% of the poverty line indicate that, after controlling for individual- and state-level covariates, those who resided in the Medicaid expansion states were more likely to have health insurance (OR = 1.97, P < .001), have a usual source of care (OR = 1.37, P < .01), and receive a routine checkup (OR = 1.24, P < .01), and were less likely to not see a doctor because of cost (OR = 0.66, P < .001) compared with low-income residents in non-expansion states in 2015. Moreover, the significant interaction terms indicate that adults living in non-expansion states with income below 100% of the poverty line are the most vulnerable compared with their counterparts in expansion states and with those with income between 100%-138% of the poverty line. This study demonstrates that state-level Medicaid expansion improved health care access among low-income US residents. However, residents with income below 100% of the poverty line in non-expansion states were disproportionately negatively affected by states' decision to not expand Medicaid coverage.

  16. Ultrasound-Guided Vascular Access Simulator for Medical Training: Proposal of a Simple, Economic and Effective Model.

    PubMed

    Fürst, Rafael Vilhena de Carvalho; Polimanti, Afonso César; Galego, Sidnei José; Bicudo, Maria Claudia; Montagna, Erik; Corrêa, João Antônio

    2017-03-01

    To present a simple and affordable model able to properly simulate an ultrasound-guided venous access. The simulation was made using a latex balloon tube filled with water and dye solution implanted in a thawed chicken breast with bones. The presented model allows the simulation of all implant stages of a central catheter. The obtained echogenicity is similar to that observed in human tissue, and the ultrasound identification of the tissues, balloon, needle, wire guide and catheter is feasible and reproducible. The proposed model is simple, economical, easy to manufacture and capable of realistically and effectively simulating an ultrasound-guided venous access.

  17. NOAA Operational Model Archive Distribution System (NOMADS): High Availability Applications for Reliable Real Time Access to Operational Model Data

    NASA Astrophysics Data System (ADS)

    Alpert, J. C.; Wang, J.

    2009-12-01

    To reduce the impact of natural hazards and environmental changes, the National Centers for Environmental Prediction (NCEP) provide first alert and a preferred partner for environmental prediction services, and represents a critical national resource to operational and research communities affected by climate, weather and water. NOMADS is now delivering high availability services as part of NOAA’s official real time data dissemination at its Web Operations Center (WOC) server. The WOC is a web service used by organizational units in and outside NOAA, and acts as a data repository where public information can be posted to a secure and scalable content server. A goal is to foster collaborations among the research and education communities, value added retailers, and public access for science and development efforts aimed at advancing modeling and GEO-related tasks. The user (client) executes what is efficient to execute on the client and the server efficiently provides format independent access services. Client applications can execute on the server, if it is desired, but the same program can be executed on the client side with no loss of efficiency. In this way this paradigm lends itself to aggregation servers that act as servers of servers listing, searching catalogs of holdings, data mining, and updating information from the metadata descriptions that enable collections of data in disparate places to be simultaneously accessed, with results processed on servers and clients to produce a needed answer. The services used to access the operational model data output are the Open-source Project for a Network Data Access Protocol (OPeNDAP), implemented with the Grid Analysis and Display System (GrADS) Data Server (GDS), and applications for slicing, dicing and area sub-setting the large matrix of real time model data holdings. This approach insures an efficient use of computer resources because users transmit/receive only the data necessary for their tasks including

  18. Diagrammatic guide signs for use on controlled access highways. Volume 1, Recommendations for diagrammatic guide signs

    DOT National Transportation Integrated Search

    1972-12-01

    The purpose of the diagrammatic signing research project was to develop warrants and standards for the use of diagrammatic guide signs on controlled access highways. Volume 1 summarizes the entire diagrammatic signing research program objectives spon...

  19. General MACOS Interface for Modeling and Analysis for Controlled Optical Systems

    NASA Technical Reports Server (NTRS)

    Sigrist, Norbert; Basinger, Scott A.; Redding, David C.

    2012-01-01

    The General MACOS Interface (GMI) for Modeling and Analysis for Controlled Optical Systems (MACOS) enables the use of MATLAB as a front-end for JPL s critical optical modeling package, MACOS. MACOS is JPL s in-house optical modeling software, which has proven to be a superb tool for advanced systems engineering of optical systems. GMI, coupled with MACOS, allows for seamless interfacing with modeling tools from other disciplines to make possible integration of dynamics, structures, and thermal models with the addition of control systems for deformable optics and other actuated optics. This software package is designed as a tool for analysts to quickly and easily use MACOS without needing to be an expert at programming MACOS. The strength of MACOS is its ability to interface with various modeling/development platforms, allowing evaluation of system performance with thermal, mechanical, and optical modeling parameter variations. GMI provides an improved means for accessing selected key MACOS functionalities. The main objective of GMI is to marry the vast mathematical and graphical capabilities of MATLAB with the powerful optical analysis engine of MACOS, thereby providing a useful tool to anyone who can program in MATLAB. GMI also improves modeling efficiency by eliminating the need to write an interface function for each task/project, reducing error sources, speeding up user/modeling tasks, and making MACOS well suited for fast prototyping.

  20. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  1. Market-Based Higher Education: Does Colorado's Voucher Model Improve Higher Education Access and Efficiency?

    ERIC Educational Resources Information Center

    Hillman, Nicholas W.; Tandberg, David A.; Gross, Jacob P. K.

    2014-01-01

    In 2004, Colorado introduced the nation's first voucher model for financing public higher education. With state appropriations now allocated to students, rather than institutions, state officials expect this model to create cost efficiencies while also expanding college access. Using difference-in-difference regression analysis, we find limited…

  2. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...

  3. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...

  4. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and facilities; (4) Granting access to only those responding to the security incident or threat... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security...

  5. Evaluating the impact of climate policies on regional food availability and accessibility using an Integrated Assessment Model

    NASA Astrophysics Data System (ADS)

    Gilmore, E.; Cui, Y. R.; Waldhoff, S.

    2015-12-01

    Beyond 2015, eradicating hunger will remain a critical part of the global development agenda through the Sustainable Development Goals (SDG). Efforts to limit climate change through both mitigation of greenhouse gas emissions and land use policies may interact with food availability and accessibility in complex and unanticipated ways. Here, we develop projections of regional food accessibility to 2050 under the alternative futures outlined by the Shared Socioeconomic Pathways (SSPs) and under different climate policy targets and structures. We use the Global Change Assessment Model (GCAM), an integrated assessment model (IAM), for our projections. We calculate food access as the weighted average of consumption of five staples and the portion of income spend on those commodities and extend the GCAM calculated universal global producer price to regional consumer prices drawing on historical relationships of these prices. Along the SSPs, food access depends largely on expectations of increases in population and economic status. Under a more optimistic scenario, the pressures on food access from increasing demand and rising prices can be counterbalanced by faster economic development. Stringent climate policies that increase commodity prices, however, may hinder vulnerable regions, namely Sub-Saharan Africa, from achieving greater food accessibility.

  6. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  7. Study on a discrete-time dynamic control model to enhance nitrogen removal with fluctuation of influent in oxidation ditches.

    PubMed

    Liu, Yanchen; Shi, Hanchang; Shi, Huiming; Wang, Zhiqiang

    2010-10-01

    The aim of study was proposed a new control model feasible on-line implemented by Programmable Logic Controller (PLC) to enhance nitrogen removal against the fluctuation of influent in Carrousel oxidation ditch. The discrete-time control model was established by confirmation model of operational conditions based on a expert access, which was obtained by a simulation using Activated Sludge Model 2-D (ASM2-D) and Computation Fluid Dynamics (CFD), and discrete-time control model to switch between different operational stages. A full-scale example is provided to demonstrate the feasibility of the proposed operation and the procedure of the control design. The effluent quality was substantially improved, to the extent that it met the new wastewater discharge standards of NH(3)-N<5mg/L and TN<15 mg/L enacted in China throughout a one-day period with fluctuation of influent. Copyright © 2010 Elsevier Ltd. All rights reserved.

  8. Proactive behavior, but not inhibitory control, predicts repeated innovation by spotted hyenas tested with a multi-access box.

    PubMed

    Johnson-Ulrich, Lily; Johnson-Ulrich, Zoe; Holekamp, Kay

    2018-05-01

    Innovation is widely linked to cognitive ability, brain size, and adaptation to novel conditions. However, successful innovation appears to be influenced by both cognitive factors, such as inhibitory control, and non-cognitive behavioral traits. We used a multi-access box (MAB) paradigm to measure repeated innovation, the number of unique innovations learned across trials, by 10 captive spotted hyenas (Crocuta crocuta). Spotted hyenas are highly innovative in captivity and also display striking variation in behavioral traits, making them good model organisms for examining the relationship between innovation and other behavioral traits. We measured persistence, motor diversity, motivation, activity, efficiency, inhibitory control, and neophobia demonstrated by hyenas while interacting with the MAB. We also independently assessed inhibitory control with a detour cylinder task. Most hyenas were able to solve the MAB at least once, but only four hyenas satisfied learning criteria for all four possible solutions. Interestingly, neither measure of inhibitory control predicted repeated innovation. Instead, repeated innovation was predicted by a proactive syndrome of behavioral traits that included high persistence, high motor diversity, high activity and low neophobia. Our results suggest that this proactive behavioral syndrome may be more important than inhibitory control for successful innovation with the MAB by members of this species.

  9. The Effect of Community Uninsurance Rates on Access to Health Care

    PubMed Central

    Sabik, Lindsay M

    2012-01-01

    Objective To investigate the effect of local uninsurance rates on access to health care for the uninsured and insured and improve on recent studies by controlling for time-invariant differences across markets. Data Sources Individual-level data from the 1996 and 2003 Community Tracking Study, and market-level data from other sources, including the Area Resource File and the Bureau of Primary Healthcare. Study Design Market-level fixed effects models estimate the effect of changes in uninsurance rates within markets on access to care, measured by whether individuals report forgoing necessary care. Instrumental variables models are also estimated. Principal Findings Increases in the rate of uninsurance are associated with poorer access to necessary care among the uninsured. In contrast with recent evidence, increases in uninsurance had no effect on access to care among the insured. Instrumental variables results are similar, although not statistically significant. Conclusions Changes in rates of insurance coverage are likely to affect access to care for both previously and continuously uninsured. In contrast with earlier studies, there is no evidence of spillover effects on the insured, suggesting that such policy changes may have little effect on access for those who are already insured. PMID:22172046

  10. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...

  11. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...

  12. Registered access: a 'Triple-A' approach.

    PubMed

    Dyke, Stephanie O M; Kirby, Emily; Shabani, Mahsa; Thorogood, Adrian; Kato, Kazuto; Knoppers, Bartha M

    2016-12-01

    We propose a standard model for a novel data access tier - registered access - to facilitate access to data that cannot be published in open access archives owing to ethical and legal risk. Based on an analysis of applicable research ethics and other legal and administrative frameworks, we discuss the general characteristics of this Registered Access Model, which would comprise a three-stage approval process: Authentication, Attestation and Authorization. We are piloting registered access with the Demonstration Projects of the Global Alliance for Genomics and Health for which it may provide a suitable mechanism for access to certain data types and to different types of data users.

  13. Accessing memory

    DOEpatents

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  14. University Access for Disadvantaged Children: A Comparison across Countries

    ERIC Educational Resources Information Center

    Jerrim, John; Vignoles, Anna

    2015-01-01

    In this paper, we consider whether certain countries are particularly adept (or particularly poor) at getting children from disadvantaged homes to study for a bachelor's degree. A series of university access models are estimated for four English-speaking countries (England, Canada, Australia and the USA), which include controls for comparable…

  15. Infection control in hemodialysis units: a quick access to essential elements.

    PubMed

    Karkar, Ayman; Bouhaha, Betty Mandin; Dammang, Mienalyn Lim

    2014-05-01

    Infection is the most common cause of hospitalization and the second most common cause of mortality among hemodialysis (HD) patients, after cardiovascular disease. HD patients as well as the dialysis staff are vulnerable to contracting health-care-associated infections (HAIs) due to frequent and prolonged exposure to many possible contaminants in the dialysis environment. The extracorporeal nature of the therapy, the associated common environmental conditions and the immune compromised status of HD patients are major predisposing factors. The evident increased potential for transmission of infections in the HD settings led to the creation and implementation of specific and stricter infection prevention and control measures in addition to the usual standard precautions. Different international organizations have generated guidelines and recommendations on infection prevention and control for implementation in the HD settings. These include the Centers for Disease Control and Prevention (CDC), the Association of Professionals in Infection Control (APIC), the Kidney Disease Outcomes Quality Initiative (K/DOQI), the European Best Practice Guidelines/European Renal Best Practice (EBPG/ERBP) and the Kidney Disease: Improving Global Outcomes (KDIGO). However, these guidelines are extensive and sometimes vary among different guideline-producing bodies. Our aim in this review is to facilitate the access, increase the awareness and encourage implementation among dialysis providers by reviewing, extracting and comparing the essential elements of guidelines and recommendations on infection prevention and control in HD units.

  16. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    PubMed Central

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  17. Universal model for collective access patterns in the Internet traffic dynamics: A superstatistical approach

    NASA Astrophysics Data System (ADS)

    Tamazian, A.; Nguyen, V. D.; Markelov, O. A.; Bogachev, M. I.

    2016-07-01

    We suggest a universal phenomenological description for the collective access patterns in the Internet traffic dynamics both at local and wide area network levels that takes into account erratic fluctuations imposed by cooperative user behaviour. Our description is based on the superstatistical approach and leads to the q-exponential inter-session time and session size distributions that are also in perfect agreement with empirical observations. The validity of the proposed description is confirmed explicitly by the analysis of complete 10-day traffic traces from the WIDE backbone link and from the local campus area network downlink from the Internet Service Provider. Remarkably, the same functional forms have been observed in the historic access patterns from single WWW servers. The suggested approach effectively accounts for the complex interplay of both “calm” and “bursty” user access patterns within a single-model setting. It also provides average sojourn time estimates with reasonable accuracy, as indicated by the queuing system performance simulation, this way largely overcoming the failure of Poisson modelling of the Internet traffic dynamics.

  18. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  19. Predicting Graduation Rates at 4-Year Broad Access Institutions Using a Bayesian Modeling Approach

    ERIC Educational Resources Information Center

    Crisp, Gloria; Doran, Erin; Salis Reyes, Nicole A.

    2018-01-01

    This study models graduation rates at 4-year broad access institutions (BAIs). We examine the student body, structural-demographic, and financial characteristics that best predict 6-year graduation rates across two time periods (2008-2009 and 2014-2015). A Bayesian model averaging approach is utilized to account for uncertainty in variable…

  20. Complication with Intraosseous Access: Scandinavian Users’ Experience

    PubMed Central

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2013-01-01

    Introduction: Intraosseous access (IO) is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users’ experiences of complications. Methods: An online questionnaire was sent to Scandinavian emergency physicians, anesthesiologists and pediatricians. Results: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%), difficulties with penetration of periosteum with IO needle (10.3%), difficulties with aspiration of bone marrow (12.3%), and bended/broken needle (4.0%). When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%), slow infusion (despite use of pressure bag) (8.8%), displacement after insertion (8.5%), and extravasation (3.7%). Compartment syndrome and osteomyelitis occurred in 0.6% and 0.4% of cases respectively. Conclusion: In users’ recollection of real-life IO use, perceived complications were more frequent than usually reported from model studies. The perceived difficulties with using IO could affect the willingness of medical staff to use IO. Therefore, user experience should be addressed both in education of how to use, and research and development of IOs. PMID:24106537

  1. Semantically Enriched Data Access Policies in eHealth.

    PubMed

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  2. An exploration of multilevel modeling for estimating access to drinking-water and sanitation.

    PubMed

    Wolf, Jennyfer; Bonjour, Sophie; Prüss-Ustün, Annette

    2013-03-01

    Monitoring progress towards the targets for access to safe drinking-water and sanitation under the Millennium Development Goals (MDG) requires reliable estimates and indicators. We analyzed trends and reviewed current indicators used for those targets. We developed continuous time series for 1990 to 2015 for access to improved drinking-water sources and improved sanitation facilities by country using multilevel modeling (MLM). We show that MLM is a reliable and transparent tool with many advantages over alternative approaches to estimate access to facilities. Using current indicators, the MDG target for water would be met, but the target for sanitation missed considerably. The number of people without access to such services is still increasing in certain regions. Striking differences persist between urban and rural areas. Consideration of water quality and different classification of shared sanitation facilities would, however, alter estimates considerably. To achieve improved monitoring we propose: (1) considering the use of MLM as an alternative for estimating access to safe drinking-water and sanitation; (2) completing regular assessments of water quality and supporting the development of national regulatory frameworks as part of capacity development; (3) evaluating health impacts of shared sanitation; (4) using a more equitable presentation of countries' performances in providing improved services.

  3. The views of stakeholders on controlled access schemes for high-cost antirheumatic biological medicines in Australia

    PubMed Central

    Lu, Christine Y; Ritchie, Jan; Williams, Ken; Day, Ric

    2007-01-01

    Background In Australia, government-subsidised access to high-cost medicines is "targeted" to particular sub-sets of patients under the Pharmaceutical Benefits Scheme to achieve cost-effective use. In order to determine how this access system could be improved, the opinions of key stakeholders on access to biological agents for rheumatoid arthritis were explored. Methods Thirty-six semi-structured interviews were conducted with persons from relevant stakeholder groups. These were transcribed verbatim, and analysed thematically. Results Controlled access to expensive medicines was considered to be equitable and practical; however, there was disagreement as to the method of defining the target patient populations. Other concerns included timeliness of access, excessive bureaucracy, and the need for additional resources to facilitate the scheme. Collaboration between stakeholders was deemed important because it allows more equitable distribution of limited resources. The majority considered that stakeholder consultation should have been broader. Most wanted increased transparency of the decision-making process, ongoing and timely review of access criteria, and an increased provision of information for patients. More structured communication between stakeholders was proposed. Conclusion The Pharmaceutical Benefit Scheme is adapting to meet the changing needs of patients. Provision of subsidised access to high-cost medicines in a manner that is affordable for individuals and society, and that is equitable and efficiently managed is challenging. The views of stakeholders on targeted access to anti-rheumatic biological medicines in Australia acknowledged this challenge and provided a number of suggestions for modifications. These could serve as a basis to inform the debate on how to change the processes and policies so as to improve the scheme. PMID:18096055

  4. Modeling and Control for Microgrids

    NASA Astrophysics Data System (ADS)

    Steenis, Joel

    Traditional approaches to modeling microgrids include the behavior of each inverter operating in a particular network configuration and at a particular operating point. Such models quickly become computationally intensive for large systems. Similarly, traditional approaches to control do not use advanced methodologies and suffer from poor performance and limited operating range. In this document a linear model is derived for an inverter connected to the Thevenin equivalent of a microgrid. This model is then compared to a nonlinear simulation model and analyzed using the open and closed loop systems in both the time and frequency domains. The modeling error is quantified with emphasis on its use for controller design purposes. Control design examples are given using a Glover McFarlane controller, gain scheduled Glover McFarlane controller, and bumpless transfer controller which are compared to the standard droop control approach. These examples serve as a guide to illustrate the use of multi-variable modeling techniques in the context of robust controller design and show that gain scheduled MIMO control techniques can extend the operating range of a microgrid. A hardware implementation is used to compare constant gain droop controllers with Glover McFarlane controllers and shows a clear advantage of the Glover McFarlane approach.

  5. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  6. Open Access Publishing - Strengths and Strategies

    NASA Astrophysics Data System (ADS)

    Rasmussen, Martin

    2010-05-01

    The journal crisis and the demand for free accessibility to the results of publicly funded research were the main drivers of the Open Access movement since the late 1990's. Besides many academic institutions that support the different ways of Open Access publishing, there is a growing number of publishing houses that are specialized on this new access and business model of scholarly literature. The lecture provides an overview of the different kinds of Open Access publishing, discusses the variety of underlying business models, names the advantages and potentials for researches and the public, and overcomes some objections against Open Access. Besides the increased visibility and information supply, the topic of copyrights and exploitation rights will be discussed. Furthermore, it is a central aim of the presentation to show that Open Access does not only support full peer-review, but also provides the potential for even enhanced quality assurance. The financing of business models based on open accessible literature is another important part to be outlined in the lecture.

  7. [Accessibility of health services for users].

    PubMed

    Sousa-Fragoso, M A; Villarreal-Ríos, E

    2000-01-01

    To measure the accessibility to health services and determine a model to explain this accessibility. All states of the Mexican Republic were included. The measurement of accessibility considers the availability of resources and the perception of barriers. Place of residence, education, participation in the work forces and household conditions were included in the model. The average of availability resources was 64.59% sd 15.68 (range 42 to 100) and the average corresponding to perception of barriers, 87.61% SD 4.04 (range 79.23 to 95.65). Accessibility was 71.50% SD 10.74 (range 56 to 96). The states with highest accessibility were the Federal District and Baja California Sur and the lowest, Chiapas and Oaxaca. The model included education and labor participation (R2 = 0.67, p < 0.05). Accessibility was determined by socioeconomic factors.

  8. Intestinal Master Transcription Factor CDX2 Controls Chromatin Access for Partner Transcription Factor Binding

    PubMed Central

    Verzi, Michael P.; Shin, Hyunjin; San Roman, Adrianna K.

    2013-01-01

    Tissue-specific gene expression requires modulation of nucleosomes, allowing transcription factors to occupy cis elements that are accessible only in selected tissues. Master transcription factors control cell-specific genes and define cellular identities, but it is unclear if they possess special abilities to regulate cell-specific chromatin and if such abilities might underlie lineage determination and maintenance. One prevailing view is that several transcription factors enable chromatin access in combination. The homeodomain protein CDX2 specifies the embryonic intestinal epithelium, through unknown mechanisms, and partners with transcription factors such as HNF4A in the adult intestine. We examined enhancer chromatin and gene expression following Cdx2 or Hnf4a excision in mouse intestines. HNF4A loss did not affect CDX2 binding or chromatin, whereas CDX2 depletion modified chromatin significantly at CDX2-bound enhancers, disrupted HNF4A occupancy, and abrogated expression of neighboring genes. Thus, CDX2 maintains transcription-permissive chromatin, illustrating a powerful and dominant effect on enhancer configuration in an adult tissue. Similar, hierarchical control of cell-specific chromatin states is probably a general property of master transcription factors. PMID:23129810

  9. Boosting a Low-Cost Smart Home Environment with Usage and Access Control Rules.

    PubMed

    Barsocchi, Paolo; Calabrò, Antonello; Ferro, Erina; Gennaro, Claudio; Marchetti, Eda; Vairo, Claudio

    2018-06-08

    Smart Home has gained widespread attention due to its flexible integration into everyday life. Pervasive sensing technologies are used to recognize and track the activities that people perform during the day, and to allow communication and cooperation of physical objects. Usually, the available infrastructures and applications leveraging these smart environments have a critical impact on the overall cost of the Smart Home construction, require to be preferably installed during the home construction and are still not user-centric. In this paper, we propose a low cost, easy to install, user-friendly, dynamic and flexible infrastructure able to perform runtime resources management by decoupling the different levels of control rules. The basic idea relies on the usage of off-the-shelf sensors and technologies to guarantee the regular exchange of critical information, without the necessity from the user to develop accurate models for managing resources or regulating their access/usage. This allows us to simplify the continuous updating and improvement, to reduce the maintenance effort and to improve residents’ living and security. A first validation of the proposed infrastructure on a case study is also presented.

  10. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ...., 1150 18th Street NW., Suite 910, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: The RTCA... (202) 833-9434, or Web site at http://www.rtca.org . SUPPLEMENTARY INFORMATION: Pursuant to section 10... Security System Standard for Airport Access Control, RTCA Paper No. 168-13/SC224-048 TOR Review--Status of...

  11. DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military Installations (REDACTED)

    DTIC Science & Technology

    2016-04-01

    DEPARTMENT OF THE ARMY SUBJECT: DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military...public tenants who leased DoD privatized housing before granting those tenants unescorted access to military installations. In addition, DoD officials...Military Housing Privatization Initiative (MHPI). Specifically, our objective was to determine whether DoD was effectively screening civilian tenants

  12. FRAMES-2.0 Software System: Providing Password Protection and Limited Access to Models and Simulations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whelan, Gene; Pelton, Mitch A.

    2007-08-09

    One of the most important concerns for regulatory agencies is the concept of reproducibility (i.e., reproducibility means credibility) of an assessment. One aspect of reproducibility deals with tampering of the assessment. In other words, when multiple groups are engaged in an assessment, it is important to lock down the problem that is to be solved and/or to restrict the models that are to be used to solve the problem. The objective of this effort is to provide the U.S. Nuclear Regulatory Commission (NRC) with a means to limit user access to models and to provide a mechanism to constrain themore » conceptual site models (CSMs) when appropriate. The purpose is to provide the user (i.e., NRC) with the ability to “lock down” the CSM (i.e., picture containing linked icons), restrict access to certain models, or both.« less

  13. The effect of tobacco control policies on smoking prevalence and smoking-attributable deaths. Findings from the Netherlands SimSmoke Tobacco Control Policy Simulation Model.

    PubMed

    Nagelhout, Gera E; Levy, David T; Blackman, Kenneth; Currie, Laura; Clancy, Luke; Willemsen, Marc C

    2012-02-01

    To develop a simulation model projecting the effect of tobacco control policies in the Netherlands on smoking prevalence and smoking-attributable deaths. Netherlands SimSmoke-an adapted version of the SimSmoke simulation model of tobacco control policy-uses population, smoking rates and tobacco control policy data for the Netherlands to predict the effect of seven types of policies: taxes, smoke-free legislation, mass media, advertising bans, health warnings, cessation treatment and youth access policies. Outcome measures were smoking prevalence and smoking-attributable deaths. With a comprehensive set of policies, as recommended by MPOWER, smoking prevalence can be decreased by as much as 21% in the first year, increasing to a 35% reduction in the next 20 years and almost 40% by 30 years. By 2040, 7706 deaths can be averted in that year alone with the stronger set of policies. Without effective tobacco control policies, almost a million lives will be lost to tobacco-related diseases between 2011 and 2040. Of those, 145,000 can be saved with a comprehensive tobacco control package. Smoking prevalence and smoking-attributable deaths in the Netherlands can be reduced substantially through tax increases, smoke-free legislation, high-intensity media campaigns, stronger advertising bans and health warnings, comprehensive cessation treatment and youth access laws. The implementation of these FCTC/MPOWER recommended policies could be expected to show similar or even larger relative reductions in smoking prevalence in other countries which currently have weak policies. © 2011 The Authors, Addiction © 2011 Society for the Study of Addiction.

  14. User-Centered Indexing for Adaptive Information Access

    NASA Technical Reports Server (NTRS)

    Chen, James R.; Mathe, Nathalie

    1996-01-01

    We are focusing on information access tasks characterized by large volume of hypermedia connected technical documents, a need for rapid and effective access to familiar information, and long-term interaction with evolving information. The problem for technical users is to build and maintain a personalized task-oriented model of the information to quickly access relevant information. We propose a solution which provides user-centered adaptive information retrieval and navigation. This solution supports users in customizing information access over time. It is complementary to information discovery methods which provide access to new information, since it lets users customize future access to previously found information. It relies on a technique, called Adaptive Relevance Network, which creates and maintains a complex indexing structure to represent personal user's information access maps organized by concepts. This technique is integrated within the Adaptive HyperMan system, which helps NASA Space Shuttle flight controllers organize and access large amount of information. It allows users to select and mark any part of a document as interesting, and to index that part with user-defined concepts. Users can then do subsequent retrieval of marked portions of documents. This functionality allows users to define and access personal collections of information, which are dynamically computed. The system also supports collaborative review by letting users share group access maps. The adaptive relevance network provides long-term adaptation based both on usage and on explicit user input. The indexing structure is dynamic and evolves over time. Leading and generalization support flexible retrieval of information under similar concepts. The network is geared towards more recent information access, and automatically manages its size in order to maintain rapid access when scaling up to large hypermedia space. We present results of simulated learning experiments.

  15. What we talk about when we talk about access deficits

    PubMed Central

    Mirman, Daniel; Britt, Allison E.

    2014-01-01

    Semantic impairments have been divided into storage deficits, in which the semantic representations themselves are damaged, and access deficits, in which the representations are intact but access to them is impaired. The behavioural phenomena that have been associated with access deficits include sensitivity to cueing, sensitivity to presentation rate, performance inconsistency, negative serial position effects, sensitivity to number and strength of competitors, semantic blocking effects, disordered selection between strong and weak competitors, correlation between semantic deficits and executive function deficits and reduced word frequency effects. Four general accounts have been proposed for different subsets of these phenomena: abnormal refractoriness, too much activation, impaired competitive selection and deficits of semantic control. A combination of abnormal refractoriness and impaired competitive selection can account for most of the behavioural phenomena, but there remain several open questions. In particular, it remains unclear whether access deficits represent a single syndrome, a syndrome with multiple subtypes or a variable collection of phenomena, whether the underlying deficit is domain-general or domain-specific, whether it is owing to disorders of inhibition, activation or selection, and the nature of the connection (if any) between access phenomena in aphasia and in neurologically intact controls. Computational models offer a promising approach to answering these questions. PMID:24324232

  16. Using routinely recorded data in the UK to assess outcomes in a randomised controlled trial: The Trials of Access.

    PubMed

    Powell, G A; Bonnett, L J; Tudur-Smith, C; Hughes, D A; Williamson, P R; Marson, A G

    2017-08-23

    In the UK, routinely recorded data may benefit prospective studies including randomised controlled trials (RCTs). In an on-going study, we aim to assess the feasibility of access and agreement of routinely recorded clinical and non-clinical data compared to data collected during a RCT using standard prospective methods. This paper will summarise available UK routinely recorded data sources and discuss our experience with the feasibility of accessing routinely recorded data for participants of a RCT before finally proposing recommendations for improving the access and implementation of routinely recorded data in RCTs. Setting: the case study RCT is the Standard and New Antiepileptic Drugs II (SANAD II) trial, a pragmatic, UK, multicentre, phase IV RCT assessing the clinical and cost-effectiveness of antiepileptic drug treatments for newly diagnosed epilepsy. 98 participants have provided written consent to permit the request of routinely recorded data. Study procedures: routinely recorded clinical and non-clinical data were identified and data requested through formal applications from available data holders for the duration that participants have been recruited into SANAD II. The feasibility of accessing routinely recorded data during a RCT is assessed and recommendations for improving access proposed. Secondary-care clinical and socioeconomic data is recorded on a national basis and can be accessed, although there are limitations in the application process. Primary-care data are recorded by a number of organisations on a de-identified basis but access for specific individuals has not been feasible. Access to data recorded by non-clinical sources, including The Department for Work and Pensions and The Driving and Vehicle Licensing Agency, was not successful. Recommendations discussed include further research to assess the attributes of routinely recorded data, an assessment of public perceptions and the development of strategies to collaboratively improve access to

  17. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks.

    Scope of Contributions

    This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to:
    • Optical access network architectures and protocols
    • Passive optical networks (BPON, EPON, GPON, etc.)
    • Active optical networks
    • Multiple access control
    • Multiservices and QoS provisioning
    • Network survivability
    • Field trials and standards
    • Performance modeling and analysis

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  18. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    EPA Pesticide Factsheets

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  19. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  20. Worktime control access, need and use in relation to work-home interference, fatigue, and job motivation.

    PubMed

    Nijp, Hylco H; Beckers, Debby G J; Kompier, Michiel A J; van den Bossche, Seth N J; Geurts, Sabine A E

    2015-07-01

    Worktime control (WTC) has been suggested as a tool to reduce employees' work-home interference and fatigue and improve job motivation. The purpose of this study was twofold: (i) to examine the prevalence of employees' need for, access to, and use of WTC, as well as the incongruence between need for and access to WTC (ie, mismatch); and (ii) to examine the associations of this mismatch and the use of WTC with employees' work-home interference (WHI), fatigue and job motivation. Questionnaire data were collected among a large (N=2420) quasi-representative sample of Dutch employees. The prevalence of WTC need, access, use, and mismatch was assessed by means of descriptive statistics. Associations with employees' outcomes were assessed by analyses of covariance. The need for WTC was highly prevalent. For many employees, we observed a negative mismatch between access to and need for WTC (ie, accessaccess to WTC and assess employees' (mis)match between components of WTC. For practice, we recommend to introduce WTC on an organizational level and assess employees' need for WTC on an individual basis.

  1. Evaluating a complex model designed to increase access to high quality primary mental health care for under-served groups: a multi-method study.

    PubMed

    Dowrick, Christopher; Bower, Peter; Chew-Graham, Carolyn; Lovell, Karina; Edwards, Suzanne; Lamb, Jonathan; Bristow, Katie; Gabbay, Mark; Burroughs, Heather; Beatty, Susan; Waheed, Waquas; Hann, Mark; Gask, Linda

    2016-02-17

    community mapping activities, and by the offer of access to the wellbeing interventions. There were variable benefits from health practitioner participation in community consultative groups. We also found that participation in the wellbeing interventions led to increased community engagement. We explored the interactions between elements of a multilevel intervention and identified important associations and underlying mechanisms. Further research is needed to test the generalisability of the model. Current Controlled Trials, reference ISRCTN68572159 . Registered 25 February 2013.

  2. Barriers of access to care in a managed competition model: lessons from Colombia

    PubMed Central

    2010-01-01

    Background The health sector reform in Colombia, initiated by Law 100 (1993) that introduced a managed competition model, is generally presented as a successful experience of improving access to care through a health insurance regulated market. The study's objective is to improve our understanding of the factors influencing access to the continuum of care in the Colombian managed competition model, from the social actors' point of view. Methods An exploratory, descriptive-interpretative qualitative study was carried out, based on case studies of four healthcare networks in rural and urban areas. Individual semi-structured interviews were conducted to a three stage theoretical sample: I) cases, II) providers and III) informants: insured and uninsured users (35), health professionals (51), administrative personnel (20), and providers' (18) and insurers' (10) managers. Narrative content analysis was conducted; segmented by cases, informant's groups and themes. Results Access, particularly to secondary care, is perceived as complex due to four groups of obstacles with synergetic effects: segmented insurance design with insufficient services covered; insurers' managed care and purchasing mechanisms; providers' networks structural and organizational limitations; and, poor living conditions. Insurers' and providers' values based on economic profit permeate all factors. Variations became apparent between the two geographical areas and insurance schemes. In the urban areas barriers related to market functioning predominate, whereas in the rural areas structural deficiencies in health services are linked to insufficient public funding. While financial obstacles are dominant in the subsidized regime, in the contributory scheme supply shortage prevails, related to insufficient private investment. Conclusions The results show how in the Colombian healthcare system structural and organizational barriers to care access, that are common in developing countries, are widened by both

  3. Barriers of access to care in a managed competition model: lessons from Colombia.

    PubMed

    Vargas, Ingrid; Vázquez, María Luisa; Mogollón-Pérez, Amparo Susana; Unger, Jean-Pierre

    2010-10-29

    The health sector reform in Colombia, initiated by Law 100 (1993) that introduced a managed competition model, is generally presented as a successful experience of improving access to care through a health insurance regulated market. The study's objective is to improve our understanding of the factors influencing access to the continuum of care in the Colombian managed competition model, from the social actors' point of view. An exploratory, descriptive-interpretative qualitative study was carried out, based on case studies of four healthcare networks in rural and urban areas. Individual semi-structured interviews were conducted to a three stage theoretical sample: I) cases, II) providers and III) informants: insured and uninsured users (35), health professionals (51), administrative personnel (20), and providers' (18) and insurers' (10) managers. Narrative content analysis was conducted; segmented by cases, informant's groups and themes. Access, particularly to secondary care, is perceived as complex due to four groups of obstacles with synergetic effects: segmented insurance design with insufficient services covered; insurers' managed care and purchasing mechanisms; providers' networks structural and organizational limitations; and, poor living conditions. Insurers' and providers' values based on economic profit permeate all factors. Variations became apparent between the two geographical areas and insurance schemes. In the urban areas barriers related to market functioning predominate, whereas in the rural areas structural deficiencies in health services are linked to insufficient public funding. While financial obstacles are dominant in the subsidized regime, in the contributory scheme supply shortage prevails, related to insufficient private investment. The results show how in the Colombian healthcare system structural and organizational barriers to care access, that are common in developing countries, are widened by both the insurers' use of mechanisms that

  4. The Use of a Computer-Controlled Random Access Slide Projector for Rapid Information Display.

    ERIC Educational Resources Information Center

    Muller, Mark T.

    A 35mm random access slide projector operated in conjunction with a computer terminal was adapted to meet the need for a more rapid and complex graphic display mechanism than is currently available with teletypewriter terminals. The model projector can be operated manually to provide for a maintenance checkout of the electromechanical system.…

  5. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  6. Three essays on access pricing

    NASA Astrophysics Data System (ADS)

    Sydee, Ahmed Nasim

    In the first essay, a theoretical model is developed to determine the time path of optimal access price in the telecommunications industry. Determining the optimal access price is an important issue in the economics of telecommunications. Setting a high access price discourages potential entrants; a low access price, on the other hand, amounts to confiscation of private property because the infrastructure already built by the incumbent is sunk. Furthermore, a low access price does not give the incumbent incentives to maintain the current network and to invest in new infrastructures. Much of the existing literature on access pricing suffers either from the limitations of a static framework or from the assumption that all costs are avoidable. The telecommunications industry is subject to high stranded costs and, therefore, to address this issue a dynamic model is imperative. This essay presents a dynamic model of one-way access pricing in which the compensation involved in deregulatory taking is formalized and then analyzed. The short run adjustment after deregulatory taking has occurred is carried out and discussed. The long run equilibrium is also analyzed. A time path for the Ramsey price is shown as the correct dynamic price of access. In the second essay, a theoretical model is developed to determine the time path of optimal access price for an infrastructure that is characterized by congestion and lumpy investment. Much of the theoretical literature on access pricing of infrastructure prescribes that the access price be set at the marginal cost of the infrastructure. In proposing this rule of access pricing, the conventional analysis assumes that infrastructure investments are infinitely divisible so that it makes sense to talk about the marginal cost of investment. Often it is the case that investments in infrastructure are lumpy and can only be made in large chunks, and this renders the marginal cost concept meaningless. In this essay, we formalize a model of

  7. Evaluation of innovative devices to control traffic entering from low-volume access points within a land closure.

    DOT National Transportation Integrated Search

    2014-04-01

    This report describes the methodology and results of analyses performed to identify and evaluate : alternative methods to control traffic entering a lane closure on a two-lane, two-way road from low-volume : access points. Researchers documented the ...

  8. Development of Control Models and a Robust Multivariable Controller for Surface Shape Control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Winters, Scott Eric

    2003-06-18

    Surface shape control techniques are applied to many diverse disciplines, such as adaptive optics, noise control, aircraft flutter control and satellites, with an objective to achieve a desirable shape for an elastic body by the application of distributed control forces. Achieving the desirable shape is influenced by many factors, such as, actuator locations, sensor locations, surface precision and controller performance. Building prototypes to complete design optimizations or controller development can be costly or impractical. This shortfall, puts significant value in developing accurate modeling and control simulation approaches. This thesis focuses on the field of adaptive optics, although these developments havemore » the potential for application in many other fields. A static finite element model is developed and validated using a large aperture interferometer system. This model is then integrated into a control model using a linear least squares algorithm and Shack-Hartmann sensor. The model is successfully exercised showing functionality for various wavefront aberrations. Utilizing a verified model shows significant value in simulating static surface shape control problems with quantifiable uncertainties. A new dynamic model for a seven actuator deformable mirror is presented and its accuracy is proven through experiment. Bond graph techniques are used to generate the state space model of the multi-actuator deformable mirror including piezo-electric actuator dynamics. Using this verified model, a robust multi-input multi-output (MIMO) H ∞ controller is designed and implemented. This controller proved superior performance as compared to a standard proportional-integral controller (PI) design.« less

  9. Provider responses to patients controlling access to their electronic health records: a prospective cohort study in primary care.

    PubMed

    Tierney, William M; Alpert, Sheri A; Byrket, Amy; Caine, Kelly; Leventhal, Jeremy C; Meslin, Eric M; Schwartz, Peter H

    2015-01-01

    Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data. We designed a program that captures patients' preferences for provider access to an urban health system's EHR. Patients could allow or restrict providers' access to all data (diagnoses, medications, test results, reports, etc.) or only highly sensitive data (sexually transmitted infections, HIV/AIDS, drugs/alcohol, mental or reproductive health). Except for information in free-text reports, we redacted EHR data shown to providers according to patients' preferences. Providers could "break the glass" to display redacted information. We prospectively studied this system in one primary care clinic, noting redactions and when users "broke the glass," and surveyed providers about their experiences and opinions. Eight of nine eligible clinic physicians and all 23 clinic staff participated. All 105 patients who enrolled completed the preference program. Providers did not know which of their patients were enrolled, nor their preferences for accessing their EHRs. During the 6-month prospective study, 92 study patients (88 %) returned 261 times, during which providers viewed their EHRs 126 times (48 %). Providers "broke the glass" 102 times, 92 times for patients not in the study and ten times for six returning study patients, all of whom had restricted EHR access. Providers "broke the glass" for six (14 %) of 43 returning study patients with redacted data vs. zero among 49 study patients without redactions (p = 0.01). Although 54 % of providers agreed that patients should have control over who sees their EHR information, 58 % believed restricting EHR access could harm provider-patient relationships and 71 % felt quality of care would suffer. Patients frequently preferred restricting provider access to their EHRs. Providers infrequently overrode patients' preferences to view hidden data. Providers believed that restricting EHR access

  10. Observation Data Model Core Components, its Implementation in the Table Access Protocol Version 1.1

    NASA Astrophysics Data System (ADS)

    Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel; Michel, Laurent; Bonnarel, Francos; Micol, Alberto; IVOA DataModel Working Group; Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel

    2017-05-01

    This document defines the core components of the Observation data model that are necessary to perform data discovery when querying data centers for astronomical observations of interest. It exposes use-cases to be carried out, explains the model and provides guidelines for its implementation as a data access service based on the Table Access Protocol (TAP). It aims at providing a simple model easy to understand and to implement by data providers that wish to publish their data into the Virtual Observatory. This interface integrates data modeling and data access aspects in a single service and is named ObsTAP. It will be referenced as such in the IVOA registries. In this document, the Observation Data Model Core Components (ObsCoreDM) defines the core components of queryable metadata required for global discovery of observational data. It is meant to allow a single query to be posed to TAP services at multiple sites to perform global data discovery without having to understand the details of the services present at each site. It defines a minimal set of basic metadata and thus allows for a reasonable cost of implementation by data providers. The combination of the ObsCoreDM with TAP is referred to as an ObsTAP service. As with most of the VO Data Models, ObsCoreDM makes use of STC, Utypes, Units and UCDs. The ObsCoreDM can be serialized as a VOTable. ObsCoreDM can make reference to more complete data models such as Characterisation DM, Spectrum DM or Simple Spectral Line Data Model (SSLDM). ObsCore shares a large set of common concepts with DataSet Metadata Data Model (Cresitello-Dittmar et al. 2016) which binds together most of the data model concepts from the above models in a comprehensive and more general frame work. This current specification on the contrary provides guidelines for implementing these concepts using the TAP protocol and answering ADQL queries. It is dedicated to global discovery.

  11. Case Study in Modeling Accessibility for Online Instruction

    ERIC Educational Resources Information Center

    Conway, Thomas Hayes

    2017-01-01

    The purpose of this qualitative multiple case study was to explore how accessibility standards are adapted to create online learning environments that are accessible to people who use assistive technology, or have navigational challenges due to physical or intellectual disabilities. Rogers diffusion of innovation was used as the contextual…

  12. Estimation and Evaluation of Future Demand and Supply of Healthcare Services Based on a Patient Access Area Model

    PubMed Central

    Doi, Shunsuke; Ide, Hiroo; Takeuchi, Koichi; Fujita, Shinsuke; Takabayashi, Katsuhiko

    2017-01-01

    Accessibility to healthcare service providers, the quantity, and the quality of them are important for national health. In this study, we focused on geographic accessibility to estimate and evaluate future demand and supply of healthcare services. We constructed a simulation model called the patient access area model (PAAM), which simulates patients’ access time to healthcare service institutions using a geographic information system (GIS). Using this model, to evaluate the balance of future healthcare services demand and supply in small areas, we estimated the number of inpatients every five years in each area and compared it with the number of hospital beds within a one-hour drive from each area. In an experiment with the Tokyo metropolitan area as a target area, when we assumed hospital bed availability to be 80%, it was predicted that over 78,000 inpatients would not receive inpatient care in 2030. However, this number would decrease if we lowered the rate of inpatient care by 10% and the average length of the hospital stay. Using this model, recommendations can be made regarding what action should be undertaken and by when to prevent a dramatic increase in healthcare demand. This method can help plan the geographical resource allocation in healthcare services for healthcare policy. PMID:29125585

  13. A Limited Access Mouse Model of Prenatal Alcohol Exposure that Produces Long-Lasting Deficits in Hippocampal-Dependent Learning and Memory

    PubMed Central

    Brady, Megan L.; Allan, Andrea M.; Caldwell, Kevin K.

    2013-01-01

    Background It has been estimated that approximately 12% of women consume alcohol at some time during their pregnancy, and as many as 5% of children born in the United States are impacted by prenatal alcohol exposure (PAE). The range of physical, behavioral, emotional, and social dysfunctions that are associated with PAE are collectively termed fetal alcohol spectrum disorder (FASD). Methods Using a saccharin-sweetened ethanol solution, we developed a limited access model of PAE. C57BL/6J mice were provided access to a solution of either 10% (w/v) ethanol and 0.066% (w/v) saccharin or 0.066% (w/v) saccharin (control) for 4 h/d. After establishing consistent drinking, mice were mated and continued drinking during gestation. Following parturition, solutions were decreased to 0% in a stepwise fashion over a period of 6 days. Characterization of the model included measurements of maternal consumption patterns, blood ethanol levels, litter size, pup weight, maternal care, and the effects of PAE on fear-conditioned and spatial learning, and locomotor activity. Results Mothers had mean daily ethanol intake of 7.17 ± 0.17 g ethanol/kg body weight per day, with average blood ethanol concentrations of 68.5 ± 9.2 mg/dl after 2 hours of drinking and 88.3 ± 11.5 mg/dl after 4 hours of drinking. Food and water consumption, maternal weight gain, litter size, pup weight, pup retrieval times, and time on nest did not differ between the alcohol-exposed and control animals. Compared with control offspring, mice that were exposed to ethanol prenatally displayed no difference in spontaneous locomotor activity but demonstrated learning deficits in 3 hippocampal-dependent tasks: delay fear conditioning, trace fear conditioning, and the delay nonmatch to place radial-arm maze task. Conclusions These results indicate that this model appropriately mimics the human condition of PAE and will be a useful tool in studying the learning deficits seen in FASD. PMID:21933200

  14. An Open-Access Modeled Passenger Flow Matrix for the Global Air Network in 2010

    PubMed Central

    Huang, Zhuojie; Wu, Xiao; Garcia, Andres J.; Fik, Timothy J.; Tatem, Andrew J.

    2013-01-01

    The expanding global air network provides rapid and wide-reaching connections accelerating both domestic and international travel. To understand human movement patterns on the network and their socioeconomic, environmental and epidemiological implications, information on passenger flow is required. However, comprehensive data on global passenger flow remain difficult and expensive to obtain, prompting researchers to rely on scheduled flight seat capacity data or simple models of flow. This study describes the construction of an open-access modeled passenger flow matrix for all airports with a host city-population of more than 100,000 and within two transfers of air travel from various publicly available air travel datasets. Data on network characteristics, city population, and local area GDP amongst others are utilized as covariates in a spatial interaction framework to predict the air transportation flows between airports. Training datasets based on information from various transportation organizations in the United States, Canada and the European Union were assembled. A log-linear model controlling the random effects on origin, destination and the airport hierarchy was then built to predict passenger flows on the network, and compared to the results produced using previously published models. Validation analyses showed that the model presented here produced improved predictive power and accuracy compared to previously published models, yielding the highest successful prediction rate at the global scale. Based on this model, passenger flows between 1,491 airports on 644,406 unique routes were estimated in the prediction dataset. The airport node characteristics and estimated passenger flows are freely available as part of the Vector-Borne Disease Airline Importation Risk (VBD-Air) project at: www.vbd-air.com/data. PMID:23691194

  15. An open-access modeled passenger flow matrix for the global air network in 2010.

    PubMed

    Huang, Zhuojie; Wu, Xiao; Garcia, Andres J; Fik, Timothy J; Tatem, Andrew J

    2013-01-01

    The expanding global air network provides rapid and wide-reaching connections accelerating both domestic and international travel. To understand human movement patterns on the network and their socioeconomic, environmental and epidemiological implications, information on passenger flow is required. However, comprehensive data on global passenger flow remain difficult and expensive to obtain, prompting researchers to rely on scheduled flight seat capacity data or simple models of flow. This study describes the construction of an open-access modeled passenger flow matrix for all airports with a host city-population of more than 100,000 and within two transfers of air travel from various publicly available air travel datasets. Data on network characteristics, city population, and local area GDP amongst others are utilized as covariates in a spatial interaction framework to predict the air transportation flows between airports. Training datasets based on information from various transportation organizations in the United States, Canada and the European Union were assembled. A log-linear model controlling the random effects on origin, destination and the airport hierarchy was then built to predict passenger flows on the network, and compared to the results produced using previously published models. Validation analyses showed that the model presented here produced improved predictive power and accuracy compared to previously published models, yielding the highest successful prediction rate at the global scale. Based on this model, passenger flows between 1,491 airports on 644,406 unique routes were estimated in the prediction dataset. The airport node characteristics and estimated passenger flows are freely available as part of the Vector-Borne Disease Airline Importation Risk (VBD-Air) project at: www.vbd-air.com/data.

  16. Comparison of perceived and modelled geographical access to accident and emergency departments: a cross-sectional analysis from the Caerphilly Health and Social Needs Study.

    PubMed

    Fone, David L; Christie, Stephen; Lester, Nathan

    2006-04-13

    Assessment of the spatial accessibility of hospital accident and emergency departments as perceived by local residents has not previously been investigated. Perceived accessibility may affect where, when, and whether potential patients attend for treatment. Using data on 11,853 respondents to a population survey in Caerphilly county borough, Wales, UK, we present an analysis comparing the accessibility of accident and emergency departments as reported by local residents and drive-time to the nearest accident and emergency department modelled using a geographical information system (GIS). Median drive-times were significantly shorter in the lowest perceived access category and longer in the best perceived access category (p < 0.001). The perceived access and GIS modelled drive-time variables were positively correlated (Spearman's rank correlation coefficient, r = 0.38, p < 0.01). The strongest correlation was found for respondents living in areas in which nearly all households had a car or van (r = 0.47, p < 0.01). Correlations were stronger among respondents reporting good access to public transport and among those reporting a recent accident and emergency attendance for injury treatment compared to other respondents. Correlation coefficients did not vary substantially by levels of household income. Drive-time, road distance and straight-line distance were highly inter-correlated and substituting road distance or straight-line distance as the GIS modelled spatial accessibility measure only marginally decreased the magnitude of the correlations between perceived and GIS modelled access. This study provides evidence that the accessibility of hospital-based health care services as perceived by local residents is related to measures of spatial accessibility modelled using GIS. For studies that aim to model geographical separation in a way that correlates well with the perception of local residents, there may be minimal advantage in using sophisticated measures

  17. A Case-Series Test of the Interactive Two-step Model of Lexical Access: Predicting Word Repetition from Picture Naming

    PubMed Central

    Dell, Gary S.; Martin, Nadine; Schwartz, Myrna F.

    2010-01-01

    Lexical access in language production, and particularly pathologies of lexical access, are often investigated by examining errors in picture naming and word repetition. In this article, we test a computational approach to lexical access, the two-step interactive model, by examining whether the model can quantitatively predict the repetition-error patterns of 65 aphasic subjects from their naming errors. The model’s characterizations of the subjects’ naming errors were taken from the companion paper to this one (Schwartz, Dell, N. Martin, Gahl & Sobel, 2006), and their repetition was predicted from the model on the assumption that naming involves two error prone steps, word and phonological retrieval, whereas repetition only creates errors in the second of these steps. A version of the model in which lexical-semantic and lexical-phonological connections could be independently lesioned was generally successful in predicting repetition for the aphasics. An analysis of the few cases in which model predictions were inaccurate revealed the role of input phonology in the repetition task. PMID:21085621

  18. Interpreting the results of a modified gravity model: examining access to primary health care physicians in five Canadian provinces and territories.

    PubMed

    Crooks, Valorie A; Schuurman, Nadine

    2012-08-01

    Primary health care (PHC) encompasses an array of health and social services that focus on preventative, diagnostic, and basic care measures to maintain wellbeing and address illnesses. In Canada, PHC involves the provision of first-contact health care services by providers such as family physicians and general practitioners - collectively referred as PHC physicians here. Ensuring access is a key requirement of effective PHC delivery. This is because having access to PHC has been shown to positively impact a number of health outcomes. We build on recent innovations in measuring potential spatial access to PHC physicians using geographic information systems (GIS) by running and then interpreting the findings of a modified gravity model. Elsewhere we have introduced the protocol for this model. In this article we run it for five selected Canadian provinces and territories. Our objectives are to present the results of the modified gravity model in order to: (1) understand how potential spatial access to PHC physicians can be interpreted in these Canadian jurisdictions, and (2) provide guidance regarding how findings of the modified gravity model should be interpreted in other analyses. Regarding the first objective, two distinct spatial patterns emerge regarding potential spatial access to PHC physicians in the five selected Canadian provinces: (1) a clear north-south pattern, where southern areas have greater potential spatial access than northern areas; and (2) while gradients of potential spatial access exist in and around urban areas, access outside of densely-to-moderately populated areas is fairly binary. Regarding the second objective, we identify three principles that others can use to interpret the findings of the modified gravity model when used in other research contexts. Future applications of the modified gravity model are needed in order to refine the recommendations we provide on interpreting its results. It is important that studies are undertaken that

  19. Interpreting the results of a modified gravity model: examining access to primary health care physicians in five Canadian provinces and territories

    PubMed Central

    2012-01-01

    Background Primary health care (PHC) encompasses an array of health and social services that focus on preventative, diagnostic, and basic care measures to maintain wellbeing and address illnesses. In Canada, PHC involves the provision of first-contact health care services by providers such as family physicians and general practitioners – collectively referred as PHC physicians here. Ensuring access is a key requirement of effective PHC delivery. This is because having access to PHC has been shown to positively impact a number of health outcomes. Methods We build on recent innovations in measuring potential spatial access to PHC physicians using geographic information systems (GIS) by running and then interpreting the findings of a modified gravity model. Elsewhere we have introduced the protocol for this model. In this article we run it for five selected Canadian provinces and territories. Our objectives are to present the results of the modified gravity model in order to: (1) understand how potential spatial access to PHC physicians can be interpreted in these Canadian jurisdictions, and (2) provide guidance regarding how findings of the modified gravity model should be interpreted in other analyses. Results Regarding the first objective, two distinct spatial patterns emerge regarding potential spatial access to PHC physicians in the five selected Canadian provinces: (1) a clear north–south pattern, where southern areas have greater potential spatial access than northern areas; and (2) while gradients of potential spatial access exist in and around urban areas, access outside of densely-to-moderately populated areas is fairly binary. Regarding the second objective, we identify three principles that others can use to interpret the findings of the modified gravity model when used in other research contexts. Conclusions Future applications of the modified gravity model are needed in order to refine the recommendations we provide on interpreting its results. It is

  20. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  1. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  2. DSSTOX WEBSITE LAUNCH: IMPROVING PUBLIC ACCESS TO DATABASES FOR BUILDING STRUCTURE-TOXICITY PREDICTION MODELS

    EPA Science Inventory

    DSSTox Website Launch: Improving Public Access to Databases for Building Structure-Toxicity Prediction Models
    Ann M. Richard
    US Environmental Protection Agency, Research Triangle Park, NC, USA

    Distributed: Decentralized set of standardized, field-delimited databases,...

  3. Learning Relational Policies from Electronic Health Record Access Logs

    PubMed Central

    Malin, Bradley; Nyemba, Steve; Paulett, John

    2011-01-01

    Modern healthcare organizations (HCOs) are composed of complex dynamic teams to ensure clinical operations are executed in a quick and competent manner. At the same time, the fluid nature of such environments hinders administrators' efforts to define access control policies that appropriately balance patient privacy and healthcare functions. Manual efforts to define these policies are labor-intensive and error-prone, often resulting in systems that endow certain care providers with overly broad access to patients' medical records while restricting other providers from legitimate and timely use. In this work, we propose an alternative method to generate these policies by automatically mining usage patterns from electronic health record (EHR) systems. EHR systems are increasingly being integrated into clinical environments and our approach is designed to be generalizable across HCOs, thus assisting in the design and evaluation of local access control policies. Our technique, which is grounded in data mining and social network analysis theory, extracts a statistical model of the organization from the access logs of its EHRs. In doing so, our approach enables the review of predefined policies, as well as the discovery of unknown behaviors. We evaluate our approach with five months of access logs from the Vanderbilt University Medical Center and confirm the existence of stable social structures and intuitive business operations. Additionally, we demonstrate that there is significant turnover in the interactions between users in the HCO and that policies learned at the department level afford greater stability over time. PMID:21277996

  4. Comparison of external catheters with subcutaneous vascular access ports for chronic vascular access in a porcine model.

    PubMed

    Chuang, Marc; Orvieto, Marcelo; Laven, Brett; Gerber, Glenn; Wardrip, Craig; Ritch, Chad; Shalhav, Arieh

    2005-03-01

    We sought to compare the outcomes of two chronic vascular access techniques, the externalized catheter and the subcutaneous vascular access port, in pigs. Female farm pigs (n = 30) underwent placement of a chronic vascular access device in the jugular vein for a research protocol: 18 of the animals underwent placement of a tunneled Hickman catheter (THC), and the remaining 12 animals underwent placement of a subcutaneous vascular access port (VAP) without external components. After placement of the devices, animals underwent serial blood sampling. All animals were given identical antibiotic prophylaxis. VAP access required the use of a restraint sling for Huber needle insertion, whereas THC access required no additional equipment. Animals were euthanatized 1 month after placement of the device. In the VAP group, the port was retrieved, cleaned, and steam-autoclaved for reuse. In the THC group, 13 (72%) animals developed infectious complications, and blood and wound cultures were often polymicrobial. One animal was euthanatized secondary to overwhelming sepsis. In addition, three (17%) animals developed thromboembolic complications. In contrast, no thromboembolic complications were noted in the VAP group, and only one animal developed a transient fever which resolved spontaneously; no septic complications or abscesses developed. Blood draws with no anesthesia were successful in both groups. We conclude that subcutaneous vascular access ports are a safe and efficient method for obtaining reliable chronic vascular access for a 1-month period in pigs. The subcutaneous devices were associated with low morbidity. In contrast, externalized catheters can be associated with considerable morbidity.

  5. Health literacy of mothers accessing child development services: a model of information use.

    PubMed

    Cheung, Winnie; Davey, Jeanette; St John, Winsome; Bydeveldt, Carmen; Forsingdal, Shareen

    2016-02-01

    This study aimed to explore how mothers use information in home therapy programs within child development services. A grounded theory study using semistructured interviews was conducted with 14 mothers of children aged 3-6 years accessing occupational therapy, physiotherapy and speech pathology services for developmental needs. A conceptual model of mothers' information use was developed. Findings showed that the mothers went through a cyclical process of information use and decision making: acquisition (collaboration, learning preferences), appraisal (understanding, relevance), application (capacity, resourcefulness) and review (evaluation, modification), with contextual factors including information characteristics, environment, personal characteristics and relationships. Mothers who used information effectively had a sense of confidence, control and mastery, and were empowered to apply information to make decisions and adapt their child's home therapy. This study adds to knowledge about health literacy, specifically how mothers interpret and use health-related information at home. Findings will enable health professionals to address families' unique health literacy needs and empower them to support their child's optimal development, functioning and participation at their stage of life.

  6. Automatic control of finite element models for temperature-controlled radiofrequency ablation.

    PubMed

    Haemmerich, Dieter; Webster, John G

    2005-07-14

    The finite element method (FEM) has been used to simulate cardiac and hepatic radiofrequency (RF) ablation. The FEM allows modeling of complex geometries that cannot be solved by analytical methods or finite difference models. In both hepatic and cardiac RF ablation a common control mode is temperature-controlled mode. Commercial FEM packages don't support automating temperature control. Most researchers manually control the applied power by trial and error to keep the tip temperature of the electrodes constant. We implemented a PI controller in a control program written in C++. The program checks the tip temperature after each step and controls the applied voltage to keep temperature constant. We created a closed loop system consisting of a FEM model and the software controlling the applied voltage. The control parameters for the controller were optimized using a closed loop system simulation. We present results of a temperature controlled 3-D FEM model of a RITA model 30 electrode. The control software effectively controlled applied voltage in the FEM model to obtain, and keep electrodes at target temperature of 100 degrees C. The closed loop system simulation output closely correlated with the FEM model, and allowed us to optimize control parameters. The closed loop control of the FEM model allowed us to implement temperature controlled RF ablation with minimal user input.

  7. Automatic control of finite element models for temperature-controlled radiofrequency ablation

    PubMed Central

    Haemmerich, Dieter; Webster, John G

    2005-01-01

    Background The finite element method (FEM) has been used to simulate cardiac and hepatic radiofrequency (RF) ablation. The FEM allows modeling of complex geometries that cannot be solved by analytical methods or finite difference models. In both hepatic and cardiac RF ablation a common control mode is temperature-controlled mode. Commercial FEM packages don't support automating temperature control. Most researchers manually control the applied power by trial and error to keep the tip temperature of the electrodes constant. Methods We implemented a PI controller in a control program written in C++. The program checks the tip temperature after each step and controls the applied voltage to keep temperature constant. We created a closed loop system consisting of a FEM model and the software controlling the applied voltage. The control parameters for the controller were optimized using a closed loop system simulation. Results We present results of a temperature controlled 3-D FEM model of a RITA model 30 electrode. The control software effectively controlled applied voltage in the FEM model to obtain, and keep electrodes at target temperature of 100°C. The closed loop system simulation output closely correlated with the FEM model, and allowed us to optimize control parameters. Discussion The closed loop control of the FEM model allowed us to implement temperature controlled RF ablation with minimal user input. PMID:16018811

  8. Studying "exposure" to firearms: household ownership v access

    PubMed Central

    Ikeda, R; Dahlberg, L; Kresnow, M; Sacks, J; Mercy, J

    2003-01-01

    Background: Firearm ownership has often been used to measure access to weapons. However, persons who own a firearm may not have access to it and conversely, persons who do not own a firearm may be able to access one quickly. Objectives: To examine whether using firearm ownership is a reasonable proxy for access by describing the demographic characteristics associated with ownership and access. Methods: Data are from the 1994 Injury Control and Risk Survey, a national, random digit dial survey. Information about household firearm ownership and ready access to a loaded firearm were collected and weighted to provide national estimates. Adjusted odds ratios for three separate models were calculated using logistic regression. Results: A total of 1353 (27.9%) respondents reported both having a firearm in the household and ready access to one. An additional 313 respondents (8.1%) reported having a firearm, but were not able to access these weapons. Another 421 respondents (7.2%) did not have a firearm in or around their home, yet reported being able to retrieve and fire one within 10 minutes. Based on the logistic regression findings, the demographic characteristics of this latter group are quite different from those who report ownership. Those who do not have a firearm, but report ready access to one, are more likely to be ethnic minorities, single, and living in attached homes. Conclusions: Asking only about the presence of a firearm in a household may miss some respondents with ready access to a loaded firearm. More importantly, those who do not own a firearm, but report ready access to one, appear to be qualitatively different from those who report ownership. Caution should be exercised when using measures of ownership as a proxy for access. PMID:12642560

  9. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  10. Channel Access in Erlang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less

  11. Design of the Wind Tunnel Model Communication Controller Board. Degree awarded by Christopher Newport Univ. on Dec. 1998

    NASA Technical Reports Server (NTRS)

    Wilson, William C.

    1999-01-01

    The NASA Langley Research Center's Wind Tunnel Reinvestment project plans to shrink the existing data acquisition electronics to fit inside a wind tunnel model. Space limitations within a model necessitate a distributed system of Application Specific Integrated Circuits (ASICs) rather than a centralized system based on PC boards. This thesis will focus on the design of the prototype of the communication Controller board. A portion of the communication Controller board is to be used as the basis of an ASIC design. The communication Controller board will communicate between the internal model modules and the external data acquisition computer. This board is based around an Field Programmable Gate Array (FPGA), to allow for reconfigurability. In addition to the FPGA, this board contains buffer Random Access Memory (RAM), configuration memory (EEPROM), drivers for the communications ports, and passive components.

  12. Improving access to psychosocial interventions for common mental health problems in the United Kingdom: narrative review and development of a conceptual model for complex interventions

    PubMed Central

    2012-01-01

    Background In the United Kingdom and worldwide, there is significant policy interest in improving the quality of care for patients with mental health disorders and distress. Improving quality of care means addressing not only the effectiveness of interventions but also the issue of limited access to care. Research to date into improving access to mental health care has not been strongly rooted within a conceptual model, nor has it systematically identified the different elements of the patient journey from identification of illness to receipt of care. This paper set out to review core concepts underlying patient access to mental health care, synthesise these to develop a conceptual model of access, and consider the implications of the model for the development and evaluation of interventions for groups with poor access to mental health care such as older people and ethnic minorities. Methods Narrative review of the literature to identify concepts underlying patient access to mental health care, and synthesis into a conceptual model to support the delivery and evaluation of complex interventions to improve access to mental health care. Results The narrative review adopted a process model of access to care, incorporating interventions at three levels. The levels comprise (a) community engagement (b) addressing the quality of interactions in primary care and (c) the development and delivery of tailored psychosocial interventions. Conclusions The model we propose can form the basis for the development and evaluation of complex interventions in access to mental health care. We highlight the key methodological challenges in evaluating the overall impact of access interventions, and assessing the relative contribution of the different elements of the model. PMID:22889290

  13. Investigating the Spatial Dimension of Food Access.

    PubMed

    Yenerall, Jackie; You, Wen; Hill, Jennie

    2017-08-02

    The purpose of this article is to investigate the sensitivity of food access models to a dataset's spatial distribution and the empirical definition of food access, which contributes to understanding the mixed findings of previous studies. Data was collected in the Dan River Region in the United States using a telephone survey for individual-level variables ( n = 784) and a store audit for the location of food retailers and grocery store quality. Spatial scanning statistics assessed the spatial distribution of obesity and detected a cluster of grocery stores overlapping with a cluster of obesity centered on a grocery store suggesting that living closer to a grocery store increased the likelihood of obesity. Logistic regression further examined this relationship while controlling for demographic and other food environment variables. Similar to the cluster analysis results, increased distance to a grocery store significantly decreased the likelihood of obesity in the urban subsample (average marginal effects, AME = -0.09, p -value = 0.02). However, controlling for grocery store quality nullified these results (AME = -0.12, p -value = 0.354). Our findings suggest that measuring grocery store accessibility as the distance to the nearest grocery store captures variability in the spatial distribution of the health outcome of interest that may not reflect a causal relationship between the food environment and health.

  14. Investigating the Spatial Dimension of Food Access

    PubMed Central

    Yenerall, Jackie; You, Wen

    2017-01-01

    The purpose of this article is to investigate the sensitivity of food access models to a dataset’s spatial distribution and the empirical definition of food access, which contributes to understanding the mixed findings of previous studies. Data was collected in the Dan River Region in the United States using a telephone survey for individual-level variables (n = 784) and a store audit for the location of food retailers and grocery store quality. Spatial scanning statistics assessed the spatial distribution of obesity and detected a cluster of grocery stores overlapping with a cluster of obesity centered on a grocery store suggesting that living closer to a grocery store increased the likelihood of obesity. Logistic regression further examined this relationship while controlling for demographic and other food environment variables. Similar to the cluster analysis results, increased distance to a grocery store significantly decreased the likelihood of obesity in the urban subsample (average marginal effects, AME = −0.09, p-value = 0.02). However, controlling for grocery store quality nullified these results (AME = −0.12, p-value = 0.354). Our findings suggest that measuring grocery store accessibility as the distance to the nearest grocery store captures variability in the spatial distribution of the health outcome of interest that may not reflect a causal relationship between the food environment and health. PMID:28767093

  15. Reduced-order modeling for hyperthermia control.

    PubMed

    Potocki, J K; Tharp, H S

    1992-12-01

    This paper analyzes the feasibility of using reduced-order modeling techniques in the design of multiple-input, multiple-output (MIMO) hyperthermia temperature controllers. State space thermal models are created based upon a finite difference expansion of the bioheat transfer equation model of a scanned focused ultrasound system (SFUS). These thermal state space models are reduced using the balanced realization technique, and an order reduction criterion is tabulated. Results show that a drastic reduction in model dimension can be achieved using the balanced realization. The reduced-order model is then used to design a reduced-order optimal servomechanism controller for a two-scan input, two thermocouple output tissue model. In addition, a full-order optimal servomechanism controller is designed for comparison and validation purposes. These two controllers are applied to a variety of perturbed tissue thermal models to test the robust nature of the reduced-order controller. A comparison of the two controllers validates the use of open-loop balanced reduced-order models in the design of MIMO hyperthermia controllers.

  16. A fragmentation model of earthquake-like behavior in internet access activity

    NASA Astrophysics Data System (ADS)

    Paguirigan, Antonino A.; Angco, Marc Jordan G.; Bantang, Johnrob Y.

    We present a fragmentation model that generates almost any inverse power-law size distribution, including dual-scaled versions, consistent with the underlying dynamics of systems with earthquake-like behavior. We apply the model to explain the dual-scaled power-law statistics observed in an Internet access dataset that covers more than 32 million requests. The non-Poissonian statistics of the requested data sizes m and the amount of time τ needed for complete processing are consistent with the Gutenberg-Richter-law. Inter-event times δt between subsequent requests are also shown to exhibit power-law distributions consistent with the generalized Omori law. Thus, the dataset is similar to the earthquake data except that two power-law regimes are observed. Using the proposed model, we are able to identify underlying dynamics responsible in generating the observed dual power-law distributions. The model is universal enough for its applicability to any physical and human dynamics that is limited by finite resources such as space, energy, time or opportunity.

  17. Open access publishing and author-pays business models: a survey of authors' knowledge and perceptions

    PubMed Central

    Schroter, Sara; Tite, Leanne

    2006-01-01

    Objectives: We aimed to assess journal authors' current knowledge and perceptions of open access and author-pays publishing. Design: An electronic survey. Setting: Authors of research papers submitted to BMJ, Archives of Disease in Childhood, and Journal of Medical Genetics in 2004. Main outcome measures: Familiarity with and perceptions of open access and author-pays publishing. Results: 468/1113 (42%) responded. Prior to definitions being provided, 47% (222/468) and 38% (176/468) reported they were familiar with the terms `open access' and `author-pays' publishing, respectively. Some who did not at first recognize the terms, did claim to recognize them when they were defined. Only 10% (49/468) had submitted to an author-pays journal. Compared with non-open access subscription-based journals, 35% agreed that open access author-pays journals have a greater capacity to publish more content making it easier to get published, 27% thought they had lower impact factors, 31% thought they had faster and more timely publicaitons, and 46% agreed that people will think anyone can pay to get published. 55% (256/468) thought they would not continue to submit to their respective journal if it became open access and charged, largely because of the reputaiton of the journals. Half (54%, 255/468) said open access has `no impact' or was `low priority' in their submission decisions. Two-thirds (66%, 308/468) said they would prefer to submit to a non-open access subscription-based journal than an open access author-pays journal. Over half thought they would have to make a contribution or pay the full cost of an author charge (56%, 262/468). Conclusions: The survey yielded useful information about respondents' knowledge and perceptions of these publishing models. Authors have limited familiarity with the concept of open-access publishing and surrounding issues. Currently, open access policies have little impact on authors' decision of where to submit papers. PMID:16508053

  18. Modelling and model predictive control for a bicycle-rider system

    NASA Astrophysics Data System (ADS)

    Chu, T. D.; Chen, C. K.

    2018-01-01

    This study proposes a bicycle-rider control model based on model predictive control (MPC). First, a bicycle-rider model with leaning motion of the rider's upper body is developed. The initial simulation data of the bicycle rider are then used to identify the linear model of the system in state-space form for MPC design. Control characteristics of the proposed controller are assessed by simulating the roll-angle tracking control. In this riding task, the MPC uses steering and leaning torques as the control inputs to control the bicycle along a reference roll angle. The simulation results in different cases have demonstrated the applicability and performance of the MPC for bicycle-rider modelling.

  19. Modeling the Benchmark Active Control Technology Wind-Tunnel Model for Active Control Design Applications

    NASA Technical Reports Server (NTRS)

    Waszak, Martin R.

    1998-01-01

    This report describes the formulation of a model of the dynamic behavior of the Benchmark Active Controls Technology (BACT) wind tunnel model for active control design and analysis applications. The model is formed by combining the equations of motion for the BACT wind tunnel model with actuator models and a model of wind tunnel turbulence. The primary focus of this report is the development of the equations of motion from first principles by using Lagrange's equations and the principle of virtual work. A numerical form of the model is generated by making use of parameters obtained from both experiment and analysis. Comparisons between experimental and analytical data obtained from the numerical model show excellent agreement and suggest that simple coefficient-based aerodynamics are sufficient to accurately characterize the aeroelastic response of the BACT wind tunnel model. The equations of motion developed herein have been used to aid in the design and analysis of a number of flutter suppression controllers that have been successfully implemented.

  20. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  1. Comparing Information Access Approaches.

    ERIC Educational Resources Information Center

    Chalmers, Matthew

    1999-01-01

    Presents a broad view of information access, drawing from philosophy and semiology in constructing a framework for comparative discussion that is used to examine the information representations that underlie four approaches to information access--information retrieval, workflow, collaborative filtering, and the path model. Contains 32 references.…

  2. Design of an Efficient CAC for a Broadband DVB-S/DVB-RCS Satellite Access Network

    NASA Astrophysics Data System (ADS)

    Inzerilli, Tiziano; Montozzi, Simone

    2003-07-01

    This paper deals with efficient utilization of network resources in an advanced broadband satellite access system. It proposes a technique for admission control of IP streams with guaranteed QoS which does not interfere with the particular BoD (Bandwidth on Demand) algorithm that handles access to uplink bandwidth, an essential part of a DVB- RCS architecture. This feature of the admission control greatly simplify its integration in the satellite network. The purpose of this admission control algorithm in particular is to suitably and dynamically configure the overall traffic control parameters, in the access terminal of the user and service segment, with a simple approach which does not introduces limitations and/or constraints to the BoD algorithm. Performance of the proposed algorithm is evaluated thorugh Opnet simulations using an ad-hoc platform modeling DVB-based satellite access.The results presented in this paper were obtained within SATIP6 project, which is sponsored within the 5th EU Research Programme, IST. The aims of the project are to evaluate and demonstrate key issues of the integration of satellite-based access networks into the Internet in order to support multimedia services over wide areas. The satellite link layer is based on DVB-S on the forward link and DVB-RCS on the return link. Adaptation and optimization of the DVB-RCS access standard in order to support QoS provision are central issues of the project. They are handled through an integration of Connection Admission Control (CAC), Traffic Shaping and Policing techniques.

  3. Diabetes: Models, Signals and control

    NASA Astrophysics Data System (ADS)

    Cobelli, C.

    2010-07-01

    Diabetes and its complications impose significant economic consequences on individuals, families, health systems, and countries. The control of diabetes is an interdisciplinary endeavor, which includes significant components of modeling, signal processing and control. Models: first, I will discuss the minimal (coarse) models which describe the key components of the system functionality and are capable of measuring crucial processes of glucose metabolism and insulin control in health and diabetes; then, the maximal (fine-grain) models which include comprehensively all available knowledge about system functionality and are capable to simulate the glucose-insulin system in diabetes, thus making it possible to create simulation scenarios whereby cost effective experiments can be conducted in silico to assess the efficacy of various treatment strategies - in particular I will focus on the first in silico simulation model accepted by FDA as a substitute to animal trials in the quest for optimal diabetes control. Signals: I will review metabolic monitoring, with a particular emphasis on the new continuous glucose sensors, on the crucial role of models to enhance the interpretation of their time-series signals, and on the opportunities that they present for automation of diabetes control. Control: I will review control strategies that have been successfully employed in vivo or in silico, presenting a promise for the development of a future artificial pancreas and, in particular, I will discuss a modular architecture for building closed-loop control systems, including insulin delivery and patient safety supervision layers.

  4. A discrete control model of PLANT

    NASA Technical Reports Server (NTRS)

    Mitchell, C. M.

    1985-01-01

    A model of the PLANT system using the discrete control modeling techniques developed by Miller is described. Discrete control models attempt to represent in a mathematical form how a human operator might decompose a complex system into simpler parts and how the control actions and system configuration are coordinated so that acceptable overall system performance is achieved. Basic questions include knowledge representation, information flow, and decision making in complex systems. The structure of the model is a general hierarchical/heterarchical scheme which structurally accounts for coordination and dynamic focus of attention. Mathematically, the discrete control model is defined in terms of a network of finite state systems. Specifically, the discrete control model accounts for how specific control actions are selected from information about the controlled system, the environment, and the context of the situation. The objective is to provide a plausible and empirically testable accounting and, if possible, explanation of control behavior.

  5. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  6. Intraosseous Vascular Access through the Anterior Mandible – A Cadaver Model Pilot Study

    PubMed Central

    Goldschalt, Christin; Doll, Sara; Ihle, Brit; Kirsch, Joachim; Mutzbauer, Till Sebastian

    2014-01-01

    Background Several insertion sites have been described for intraosseous puncture in cases of emergencies when a conventional vascular access cannot be established. This pilot study has been designed to evaluate the feasibility of the mandibular bone for the use of an intraosseous vascular access in a cadaver model. Methodology/Principal Findings 17 dentistry and 16 medical students participating in a voluntary course received a short introduction into the method and subsequently used the battery powered EZ-IO system with a 15 mm cannula for a puncture of the anterior mandible in 33 cadavers. The time needed to perform each procedure was evaluated. India ink was injected into the accesses and during the anatomy course cadavers were dissected to retrace the success or failure of the puncture. Dental students needed 25.5±18.9(mean±standard deviation)s and medical students 33±20.4 s for the procedure (p = 0.18). Floor of mouth extravasation occurred in both groups in 3 cases. Success rates were 82 and 75% (p = 0.93). Conclusions/Significance Despite floor of mouth extravasation of injected fluid into a mandibular intraosseous access might severely complicate this procedure, the anterior mandible may be helpful as an alternative to other intraosseous and intravenous insertion sites when these are not available in medical emergencies. PMID:25405476

  7. Diabetes: Models, Signals, and Control

    PubMed Central

    Cobelli, Claudio; Man, Chiara Dalla; Sparacino, Giovanni; Magni, Lalo; De Nicolao, Giuseppe; Kovatchev, Boris P.

    2010-01-01

    The control of diabetes is an interdisciplinary endeavor, which includes a significant biomedical engineering component, with traditions of success beginning in the early 1960s. It began with modeling of the insulin-glucose system, and progressed to large-scale in silico experiments, and automated closed-loop control (artificial pancreas). Here, we follow these engineering efforts through the last, almost 50 years. We begin with the now classic minimal modeling approach and discuss a number of subsequent models, which have recently resulted in the first in silico simulation model accepted as substitute to animal trials in the quest for optimal diabetes control. We then review metabolic monitoring, with a particular emphasis on the new continuous glucose sensors, on the analyses of their time-series signals, and on the opportunities that they present for automation of diabetes control. Finally, we review control strategies that have been successfully employed in vivo or in silico, presenting a promise for the development of a future artificial pancreas and, in particular, discuss a modular architecture for building closed-loop control systems, including insulin delivery and patient safety supervision layers. We conclude with a brief discussion of the unique interactions between human physiology, behavioral events, engineering modeling and control relevant to diabetes. PMID:20936056

  8. The EV Project Price/Fee Models for Publicly Accessible Charging

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Francfort, James Edward

    As plug-in electric vehicles (PEVs) are introduced to the market place and gain more consumer acceptance, it is important for a robust and self-sustaining non-residential infrastructure of electric vehicle supply equipment (EVSE) to be established to meet the needs of PEV drivers. While federal and state financial incentives for electric vehicles were in place and remain so today, future incentives are uncertain. In order for PEVs to achieve mainstream adoption, an adequate and sustainable commercial or publicly available charging infrastructure was pursued by The EV Project to encourage increased PEV purchases by alleviating range anxiety, and by removing adoption barriersmore » for consumers without a dedicated overnight parking location to provide a home-base charger. This included determining a business model for publicly accessible charge infrastructure. To establish this business model, The EV Project team created a fee for charge model along with various ancillary offerings related to charging that would generate revenue. And after placing chargers in the field the Project rolled out this fee structure.« less

  9. Stereolithographic models of the solvent-accessible surface of biopolymers. Topical report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bradford, J.; Noel, P.; Emery, J.D.

    1996-11-01

    The solvent-accessible surfaces of several biopolymers were calculated. As part of the DOE education outreach activity, two high school students participated in this project. Computer files containing sets of triangles were produced. These files are called stl files and are the ISO 9001 standard. They have been written onto CD-ROMs for distribution to American companies. Stereolithographic models were made of some of them to ensure that the computer calculations were done correctly. Stereolithographic models were made of interleukin 1{beta} (IL-1{beta}), three antibodies (an anti-p-azobenzene arsonate, an anti-Brucella A cell wall polysaccharide, and an HIV neutralizing antibody), a triple stranded coiledmore » coil, and an engrailed homeodomain. Also, the biopolymers and their files are described.« less

  10. Integrated semiconductor-magnetic random access memory system

    NASA Technical Reports Server (NTRS)

    Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)

    2001-01-01

    The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.

  11. AP-8 trapped proton environment for solar maximum and solar minimum. [Computer accessible models

    NASA Technical Reports Server (NTRS)

    Sawyer, D. M.; Vette, J. I.

    1976-01-01

    Data sets from Ov-3 and Azur indicate a need for improvement in models of the stably trapped proton flux with energies between 0.1 and 400 MeV. Two computer accessible models are described: AP8MAX and AP8MIN. The models are presented in the form of nomographs, B-L plots, R-lambda plots, and equatorial radial profiles. Nomographs of the orbit-integrated fluxes are also discussed. The models are compared with each other, with the data, and with previous AP models. Requirements for future improvements include more complete data coverage and periodic comparisons with new data sets as they become available. The machine-sensible format in which the models are available are described.

  12. Tinamit: Making coupled system dynamics models accessible to stakeholders

    NASA Astrophysics Data System (ADS)

    Malard, Julien; Inam Baig, Azhar; Rojas Díaz, Marcela; Hassanzadeh, Elmira; Adamowski, Jan; Tuy, Héctor; Melgar-Quiñonez, Hugo

    2017-04-01

    Model coupling is increasingly used as a method of combining the best of two models when representing socio-environmental systems, though barriers to successful model adoption by stakeholders are particularly present with the use of coupled models, due to their high complexity and typically low implementation flexibility. Coupled system dynamics - physically-based modelling is a promising method to improve stakeholder participation in environmental modelling while retaining a high level of complexity for physical process representation, as the system dynamics components are readily understandable and can be built by stakeholders themselves. However, this method is not without limitations in practice, including 1) inflexible and complicated coupling methods, 2) difficult model maintenance after the end of the project, and 3) a wide variety of end-user cultures and languages. We have developed the open-source Python-language software tool Tinamit to overcome some of these limitations to the adoption of stakeholder-based coupled system dynamics - physically-based modelling. The software is unique in 1) its inclusion of both a graphical user interface (GUI) and a library of available commands (API) that allow users with little or no coding abilities to rapidly, effectively, and flexibly couple models, 2) its multilingual support for the GUI, allowing users to couple models in their preferred language (and to add new languages as necessary for their community work), and 3) its modular structure allowing for very easy model coupling and modification without the direct use of code, and to which programming-savvy users can easily add support for new types of physically-based models. We discuss how the use of Tinamit for model coupling can greatly increase the accessibility of coupled models to stakeholders, using an example of a stakeholder-built system dynamics model of soil salinity issues in Pakistan coupled with the physically-based soil salinity and water flow model

  13. Access and adequate utilization of malaria control interventions in rural Malawi: a descriptive quantitative study.

    PubMed

    Kabaghe, Alinune Nathanael; Chipeta, Michael Give; McCann, Robert Sean; Terlouw, Dianne Jean; Tizifa, Tinashe; Truwah, Zinenani; Phiri, Kamija Samuel; van Vugt, Michèle

    2018-03-06

    Despite the availability of cost effective malaria control interventions, such as insecticide-treated bed nets (ITN), diagnosis and effective treatment of malaria, and intermittent preventive treatment during pregnancy (IPTp), the lack of equitable access and coverage affect utilization of these interventions in rural communities. Aggregated rates of access and utilization of malaria interventions in national surveys mask substantial variations in intervention coverage. Utilization of interventions and factors affecting utilization need investigation in rural communities. One year of quantitative data collected from a rolling Malaria Indicator Survey (April 2015-April 2016) in Chikhwawa District, Malawi, before the ITN distribution campaign, were analysed. Univariate analyses were used to quantify rates of ITN usage, care-seeking for fever in children aged 6-59 months and women aged 15-49 years and IPTp uptake (for women aged 15-49 years with a recent delivery). Results were compared to national survey estimates; factors associated with these outcomes were determined using multivariate regression models. A total of 2046 participants were included from 1328 households; 56.6% were women aged 15-49 years and 43.4% were children aged 6-59 months. Reported ownership of at least one ITN per household and under-five children ITN use the previous night were 35.3 and 33.5% compared to 70.2 and 67.1%, respectively, in the national survey; ITN use was higher in high wealth quintile households than low quintile ones. For participants with recent fever, 37.6 and 19.5% sought care and sought care within 24 h, respectively. Care-seeking was lower for febrile women than febrile children [aOR, 95% CI 0.53 (0.35-0.81)]. Uptake of two and three or more doses of IPTp were 40.6 and 15.0%, respectively, among women with a pregnancy in the last 2 years. To achieve effective malaria control, fine-scale or district-based surveillance should be used to identify and target communities

  14. Transgender Adults' Access to College Bathrooms and Housing and the Relationship to Suicidality.

    PubMed

    Seelman, Kristie L

    2016-10-01

    Transgender and gender non-conforming people frequently experience discrimination, harassment, and marginalization across college and university campuses (Bilodeau, 2007; Finger, 2010; Rankin et al., 2010; Seelman et al., 2012). The minority stress model (Meyer, 2007) posits that experiences of discrimination often negatively impact the psychological wellbeing of minority groups. However, few scholars have examined whether college institutional climate factors-such as being denied access to bathrooms or gender-appropriate campus housing-are significantly associated with detrimental psychological outcomes for transgender people. Using the National Transgender Discrimination Survey, this study analyzes whether being denied access to these spaces is associated with lifetime suicide attempts, after controlling for interpersonal victimization by students or teachers. Findings from sequential logistic regression (N = 2,316) indicate that denial of access to either space had a significant relationship to suicidality, even after controlling for interpersonal victimization. This article discusses implications for higher education professionals and researchers.

  15. Modeling and control design of a wind tunnel model support

    NASA Technical Reports Server (NTRS)

    Howe, David A.

    1990-01-01

    The 12-Foot Pressure Wind Tunnel at Ames Research Center is being restored. A major part of the restoration is the complete redesign of the aircraft model supports and their associated control systems. An accurate trajectory control servo system capable of positioning a model (with no measurable overshoot) is needed. Extremely small errors in scaled-model pitch angle can increase airline fuel costs for the final aircraft configuration by millions of dollars. In order to make a mechanism sufficiently accurate in pitch, a detailed structural and control-system model must be created and then simulated on a digital computer. The model must contain linear representations of the mechanical system, including masses, springs, and damping in order to determine system modes. Electrical components, both analog and digital, linear and nonlinear must also be simulated. The model of the entire closed-loop system must then be tuned to control the modes of the flexible model-support structure. The development of a system model, the control modal analysis, and the control-system design are discussed.

  16. A Review of Existing Studies Reporting the Negative Effects of Alcohol Access and Positive Effects of Alcohol Control Policies on Interpersonal Violence

    PubMed Central

    Fitterer, Jessica L.; Nelson, Trisalyn A.; Stockwell, Timothy

    2015-01-01

    Alcohol consumption often leads to elevated rates of violence yet alcohol access policies continue to relax across the globe. Our review establishes the extent alcohol policy can moderate violent crime through alcohol availability restrictions. Results were informed from comprehensive selection of peer-reviewed journals from 1950 to October 2015. Our search identified 87 relevant studies on alcohol access and violence conducted across 12 countries. Seventeen studies included quasi-control design, and 23 conducted intervention analysis. Seventy-one (82%) reported a significant relationship between alcohol access and violent offenses. Alcohol outlet studies reported the greatest percentage of significant results (93%), with trading hours (63%), and alcohol price following (58%). Results from baseline studies indicated the effectiveness of increasing the price of commonly consumed alcohol, restricting the hours of alcohol trading, and limiting the number of alcohol outlets per region to prevent violent offenses. Unclear are the effects of tax reductions, restriction of on-premises re-entry, and different outlet types on violent crime. Further, the generalization of statistics over broad areas and the low number of control/intervention studies poses some concern for confounding or correlated effects on study results, and amount of information for local-level prevention of interpersonal violence. Future studies should focus on gathering longitudinal data, validating models, limiting crime data to peak drinking days and times, and wherever possible collecting the joint distribution between violent crime, intoxication, and place. A greater uptake of local-level analysis will benefit studies comparing the influence of multiple alcohol establishment types by relating the location of a crime to establishment proximity. Despite, some uncertainties particular studies showed that even modest policy changes, such as 1% increases in alcohol price, 1 h changes to closing times

  17. Prospects of Genomic Prediction in the USDA Soybean Germplasm Collection: Historical Data Creates Robust Models for Enhancing Selection of Accessions.

    PubMed

    Jarquin, Diego; Specht, James; Lorenz, Aaron

    2016-08-09

    The identification and mobilization of useful genetic variation from germplasm banks for use in breeding programs is critical for future genetic gain and protection against crop pests. Plummeting costs of next-generation sequencing and genotyping is revolutionizing the way in which researchers and breeders interface with plant germplasm collections. An example of this is the high density genotyping of the entire USDA Soybean Germplasm Collection. We assessed the usefulness of 50K single nucleotide polymorphism data collected on 18,480 domesticated soybean (Glycine max) accessions and vast historical phenotypic data for developing genomic prediction models for protein, oil, and yield. Resulting genomic prediction models explained an appreciable amount of the variation in accession performance in independent validation trials, with correlations between predicted and observed reaching up to 0.92 for oil and protein and 0.79 for yield. The optimization of training set design was explored using a series of cross-validation schemes. It was found that the target population and environment need to be well represented in the training set. Second, genomic prediction training sets appear to be robust to the presence of data from diverse geographical locations and genetic clusters. This finding, however, depends on the influence of shattering and lodging, and may be specific to soybean with its presence of maturity groups. The distribution of 7608 nonphenotyped accessions was examined through the application of genomic prediction models. The distribution of predictions of phenotyped accessions was representative of the distribution of predictions for nonphenotyped accessions, with no nonphenotyped accessions being predicted to fall far outside the range of predictions of phenotyped accessions. Copyright © 2016 Jarquin et al.

  18. Dynamics and control of quadcopter using linear model predictive control approach

    NASA Astrophysics Data System (ADS)

    Islam, M.; Okasha, M.; Idres, M. M.

    2017-12-01

    This paper investigates the dynamics and control of a quadcopter using the Model Predictive Control (MPC) approach. The dynamic model is of high fidelity and nonlinear, with six degrees of freedom that include disturbances and model uncertainties. The control approach is developed based on MPC to track different reference trajectories ranging from simple ones such as circular to complex helical trajectories. In this control technique, a linearized model is derived and the receding horizon method is applied to generate the optimal control sequence. Although MPC is computer expensive, it is highly effective to deal with the different types of nonlinearities and constraints such as actuators’ saturation and model uncertainties. The MPC parameters (control and prediction horizons) are selected by trial-and-error approach. Several simulation scenarios are performed to examine and evaluate the performance of the proposed control approach using MATLAB and Simulink environment. Simulation results show that this control approach is highly effective to track a given reference trajectory.

  19. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    NASA Astrophysics Data System (ADS)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  20. Locally Controlled Scholarly Publishing via the Internet: The Guild Model.

    ERIC Educational Resources Information Center

    Kling, Rob; Spector, Lisa; McKim, Geoff

    2002-01-01

    Discusses use of the Internet for scholarly communication; describes five publishing models where readers can access articles without a fee, including electronic journals; and explains a sixth model, called the Guild Publishing Model, which involves research publication series called working papers or technical reports that are sponsored by…

  1. Modeling and control of flexible structures

    NASA Technical Reports Server (NTRS)

    Gibson, J. S.; Mingori, D. L.

    1988-01-01

    This monograph presents integrated modeling and controller design methods for flexible structures. The controllers, or compensators, developed are optimal in the linear-quadratic-Gaussian sense. The performance objectives, sensor and actuator locations and external disturbances influence both the construction of the model and the design of the finite dimensional compensator. The modeling and controller design procedures are carried out in parallel to ensure compatibility of these two aspects of the design problem. Model reduction techniques are introduced to keep both the model order and the controller order as small as possible. A linear distributed, or infinite dimensional, model is the theoretical basis for most of the text, but finite dimensional models arising from both lumped-mass and finite element approximations also play an important role. A central purpose of the approach here is to approximate an optimal infinite dimensional controller with an implementable finite dimensional compensator. Both convergence theory and numerical approximation methods are given. Simple examples are used to illustrate the theory.

  2. Video Modeling and Observational Learning to Teach Gaming Access to Students with ASD.

    PubMed

    Spriggs, Amy D; Gast, David L; Knight, Victoria F

    2016-09-01

    The purpose of this study was to evaluate both video modeling and observational learning to teach age-appropriate recreation and leisure skills (i.e., accessing video games) to students with autism spectrum disorder. Effects of video modeling were evaluated via a multiple probe design across participants and criteria for mastery were based on these results. Secondary measures were collected on observational learning across participants and behaviors. Participants included 4 children with autism, ages 8-11, who were served in self-contained special education classrooms. Results indicated a functional relation between video modeling and increased independence in gaming; observational learning occurred for at least some steps across students. Results, implications for practitioners, limitations, and ideas for future research are discussed.

  3. Multiplicity Control in Structural Equation Modeling

    ERIC Educational Resources Information Center

    Cribbie, Robert A.

    2007-01-01

    Researchers conducting structural equation modeling analyses rarely, if ever, control for the inflated probability of Type I errors when evaluating the statistical significance of multiple parameters in a model. In this study, the Type I error control, power and true model rates of famsilywise and false discovery rate controlling procedures were…

  4. Applying a mathematical model to estimate the fractional accessibility to quenching of serum albumin by risperidone

    NASA Astrophysics Data System (ADS)

    Carqueja, Marilena; Cortez, Celia Martins

    2014-10-01

    In this work we report the results from application of a mathematical model to estimate the fractional accessibility to fluorescence quenching by risperidone in human and bovine sera albumins. Risperidone is an atypical antipsychotic drug used to treat many kinds of psychiatric disorders. Results showed that but the fractional accessibility for trypyophan 134, sub domain 1B, is about 3 times higher than that to tryptophan 212, showing that the primary binding site for risperidone is close to tryptophan 134, in domain IB of BSA.

  5. Final Report: Results from Accessing Curriculum through Technology Tools (ACTTT), A Model Development Project

    ERIC Educational Resources Information Center

    Johanson, Joyce; Clark, Letha; Daytner, Katrina; Robinson, Linda

    2009-01-01

    Accessing Curriculum through Technology Tools (ACTTT), a model development project, was developed and tested by staff of the Center for Best Practices in Early Childhood (the Center), a research and development unit within the College of Education and Human Services at Western Illinois University. The major goal of ACTTT was to develop,…

  6. The neighbourhood effects of geographical access to tobacco retailers on individual smoking behaviour.

    PubMed

    Pearce, J; Hiscock, R; Moon, G; Barnett, R

    2009-01-01

    To investigate whether neighbourhood measures of geographical accessibility to outlets selling tobacco (supermarkets, convenience stores and petrol stations) are associated with individual smoking behaviour in New Zealand. Using geographical information systems, travel times from the population-weighted centroid of each neighbourhood to the closest outlet selling tobacco were calculated for all 38,350 neighbourhoods across New Zealand. These measures were appended to the 2002/03 New Zealand Health Survey, a national survey of 12, 529 adults. Two-level logistic regression models were fitted to examine the effects of neighbourhood locational access upon individual smoking behaviour after controlling for potential individual- and neighbourhood-level confounding factors, including deprivation and urban/rural status. After controlling for individual-level demographic and socioeconomic variables, individuals living in the quartiles of neighbourhoods with the best access to supermarkets (OR 1.23, 95% CI 1.06 to 1.42) and convenience stores (OR 1.19, 95% CI 1.03 to 1.38) had a higher odds of smoking compared with individuals in the worst access quartiles. However, the association between neighbourhood accessibility to supermarkets and convenience stores was not apparent once other neighbourhood-level variables (deprivation and rurality) were included. At the national level, there is little evidence to suggest that, after adjustment for neighbourhood deprivation, better locational access to tobacco retail provision in New Zealand is associated with individual-level smoking behaviour.

  7. Lithium-ion battery cell-level control using constrained model predictive control and equivalent circuit models

    NASA Astrophysics Data System (ADS)

    Xavier, Marcelo A.; Trimboli, M. Scott

    2015-07-01

    This paper introduces a novel application of model predictive control (MPC) to cell-level charging of a lithium-ion battery utilizing an equivalent circuit model of battery dynamics. The approach employs a modified form of the MPC algorithm that caters for direct feed-though signals in order to model near-instantaneous battery ohmic resistance. The implementation utilizes a 2nd-order equivalent circuit discrete-time state-space model based on actual cell parameters; the control methodology is used to compute a fast charging profile that respects input, output, and state constraints. Results show that MPC is well-suited to the dynamics of the battery control problem and further suggest significant performance improvements might be achieved by extending the result to electrochemical models.

  8. Use of program logic models in the Southern Rural Access Program evaluation.

    PubMed

    Pathman, Donald; Thaker, Samruddhi; Ricketts, Thomas C; Albright, Jennifer B

    2003-01-01

    The Southern Rural Access Program (SRAP) evaluation team used program logic models to clarify grantees' activities, objectives, and timelines. This information was used to benchmark data from grantees' progress reports to assess the program's successes. This article presents a brief background on the use of program logic models--essentially charts or diagrams specifying a program's planned activities, objectives, and goals--for evaluating and managing a program. It discusses the structure of the logic models chosen for the SRAP and how the model concept was introduced to the grantees to promote acceptance and use of the models. The article describes how the models helped clarify the program's objectives and helped lead agencies plan and manage the many program initiatives and subcontractors in their states. Models also provided a framework for grantees to report their progress to the National Program Office and evaluators and promoted the evaluators' visibility and acceptance by the grantees. Program logics, however, increased grantees' reporting requirements and demanded substantial time of the evaluators. Program logic models, on balance, proved their merit in the SRAP through their contributions to its management and evaluation and by providing a better understanding of the program's initiatives, successes, and potential impact.

  9. Combined Use of Bivalirudin and Radial Access in Acute Coronary Syndromes Is Not Superior to the Use of Either One Separately: Meta-Analysis of Randomized Controlled Trials.

    PubMed

    Mina, George S; Gobrial, George F; Modi, Kalgi; Dominic, Paari

    2016-08-08

    The aim of this meta-analysis was to study the relation between access site and bivalirudin use on outcomes in patients with acute coronary syndrome (ACS). Bivalirudin and radial access use are 2 strategies that are increasingly used to lower major bleeding in patients with ACS undergoing invasive approaches. The interaction between these 2 strategies and the benefit of using them in combination are unclear. This analysis included randomized controlled trials that compared bivalirudin to heparin with or without glycoprotein IIb/IIIa inhibitors in patients with ACS and reported outcomes stratified by arterial access site. Meta-analyses of outcome data were performed on the basis of access site and anticoagulation regimen. Pooled odds ratios (ORs) and 95% confidence intervals (CIs) were calculated from event rates using random-effects models. Eight trials with a total of 27,491 patients were included. Bivalirudin reduced major bleeding risk in patients with femoral access (OR: 0.51; 95% CI: 0.46 to 0.6; p < 0.001) but not in patients with radial access (OR: 0.75; 95% CI: 0.45 to 1.26; p = 0.28). Moreover, radial access reduced major bleeding risk in patients treated with heparin (OR: 0.57; 95% CI: 0.43 to 0.77; p < 0.001) but not in patients treated with bivalirudin (OR: 0.96; 95% CI: 0.65 to 1.41; p = 0.83). There were no differences in major adverse cardiovascular events or all-cause mortality between bivalirudin and heparin, regardless of access site. Bivalirudin reduces bleeding risk only with femoral access, and radial access reduces bleeding risk only with heparin anticoagulation. Therefore, there is no additional benefit to the combined use of bivalirudin and radial access strategies in patients with ACS. Copyright © 2016 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  10. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  11. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  12. Model based design introduction: modeling game controllers to microprocessor architectures

    NASA Astrophysics Data System (ADS)

    Jungwirth, Patrick; Badawy, Abdel-Hameed

    2017-04-01

    We present an introduction to model based design. Model based design is a visual representation, generally a block diagram, to model and incrementally develop a complex system. Model based design is a commonly used design methodology for digital signal processing, control systems, and embedded systems. Model based design's philosophy is: to solve a problem - a step at a time. The approach can be compared to a series of steps to converge to a solution. A block diagram simulation tool allows a design to be simulated with real world measurement data. For example, if an analog control system is being upgraded to a digital control system, the analog sensor input signals can be recorded. The digital control algorithm can be simulated with the real world sensor data. The output from the simulated digital control system can then be compared to the old analog based control system. Model based design can compared to Agile software develop. The Agile software development goal is to develop working software in incremental steps. Progress is measured in completed and tested code units. Progress is measured in model based design by completed and tested blocks. We present a concept for a video game controller and then use model based design to iterate the design towards a working system. We will also describe a model based design effort to develop an OS Friendly Microprocessor Architecture based on the RISC-V.

  13. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  14. CCBuilder 2.0: Powerful and accessible coiled‐coil modeling

    PubMed Central

    Wood, Christopher W.

    2017-01-01

    Abstract The increased availability of user‐friendly and accessible computational tools for biomolecular modeling would expand the reach and application of biomolecular engineering and design. For protein modeling, one key challenge is to reduce the complexities of 3D protein folds to sets of parametric equations that nonetheless capture the salient features of these structures accurately. At present, this is possible for a subset of proteins, namely, repeat proteins. The α‐helical coiled coil provides one such example, which represents ≈ 3–5% of all known protein‐encoding regions of DNA. Coiled coils are bundles of α helices that can be described by a small set of structural parameters. Here we describe how this parametric description can be implemented in an easy‐to‐use web application, called CCBuilder 2.0, for modeling and optimizing both α‐helical coiled coils and polyproline‐based collagen triple helices. This has many applications from providing models to aid molecular replacement for X‐ray crystallography, in silico model building and engineering of natural and designed protein assemblies, and through to the creation of completely de novo “dark matter” protein structures. CCBuilder 2.0 is available as a web‐based application, the code for which is open‐source and can be downloaded freely. http://coiledcoils.chm.bris.ac.uk/ccbuilder2. Lay Summary We have created CCBuilder 2.0, an easy to use web‐based application that can model structures for a whole class of proteins, the α‐helical coiled coil, which is estimated to account for 3–5% of all proteins in nature. CCBuilder 2.0 will be of use to a large number of protein scientists engaged in fundamental studies, such as protein structure determination, through to more‐applied research including designing and engineering novel proteins that have potential applications in biotechnology. PMID:28836317

  15. Routes to DNA accessibility: alternative pathways for nucleosome unwinding.

    PubMed

    Schlingman, Daniel J; Mack, Andrew H; Kamenetska, Masha; Mochrie, Simon G J; Regan, Lynne

    2014-07-15

    The dynamic packaging of DNA into chromatin is a key determinant of eukaryotic gene regulation and epigenetic inheritance. Nucleosomes are the basic unit of chromatin, and therefore the accessible states of the nucleosome must be the starting point for mechanistic models regarding these essential processes. Although the existence of different unwound nucleosome states has been hypothesized, there have been few studies of these states. The consequences of multiple states are far reaching. These states will behave differently in all aspects, including their interactions with chromatin remodelers, histone variant exchange, and kinetic properties. Here, we demonstrate the existence of two distinct states of the unwound nucleosome, which are accessible at physiological forces and ionic strengths. Using optical tweezers, we measure the rates of unwinding and rewinding for these two states and show that the rewinding rates from each state are different. In addition, we show that the probability of unwinding into each state is dependent on the applied force and ionic strength. Our results demonstrate not only that multiple unwound states exist but that their accessibility can be differentially perturbed, suggesting possible roles for these states in gene regulation. For example, different histone variants or modifications may facilitate or suppress access to DNA by promoting unwinding into one state or the other. We anticipate that the two unwound states reported here will be the basis for future models of eukaryotic transcriptional control. Copyright © 2014 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  16. Parallel Systems Laboratory: Access, Allocation, and Control

    DTIC Science & Technology

    1992-06-30

    boog Eae...4d READ ISTRUCTIONSREPORT DOCUMENTATIO PAGE BEFOR COMPLETNG FORM I. REPORT NUMNER 2. GOVT ACCESSION NO 3- RECIPINT’S CATALOG NUMR9 . TITLE (an...a summary of the salient results of this research in capsule form which is followed by an extensive list of publications, dissertations and theses...because it provides the asymptotic use of currently wasted cycles. To do so, we examine a distribution of w(u It) in a very simple form and for

  17. Model based manipulator control

    NASA Technical Reports Server (NTRS)

    Petrosky, Lyman J.; Oppenheim, Irving J.

    1989-01-01

    The feasibility of using model based control (MBC) for robotic manipulators was investigated. A double inverted pendulum system was constructed as the experimental system for a general study of dynamically stable manipulation. The original interest in dynamically stable systems was driven by the objective of high vertical reach (balancing), and the planning of inertially favorable trajectories for force and payload demands. The model-based control approach is described and the results of experimental tests are summarized. Results directly demonstrate that MBC can provide stable control at all speeds of operation and support operations requiring dynamic stability such as balancing. The application of MBC to systems with flexible links is also discussed.

  18. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications

    PubMed Central

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  19. Vehicle active steering control research based on two-DOF robust internal model control

    NASA Astrophysics Data System (ADS)

    Wu, Jian; Liu, Yahui; Wang, Fengbo; Bao, Chunjiang; Sun, Qun; Zhao, Youqun

    2016-07-01

    Because of vehicle's external disturbances and model uncertainties, robust control algorithms have obtained popularity in vehicle stability control. The robust control usually gives up performance in order to guarantee the robustness of the control algorithm, therefore an improved robust internal model control(IMC) algorithm blending model tracking and internal model control is put forward for active steering system in order to reach high performance of yaw rate tracking with certain robustness. The proposed algorithm inherits the good model tracking ability of the IMC control and guarantees robustness to model uncertainties. In order to separate the design process of model tracking from the robustness design process, the improved 2 degree of freedom(DOF) robust internal model controller structure is given from the standard Youla parameterization. Simulations of double lane change maneuver and those of crosswind disturbances are conducted for evaluating the robust control algorithm, on the basis of a nonlinear vehicle simulation model with a magic tyre model. Results show that the established 2-DOF robust IMC method has better model tracking ability and a guaranteed level of robustness and robust performance, which can enhance the vehicle stability and handling, regardless of variations of the vehicle model parameters and the external crosswind interferences. Contradiction between performance and robustness of active steering control algorithm is solved and higher control performance with certain robustness to model uncertainties is obtained.

  20. Lithium-ion battery cell-level control using constrained model predictive control and equivalent circuit models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xavier, MA; Trimboli, MS

    This paper introduces a novel application of model predictive control (MPC) to cell-level charging of a lithium-ion battery utilizing an equivalent circuit model of battery dynamics. The approach employs a modified form of the MPC algorithm that caters for direct feed-though signals in order to model near-instantaneous battery ohmic resistance. The implementation utilizes a 2nd-order equivalent circuit discrete-time state-space model based on actual cell parameters; the control methodology is used to compute a fast charging profile that respects input, output, and state constraints. Results show that MPC is well-suited to the dynamics of the battery control problem and further suggestmore » significant performance improvements might be achieved by extending the result to electrochemical models. (C) 2015 Elsevier B.V. All rights reserved.« less

  1. 33 CFR 104.107 - Employee access area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...

  2. 33 CFR 104.107 - Employee access area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...

  3. 33 CFR 104.107 - Employee access area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...

  4. 33 CFR 104.106 - Passenger access area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...

  5. 33 CFR 104.106 - Passenger access area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...

  6. 33 CFR 104.107 - Employee access area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...

  7. 33 CFR 104.107 - Employee access area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...

  8. 33 CFR 104.106 - Passenger access area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...

  9. 33 CFR 104.106 - Passenger access area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...

  10. 33 CFR 104.106 - Passenger access area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...

  11. Introducing a Fresh Cadaver Model for Ultrasound-guided Central Venous Access Training in Undergraduate Medical Education

    PubMed Central

    Miller, Ryan; Ho, Hang; Ng, Vivienne; Tran, Melissa; Rappaport, Douglas; Rappaport, William J.A.; Dandorf, Stewart J.; Dunleavy, James; Viscusi, Rebecca; Amini, Richard

    2016-01-01

    Introduction Over the past decade, medical students have witnessed a decline in the opportunities to perform technical skills during their clinical years. Ultrasound-guided central venous access (USG-CVA) is a critical procedure commonly performed by emergency medicine, anesthesia, and general surgery residents, often during their first month of residency. However, the acquisition of skills required to safely perform this procedure is often deficient upon graduation from medical school. To ameliorate this lack of technical proficiency, ultrasound simulation models have been introduced into undergraduate medical education to train venous access skills. Criticisms of simulation models are the innate lack of realistic tactile qualities, as well as the lack of anatomical variances when compared to living patients. The purpose of our investigation was to design and evaluate a life-like and reproducible training model for USG-CVA using a fresh cadaver. Methods This was a cross-sectional study at an urban academic medical center. An 18-point procedural knowledge tool and an 18-point procedural skill evaluation tool were administered during a cadaver lab at the beginning and end of the surgical clerkship. During the fresh cadaver lab, procedure naïve third-year medical students were trained on how to perform ultrasound-guided central venous access of the femoral and internal jugular vessels. Preparation of the fresh cadaver model involved placement of a thin-walled latex tubing in the anatomic location of the femoral and internal jugular vein respectively. Results Fifty-six third-year medical students participated in this study during their surgical clerkship. The fresh cadaver model provided high quality and lifelike ultrasound images despite numerous cannulation attempts. Technical skill scores improved from an average score of 3 to 12 (p<0.001) and procedural knowledge scores improved from an average score of 4 to 8 (p<0.001). Conclusion The use of this novel cadaver

  12. Introducing a Fresh Cadaver Model for Ultrasound-guided Central Venous Access Training in Undergraduate Medical Education.

    PubMed

    Miller, Ryan; Ho, Hang; Ng, Vivienne; Tran, Melissa; Rappaport, Douglas; Rappaport, William J A; Dandorf, Stewart J; Dunleavy, James; Viscusi, Rebecca; Amini, Richard

    2016-05-01

    Over the past decade, medical students have witnessed a decline in the opportunities to perform technical skills during their clinical years. Ultrasound-guided central venous access (USG-CVA) is a critical procedure commonly performed by emergency medicine, anesthesia, and general surgery residents, often during their first month of residency. However, the acquisition of skills required to safely perform this procedure is often deficient upon graduation from medical school. To ameliorate this lack of technical proficiency, ultrasound simulation models have been introduced into undergraduate medical education to train venous access skills. Criticisms of simulation models are the innate lack of realistic tactile qualities, as well as the lack of anatomical variances when compared to living patients. The purpose of our investigation was to design and evaluate a life-like and reproducible training model for USG-CVA using a fresh cadaver. This was a cross-sectional study at an urban academic medical center. An 18-point procedural knowledge tool and an 18-point procedural skill evaluation tool were administered during a cadaver lab at the beginning and end of the surgical clerkship. During the fresh cadaver lab, procedure naïve third-year medical students were trained on how to perform ultrasound-guided central venous access of the femoral and internal jugular vessels. Preparation of the fresh cadaver model involved placement of a thin-walled latex tubing in the anatomic location of the femoral and internal jugular vein respectively. Fifty-six third-year medical students participated in this study during their surgical clerkship. The fresh cadaver model provided high quality and lifelike ultrasound images despite numerous cannulation attempts. Technical skill scores improved from an average score of 3 to 12 (p<0.001) and procedural knowledge scores improved from an average score of 4 to 8 (p<0.001). The use of this novel cadaver model prevented extravasation of fluid

  13. A coordinated PCP-Cardiologist Telemedicine Model (PCTM) in China's community hypertension care: study protocol for a randomized controlled trial.

    PubMed

    Xu, Lei; Fang, Wei-Yi; Zhu, Fu; Zhang, Hong-Guang; Liu, Kai

    2017-05-25

    Hypertension is a major risk factor for cardiovascular disease, and its control rate has remained low worldwide. Studies have found that telemonitoring blood pressure (BP) helped control hypertension in randomized controlled trials. However, little is known about its effect in a structured primary care model in which primary care physicians (PCPs) are partnering with cardiology specialists in electronic healthcare data sharing and medical interventions. This study aims to identify the effects of a coordinated PCP-cardiologist model that applies telemedicine tools to facilitate community hypertension control in China. Patients with hypertension receiving care at four community healthcare centers that are academically affiliated to Shanghai Chest Hospital, Shanghai JiaoTong University are eligible if they have had uncontrolled BP in the previous 3 months and access to mobile Internet. Study subjects are randomly assigned to three interventional groups: (1) usual care; (2) home-based BP telemonitor with embedded Global System for Mobile Communications (GSM) module and unlimited data plan, an app to access personal healthcare record and receive personalized lifestyle coaching contents, and proficiency training of their use; or (3) this plus coordinated PCP-cardiologist care in which PCPs and cardiologists share data via a secure CareLinker website to determine interventional approaches. The primary outcome is mean change in systolic blood pressure over a 12-month period. Secondary outcomes are changes of diastolic blood pressure, HbA1C, blood lipids, and medication adherence measured by the eight-item Morisky Medication Adherence Scale. This study will determine whether a coordinated PCP-Cardiologist Telemedicine Model that incorporates the latest telemedicine technologies will improve hypertension care. Success of the model would help streamline the present community healthcare processes and impact a greater number of patients with uncontrolled hypertension. Clinical

  14. ACCESS - A Science and Engineering Assessment of Space Coronagraph Concepts for the Direct Imaging and Spectroscopy of Exoplanetary Systems

    NASA Technical Reports Server (NTRS)

    Trauger, John

    2008-01-01

    Topics include and overview, science objectives, study objectives, coronagraph types, metrics, ACCESS observatory, laboratory validations, and summary. Individual slides examine ACCESS engineering approach, ACCESS gamut of coronagraph types, coronagraph metrics, ACCESS Discovery Space, coronagraph optical layout, wavefront control on the "level playing field", deformable mirror development for HCIT, laboratory testbed demonstrations, high contract imaging with the HCIT, laboratory coronagraph contrast and stability, model validation and performance predictions, HCIT coronagraph optical layout, Lyot coronagraph on the HCIT, pupil mapping (PIAA), shaped pupils, and vortex phase mask experiments on the HCIT.

  15. Public-domain-software solution to data-access problems for numerical modelers

    USGS Publications Warehouse

    Jenter, Harry; Signell, Richard

    1992-01-01

    Unidata's network Common Data Form, netCDF, provides users with an efficient set of software for scientific-data-storage, retrieval, and manipulation. The netCDF file format is machine-independent, direct-access, self-describing, and in the public domain, thereby alleviating many problems associated with accessing output from large hydrodynamic models. NetCDF has programming interfaces in both the Fortran and C computer language with an interface to C++ planned for release in the future. NetCDF also has an abstract data type that relieves users from understanding details of the binary file structure; data are written and retrieved by an intuitive, user-supplied name rather than by file position. Users are aided further by Unidata's inclusion of the Common Data Language, CDL, a printable text-equivalent of the contents of a netCDF file. Unidata provides numerous operators and utilities for processing netCDF files. In addition, a number of public-domain and proprietary netCDF utilities from other sources are available at this time or will be available later this year. The U.S. Geological Survey has produced and is producing a number of public-domain netCDF utilities.

  16. The Open Access Association? EAHIL's new model for sustainability.

    PubMed

    McSean, Tony; Jakobsson, Arne

    2009-12-01

    To discover a governance structure and a business model for the European Association for Health Information and Libraries (EAHIL) which will be economically sustainable in the medium term, arresting a long-term gradual decline in membership numbers and implementing new revenue streams to sustain association activity. Reviewed survival strategies of other professional associations, investigated potential of emerging interactive web technologies, investigated alternative revenue streams based around the 'franchise' of the annual EAHIL conferences and workshops. A fully worked-through and costed alternative structure was produced, based on abolition of the subscription, web-based procedures and functions, increased income from advertising and sponsorship and a large measure of member participation and engagement. Statutes and Rules of Procedure were rewritten to reflect the changes. This plan was put through the Association's approval cycle and implemented in 2005. The new financial model has proved itself sustainable on the basis of the first 2 years' operations. The long-term gradual decline in membership was reversed, with membership numbers trebling across the EAHIL region. The software worked with minimal problems, including the online electoral process. With no identified precedent from other professional associations, the changes represented a considerable risk, which was justifiable because long-term projections made it clear that continuing the traditional model was not viable. The result is a larger, healthier association with a stronger link to its membership. Long-term risks include the high level of member commitment and expertise. There are also important questions about scalability-diseconomies of scale probably limit the applicability of the overall open access model to larger associations.

  17. Loudspeakers: Modeling and control

    NASA Astrophysics Data System (ADS)

    Al-Ali, Khalid Mohammad

    This thesis documented a comprehensive study of loudspeaker modeling and control. A lumped-parameter model for a voice-coil loudspeaker in a vented enclosure was presented that derived from a consideration of physical principles. In addition, a low-frequency (20 Hz to 100 Hz), feedback control method designed to improve the nonlinear performance of the loudspeaker and a suitable performance measure for use in design and evaluation were proposed. Data from experiments performed on a variety of actual loudspeakers confirmed the practicality of the theory developed in this work. The lumped-parameter loudspeaker model, although simple, captured much of the nonlinear behavior of the loudspeaker. In addition, the model formulation allowed a straightforward application of modern control system methods and lent itself well to modern parametric identification techniques. The nonlinear performance of the loudspeaker system was evaluated using a suitable distortion measure that was proposed and compared with other distortion measures currently used in practice. Furthermore, the linearizing effect of feedback using a linear controller (both static and dynamic) was studied on a class of nonlinear systems. The results illustrated that the distortion reduction was potentially significant and a useful upper bound on the closed-loop distortion was found based on the sensitivity function of the system's linearization. A feedback scheme based on robust control theory was chosen for application to the loudspeaker system. Using the pressure output of the loudspeaker system for feedback, the technique offered significant advantages over those previously attempted. Illustrative examples were presented that proved the applicability of the theory developed in this dissertation to a variety of loudspeaker systems. The examples included a vented loudspeaker model and actual loudspeakers enclosed in both vented and sealed configurations. In each example, predictable and measurable distortion

  18. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...

  19. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...

  20. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...