Sample records for access control protocols

  1. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  2. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  3. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  4. Analyzing the effect of routing protocols on media access control protocols in radio networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barrett, C. L.; Drozda, M.; Marathe, A.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less

  5. An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.

    PubMed

    Li, Huaming; Tan, Jindong

    2005-01-01

    In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.

  6. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  7. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  8. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  9. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  10. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  11. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  12. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  13. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  14. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  15. Remote Memory Access Protocol Target Node Intellectual Property

    NASA Technical Reports Server (NTRS)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  16. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  17. Direct data access protocols benchmarking on DPM

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  18. Access Protocol For An Industrial Optical Fibre LAN

    NASA Astrophysics Data System (ADS)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  19. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  20. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  1. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  2. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  3. TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network.

    PubMed

    Ullah, Fasee; Abdullah, Abdul Hanan; Kaiwartya, Omprakash; Cao, Yue

    2017-06-01

    Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical

  4. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  5. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  6. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  7. Experiences with http/WebDAV protocols for data access in high throughput computing

    NASA Astrophysics Data System (ADS)

    Bernabeu, Gerard; Martinez, Francisco; Acción, Esther; Bria, Arnau; Caubet, Marc; Delfino, Manuel; Espinal, Xavier

    2011-12-01

    In the past, access to remote storage was considered to be at least one order of magnitude slower than local disk access. Improvement on network technologies provide the alternative of using remote disk. For those accesses one can today reach levels of throughput similar or exceeding those of local disks. Common choices as access protocols in the WLCG collaboration are RFIO, [GSI]DCAP, GRIDFTP, XROOTD and NFS. HTTP protocol shows a promising alternative as it is a simple, lightweight protocol. It also enables the use of standard technologies such as http caching or load balancing which can be used to improve service resilience and scalability or to boost performance for some use cases seen in HEP such as the "hot files". WebDAV extensions allow writing data, giving it enough functionality to work as a remote access protocol. This paper will show our experiences with the WebDAV door for dCache, in terms of functionality and performance, applied to some of the HEP work flows in the LHC Tier1 at PIC.

  8. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  9. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  10. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  11. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  12. Structural barriers in access to medical marijuana in the USA-a systematic review protocol.

    PubMed

    Valencia, Celina I; Asaolu, Ibitola O; Ehiri, John E; Rosales, Cecilia

    2017-08-07

    There are 43 state medical marijuana programs in the USA, yet limited evidence is available on the demographic characteristics of the patient population accessing these programs. Moreover, insights into the social and structural barriers that inform patients' success in accessing medical marijuana are limited. A current gap in the scientific literature exists regarding generalizable data on the social, cultural, and structural mechanisms that hinder access to medical marijuana among qualifying patients. The goal of this systematic review, therefore, is to identify the aforementioned mechanisms that inform disparities in access to medical marijuana in the USA. This scoping review protocol outlines the proposed study design for the systematic review and evaluation of peer-reviewed scientific literature on structural barriers to medical marijuana access. The protocol follows the guidelines set forth by the Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) checklist. The overarching goal of this study is to rigorously evaluate the existing peer-reviewed data on access to medical marijuana in the USA. Income, ethnic background, stigma, and physician preferences have been posited as the primary structural barriers influencing medical marijuana patient population demographics in the USA. Identification of structural barriers to accessing medical marijuana provides a framework for future policies and programs. Evidence-based policies and programs for increasing medical marijuana access help minimize the disparity of access among qualifying patients.

  13. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  14. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    PubMed

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  15. Obtaining i.v. fosfomycin through an expanded-access protocol.

    PubMed

    Frederick, Corey M; Burnette, Jennifer; Aragon, Laura; Gauthier, Timothy P

    2016-08-15

    One hospital's experience with procuring i.v. fosfomycin via an expanded-access protocol to treat a panresistant infection is described. In mid-2014, a patient at a tertiary care institution had an infection caused by a gram-negative pathogen expressing notable drug resistance. Once it was determined by the infectious diseases (ID) attending physician that i.v. fosfomycin was a possible treatment for this patient, the ID pharmacist began the process of drug procurement. The research and ID pharmacists completed an investigational new drug (IND) application, which required patient-specific details and contributions from the ID physician. After obtaining approval of the IND, an Internet search identified a product vendor in the United Kingdom, who was then contacted to begin the drug purchasing and acquisition processes. Authorization of the transaction required signatures from key senior hospital administrators, including the chief financial officer and the chief operating officer. Approximately 6 days after beginning the acquisition process, the research pharmacist arranged for the wholesaler to expedite product delivery. The ID pharmacist contacted the wholesaler's shipping company at the U.S. Customs Office, providing relevant contact information to ensure that any unexpected circumstances could be quickly addressed. The product arrived at the U.S. Customs Office 8 days after beginning the acquisition process and was held in the U.S. Customs Office for 2 days. The patient received the first dose of i.v. fosfomycin 13 days after starting the expanded-access protocol process. I.V. fosfomycin was successfully procured through an FDA expanded-access protocol by coordinating efforts among ID physicians, pharmacists, and hospital executives. Copyright © 2016 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  16. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  18. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an

  19. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  20. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    PubMed

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  1. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  2. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    PubMed

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  3. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    PubMed

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  4. Comparison between publicly accessible publications, registries, and protocols of phase III trials indicated persistence of selective outcome reporting.

    PubMed

    Zhang, Sheng; Liang, Fei; Li, Wenfeng

    2017-11-01

    The decision to make protocols of phase III randomized controlled trials (RCTs) publicly accessible by leading journals was a landmark event in clinical trial reporting. Here, we compared primary outcomes defined in protocols with those in publications describing the trials and in trial registration. We identified phase III RCTs published between January 1, 2012, and June 30, 2015, in The New England Journal of Medicine, The Lancet, The Journal of the American Medical Association, and The BMJ with available protocols. Consistency in primary outcomes between protocols and registries (articles) was evaluated. We identified 299 phase III RCTs with available protocols in this analysis. Out of them, 25 trials (8.4%) had some discrepancy for primary outcomes between publications and protocols. Types of discrepancies included protocol-defined primary outcome reported as nonprimary outcome in publication (11 trials, 3.7%), protocol-defined primary outcome omitted in publication (10 trials, 3.3%), new primary outcome introduced in publication (8 trials, 2.7%), protocol-defined nonprimary outcome reported as primary outcome in publication (4 trials, 1.3%), and different timing of assessment of primary outcome (4 trials, 1.3%). Out of trials with discrepancies in primary outcome, 15 trials (60.0%) had discrepancies that favored statistically significant results. Registration could be seen as a valid surrogate of protocol in 237 of 299 trials (79.3%) with regard to primary outcome. Despite unrestricted public access to protocols, selective outcome reporting persists in a small fraction of phase III RCTs. Only studies from four leading journals were included, which may cause selection bias and limit the generalizability of this finding. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol

    PubMed Central

    Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-01-01

    Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013

  6. Optimizing Libraries’ Content Findability Using Simple Object Access Protocol (SOAP) With Multi-Tier Architecture

    NASA Astrophysics Data System (ADS)

    Lahinta, A.; Haris, I.; Abdillah, T.

    2017-03-01

    The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.

  7. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  8. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if

  9. Serial Interface through Stream Protocol on EPICS Platform for Distributed Control and Monitoring

    NASA Astrophysics Data System (ADS)

    Das Gupta, Arnab; Srivastava, Amit K.; Sunil, S.; Khan, Ziauddin

    2017-04-01

    Remote operation of any equipment or device is implemented in distributed systems in order to control and proper monitoring of process values. For such remote operations, Experimental Physics and Industrial Control System (EPICS) is used as one of the important software tool for control and monitoring of a wide range of scientific parameters. A hardware interface is developed for implementation of EPICS software so that different equipment such as data converters, power supplies, pump controllers etc. could be remotely operated through stream protocol. EPICS base was setup on windows as well as Linux operating system for control and monitoring while EPICS modules such as asyn and stream device were used to interface the equipment with standard RS-232/RS-485 protocol. Stream Device protocol communicates with the serial line with an interface to asyn drivers. Graphical user interface and alarm handling were implemented with Motif Editor and Display Manager (MEDM) and Alarm Handler (ALH) command line channel access utility tools. This paper will describe the developed application which was tested with different equipment and devices serially interfaced to the PCs on a distributed network.

  10. Access and accounting schemes of wireless broadband

    NASA Astrophysics Data System (ADS)

    Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing

    2004-04-01

    In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.

  11. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  12. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  13. Application of an access technology delivery protocol to two children with cerebral palsy.

    PubMed

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  14. Explanation of the Nagoya Protocol on Access and Benefit Sharing and its implication for microbiology.

    PubMed

    Smith, David; da Silva, Manuela; Jackson, Julian; Lyal, Christopher

    2017-03-01

    Working with genetic resources and associated data requires greater attention since the Nagoya Protocol on Access and Benefit Sharing (ABS) came into force in October 2014. Biologists must ensure that they have legal clarity in how they can and cannot use the genetic resources on which they carry out research. Not only must they work within the spirit in the Convention on Biological Diversity (https://www.cbd.int/convention/articles/default.shtml?a=cbd-02) but also they may have regulatory requirements to meet. Although the Nagoya Protocol was negotiated and agreed globally, it is the responsibility of each country that ratifies it to introduce their individual implementing procedures and practices. Many countries in Europe, such as the UK, have chosen not to put access controls in place at this time, but others already have laws enacted providing ABS measures under the Convention on Biological Diversity or specifically to implement the Nagoya Protocol. Access legislation is in place in many countries and information on this can be found at the ABS Clearing House (https://absch.cbd.int/). For example, Brazil, although not a Party to the Nagoya Protocol at the time of writing, has Law 13.123 which entered into force on 17 November 2015, regulated by Decree 8.772 which was published on 11 May 2016. In this case, export of Brazilian genetic resources is not allowed unless the collector is registered in the National System for Genetic Heritage and Associated Traditional Knowledge Management (SisGen). The process entails that a foreign scientist must first of all be registered working with someone in Brazil and have authorization to collect. The enactment of European Union Regulation po. 511/2014 implements Nagoya Protocol elements that govern compliance measures for users and offers the opportunity to demonstrate due diligence in sourcing their organisms by selecting from holdings of 'registered collections'. The UK has introduced a Statutory Instrument that puts in

  15. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  16. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  17. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  18. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  19. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  20. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  1. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  2. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    PubMed

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  3. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    PubMed Central

    Huarte, Maider; Romaña, Pedro

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338

  4. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  5. Channel Access in Erlang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less

  6. Difficulties in controlling mobilization pain using a standardized patient-controlled analgesia protocol in burns.

    PubMed

    Nilsson, Andreas; Kalman, Sigga; Sonesson, Lena Karin; Arvidsson, Anders; Sjöberg, Folke

    2011-01-01

    The aim of this study was to evaluate pain relief for patients with burns during rest and mobilization with morphine according to a standard protocol for patient-controlled analgesia (PCA). Eighteen patients with a mean (SD) burned TBSA% of 26 (20) were studied for 10 days. Using a numeric rating scale (NRS, 0 = no pain and 10 = unbearable pain), patients were asked to estimate their acceptable and worst experienced pain by specifying a number on a scale and at what point they would like additional analgesics. Patients were allowed free access to morphine with a PCA pump device. Bolus doses were set according to age, (100 - age)/24 = bolus dose (mg), and 6 minutes lockout time. Degrees of pain, morphine requirements, doses delivered and demanded, oral intake of food, and antiemetics given were used as endpoints. Acceptable pain (mean [SD]) was estimated to be 3.8 (1.3) on the NRS, and additional treatment was considered necessary at scores of 4.3 (1.6) or more. NRS at rest was 2.7 (2.2) and during mobilization 4.7 (2.6). Required mean morphine per day was 81 (15) mg, and the number of doses requested increased during the first 6 days after the burn. The authors found no correlation between dose of morphine required and any other variables. Background pain can be controlled adequately with a standard PCA protocol. During mobilization, the pain experienced was too intense, despite having the already high doses of morphine increased. The present protocol must be refined further to provide analgesia adequate to cover mobilization as well.

  7. Tolcapone suppresses ethanol intake in alcohol-preferring rats performing a novel cued access protocol.

    PubMed

    McCane, Aqilah M; Czachowski, Cristine L; Lapish, Christopher C

    2014-09-01

    Dopamine (DA) has been shown to play a central role in regulating motivated behavior and encoding reward. Chronic drug abuse elicits a state of hypodopaminergia in the mesocorticolimbic (MCL) system in both humans and preclinical rodent models of addiction, including those modeling alcohol use disorders (AUD). Working under the hypothesis that reductions in the bioavailability of DA play an integral role in the expression of the excessive drinking phenotype, the catechol-O-methyltransferase (COMT) inhibitor tolcapone was used as a means to amplify cortical DA concentration and drinking behaviors were then assessed. Sucrose and ethanol (EtOH) consumption were measured in P and Wistar rats in both a free choice drinking protocol and a novel cued access protocol. Tolcapone attenuated the consumption of EtOH, and to a lesser extent sucrose, in P rats in the cued access protocol, while no effect was observed in the free choice drinking protocol. Tolcapone also decreased EtOH consumption in high drinking Wistar rats. A follow-up experiment using the indirect DA agonist d-amphetamine showed no change in EtOH consumption. Collectively, these data suggest that COMT inhibitors may be capable of alleviating the extremely motivating or salient nature of stimuli associated with alcohol. The hypothesis is put forth that the relative specificity of tolcapone for cortical DA systems may mediate the suppression of the high seeking/drinking phenotype. Copyright © 2014 by the Research Society on Alcoholism.

  8. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  9. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  10. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  11. An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.

    PubMed

    Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.

  12. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  13. Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals

    PubMed Central

    2004-01-01

    Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763

  14. Peer-review and publication of research protocols and proposals: a role for open access journals.

    PubMed

    Eysenbach, Gunther

    2004-09-30

    Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.

  15. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  16. 76 FR 24862 - Proposed Information Collection; Comment Request; Protocol for Access to Tissue Specimen Samples...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... Collection; Comment Request; Protocol for Access to Tissue Specimen Samples From the National Marine Mammal Tissue Bank AGENCY: National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice... National Marine Mammal Tissue Bank (NMMTB) was established by the National Marine Fisheries Service (NMFS...

  17. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  18. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  19. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  20. System access control study

    DOT National Transportation Integrated Search

    1974-06-01

    The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...

  1. Stability and sensitivity of ABR flow control protocols

    NASA Astrophysics Data System (ADS)

    Tsai, Wie K.; Kim, Yuseok; Chiussi, Fabio; Toh, Chai-Keong

    1998-10-01

    This tutorial paper surveys the important issues in stability and sensitivity analysis of ABR flow control of ATM networks. THe stability and sensitivity issues are formulated in a systematic framework. Four main cause of instability in ABR flow control are identified: unstable control laws, temporal variations of available bandwidth with delayed feedback control, misbehaving components, and interactions between higher layer protocols and ABR flow control. Popular rate-based ABR flow control protocols are evaluated. Stability and sensitivity is shown to be the fundamental issues when the network has dynamically-varying bandwidth. Simulation result confirming the theoretical studies are provided. Open research problems are discussed.

  2. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  3. Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers

    DTIC Science & Technology

    2017-12-01

    PLCs) are vital components in these cyber-physical systems. The industrial network protocols used to communicate between nodes in a control network...AB/RA) MicroLogix 1100 PLC through its implementation of EtherNet/IP, Common Industrial Protocol (CIP), and Programmable Controller Communication ...Commands (PCCC) communication protocols. This research also examines whether cross-generational vulnerabilities exist in the more advanced AB/RA

  4. An access technology delivery protocol for children with severe and multiple disabilities: a case demonstration.

    PubMed

    Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom

    2014-08-01

    This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.

  5. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  6. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  7. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  8. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  9. Controlled breathing protocols probe human autonomic cardiovascular rhythms

    NASA Technical Reports Server (NTRS)

    Cooke, W. H.; Cox, J. F.; Diedrich, A. M.; Taylor, J. A.; Beightol, L. A.; Ames, J. E. 4th; Hoag, J. B.; Seidel, H.; Eckberg, D. L.

    1998-01-01

    The purpose of this study was to determine how breathing protocols requiring varying degrees of control affect cardiovascular dynamics. We measured inspiratory volume, end-tidal CO2, R-R interval, and arterial pressure spectral power in 10 volunteers who followed the following 5 breathing protocols: 1) uncontrolled breathing for 5 min; 2) stepwise frequency breathing (at 0.3, 0.25, 0.2, 0.15, 0.1, and 0.05 Hz for 2 min each); 3) stepwise frequency breathing as above, but with prescribed tidal volumes; 4) random-frequency breathing (approximately 0.5-0.05 Hz) for 6 min; and 5) fixed-frequency breathing (0.25 Hz) for 5 min. During stepwise breathing, R-R interval and arterial pressure spectral power increased as breathing frequency decreased. Control of inspired volume reduced R-R interval spectral power during 0.1 Hz breathing (P < 0.05). Stepwise and random-breathing protocols yielded comparable coherence and transfer functions between respiration and R-R intervals and systolic pressure and R-R intervals. Random- and fixed-frequency breathing reduced end-tidal CO2 modestly (P < 0.05). Our data suggest that stringent tidal volume control attenuates low-frequency R-R interval oscillations and that fixed- and random-rate breathing may decrease CO2 chemoreceptor stimulation. We conclude that autonomic rhythms measured during different breathing protocols have much in common but that a stepwise protocol without stringent control of inspired volume may allow for the most efficient assessment of short-term respiratory-mediated autonomic oscillations.

  10. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    PubMed Central

    Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-01-01

    ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341

  11. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing.

    PubMed

    McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-08-15

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  12. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  13. A comparison of Percutaneous femoral access in Endovascular Repair versus Open femoral access (PiERO): study protocol for a randomized controlled trial.

    PubMed

    Vierhout, Bastiaan P; Saleem, Ben R; Ott, Alewijn; van Dijl, Jan Maarten; de Kempenaer, Ties D van Andringa; Pierie, Maurice E N; Bottema, Jan T; Zeebregts, Clark J

    2015-09-14

    Access for endovascular repair of abdominal aortic aneurysms (EVAR) is obtained through surgical cutdown or percutaneously. The only devices suitable for percutaneous closure of the 20 French arteriotomies of the common femoral artery (CFA) are the Prostar(™) and Proglide(™) devices (Abbott Vascular). Positive effects of these devices seem to consist of a lower infection rate, and shorter operation time and hospital stay. This conclusion was published in previous reports comparing techniques in patients in two different groups (cohort or randomized). Access techniques were never compared in one and the same patient; this research simplifies comparison because patient characteristics will be similar in both groups. Percutaneous access of the CFA is compared to surgical cutdown in a single patient; in EVAR surgery, access is necessary in both groins in each patient. Randomization is performed on the introduction site of the larger main device of the endoprosthesis. The contralateral device of the endoprosthesis is smaller. When we use this type of randomization, both groups will contain a similar number of main and contralateral devices. Preoperative nose cultures and perineal cultures are obtained, to compare colonization with postoperative wound cultures (in case of a surgical site infection). Furthermore, patient comfort will be considered, using VAS-scores (Visual analog scale). Punch biopsies of the groin will be harvested to retrospectively compare skin of patients who suffered a surgical site infection (SSI) to patients who did not have an SSI. The PiERO trial is a multicenter randomized controlled clinical trial designed to show the consequences of using percutaneous access in EVAR surgery and focuses on the occurrence of surgical site infections. NTR4257 10 November 2013, NL44578.042.13.

  14. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This

  15. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  16. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  17. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  18. Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)

    DTIC Science & Technology

    2015-12-08

    ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal

  19. Performance comparison of token ring protocols for hard-real-time communication

    NASA Technical Reports Server (NTRS)

    Kamat, Sanjay; Zhao, Wei

    1992-01-01

    The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.

  20. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  1. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  2. Return of postural control to baseline after anaerobic and aerobic exercise protocols.

    PubMed

    Fox, Zachary G; Mihalik, Jason P; Blackburn, J Troy; Battaglini, Claudio L; Guskiewicz, Kevin M

    2008-01-01

    With regard to sideline concussion testing, the effect of fatigue associated with different types of exercise on postural control is unknown. To evaluate the effects of fatigue on postural control in healthy college-aged athletes performing anaerobic and aerobic exercise protocols and to establish an immediate recovery time course from each exercise protocol for postural control measures to return to baseline status. Counterbalanced, repeated measures. Research laboratory. Thirty-six collegiate athletes (18 males, 18 females; age = 19.00 +/- 1.01 years, height = 172.44 +/- 10.47 cm, mass = 69.72 +/- 12.84 kg). Participants completed 2 counterbalanced sessions within 7 days. Each session consisted of 1 exercise protocol followed by postexercise measures of postural control taken at 3-, 8-, 13-, and 18-minute time intervals. Baseline measures were established during the first session, before the specified exertion protocol was performed. Balance Error Scoring System (BESS) results, sway velocity, and elliptical sway area. We found a decrease in postural control after each exercise protocol for all dependent measures. An interaction was noted between exercise protocol and time for total BESS score (P = .002). For both exercise protocols, all measures of postural control returned to baseline within 13 minutes. Postural control was negatively affected after anaerobic and aerobic exercise protocols as measured by total BESS score, elliptical sway area, and sway velocity. The effect of exertion lasted up to 13 minutes after each exercise was completed. Certified athletic trainers and clinicians should be aware of these effects and their recovery time course when determining an appropriate time to administer sideline assessments of postural control after a suspected mild traumatic brain injury.

  3. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...

  4. Return of Postural Control to Baseline After Anaerobic and Aerobic Exercise Protocols

    PubMed Central

    Fox, Zachary G; Mihalik, Jason P; Blackburn, J Troy; Battaglini, Claudio L; Guskiewicz, Kevin M

    2008-01-01

    Context: With regard to sideline concussion testing, the effect of fatigue associated with different types of exercise on postural control is unknown. Objective: To evaluate the effects of fatigue on postural control in healthy college-aged athletes performing anaerobic and aerobic exercise protocols and to establish an immediate recovery time course from each exercise protocol for postural control measures to return to baseline status. Design: Counterbalanced, repeated measures. Setting: Research laboratory. Patients Or Other Participants: Thirty-six collegiate athletes (18 males, 18 females; age  =  19.00 ± 1.01 years, height  =  172.44 ± 10.47 cm, mass  =  69.72 ± 12.84 kg). Intervention(s): Participants completed 2 counterbalanced sessions within 7 days. Each session consisted of 1 exercise protocol followed by postexercise measures of postural control taken at 3-, 8-, 13-, and 18-minute time intervals. Baseline measures were established during the first session, before the specified exertion protocol was performed. Main Outcome Measure(s): Balance Error Scoring System (BESS) results, sway velocity, and elliptical sway area. Results: We found a decrease in postural control after each exercise protocol for all dependent measures. An interaction was noted between exercise protocol and time for total BESS score (P  =  .002). For both exercise protocols, all measures of postural control returned to baseline within 13 minutes. Conclusions: Postural control was negatively affected after anaerobic and aerobic exercise protocols as measured by total BESS score, elliptical sway area, and sway velocity. The effect of exertion lasted up to 13 minutes after each exercise was completed. Certified athletic trainers and clinicians should be aware of these effects and their recovery time course when determining an appropriate time to administer sideline assessments of postural control after a suspected mild traumatic brain injury. PMID:18833307

  5. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  6. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  7. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  8. Extending OPeNDAP's Data-Access Protocol to Include Enhanced Pre-Retrieval Operations

    NASA Astrophysics Data System (ADS)

    Fulker, D. W.

    2013-12-01

    We describe plans to extend OPeNDAP's Web-services protocol as a Building Block for NSF's EarthCube initiative. Though some data-access services have offered forms of subset-selection for decades, other pre-retrieval operations have been unavailable, in part because their benefits (over equivalent post-retrieval actions) are only now becoming fully evident. This is due in part to rapid growth in the volumes of data that are pertinent to the geosciences, exacerbated by limitations such as Internet speeds and latencies as well as pressures toward data usage on ever-smaller devices. In this context, as recipients of a "Building Blocks" award from the most recent round of EarthCube funding, we are launching the specification and prototype implementation of a new Open Data Services Invocation Protocol (ODSIP), by which clients may invoke a newly rich set of data-acquisition services, ranging from statistical summarization and criteria-driven subsetting to re-gridding/resampling. ODSIP will be an extension to DAP4, the latest version of OPeNDAP's widely used data access protocol, which underpins a number of open-source, multilingual, client-server systems (offering data access as a Web service), including THREDDS, PyDAP, GrADS, ERDAP and FERRET, as well as OPeNDAP's own Hyrax servers. We are motivated by the idea that key parts of EarthCube can be built effectively around clients and servers that employ a common and conceptually rich protocol for data acquisition. This concept extends 'data provision' to include pre-retrieval operations that, even when invoked by remote clients, exhibit efficiencies of data-proximate computation. Our aim for ODSIP is to embed a largely domain-neutral algebra of server functions that, despite being deliberately compact, can fulfill a broad range of user needs for pre-retrieval operations. To that end, our approach builds upon languages and tools that have proven effective in multi-domain contexts, and we will employ a user-centered design

  9. Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie

    2008-12-01

    Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.

  10. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  11. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  12. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  13. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  14. The US Culture Collection Network responding to the requirements of the Nagoya Protocol on Access and Benefit Sharing

    USDA-ARS?s Scientific Manuscript database

    The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...

  15. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  16. Clomiphene citrate 'stair-step' protocol vs. traditional protocol in patients with polycystic ovary syndrome: a randomized controlled trial.

    PubMed

    Deveci, Canan Dura; Demir, Berfu; Sengul, Ozlem; Dilbaz, Berna; Goktolga, Umit

    2015-01-01

    To evaluate the efficacy of the stair-step protocol using clomiphene citrate (CC) and to assess the uterine and systemic side effects in patients with polycystic ovary syndrome (PCOS). A total of 60 PCOS patients who failed to respond to 50 mg/day for 5 days of CC treatment within the cycle were randomly allocated to the control (traditional protocol) and study (stair-step protocol) groups. In the stair-step protocol,patients were treated with CC 50 mg/day for 5 days and then in nonresponsive patients, the dosage was increased to 100 mg/day for 5 days in the same cycle. Patients who failed the 50 mg/day CC treatment in the previous cycle were stimulated with 100 mg/day CC and were accepted as the control group. Ovulation and pregnancy rates, duration of treatment and uterine and systemic side effects were evaluated. Ovulation and pregnancy rates were similar between the stair-step and the control group (43.3 vs. 33.3 %, respectively) (16.7 vs. 10 %, respectively). The duration of treatment was significantly shorter in stair-step compared to traditional protocol (20.5 ± 2.0 vs. 48.6 ± 2.4 days, respectively). There were no significant differences in the systemic side effects between the groups. Uterine side effects were evaluated with endometrial thickness and uterine artery Doppler ultrasound; no significant differences were observed in stair-step compared to traditional protocol. The stair-step protocol was determined to have a significantly shorter treatment period without any detrimental effect on the ovulation and pregnancy rates.

  17. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  18. ? PID output-feedback control under event-triggered protocol

    NASA Astrophysics Data System (ADS)

    Zhao, Di; Wang, Zidong; Ding, Derui; Wei, Guoliang; Alsaadi, Fuad E.

    2018-07-01

    This paper is concerned with the ? proportional-integral-derivative (PID) output-feedback control problem for a class of linear discrete-time systems under event-triggered protocols. The controller and the actuators are connected through a communication network of limited bandwidth, and an event-triggered communication mechanism is adopted to decide when a certain control signal should be transmitted to the respective actuator. Furthermore, a novel PID output-feedback controller is designed where the accumulative sum-loop (the counterpart to the integral-loop in the continues-time setting) operates on a limited time-window with hope to mitigate the effect from the past measurement data. The main objective of the problem under consideration is to design a desired PID controller such that the closed-loop system is exponentially stable and the prescribed ? disturbance rejection attenuation level is guaranteed under event-triggered protocols. By means of the Lyapunov stability theory combined with the orthogonal decomposition, sufficient conditions are established under which the addressed PID controller design problem is recast into a linear convex optimization one that can be easily solved via available software packages. Finally, a simulation example is exploited to illustrate the usefulness and effectiveness of the established control scheme.

  19. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  20. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    PubMed

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  1. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  2. Control systems and coordination protocols of the secretory pathway.

    PubMed

    Luini, Alberto; Mavelli, Gabriella; Jung, Juan; Cancino, Jorge

    2014-01-01

    Like other cellular modules, the secretory pathway and the Golgi complex are likely to be supervised by control systems that support homeostasis and optimal functionality under all conditions, including external and internal perturbations. Moreover, the secretory apparatus must be functionally connected with other cellular modules, such as energy metabolism and protein degradation, via specific rules of interaction, or "coordination protocols". These regulatory devices are of fundamental importance for optimal function; however, they are generally "hidden" at steady state. The molecular components and the architecture of the control systems and coordination protocols of the secretory pathway are beginning to emerge through studies based on the use of controlled transport-specific perturbations aimed specifically at the detection and analysis of these internal regulatory devices.

  3. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  4. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  5. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  6. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  7. Efficacy of Multimodal Pain Control Protocol in the Setting of Total Hip Arthroplasty

    PubMed Central

    Lee, Kyung-Jae; Bae, Ki-Cheor; Cho, Chul-Hyun; Kwon, Doo-Hyun

    2009-01-01

    Background This study evaluated the benefits and safety of a multimodal pain control protocol, which included a periarticular injection of local anesthetics, in patients undergoing total hip arthroplasty. Methods Between March 2006 and March 2007, 60 patients undergoing unilateral total hip arthroplasty were randomized to undergo either a multimodal pain control protocol or a conventional pain control protocol. The following parameters were compared: the preoperative and postoperative visual analogue scales (VAS), hospital stay, operative time, postoperative rehabilitation, additional painkiller consumption, and complication rates. Results There was no difference between the groups in terms of diagnosis, age, gender, and BMI. Although both groups had similar VAS scores in the preoperative period and on the fifth postoperative day, there was a significant difference between the groups over the four-day period after surgery. There were no differences in the hospital stay, operative time, additional painkiller consumption, or complication rate between the groups. The average time for comfortable crutch ambulation was 2.8 days in the multimodal pain control protocol group and 5.3 days in the control group. Conclusions The multimodal pain control protocol can significantly reduce the level of postoperative pain and improve patients' satisfaction, with no apparent risks, after total hip arthroplasty. PMID:19885051

  8. Patient privacy protection using anonymous access control techniques.

    PubMed

    Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V

    2008-01-01

    The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.

  9. Modelling high data rate communication network access protocol

    NASA Technical Reports Server (NTRS)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  10. Comparison of two MAC protocols based on LEO satellite networks

    NASA Astrophysics Data System (ADS)

    Guan, Mingxiang; Wang, Ruichun

    2009-12-01

    With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.

  11. Review of SDDOT's highway access control process

    DOT National Transportation Integrated Search

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  12. Typing for Conflict Detection in Access Control Policies

    NASA Astrophysics Data System (ADS)

    Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge

    In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.

  13. Streetlight Control System Based on Wireless Communication over DALI Protocol

    PubMed Central

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  14. Formats and Network Protocols for Browser Access to 2D Raster Data

    NASA Astrophysics Data System (ADS)

    Plesea, L.

    2015-12-01

    Tiled web maps in browsers are a major success story, forming the foundation of many current web applications. Enabling tiled data access is the next logical step, and is likely to meet with similar success. Many ad-hoc approaches have already started to appear, and something similar is explored within the Open Geospatial Consortium. One of the main obstacles in making browser data access a reality is the lack of a well-known data format. This obstacle also represents an opportunity to analyze the requirements and possible candidates, applying lessons learned from web tiled image services and protocols. Similar to the image counterpart, a web tile raster data format needs to have good intrinsic compression and be able to handle high byte count data types including floating point. An overview of a possible solution to the format problem, a 2D data raster compression algorithm called Limited Error Raster Compression (LERC) will be presented. In addition to the format, best practices for high request rate HTTP services also need to be followed. In particular, content delivery network (CDN) caching suitability needs to be part of any design, not an after-thought. Last but not least, HTML 5 browsers will certainly be part of any solution since they provide improved access to binary data, as well as more powerful ways to view and interact with the data in the browser. In a simple but relevant application, digital elevation model (DEM) raster data is served as LERC compressed data tiles which are used to generate terrain by a HTML5 scene viewer.

  15. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    PubMed Central

    Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  16. Review and publication of protocol submissions to Trials - what have we learned in 10 years?

    PubMed

    Li, Tianjing; Boutron, Isabelle; Al-Shahi Salman, Rustam; Cobo, Erik; Flemyng, Ella; Grimshaw, Jeremy M; Altman, Douglas G

    2016-12-16

    Trials has 10 years of experience in providing open access publication of protocols for randomised controlled trials. In this editorial, the senior editors and editors-in-chief of Trials discuss editorial issues regarding managing trial protocol submissions, including the content and format of the protocol, timing of submission, approaches to tracking protocol amendments, and the purpose of peer reviewing a protocol submission. With the clarification and guidance provided, we hope we can make the process of publishing trial protocols more efficient and useful to trial investigators and readers.

  17. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  18. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  19. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Treesearch

    Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow

    2017-01-01

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...

  20. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  1. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  2. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  3. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  4. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  5. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  6. A new communication protocol family for a distributed spacecraft control system

    NASA Technical Reports Server (NTRS)

    Baldi, Andrea; Pace, Marco

    1994-01-01

    In this paper we describe the concepts behind and architecture of a communication protocol family, which was designed to fulfill the communication requirements of ESOC's new distributed spacecraft control system SCOS 2. A distributed spacecraft control system needs a data delivery subsystem to be used for telemetry (TLM) distribution, telecommand (TLC) dispatch and inter-application communication, characterized by the following properties: reliability, so that any operational workstation is guaranteed to receive the data it needs to accomplish its role; efficiency, so that the telemetry distribution, even for missions with high telemetry rates, does not cause a degradation of the overall control system performance; scalability, so that the network is not the bottleneck both in terms of bandwidth and reconfiguration; flexibility, so that it can be efficiently used in many different situations. The new protocol family which satisfies the above requirements is built on top of widely used communication protocols (UDP and TCP), provides reliable point-to-point and broadcast communication (UDP+) and is implemented in C++. Reliability is achieved using a retransmission mechanism based on a sequence numbering scheme. Such a scheme allows to have cost-effective performances compared to the traditional protocols, because retransmission is only triggered by applications which explicitly need reliability. This flexibility enables applications with different profiles to take advantage of the available protocols, so that the best rate between sped and reliability can be achieved case by case.

  7. Implementation of a written protocol for management of central venous access devices: a theoretical and practical education, including bedside examinations.

    PubMed

    Ahlin, Catharina; Klang-Söderkvist, Birgitta; Brundin, Seija; Hellström, Birgitta; Pettersson, Karin; Johansson, Eva

    2006-01-01

    The objectives of this study were to evaluate registered nurses' (RN) compliance with a local clinical central venous access device (CVAD) protocol after completing an educational program and to determine RNs' perception of the program. Seventy-five RNs working in hematology participated in the educational part of the program. Sixty-eight RNs were examined while changing CVAD dressings or placing a Huber needle into a port on actual patients. Sixty percent of the RNs passed the examination and reported that the program increased their knowledge. The results indicated that the educational program could be recommended for use when implementing a new clinical protocol.

  8. Intraosseous vascular access in the treatment of chemical warfare casualties assessed by advanced simulation: proposed alteration of treatment protocol.

    PubMed

    Vardi, Amir; Berkenstadt, Haim; Levin, Inbal; Bentencur, Ariel; Ziv, Amitai

    2004-06-01

    Current treatment protocols for chemical warfare casualties assume no IV access during the early treatment stages. Time constraints in mass casualty scenarios, impaired manual dexterity of medical personnel wearing protective gear, and victims' complex clinical presentations render standard IV access techniques impractical. A newly developed spring-driven, trigger-operated intraosseous infusion device may offer an effective solution. Sophisticated simulators were developed and used to mimic scenarios of chemical warfare casualties for assessing the feasibility of intraosseous infusion delivery. We evaluated the clinical performance of medical teams in full protective gear. The success rate in intraosseous insertion, time to completion of treatment goals, and outcome were measured in a simulated setting. Medical teams from major hospitals in Israel, designated for emergency response in a real chemical warfare mass casualty scenario, were trained in a simulated setting. All 94 participating physicians were supplied with conventional treatment modalities: only the 64 study group physicians received intraosseous devices. The simulated survival rate was 73.4% for the study group and 3.3% for the controls (P < 0.001). Treatment goals were achieved within 3.5 min (range, 1-9 min) in the study group and within >10 min for controls (P < 0.001), and the complication rate for intraosseous use was 13.8%. Personnel satisfaction with the intraosseous device was unanimous and high. New-generation intraosseous infusions have great potential value in the early treatment stages of chemical warfare casualties. In a chemical warfare mass casualty scenario, the protective gear worn by medical personnel, the time constraints, and the casualties' medical condition impose limitations on the establishment of IV access during early treatment of the victims. A spring-driven, trigger-operated intraosseous infusion delivery system may offer an effective solution.

  9. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications

    PubMed Central

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  10. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  11. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  12. Telemonitoring and Protocolized Case Management for Hypertensive Community-Dwelling Seniors With Diabetes: Protocol of the TECHNOMED Randomized Controlled Trial.

    PubMed

    Padwal, Raj; McAlister, Finlay Aleck; Wood, Peter William; Boulanger, Pierre; Fradette, Miriam; Klarenbach, Scott; Edwards, Alun L; Holroyd-Leduc, Jayna M; Alagiakrishnan, Kannayiram; Rabi, Doreen; Majumdar, Sumit Ranjan

    2016-06-24

    Diabetes and hypertension are devastating, deadly, and costly conditions that are very common in seniors. Controlling hypertension in seniors with diabetes dramatically reduces hypertension-related complications. However, blood pressure (BP) must be lowered carefully because seniors are also susceptible to low BP and attendant harms. Achieving "optimal BP control" (ie, avoiding both undertreatment and overtreatment) is the ultimate therapeutic goal in such patients. Regular BP monitoring is required to achieve this goal. BP monitoring at home is cheap, convenient, widely used, and guideline endorsed. However, major barriers prevent proper use. These may be overcome through use of BP telemonitoring-the secure teletransmission of BP readings to a health portal, where BP data are summarized for provider and patient use, with or without protocolized case management. To examine the incremental effectiveness, safety, cost-effectiveness, usability, and acceptability of home BP telemonitoring, used with or without protocolized case management, compared with "enhanced usual care" in community-dwelling seniors with diabetes and hypertension. A 300-patient, 3-arm, pragmatic randomized controlled trial with blinded outcome ascertainment will be performed in seniors with diabetes and hypertension living independently in seniors' residences in greater Edmonton. Consenting patients will be randomized to usual care, home BP telemonitoring alone, or home BP telemonitoring plus protocolized pharmacist case management. Usual care subjects will receive a home BP monitor but neither they nor their providers will have access to teletransmitted data. In both telemonitored arms, providers will receive telemonitored BP data summaries. In the case management arm, pharmacist case managers will be responsible for reviewing teletransmitted data and initiating guideline-concordant and protocolized changes in BP management. Outcomes will be ascertained at 6 and 12 months. Within-study-arm change

  13. Observation Data Model Core Components, its Implementation in the Table Access Protocol Version 1.1

    NASA Astrophysics Data System (ADS)

    Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel; Michel, Laurent; Bonnarel, Francos; Micol, Alberto; IVOA DataModel Working Group; Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel

    2017-05-01

    This document defines the core components of the Observation data model that are necessary to perform data discovery when querying data centers for astronomical observations of interest. It exposes use-cases to be carried out, explains the model and provides guidelines for its implementation as a data access service based on the Table Access Protocol (TAP). It aims at providing a simple model easy to understand and to implement by data providers that wish to publish their data into the Virtual Observatory. This interface integrates data modeling and data access aspects in a single service and is named ObsTAP. It will be referenced as such in the IVOA registries. In this document, the Observation Data Model Core Components (ObsCoreDM) defines the core components of queryable metadata required for global discovery of observational data. It is meant to allow a single query to be posed to TAP services at multiple sites to perform global data discovery without having to understand the details of the services present at each site. It defines a minimal set of basic metadata and thus allows for a reasonable cost of implementation by data providers. The combination of the ObsCoreDM with TAP is referred to as an ObsTAP service. As with most of the VO Data Models, ObsCoreDM makes use of STC, Utypes, Units and UCDs. The ObsCoreDM can be serialized as a VOTable. ObsCoreDM can make reference to more complete data models such as Characterisation DM, Spectrum DM or Simple Spectral Line Data Model (SSLDM). ObsCore shares a large set of common concepts with DataSet Metadata Data Model (Cresitello-Dittmar et al. 2016) which binds together most of the data model concepts from the above models in a comprehensive and more general frame work. This current specification on the contrary provides guidelines for implementing these concepts using the TAP protocol and answering ADQL queries. It is dedicated to global discovery.

  14. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    PubMed Central

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  15. Efficacy and cost effectiveness of telemedicine for improving access to care in the Paris region: study protocols for eight trials.

    PubMed

    Charrier, Nathanael; Zarca, Kevin; Durand-Zaleski, Isabelle; Calinaud, Christine

    2016-02-08

    With the development of information and communication technologies, telemedicine has been proposed as a way to improve patient management by facilitating access to appropriate diagnosis and treatment. The Paris Ile de France Regional Health Agency is currently funding a comprehensive program of telemedicine experiments. This article describes the protocols for the evaluation of the implementation of telemedicine in the Paris region. Over 2,500 patients have been included in eight studies addressing the use of telemedicine in the context of specific diseases or settings. Two projects are randomized controlled trials, while the six other projects are based on before-after designs (differences in differences studies). Based on the MAST model and the French national framework, we identified endpoints to assess the impact of telemedicine on five dimensions: clinical effectiveness, cost-effectiveness, security of the application, patient satisfaction and quality of life and perception of professionals. Telemedicine encompasses a wide range of services and stakeholders, and thus study protocols must be tailored to the specific constraints and interests of the users. NCT02110433 (03/07/2014), NCT02157740 (05/27/2014), NCT02374697 (02/05/2015), NCT02157727 (05/27/2014), NCT02229279 (08/28/2014), NCT02368769 (02/05/2015), NCT02164747 (NCT02164747), NCT02309905 (11/27/2014).

  16. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-03-08

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  17. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  18. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  19. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  20. Programmable Direct-Memory-Access Controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F.

    1990-01-01

    Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.

  1. Adaptive low-power listening MAC protocol based on transmission rates.

    PubMed

    Hwang, Kwang-il; Yi, Gangman

    2014-01-01

    Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.

  2. Simulation improves procedural protocol adherence during central venous catheter placement: a randomized-controlled trial

    PubMed Central

    Peltan, Ithan D.; Shiga, Takashi; Gordon, James A.; Currier, Paul F.

    2015-01-01

    Background Simulation training may improve proficiency at and reduces complications from central venous catheter (CVC) placement, but the scope of simulation’s effect remains unclear. This randomized controlled trial evaluated the effects of a pragmatic CVC simulation program on procedural protocol adherence, technical skill, and patient outcomes. Methods Internal medicine interns were randomized to standard training for CVC insertion or standard training plus simulation-based mastery training. Standard training involved a lecture, a video-based online module, and instruction by the supervising physician during actual CVC insertions. Intervention-group subjects additionally underwent supervised training on a venous access simulator until they demonstrated procedural competence. Raters evaluated interns’ performance during internal jugular CVC placement on actual patients in the medical intensive care unit. Generalized estimating equations were used to account for outcome clustering within trainees. Results We observed 52 interns place 87 CVCs. Simulation-trained interns exhibited better adherence to prescribed procedural technique than interns who received only standard training (p=0.024). There were no significant differences detected in first-attempt or overall cannulation success rates, mean needle passes, global assessment scores or complication rates. Conclusions Simulation training added to standard training improved protocol adherence during CVC insertion by novice practitioners. This study may have been too small to detect meaningful differences in venous cannulation proficiency and other clinical outcomes, highlighting the difficulty of patient-centered simulation research in settings where poor outcomes are rare. For high-performing systems, where protocol deviations may provide an important proxy for rare procedural complications, simulation may improve CVC insertion quality and safety. PMID:26154250

  3. On Ramps: Options and Issues in Accessing the Internet.

    ERIC Educational Resources Information Center

    Bocher, Bob

    1995-01-01

    Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…

  4. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  5. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    PubMed Central

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  6. Performance of Stochastic Targeted Blood Glucose Control Protocol by virtual trials in the Malaysian intensive care unit.

    PubMed

    Jamaludin, Ummu K; M Suhaimi, Fatanah; Abdul Razak, Normy Norfiza; Md Ralib, Azrina; Mat Nor, Mohd Basri; Pretty, Christopher G; Humaidi, Luqman

    2018-08-01

    Blood glucose variability is common in healthcare and it is not related or influenced by diabetes mellitus. To minimise the risk of high blood glucose in critically ill patients, Stochastic Targeted Blood Glucose Control Protocol is used in intensive care unit at hospitals worldwide. Thus, this study focuses on the performance of stochastic modelling protocol in comparison to the current blood glucose management protocols in the Malaysian intensive care unit. Also, this study is to assess the effectiveness of Stochastic Targeted Blood Glucose Control Protocol when it is applied to a cohort of diabetic patients. Retrospective data from 210 patients were obtained from a general hospital in Malaysia from May 2014 until June 2015, where 123 patients were having comorbid diabetes mellitus. The comparison of blood glucose control protocol performance between both protocol simulations was conducted through blood glucose fitted with physiological modelling on top of virtual trial simulations, mean calculation of simulation error and several graphical comparisons using stochastic modelling. Stochastic Targeted Blood Glucose Control Protocol reduces hyperglycaemia by 16% in diabetic and 9% in nondiabetic cohorts. The protocol helps to control blood glucose level in the targeted range of 4.0-10.0 mmol/L for 71.8% in diabetic and 82.7% in nondiabetic cohorts, besides minimising the treatment hour up to 71 h for 123 diabetic patients and 39 h for 87 nondiabetic patients. It is concluded that Stochastic Targeted Blood Glucose Control Protocol is good in reducing hyperglycaemia as compared to the current blood glucose management protocol in the Malaysian intensive care unit. Hence, the current Malaysian intensive care unit protocols need to be modified to enhance their performance, especially in the integration of insulin and nutrition intervention in decreasing the hyperglycaemia incidences. Improvement in Stochastic Targeted Blood Glucose Control Protocol in terms of u en

  7. Difficult‐to‐control asthma management through the use of a specific protocol

    PubMed Central

    Giavina‐Bianchi, Pedro; Aun, Marcelo Vivolo; Bisaccioni, Carla; Agondi, Rosana; Kalil, Jorge

    2010-01-01

    The present study is a critical review of difficult‐to‐control asthma, highlighting the characteristics and severity of the disease. It also presents a protocol for the management of patients with this asthma phenotype. The protocol, which was based on relevant studies in the literature, is described and analyzed. PMID:21049219

  8. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    DTIC Science & Technology

    2013-09-16

    fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011

  9. Investigating Bordetella pertussis colonisation and immunity: protocol for an inpatient controlled human infection model

    PubMed Central

    de Graaf, Hans; Gbesemete, Diane; Gorringe, Andrew R.; Diavatopoulos, Dimitri A.; Kester, Kent E.; Faust, Saul N.; Read, Robert C.

    2017-01-01

    Introduction We summarise an ethically approved protocol for the development of an experimental human challenge colonisation model. Globally Bordetella pertussis is one of the leading causes of vaccine-preventable death. Many countries have replaced whole cell vaccines with acellular vaccines over the last 20 years during which pertussis appears to be resurgent in a number of countries in the developed world that boast high immunisation coverage. The acellular vaccine provides relatively short-lived immunity and, in contrast to whole cell vaccines, may be less effective against colonisation and subsequent transmission. To improve vaccine strategies, a greater understanding of human B. pertussis colonisation is required. This article summarises a protocol and does not contain any results. Methods and analysis A controlled human colonisation model will be developed over two phases. In phase A, a low dose of the inoculum will be given intranasally to healthy participants. This dose will be escalated or de-escalated until colonisation is achieved in approximately 70% (95% CI 47% to 93%) of the exposed volunteers without causing disease. The colonisation period, shedding and exploratory immunology will be assessed during a 17-day inpatient stay and follow-up over 1 year. The dose of inoculum that achieves 70% colonisation will then be confirmed in phase B, comparing healthy participants exposed to B. pertussis with a control group receiving a sham inoculum. Ethics and dissemination This study has been approved by the ethical committee reference: 17/SC/0006, 24 February 2017. Findings will be published in peer-reviewed open access journals as soon as possible. PMID:29025851

  10. Reliable multicast protocol specifications flow control and NACK policy

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    This appendix presents the flow and congestion control schemes recommended for RMP and a NACK policy based on the whiteboard tool. Because RMP uses a primarily NACK based error detection scheme, there is no direct feedback path through which receivers can signal losses through low buffer space or congestion. Reliable multicast protocols also suffer from the fact that throughput for a multicast group must be divided among the members of the group. This division is usually very dynamic in nature and therefore does not lend itself well to a priori determination. These facts have led the flow and congestion control schemes of RMP to be made completely orthogonal to the protocol specification. This allows several differing schemes to be used in different environments to produce the best results. As a default, a modified sliding window scheme based on previous algorithms are suggested and described below.

  11. Implementation of radial arterial access for cardiac interventions: a strong case for quality assurance protocols by the nursing staff.

    PubMed

    Steffenino, Giuseppe; Fabrizi, Mauro De Benedetto; Baralis, Giorgio; Tomatis, Marilena; Mogna, Aldo; Dutto, Monica; Dutto, Maria Stefania; Conte, Laura; Lice, Giulietta; Cavallo, Simona; Porcedda, Brunella

    2011-02-01

    Radial arterial access is becoming increasingly popular for coronary angiography and angioplasty. The technique is, however, more demanding than femoral arterial access, and hemostasis is not care-free. A quality assurance program was run by our nursing staff, with patient follow-up, to monitor radial arterial access implementation in our laboratory. In 973 consecutive patients, both a hydrophilic sheath and an inflatable bandage for hemostasis were used. Bandage inflation volume and time were both reduced through subsequent data audit and protocol changes (A = 175 patients; B = 297; C = 501). An increase was achieved in the percentage of patients with neither loss of radial pulse nor hematoma of any size (A = 81.3%, B = 90.9%, C = 92.2%, P < 0.001), and no discomfort at all (A = 44.2%, B = 75.1%, C = 89.3%, P < 0.001). Follow-up was available for 965 patients (99%), and in 956, the access site could be re-inspected at least once. There were no vascular complications. Overall, the radial artery pulse was absent at latest follow-up in 0.6% of cases (95% confidence interval 0.21-1.05%). In 460 consecutive patients with complete assessment in protocol C, a palpable arterial pulse was absent in 5% of cases at about 20 h after hemostasis. Barbeau's test was positive in 26.5% of patients (95% confidence interval 22.5-30.6%). They had a significantly lower body weight, a lower systolic blood pressure at hemostasis, and a higher bandage inflation volume; a hematoma of any size and the report of any discomfort were also more frequent. Barbeau's test returned to normal in 30% of them 3-60 days later. Our nurse-led quality assurance program helped us in reducing minor vascular sequelae and improving patient comfort after radial access. Early occlusion of the radial artery as detected by pulse oxymeter is frequent, often reversible, and may be mostly related to trauma/occlusion of the artery during hemostasis. 2011 Italian Federation of Cardiology.

  12. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  13. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  14. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  15. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  16. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  17. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  18. Speed control system for an access gate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bzorgi, Fariborz M

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the outputmore » element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.« less

  19. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  20. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  1. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  2. Traffic management mechanism for intranets with available-bit-rate access to the Internet

    NASA Astrophysics Data System (ADS)

    Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed

    1997-10-01

    The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.

  3. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  4. Projecting the effects of tobacco control policies in the USA through microsimulation: a study protocol

    PubMed Central

    Levy, David T; Jeon, Jihyoun; Clarke, John; Gilkeson, Scott; Hall, Tim; Holford, Theodore R; Meza, Rafael

    2018-01-01

    Introduction Smoking remains the leading cause of preventable death in the USA but can be reduced through policy interventions. Computational models of smoking can provide estimates of the projected impact of tobacco control policies and can be used to inform public health decision making. We outline a protocol for simulating the effects of tobacco policies on population health outcomes. Methods and analysis We extend the Smoking History Generator (SHG), a microsimulation model based on data from the National Health Interview Surveys, to evaluate the effects of tobacco control policies on projections of smoking prevalence and mortality in the USA. The SHG simulates individual life trajectories including smoking initiation, cessation and mortality. We illustrate the application of the SHG policy module for four types of tobacco control policies at the national and state levels: smoke-free air laws, cigarette taxes, increasing tobacco control programme expenditures and raising the minimum age of legal access to tobacco. Smoking initiation and cessation rates are modified by age, birth cohort, gender and years since policy implementation. Initiation and cessation rate modifiers are adjusted for differences across age groups and the level of existing policy coverage. Smoking prevalence, the number of population deaths avoided, and life-years gained are calculated for each policy scenario at the national and state levels. The model only considers direct individual benefits through reduced smoking and does not consider benefits through reduced exposure to secondhand smoke. Ethics and dissemination A web-based interface is being developed to integrate the results of the simulations into a format that allows the user to explore the projected effects of tobacco control policies in the USA. Usability testing is being conducted in which experts provide feedback on the interface. Development of this tool is under way, and a publicly accessible website is available at http

  5. Remote control of the industry processes. POWERLINK protocol application

    NASA Astrophysics Data System (ADS)

    Wóbel, A.; Paruzel, D.; Paszkiewicz, B.

    2017-08-01

    The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.

  6. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  7. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  8. On shaky ground - A study of security vulnerabilities in control protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Byres, E. J.; Huffman, D.; Kube, N.

    2006-07-01

    The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large numbermore » of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)« less

  9. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  10. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  11. Controlling for confounding variables in MS-omics protocol: why modularity matters.

    PubMed

    Smith, Rob; Ventura, Dan; Prince, John T

    2014-09-01

    As the field of bioinformatics research continues to grow, more and more novel techniques are proposed to meet new challenges and improvements upon solutions to long-standing problems. These include data processing techniques and wet lab protocol techniques. Although the literature is consistently thorough in experimental detail and variable-controlling rigor for wet lab protocol techniques, bioinformatics techniques tend to be less described and less controlled. As the validation or rejection of hypotheses rests on the experiment's ability to isolate and measure a variable of interest, we urge the importance of reducing confounding variables in bioinformatics techniques during mass spectrometry experimentation. © The Author 2013. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  12. Performance Evaluation of a SLA Negotiation Control Protocol for Grid Networks

    NASA Astrophysics Data System (ADS)

    Cergol, Igor; Mirchandani, Vinod; Verchere, Dominique

    A framework for an autonomous negotiation control protocol for service delivery is crucial to enable the support of heterogeneous service level agreements (SLAs) that will exist in distributed environments. We have first given a gist of our augmented service negotiation protocol to support distinct service elements. The augmentations also encompass related composition of the services and negotiation with several service providers simultaneously. All the incorporated augmentations will enable to consolidate the service negotiation operations for telecom networks, which are evolving towards Grid networks. Furthermore, our autonomous negotiation protocol is based on a distributed multi-agent framework to create an open market for Grid services. Second, we have concisely presented key simulation results of our work in progress. The results exhibit the usefulness of our negotiation protocol for realistic scenarios that involves different background traffic loading, message sizes and traffic flow asymmetry between background and negotiation traffics.

  13. Multimodal Pain Management Protocol Versus Patient Controlled Narcotic Analgesia for Postoperative Pain Control after Shoulder Arthroplasty.

    PubMed

    Nicholson, Thema; Maltenfort, Mitchell; Getz, Charles; Lazarus, Mark; Williams, Gerald; Namdari, Surena

    2018-05-01

    Our institution's traditional pain management strategy after shoulder arthroplasty has involved the utilization of postoperative patient-controlled narcotic analgesia. More recently, we have implemented a protocol (TLC) that utilizes a multimodal approach. The purpose of this study was to determine whether this change has improved pain control and decreased narcotic utilization. Patients undergoing primary total shoulder or reverse arthroplasty were retrospectively studied. All patients underwent interscalene brachial plexus blockade. "Traditional" patients were provided a patient-controlled analgesic pump postoperatively. TLC patients were given preoperative and postoperative multimodal, non-narcotic analgesic medications and breakthrough narcotics. Morphine equivalent units (MEU) consumed and Visual Analog Scale (VAS) scores for pain (0, 8, 16, and 24 hours) were considered. There were 108 patients in each group. Total postoperative narcotic consumption in the first 24 postoperative hours was 38.5 +/- 81.1 MEU in the "Traditional group" compared to 59.3 +/- 59.1 MEU in the TLC group ( P<0.001 ). Of patients in the TLC group, 88% utilized breakthrough narcotics. VAS pain was significantly higher in the "Traditional group" at 16 hours (4.1 +/- 2.9 vs 3.2 +/- 2.7, P=0.020 ) and 24 hours (4.8 +/- 2.7 vs 3.7 +/- 2.6, P=0.004 ). Those treated with the TLC protocol had greater narcotic utilization but better VAS pain scores at 24 hours after surgery. Both groups experienced rebound pain. While the TLC protocol led to an improved pain experience, further modification of the currently protocol may be necessary to reduce overall narcotic utilization.

  14. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  15. Dynamic Postural Control in Female Athletes and Nonathletes After a Whole-Body Fatigue Protocol.

    PubMed

    Baghbani, Fatemeh; Woodhouse, Linda J; Gaeini, Abbas A

    2016-07-01

    Baghbani, F, Woodhouse, LJ, and Gaeini, AA. Dynamic postural control in female athletes and nonathletes after a whole-body fatigue protocol. J Strength Cond Res 30(7): 1942-1947, 2016-Postural control is a crucial element in regular training of athletes, development of complex technical movement, and injury prevention; however, distributing factor of the postural control such as fatigue has been neglected by athletic trainers in novice and inexperienced athletes. The objective of this study was to compare changes in dynamic postural control of young female athletes and nonathletes after a fatigue protocol. Thirty females (15 athletes and 15 nonathletes) with no orthopedic problems were recruited to participate in this study. All participants completed the pre-SEBT (star excursion balance test) in 8 directions at baseline; then, they performed a 20-minute fatigue protocol after which post-SEBT was measured. Rating of perceived exertion was measured using the Borg scale immediately before, mid-way through (i.e., after the third station), and after performing the fatigue protocol (i.e., immediately before the post-SEBT). Female nonathlete groups had significant differences in dynamic balance performance after fatigue in the medial, posteromedial, and posterior directions (p < 0.01) measured by SEBT. Athletes, however, showed no significant changes after the fatigue protocol. Our results indicates the importance of evaluation and monitoring of dynamic postural control of the novice with progressing the exercise time. Our findings could also help coaches to develop trainings focused on the 3 directions of medial, posteromedial, and posterior directions and aimed at exercises increasing fatigue resistance.

  16. Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent

    NASA Technical Reports Server (NTRS)

    Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.

    2013-01-01

    This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.

  17. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  18. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    PubMed

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been

  19. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  20. Evolution of the Data Access Protocol in Response to Community Needs

    NASA Astrophysics Data System (ADS)

    Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.

    2012-12-01

    Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that

  1. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  2. Internet-based intervention programme for obese adolescents and their families (Next.Step): research protocol of a controlled trial.

    PubMed

    Sousa, Pedro; Fonseca, Helena; Gaspar, Pedro; Gaspar, Filomena

    2014-04-01

    This paper describes the design and rationale of a controlled trial that aims to determine the effectiveness of an intervention programme in which the internet is used. Adolescent obesity is a major health problem, there being urgency to find effective interventions that induce behavioural change. The inclusion of the internet in the intervention may improve adolescents' adherence to the weight management programme and lead to adoption of healthier lifestyles. A clinical trial with a control group (non-randomized). Participants are adolescents with appointments at a paediatric obesity clinic (Portugal). Sample size was calculated according to the power analysis. The experimental group will follow the standard treatment protocol and receive free access to the e-therapeutic platform. The control group will follow the standard treatment protocol and join a waiting list. Intervention length will be 36 weeks (24 weeks of direct intervention with a follow-up for 12 weeks). This study was approved by the Ethical Committee for Health (Lisbon, Portugal) in January 2012 and funded by the Foundation for Science and Technology (Portugal) in December 2012. The results of this research will promote reflection on new approaches directed to treat adolescent obesity and on the promotion of healthy behaviours. We expect to gather empirical evidence of the intervention programme effectiveness. The expectations lie on the population health gains, empowerment in decision-making and adoption of healthier lifestyles. © 2013 John Wiley & Sons Ltd.

  3. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  4. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  5. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  6. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  7. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  8. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  9. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  10. Hormone-dependent control of developmental timing through regulation of chromatin accessibility

    PubMed Central

    Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.

    2017-01-01

    Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147

  11. A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks

    PubMed Central

    Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad

    2017-01-01

    Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495

  12. Frequency of pneumothorax and haemothorax after primary open versus closed implantation strategies for insertion of a totally implantable venous access port in oncological patients: study protocol for a randomised controlled trial.

    PubMed

    Hüttner, Felix J; Bruckner, Tom; Alldinger, Ingo; Hennes, Roland; Ulrich, Alexis; Büchler, Markus W; Diener, Markus K; Knebel, Phillip

    2015-03-31

    The insertion of central venous access devices, such as totally implantable venous access ports (TIVAPs), is routine in patients who need a safe and permanent venous access. The number of port implantations is increasing due to the development of innovative adjuvant and neo-adjuvant therapies. Currently, two different strategies are being routinely used: surgical cut-down of the cephalic vein (vena section) and direct puncture of the subclavian vein. The aim of this trial is to identify the strategy for the implantation of TIVAPs with the lowest risk of pneumothorax and haemothorax. The PORTAS-3 trial is designed as a multicentre, randomised controlled trial to compare two implantation strategies. A total of 1,154 patients will be randomised after giving written informed consent. Patients must be over 18 years of age and scheduled for primary implantation of a TIVAP on the designated side. The primary endpoint will be the frequency of pneumothorax and haemothorax after insertion of a TIVAP by one of two different strategies. The experimental intervention is as follows: open strategy, defined as surgical cut-down of the cephalic vein, supported by a rescue technique if necessary, and in the case of failure, direct puncture of the subclavian vein. The control intervention is as follows: direct puncture of the subclavian vein using the Seldinger technique guided by sonography, fluoroscopy or landmark technique. The trial duration is approximately 36 months, with a recruitment period of 18 months and a follow-up period of 30 days. The PORTAS-3 trial will compare two different TIVAP implantation strategies with regard to their individual risk of postoperative pneumothorax and haemothorax. Since TIVAP implantation is one of the most common procedures in general surgery, the results will be of interest for a large community of surgeons as well as oncologists and general practitioners. The pragmatic trial design ensures that the results will be generalizable to a wide

  13. ANDRO-IVF: a novel protocol for poor responders to IVF controlled ovarian stimulation

    PubMed Central

    Bercaire, Ludmila; Nogueira, Sara MB; Lima, Priscila CM; Alves, Vanessa R; Donadio, Nilka; Dzik, Artur; Cavagna, Mario; Fanchin, Renato

    2018-01-01

    Objective This study aimed to assess a novel protocol designed to improve poor ovarian response through intra-ovarian androgenization. The endpoints were: number of oocytes and mature oocytes retrieved, fertilization, cancellation and pregnancy rates. Methods This prospective crossover study enrolled poor responders from previous ovarian stimulation cycles submitted to a novel protocol called ANDRO-IVF. The protocol included pretreatment with transdermal AndroGel(r) (Besins) 25 mg, oral letrozole 2.5 mg and subcutaneous hCG 2500 IU; cycle control was performed with estradiol valerate and micronized progesterone; ovarian stimulation was attained with gonadotropins FSH/LH 450 IU, GnRH antagonist and hCG 5000 IU. Results Fourteen poor responders were enrolled. One patient did not meet the inclusion criteria. Thirteen patients previously summited to the standard protocol were offered the ANDRO-IVF Protocol.-Standard Protocol: Mean age: 35.30 years; cancellation rate: 61.53%; mean number of MII oocytes retrieved per patient: 1.8; fertilization rate: 33.33%. Only two patients had embryo transfers, and none got pregnant.-ANDRO-IVF Protocol: Mean age: 35.83 years; cancellation rate: 7.69%; mean number of oocytes retrieved per patient: 5.58, MII oocytes: 3.91. ICSI was performed in 84.61% of the patients and a mean of 1.5 embryos were transferred per patient. Fertilization rate: 62.5%; cumulative pregnancy rate: 16.66%; mean duration of stimulation: 9.77 days. Conclusion ANDRO-IVF allows intra-ovarian androgenization by increasing serum and intra-follicular androgen levels and preventing androgen aromatization. This protocol apparently improved clinical outcomes of poor responders in parameters such as number of oocytes retrieved and clinical pregnancy rates. Further randomized controlled trials are needed to confirm these findings. PMID:29303236

  14. Straight Talk About Birth Control: A Contraceptive Education Protocol for Home Care.

    PubMed

    Schoenberg, Leslie

    Home healthcare providers play a critical role in the prevention of unintended pregnancies by providing evidence-based contraception education during home visits. This article describes an innovative and comprehensive contraception protocol that was developed for Nurse-Family Partnership to improve contraception education for home healthcare patients. The protocol focused on increasing uptake of long-acting reversible contraception (LARC) for high-risk prenatal and postpartum home healthcare patients. The protocol was designed to reduce early subsequent pregnancies and thereby improve outcomes for mothers and their infants. An evidence-based translation project was designed and piloted in three California counties. The protocol consisted of a contraception education module for nurses and a patient education toolkit. The toolkit included an interactive patient education workbook emphasizing LARC methods for nurses to complete with their patients along with other teaching tools. The project was evaluated using pre- and posttest surveys that measured changes in nurses' knowledge, attitudes, and practice before, after, and 2 months after implementation. Outcomes revealed the following statistically significant results: (a) nurses' knowledge doubled at the first posttest and persisted at 2 months, (b) nurses' attitudes improved on two of the three measures, and (c) there was a 17.7% increase in the frequency of LARC birth control education 2 months after implementation. An evidence-based contraception protocol can promote acceptance of LARC methods and improve home healthcare clinician comfort with and frequency of birth control education.

  15. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as

  16. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  17. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  18. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  19. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  20. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  1. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  2. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  3. Redactions in protocols for drug trials: what industry sponsors concealed.

    PubMed

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  4. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  5. Hospital protocols for targeted glycemic control: Development, implementation, and models for cost justification.

    PubMed

    Magee, Michelle F

    2007-05-15

    Evolving elements of best practices for providing targeted glycemic control in the hospital setting, clinical performance measurement, basal-bolus plus correction-dose insulin regimens, components of standardized subcutaneous (s.c.) insulin order sets, and strategies for implementation and cost justification of glycemic control initiatives are discussed. Best practices for targeted glycemic control should address accurate documentation of hyperglycemia, initial patient assessment, management plan, target blood glucose range, blood glucose monitoring frequency, maintenance of glycemic control, criteria for glucose management consultations, and standardized insulin order sets and protocols. Establishing clinical performance measures, including desirable processes and outcomes, can help ensure the success of targeted hospital glycemic control initiatives. The basal-bolus plus correction-dose regimen for insulin administration will be used to mimic the normal physiologic pattern of endogenous insulin secretion. Standardized insulin order sets and protocols are being used to minimize the risk of error in insulin therapy. Components of standardized s.c. insulin order sets include specification of the hyperglycemia diagnosis, finger stick blood glucose monitoring frequency and timing, target blood glucose concentration range, cutoff values for excessively high or low blood glucose concentrations that warrant alerting the physician, basal and prandial or nutritional (i.e., bolus) insulin, correction doses, hypoglycemia treatment, and perioperative or procedural dosage adjustments. The endorsement of hospital administrators and key physician and nursing leaders is needed for glycemic control initiatives. Initiatives may be cost justified on the basis of the billings for clinical diabetes management services and/or the return- on-investment accrued to reductions in hospital length of stay, readmissions, and accurate documentation and coding of unrecognized or uncontrolled

  6. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  7. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  8. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  9. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  10. Telemonitoring and Protocolized Case Management for Hypertensive Community-Dwelling Seniors With Diabetes: Protocol of the TECHNOMED Randomized Controlled Trial

    PubMed Central

    McAlister, Finlay Aleck; Wood, Peter William; Boulanger, Pierre; Fradette, Miriam; Klarenbach, Scott; Edwards, Alun L; Holroyd-Leduc, Jayna M; Alagiakrishnan, Kannayiram; Rabi, Doreen; Majumdar, Sumit Ranjan

    2016-01-01

    Background Diabetes and hypertension are devastating, deadly, and costly conditions that are very common in seniors. Controlling hypertension in seniors with diabetes dramatically reduces hypertension-related complications. However, blood pressure (BP) must be lowered carefully because seniors are also susceptible to low BP and attendant harms. Achieving “optimal BP control” (ie, avoiding both undertreatment and overtreatment) is the ultimate therapeutic goal in such patients. Regular BP monitoring is required to achieve this goal. BP monitoring at home is cheap, convenient, widely used, and guideline endorsed. However, major barriers prevent proper use. These may be overcome through use of BP telemonitoring—the secure teletransmission of BP readings to a health portal, where BP data are summarized for provider and patient use, with or without protocolized case management. Objective To examine the incremental effectiveness, safety, cost-effectiveness, usability, and acceptability of home BP telemonitoring, used with or without protocolized case management, compared with “enhanced usual care” in community-dwelling seniors with diabetes and hypertension. Methods A 300-patient, 3-arm, pragmatic randomized controlled trial with blinded outcome ascertainment will be performed in seniors with diabetes and hypertension living independently in seniors’ residences in greater Edmonton. Consenting patients will be randomized to usual care, home BP telemonitoring alone, or home BP telemonitoring plus protocolized pharmacist case management. Usual care subjects will receive a home BP monitor but neither they nor their providers will have access to teletransmitted data. In both telemonitored arms, providers will receive telemonitored BP data summaries. In the case management arm, pharmacist case managers will be responsible for reviewing teletransmitted data and initiating guideline-concordant and protocolized changes in BP management. Results Outcomes will be

  11. An Energy Efficient MAC Protocol for Multi-Hop Swallowable Body Sensor Networks

    PubMed Central

    Lin, Lin; Yang, Chengfeng; Wong, Kai Juan; Yan, Hao; Shen, Junwen; Phee, Soo Jay

    2014-01-01

    Swallowable body sensor networks (BSNs) are composed of sensors which are swallowed by patients and send the collected data to the outside coordinator. These sensors are energy constraint and the batteries are difficult to be replaced. The medium access control (MAC) protocol plays an important role in energy management. This paper investigates an energy efficient MAC protocol design for swallowable BSNs. Multi-hop communication is analyzed and proved more energy efficient than single-hop communication within the human body when the circuitry power is low. Based on this result, a centrally controlled time slotting schedule is proposed. The major workload is shifted from the sensors to the coordinator. The coordinator collects the path-loss map and calculates the schedules, including routing, slot assignment and transmission power. Sensor nodes follow the schedules to send data in a multi-hop way. The proposed protocol is compared with the IEEE 802.15.6 protocol in terms of energy consumption. The results show that it is more energy efficient than IEEE 802.15.6 for swallowable BSN scenarios. PMID:25330049

  12. Access and benefit sharing: Best practices for the use and exchange of invertebrate biological control agents

    USDA-ARS?s Scientific Manuscript database

    The Convention on Biological Diversity (CBD) acknowledges the sovereign rights that countries have over their ‘genetic resources’. The Nagoya Protocol that came into force in 2014 provides a framework for implementation of and equitable process by which access to, and sharing of benefits between don...

  13. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  14. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  15. A Randomized trial of an Asthma Internet Self-management Intervention (RAISIN): study protocol for a randomized controlled trial.

    PubMed

    Morrison, Deborah; Wyke, Sally; Thomson, Neil C; McConnachie, Alex; Agur, Karolina; Saunderson, Kathryn; Chaudhuri, Rekha; Mair, Frances S

    2014-05-24

    The financial costs associated with asthma care continue to increase while care remains suboptimal. Promoting optimal self-management, including the use of asthma action plans, along with regular health professional review has been shown to be an effective strategy and is recommended in asthma guidelines internationally. Despite evidence of benefit, guided self-management remains underused, however the potential for online resources to promote self-management behaviors is gaining increasing recognition. The aim of this paper is to describe the protocol for a pilot evaluation of a website 'Living well with asthma' which has been developed with the aim of promoting self-management behaviors shown to improve outcomes. The study is a parallel randomized controlled trial, where adults with asthma are randomly assigned to either access to the website for 12 weeks, or usual asthma care for 12 weeks (followed by access to the website if desired). Individuals are included if they are over 16-years-old, have a diagnosis of asthma with an Asthma Control Questionnaire (ACQ) score of greater than, or equal to 1, and have access to the internet. Primary outcomes for this evaluation include recruitment and retention rates, changes at 12 weeks from baseline for both ACQ and Asthma Quality of Life Questionnaire (AQLQ) scores, and quantitative data describing website usage (number of times logged on, length of time logged on, number of times individual pages looked at, and for how long). Secondary outcomes include clinical outcomes (medication use, health services use, lung function) and patient reported outcomes (including adherence, patient activation measures, and health status). Piloting of complex interventions is considered best practice and will maximise the potential of any future large-scale randomized controlled trial to successfully recruit and be able to report on necessary outcomes. Here we will provide results across a range of outcomes which will provide estimates of

  16. The Active for Life Year 5 (AFLY5) school-based cluster randomised controlled trial protocol: detailed statistical analysis plan.

    PubMed

    Lawlor, Debbie A; Peters, Tim J; Howe, Laura D; Noble, Sian M; Kipping, Ruth R; Jago, Russell

    2013-07-24

    The Active For Life Year 5 (AFLY5) randomised controlled trial protocol was published in this journal in 2011. It provided a summary analysis plan. This publication is an update of that protocol and provides a detailed analysis plan. This update provides a detailed analysis plan of the effectiveness and cost-effectiveness of the AFLY5 intervention. The plan includes details of how variables will be quality control checked and the criteria used to define derived variables. Details of four key analyses are provided: (a) effectiveness analysis 1 (the effect of the AFLY5 intervention on primary and secondary outcomes at the end of the school year in which the intervention is delivered); (b) mediation analyses (secondary analyses examining the extent to which any effects of the intervention are mediated via self-efficacy, parental support and knowledge, through which the intervention is theoretically believed to act); (c) effectiveness analysis 2 (the effect of the AFLY5 intervention on primary and secondary outcomes 12 months after the end of the intervention) and (d) cost effectiveness analysis (the cost-effectiveness of the AFLY5 intervention). The details include how the intention to treat and per-protocol analyses were defined and planned sensitivity analyses for dealing with missing data. A set of dummy tables are provided in Additional file 1. This detailed analysis plan was written prior to any analyst having access to any data and was approved by the AFLY5 Trial Steering Committee. Its publication will ensure that analyses are in accordance with an a priori plan related to the trial objectives and not driven by knowledge of the data. ISRCTN50133740.

  17. Projecting the effects of tobacco control policies in the USA through microsimulation: a study protocol.

    PubMed

    Tam, Jamie; Levy, David T; Jeon, Jihyoun; Clarke, John; Gilkeson, Scott; Hall, Tim; Feuer, Eric J; Holford, Theodore R; Meza, Rafael

    2018-03-23

    Smoking remains the leading cause of preventable death in the USA but can be reduced through policy interventions. Computational models of smoking can provide estimates of the projected impact of tobacco control policies and can be used to inform public health decision making. We outline a protocol for simulating the effects of tobacco policies on population health outcomes. We extend the Smoking History Generator (SHG), a microsimulation model based on data from the National Health Interview Surveys, to evaluate the effects of tobacco control policies on projections of smoking prevalence and mortality in the USA. The SHG simulates individual life trajectories including smoking initiation, cessation and mortality. We illustrate the application of the SHG policy module for four types of tobacco control policies at the national and state levels: smoke-free air laws, cigarette taxes, increasing tobacco control programme expenditures and raising the minimum age of legal access to tobacco. Smoking initiation and cessation rates are modified by age, birth cohort, gender and years since policy implementation. Initiation and cessation rate modifiers are adjusted for differences across age groups and the level of existing policy coverage. Smoking prevalence, the number of population deaths avoided, and life-years gained are calculated for each policy scenario at the national and state levels. The model only considers direct individual benefits through reduced smoking and does not consider benefits through reduced exposure to secondhand smoke. A web-based interface is being developed to integrate the results of the simulations into a format that allows the user to explore the projected effects of tobacco control policies in the USA. Usability testing is being conducted in which experts provide feedback on the interface. Development of this tool is under way, and a publicly accessible website is available at http://www.tobaccopolicyeffects.org. © Article author(s) (or their

  18. Using mobile technology to deliver a cognitive behaviour therapy-informed intervention in early psychosis (Actissist): study protocol for a randomised controlled trial.

    PubMed

    Bucci, Sandra; Barrowclough, Christine; Ainsworth, John; Morris, Rohan; Berry, Katherine; Machin, Matthew; Emsley, Richard; Lewis, Shon; Edge, Dawn; Buchan, Iain; Haddock, Gillian

    2015-09-10

    Cognitive behaviour therapy (CBT) is recommended for the treatment of psychosis; however, only a small proportion of service users have access to this intervention. Smartphone technology using software applications (apps) could increase access to psychological approaches for psychosis. This paper reports the protocol development for a clinical trial of smartphone-based CBT. We present a study protocol that describes a single-blind randomised controlled trial comparing a cognitive behaviour therapy-informed software application (Actissist) plus Treatment As Usual (TAU) with a symptom monitoring software application (ClinTouch) plus TAU in early psychosis. The study consists of a 12-week intervention period. We aim to recruit and randomly assign 36 participants registered with early intervention services (EIS) across the North West of England, UK in a 2:1 ratio to each arm of the trial. Our primary objective is to determine whether in people with early psychosis the Actissist app is feasible to deliver and acceptable to use. Secondary aims are to determine whether Actissist impacts on predictors of first episode psychosis (FEP) relapse and enhances user empowerment, functioning and quality of life. Assessments will take place at baseline, 12 weeks (post-treatment) and 22-weeks (10 weeks post-treatment) by assessors blind to treatment condition. The trial will report on the feasibility and acceptability of Actissist and compare outcomes between the randomised arms. The study also incorporates semi-structured interviews about the experience of participating in the Actissist trial that will be qualitatively analysed to inform future developments of the Actissist protocol and app. To our knowledge, this is the first controlled trial to test the feasibility, acceptability, uptake, attrition and potential efficacy of a CBT-informed smartphone app for early psychosis. Mobile applications designed to deliver a psychologically-informed intervention offer new possibilities to

  19. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  20. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  1. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  2. Novel Application of a Reverse Triage Protocol Providing Increased Access to Care in an Outpatient, Primary Care Clinic Setting.

    PubMed

    Sacino, Amanda N; Shuster, Jonathan J; Nowicki, Kamil; Carek, Peter J; Wegman, Martin P; Listhaus, Alyson; Gibney, Joseph M; Chang, Ku-Lang

    2016-02-01

    As the number of patients with access to care increases, outpatient clinics will need to implement innovative strategies to maintain or enhance clinic efficiency. One viable alternative involves reverse triage. A reverse triage protocol was implemented during a student-run free clinic. Each patient's chief complaint(s) were obtained at the beginning of the clinic session and ranked by increasing complexity. "Complexity" was defined as the subjective amount of time required to provide a full, thorough evaluation of a patient. Less complex cases were prioritized first since they could be expedited through clinic processing and allow for more time and resources to be dedicated to complex cases. Descriptive statistics were used to characterize and summarize the data obtained. Categorical variables were analyzed using chi-square. A time series analysis of the outcome versus centered time in weeks was also conducted. The average number of patients seen per clinic session increased by 35% (9.5 versus 12.8) from pre-implementation of the reverse triage protocol to 6 months after the implementation of the protocol. The implementation of a reverse triage in an outpatient setting significantly increased clinic efficiency as noted by a significant increase in the number of patients seen during a clinic session.

  3. A randomised controlled non-inferiority trial of primary care-based facilitated access to an alcohol reduction website (EFAR Spain): the study protocol

    PubMed Central

    López-Pelayo, Hugo; Wallace, Paul; Segura, Lidia; Miquel, Laia; Díaz, Estela; Teixidó, Lidia; Baena, Begoña; Struzzo, Pierliugio; Palacio-Vieira, Jorge; Casajuana, Cristina; Colom, Joan; Gual, Antoni

    2014-01-01

    Introduction Early identification (EI) and brief interventions (BIs) for risky drinkers are effective tools in primary care. Lack of time in daily practice has been identified as one of the main barriers to implementation of BI. There is growing evidence that facilitated access by primary healthcare professionals (PHCPs) to a web-based BI can be a time-saving alternative to standard face-to-face BIs, but there is as yet no evidence about the effectiveness of this approach relative to conventional BI. The main aim of this study is to test non-inferiority of facilitation to a web-based BI for risky drinkers delivered by PHCP against face-to-face BI. Method and analysis A randomised controlled non-inferiority trial comparing both interventions will be performed in primary care health centres in Catalonia, Spain. Unselected adult patients attending participating centres will be given a leaflet inviting them to log on to a website to complete the Alcohol Use Disorders Identification Test (AUDIT-C) alcohol screening questionnaire. Participants with positive results will be requested online to complete a trial module including consent, baseline assessment and randomisation to either face-to-face BI by the practitioner or BI via the alcohol reduction website. Follow-up assessment of risky drinking will be undertaken online at 3 months and 1 year using the full AUDIT and D5-EQD5 scale. Proportions of risky drinkers in each group will be calculated and non-inferiority assessed against a specified margin of 10%. Assuming reduction of 30% of risky drinkers receiving standard intervention, 1000 patients will be required to give 90% power to reject the null hypothesis. Ethics and dissemination The protocol was approved by the Ethics Commmittee of IDIAP Jordi Gol i Gurina P14/028. The findings of the trial will be disseminated through peer-reviewed journals, national and international conference presentations. Trial registration number ClinicalTrials.gov NCT02082990. PMID

  4. Device Oriented Project Controller

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dalesio, Leo; Kraimer, Martin

    2013-11-20

    This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions havemore » been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.« less

  5. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  6. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    PubMed Central

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592

  7. Evaluation of modified work zone traffic control devices at business accesses

    DOT National Transportation Integrated Search

    2001-01-01

    Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...

  8. Providing Internet Access to High-Resolution Lunar Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  9. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  10. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  11. Validity of Assessments of Youth Access to Tobacco: The Familiarity Effect

    PubMed Central

    Landrine, Hope; Klonoff, Elizabeth A.

    2003-01-01

    Objectives. We examined the standard compliance protocol and its validity as a measure of youth access to tobacco. Methods. In Study 1, youth smokers reported buying cigarettes in stores where they are regular customers. In Study 2, youths attempted to purchase cigarettes by using the Standard Protocol, in which they appeared at stores once for cigarettes, and by using the Familiarity Protocol, in which they were rendered regular customers by purchasing nontobacco items 4 times and then requested cigarettes during their fifth visit. Results. Sales to youths aged 17 years in the Familiarity Protocol were significantly higher than sales to the same age group in the Standard Protocols (62.5% vs. 6%, respectively). Conclusions. The Standard Protocol does not match how youths obtain cigarettes. Access is low for stranger youths within compliance studies, but access is high for familiar youths outside of compliance studies. PMID:14600057

  12. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  13. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  14. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  15. Development of a generic system for real-time data access and remote control of multiple in-situ water quality monitoring instruments

    NASA Astrophysics Data System (ADS)

    Wright, S. A.; Bennett, G. E.; Andrews, T.; Melis, T. S.; Topping, D. J.

    2005-05-01

    Currently, in-situ monitoring of water quality parameters (e.g. water temperature, conductivity, turbidity) in the Colorado River ecosystem typically consists of deploying instruments in the river, retrieving them at a later date, downloading the datalogger, then examining the data; an arduous process in the remote settings of Grand Canyon. Under this protocol, data is not available real-time and there is no way to detect problems with the instrumentation until after retrieval. The next obvious stage in the development of in-situ monitoring in Grand Canyon was the advent of one-way telemetry, i.e. streaming data in real-time from the instrument to the office and/or the world-wide-web. This protocol allows for real-time access to data and the identification of instrumentation problems, but still requires a site visit to address instrument malfunctions, i.e. the user does not have the ability to remotely control the instrument. At some field sites, such as the Colorado River in Grand Canyon, site visitation is restricted by remoteness and lack of traditional access routes (i.e. roads). Even at less remote sites, it may still be desirable to have two-way communication with instruments in order to, for example, diagnose and potentially fix instrumentation problems, change sampling parameters to save battery power, etc., without having to visit the site. To this end, the U.S. Geological Survey, Grand Canyon Monitoring and Research Center, is currently developing and testing a high-speed, two-way communication system that allows for real-time data access and remote control of instrumentation. The approach tested relies on internet access and may be especially useful in areas where land-line or cellular connections are unavailable. The system is composed of off-the-shelf products, uses a commercial broadband satellite service, and is designed in a generic way such that any instrument that communicates through RS-232 communication (i.e. a serial port) is compatible with

  16. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  17. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  18. Abiraterone acetate for patients with metastatic castration-resistant prostate cancer progressing after chemotherapy: final analysis of a multicentre, open-label, early-access protocol trial.

    PubMed

    Sternberg, Cora N; Castellano, Daniel; Daugaard, Gedske; Géczi, Lajos; Hotte, Sebastien J; Mainwaring, Paul N; Saad, Fred; Souza, Ciro; Tay, Miah H; Garrido, José M Tello; Galli, Luca; Londhe, Anil; De Porre, Peter; Goon, Betty; Lee, Emma; McGowan, Tracy; Naini, Vahid; Todd, Mary B; Molina, Arturo; George, Daniel J

    2014-10-01

    In the final analysis of the phase 3 COU-AA-301 study, abiraterone acetate plus prednisone significantly prolonged overall survival compared with prednisone alone in patients with metastatic castration-resistant prostate cancer progressing after chemotherapy. Here, we present the final analysis of an early-access protocol trial that was initiated after completion of COU-AA-301 to enable worldwide preapproval access to abiraterone acetate in patients with metastatic castration-resistant prostate cancer progressing after chemotherapy. We did a multicentre, open-label, early-access protocol trial in 23 countries. We enrolled patients who had metastatic castration-resistant prostate cancer progressing after taxane chemotherapy. Participants received oral doses of abiraterone acetate (1000 mg daily) and prednisone (5 mg twice a day) in 28-day cycles until disease progression, development of sustained side-effects, or abiraterone acetate becoming available in the respective country. The primary outcome was the number of adverse events arising during study treatment and within 30 days of discontinuation. Efficacy measures (time to prostate-specific antigen [PSA] progression and time to clinical progression) were gathered to guide treatment decisions. We included in our analysis all patients who received at least one dose of abiraterone acetate. This study is registered with ClinicalTrials.gov, number NCT01217697. Between Nov 17, 2010, and Sept 30, 2013, 2314 patients were enrolled into the early-access protocol trial. Median follow-up was 5·7 months (IQR 3·5-10·6). 952 (41%) patients had a grade 3 or 4 treatment-related adverse event, and grade 3 or 4 serious adverse events were recorded in 585 (25%) people. The most common grade 3 and 4 adverse events were hepatotoxicity (188 [8%]), hypertension (99 [4%]), cardiac disorders (52 [2%]), osteoporosis (31 [1%]), hypokalaemia (28 [1%]), and fluid retention or oedema (23 [1%]). 172 (7%) patients discontinued the study

  19. Abbreviated MRI Protocols: Wave of the Future for Breast Cancer Screening.

    PubMed

    Chhor, Chloe M; Mercado, Cecilia L

    2017-02-01

    The purpose of this article is to describe the use of abbreviated breast MRI protocols for improving access to screening for women at intermediate risk. Breast MRI is not a cost-effective modality for screening women at intermediate risk, including those with dense breast tissue as the only risk. Abbreviated breast MRI protocols have been proposed as a way of achieving efficiency and rapid throughput. Use of these abbreviated protocols may increase availability and provide women with greater access to breast MRI.

  20. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  1. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  2. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  3. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  4. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  5. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms

  6. A web-based multidomain lifestyle intervention with connected devices for older adults: research protocol of the eMIND pilot randomized controlled trial.

    PubMed

    Pothier, Kristell; Soriano, G; Lussier, M; Naudin, A; Costa, N; Guyonnet, S; Piau, A; Ousset, P J; Nourhashemi, F; Vellas, B; de Souto Barreto, P

    2018-01-24

    Multidomain interventions composed of nutritional counseling, exercise and cognitive trainings have shown encouraging results as effective preventive strategies delaying age-related declines. However, these interventions are time- and resource-consuming. The use of Information and Communication Technologies (ICT) might facilitate the translation from research into real-world practice and reach a massive number of people. This article describes the protocol of the eMIND study, a randomized controlled trial (RCT) using a web-based multidomain intervention for older adults. One hundred and twenty older adults (≥ 65 years), with a spontaneous memory complaint, will be randomly assigned to a six-month web-based multidomain (nutritional counseling, physical and cognitive trainings) intervention group with a connected accelerometer (number of steps, energy expenditure), or to a control group with access to general information on healthy aging plus the accelerometer, but no access to the multidomain intervention. The main outcome is the feasibility/acceptability of the web-based intervention. Secondary clinical outcomes include: cognitive functions, physical performance, nutritional status and cost-effectiveness. We expect a high amount of adherers (ie, > 75% compliance to the protocol) to reflect the feasibility. Acceptability, assessed through interviews, should allow us to understand motivators and barriers to this ICT intervention. We also expect to provide data on its effects on various clinical outcomes and efficiency. The eMIND study will provide crucial information to help developing a future and larger web-based multidomain lifestyle RCT, which should facilitate the translation of this ICT intervention from the research world into real-life clinical practice for the healthcare of older adults.

  7. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  8. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  9. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  10. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  11. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  12. Guidelines for Outsourcing Remote Access.

    ERIC Educational Resources Information Center

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  13. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  14. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  15. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  16. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  17. Automating Access Control Logics in Simple Type Theory with LEO-II

    NASA Astrophysics Data System (ADS)

    Benzmüller, Christoph

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.

  18. Quantitative image feature variability amongst CT scanners with a controlled scan protocol

    NASA Astrophysics Data System (ADS)

    Ger, Rachel B.; Zhou, Shouhao; Chi, Pai-Chun Melinda; Goff, David L.; Zhang, Lifei; Lee, Hannah J.; Fuller, Clifton D.; Howell, Rebecca M.; Li, Heng; Stafford, R. Jason; Court, Laurence E.; Mackin, Dennis S.

    2018-02-01

    Radiomics studies often analyze patient computed tomography (CT) images acquired from different CT scanners. This may result in differences in imaging parameters, e.g. different manufacturers, different acquisition protocols, etc. However, quantifiable differences in radiomics features can occur based on acquisition parameters. A controlled protocol may allow for minimization of these effects, thus allowing for larger patient cohorts from many different CT scanners. In order to test radiomics feature variability across different CT scanners a radiomics phantom was developed with six different cartridges encased in high density polystyrene. A harmonized protocol was developed to control for tube voltage, tube current, scan type, pitch, CTDIvol, convolution kernel, display field of view, and slice thickness across different manufacturers. The radiomics phantom was imaged on 18 scanners using the control protocol. A linear mixed effects model was created to assess the impact of inter-scanner variability with decomposition of feature variation between scanners and cartridge materials. The inter-scanner variability was compared to the residual variability (the unexplained variability) and to the inter-patient variability using two different patient cohorts. The patient cohorts consisted of 20 non-small cell lung cancer (NSCLC) and 30 head and neck squamous cell carcinoma (HNSCC) patients. The inter-scanner standard deviation was at least half of the residual standard deviation for 36 of 49 quantitative image features. The ratio of inter-scanner to patient coefficient of variation was above 0.2 for 22 and 28 of the 49 features for NSCLC and HNSCC patients, respectively. Inter-scanner variability was a significant factor compared to patient variation in this small study for many of the features. Further analysis with a larger cohort will allow more thorough analysis with additional variables in the model to truly isolate the interscanner difference.

  19. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    ERIC Educational Resources Information Center

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  20. A review of tags anti-collision and localization protocols in RFID networks.

    PubMed

    Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N

    2012-12-01

    Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.

  1. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  2. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  3. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  4. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  5. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  6. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  7. Formalization of the Access Control on ARM-Android Platform with the B Method

    NASA Astrophysics Data System (ADS)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  8. CSMA/RN: A universal protocol for gigabit networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.

  9. Early Access to the Cardiac Catheterization Laboratory for Patients Resuscitated From Cardiac Arrest Due to a Shockable Rhythm: The Minnesota Resuscitation Consortium Twin Cities Unified Protocol.

    PubMed

    Garcia, Santiago; Drexel, Todd; Bekwelem, Wobo; Raveendran, Ganesh; Caldwell, Emily; Hodgson, Lucinda; Wang, Qi; Adabag, Selcuk; Mahoney, Brian; Frascone, Ralph; Helmer, Gregory; Lick, Charles; Conterato, Marc; Baran, Kenneth; Bart, Bradley; Bachour, Fouad; Roh, Steven; Panetta, Carmelo; Stark, Randall; Haugland, Mark; Mooney, Michael; Wesley, Keith; Yannopoulos, Demetris

    2016-01-07

    In 2013 the Minnesota Resuscitation Consortium developed an organized approach for the management of patients resuscitated from shockable rhythms to gain early access to the cardiac catheterization laboratory (CCL) in the metro area of Minneapolis-St. Paul. Eleven hospitals with 24/7 percutaneous coronary intervention capabilities agreed to provide early (within 6 hours of arrival at the Emergency Department) access to the CCL with the intention to perform coronary revascularization for outpatients who were successfully resuscitated from ventricular fibrillation/ventricular tachycardia arrest. Other inclusion criteria were age >18 and <76 and presumed cardiac etiology. Patients with other rhythms, known do not resuscitate/do not intubate, noncardiac etiology, significant bleeding, and terminal disease were excluded. The primary outcome was survival to hospital discharge with favorable neurological outcome. Patients (315 out of 331) who were resuscitated from VT/VF and transferred alive to the Emergency Department had complete medical records. Of those, 231 (73.3%) were taken to the CCL per the Minnesota Resuscitation Consortium protocol while 84 (26.6%) were not taken to the CCL (protocol deviations). Overall, 197 (63%) patients survived to hospital discharge with good neurological outcome (cerebral performance category of 1 or 2). Of the patients who followed the Minnesota Resuscitation Consortium protocol, 121 (52%) underwent percutaneous coronary intervention, and 15 (7%) underwent coronary artery bypass graft. In this group, 151 (65%) survived with good neurological outcome, whereas in the group that did not follow the Minnesota Resuscitation Consortium protocol, 46 (55%) survived with good neurological outcome (adjusted odds ratio: 1.99; [1.07-3.72], P=0.03). Early access to the CCL after cardiac arrest due to a shockable rhythm in a selected group of patients is feasible in a large metropolitan area in the United States and is associated with a 65% survival

  10. Security Enhanced EMV-Based Mobile Payment Protocol

    PubMed Central

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334

  11. Security enhanced EMV-based mobile payment protocol.

    PubMed

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.

  12. Honest broker protocol streamlines research access to data while safeguarding patient privacy.

    PubMed

    Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti

    2008-11-06

    At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.

  13. The Deployment of Routing Protocols in Distributed Control Plane of SDN

    PubMed Central

    Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu

    2014-01-01

    Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies. PMID:25250395

  14. The deployment of routing protocols in distributed control plane of SDN.

    PubMed

    Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu

    2014-01-01

    Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies.

  15. Acute Pain Service and multimodal therapy for postsurgical pain control: evaluation of protocol efficacy.

    PubMed

    Moizo, E; Berti, M; Marchetti, C; Deni, F; Albertin, A; Muzzolon, F; Antonino, A

    2004-11-01

    The institution of a postoperative Acute Pain Control Service is mandatory to improve the control of pain induced by surgical injury. Treatment of postoperative pain may be achieved using a combination of analgesic agents and techniques, reducing the incidence of side effects owing to the lower doses of the individual drugs. In 1997 we established an Acute Pain Service (APS) at the San Raffaele Hospital in Milan. The aim of this study was to assess the efficacy and safety of our APS both in terms of treatment protocols and organisational issues. In this prospective observational study we included 592 patients undergoing abdominal, gynecological, or orthopedic surgery with severe expected pain. According to general guidelines on pain treatment, the patients were assigned to different treatment protocols based on the kind of operation. All protocols were based on the multimodal therapy, with the association of nonsteroidal anti-inflammatory drugs (NSAIDS), opioids and regional anesthesia techniques. During the first 48 h of the postoperative period we recorded vital signs, level of pain and occurrence of any side effect. Our analgesic protocols proved to be effective and safe (low incidence of side effects) for every surgery. The incidence of postoperative nausea and vomiting was higher in patients receiving patient-controlled morphine than that with continuous epidural or nerve block. After lower abdominal surgery, pain at movement at 24 h was significantly lower in the epidural group than in the Patient Control Analgesia group. Nausea and vomiting, numbness and paresthesias at the lower limbs were higher in gynecological patients. A larger percentage of orthopedic patients in the epidural group reported numbness and paresthesias at the lower limbs in comparison with patients receiving continuous peripheral nerve block. In agreement with previous literature, this study confirmed that a multimodal approach to pain treatment provides an adequate control of

  16. Internet-based modular program BADI for adjustment disorder: protocol of a randomized controlled trial.

    PubMed

    Skruibis, Paulius; Eimontas, Jonas; Dovydaitiene, Migle; Mazulyte, Egle; Zelviene, Paulina; Kazlauskas, Evaldas

    2016-07-26

    Adjustment disorder is one of the most common mental health diagnoses. Still it receives relatively little attention from researchers trying to establish best interventions to treat it. With high prevalence of stressful life events, which might be leading to adjustment disorder, and limited resources of mental health service providers, online interventions could be a very practical way of helping people who have these disorders or are in the risk to develop them. The proposed study protocol is aimed to describe a randomized controlled trial of an internet-based modular intervention for adjustment disorder as it is defined in a proposal for the ICD-11. This study is a two-armed Randomized Controlled Trial (RCT) to examine the effectiveness of a web-based intervention BADI (Brief Adjustment Disorder Intervention) for adjustment disorder symptoms. BADI has four modules: Relaxation, Time management, Mindfulness and Strengthening relationships. It is based on stress and coping research and integrates evidence-based treatment approaches such as Cognitive Behavioural therapy (CBT), mindfulness and body-mind practices, as well as exercises for enhancing social support. Primary outcome of the study are symptoms of adjustment disorder and well-being. Engagement into the program and motivation for change is a secondary outcome. All participants after completing the baseline assessment are randomly assigned to one of the two groups: either to the one in which participant will instantly gain access to the BADI intervention or a group in which participants will be given access to the BADI program after waiting one month. Participants of BADI can choose exercises of the program flexibly. There is no particular order in which the exercises should be completed. Study will provide new insights of modular internet-based interventions efficacy for adjustment disorders. The study will also provide information about the role of motivation and expectancies on engagement in modular

  17. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks.

    Scope of Contributions

    This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to:
    • Optical access network architectures and protocols
    • Passive optical networks (BPON, EPON, GPON, etc.)
    • Active optical networks
    • Multiple access control
    • Multiservices and QoS provisioning
    • Network survivability
    • Field trials and standards
    • Performance modeling and analysis

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  18. Digital IAPT: the effectiveness & cost-effectiveness of internet-delivered interventions for depression and anxiety disorders in the Improving Access to Psychological Therapies programme: study protocol for a randomised control trial.

    PubMed

    Richards, Derek; Duffy, Daniel; Blackburn, Brid; Earley, Caroline; Enrique, Angel; Palacios, Jorge; Franklin, Matthew; Clarke, Gabriella; Sollesse, Sarah; Connell, Sarah; Timulak, Ladislav

    2018-03-02

    Depression and anxiety are common mental health disorders worldwide. The UK's Improving Access to Psychological Therapies (IAPT) programme is part of the National Health Service (NHS) designed to provide a stepped care approach to treating people with anxiety and depressive disorders. Cognitive Behavioural Therapy (CBT) is widely used, with computerised and internet-delivered cognitive behavioural therapy (cCBT and iCBT, respectively) being a suitable IAPT approved treatment alternative for step 2, low- intensity treatment. iCBT has accumulated a large empirical base for treating depression and anxiety disorders. However, the cost-effectiveness and impact of these interventions in the longer-term is not routinely assessed by IAPT services. The current study aims to evaluate the clinical and cost-effectiveness of internet-delivered interventions for symptoms of depression and anxiety disorders in IAPT. The study is a parallel-groups, randomised controlled trial examining the effectiveness and cost-effectiveness of iCBT interventions for depression and anxiety disorders, against a waitlist control group. The iCBT treatments are of 8 weeks duration and will be supported by regular post-session feedback by Psychological Wellbeing Practitioners. Assessments will be conducted at baseline, during, and at the end of the 8-week treatment and at 3, 6, 9, and 12-month follow-up. A diagnostic interview will be employed at baseline and 3-month follow-up. Participants in the waitlist control group will complete measures at baseline and week 8, at which point they will receive access to the treatment. All adult users of the Berkshire NHS Trust IAPT Talking Therapies Step 2 services will be approached to participate and measured against set eligibility criteria. Primary outcome measures will assess anxiety and depressive symptoms using the GAD-7 and PHQ-9, respectively. Secondary outcome measures will allow for the evaluation of long-term outcomes, mediators and moderators of

  19. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  20. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  1. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  2. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    PubMed Central

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  3. Global Access-controlled Transfer e-frame (GATe)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  4. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  5. Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kaj, Ingemar

    Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information for the network users. Hundreds or thousands of small embedded units, which operate under low-energy supply and with limited access to central network control, rely on interconnecting protocols to coordinate data aggregation and transmission. Energy efficiency is crucial and it has been proposed that cluster based and distributed architectures such as LEACH are particularly suitable. We analyse the random cluster hierarchy in this protocol and provide a solution for low-energy and limited-loss optimization. Moreover, we extend these results to a multi-level version of LEACH, where clusters of nodes again self-organize to form clusters of clusters, and so on.

  6. A review on transport layer protocol performance for delivering video on an adhoc network

    NASA Astrophysics Data System (ADS)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  7. Development and validation of a remote home safety protocol.

    PubMed

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  8. Worldwide trends in volume and quality of published protocols of randomized controlled trials

    PubMed Central

    Alldinger, Ingo; Cieslak, Kasia P.; Wennink, Roos; Clarke, Mike; Ali, Usama Ahmed; Besselink, Marc G. H.

    2017-01-01

    Introduction Publishing protocols of randomized controlled trials (RCT) facilitates a more detailed description of study rational, design, and related ethical and safety issues, which should promote transparency. Little is known about how the practice of publishing protocols developed over time. Therefore, this study describes the worldwide trends in volume and methodological quality of published RCT protocols. Methods A systematic search was performed in PubMed and EMBASE, identifying RCT protocols published over a decade from 1 September 2001. Data were extracted on quality characteristics of RCT protocols. The primary outcome, methodological quality, was assessed by individual methodological characteristics (adequate generation of allocation, concealment of allocation and intention-to-treat analysis). A comparison was made by publication period (First, September 2001- December 2004; Second, January 2005-May 2008; Third, June 2008-September 2011), geographical region and medical specialty. Results The number of published RCT protocols increased from 69 in the first, to 390 in the third period (p<0.0001). Internal medicine and paediatrics were the most common specialty topics. Whereas most published RCT protocols in the first period originated from North America (n = 30, 44%), in the second and third period this was Europe (respectively, n = 65, 47% and n = 190, 48%, p = 0.02). Quality of RCT protocols was higher in Europe and Australasia, compared to North America (OR = 0.63, CI = 0.40–0.99, p = 0.04). Adequate generation of allocation improved with time (44%, 58%, 67%, p = 0.001), as did concealment of allocation (38%, 53%, 55%, p = 0.03). Surgical protocols had the highest quality among the three specialty topics used in this study (OR = 1.94, CI = 1.09–3.45, p = 0.02). Conclusion Publishing RCT protocols has become popular, with a five-fold increase in the past decade. The quality of published RCT protocols also improved, although variation between

  9. System level traffic shaping in disk servers with heterogeneous protocols

    NASA Astrophysics Data System (ADS)

    Cano, Eric; Kruse, Daniele Francesco

    2014-06-01

    Disk access and tape migrations compete for network bandwidth in CASTORs disk servers, over various protocols: RFIO, Xroot, root and GridFTP. As there are a limited number of tape drives, it is important to keep them busy all the time, at their nominal speed. With potentially 100s of user read streams per server, the bandwidth for the tape migrations has to be guaranteed to a controlled level, and not the fair share the system gives by default. Xroot provides a prioritization mechanism, but using it implies moving exclusively to the Xroot protocol, which is not possible in short to mid-term time frame, as users are equally using all protocols. The greatest commonality of all those protocols is not more than the usage of TCP/IP. We investigated the Linux kernel traffic shaper to control TCP/ IP bandwidth. The performance and limitations of the traffic shaper have been understood in test environment, and satisfactory working point has been found for production. Notably, TCP offload engines' negative impact on traffic shaping, and the limitations of the length of the traffic shaping rules were discovered and measured. A suitable working point has been found and the traffic shaping is now successfully deployed in the CASTOR production systems at CERN. This system level approach could be transposed easily to other environments.

  10. Enhanced Multi-Modal Access to Planetary Exploration

    NASA Technical Reports Server (NTRS)

    Lamarra, Norm; Doyle, Richard; Wyatt, Jay

    2003-01-01

    Tomorrow's Interplanetary Network (IPN) will evolve from JPL's Deep-Space Network (DSN) and provide key capabilities to future investigators, such as simplified acquisition of higher-quality science at remote sites and enriched access to these sites. These capabilities could also be used to foster public interest, e.g., by making it possible for students to explore these environments personally, eventually perhaps interacting with a virtual world whose models could be populated by data obtained continuously from the IPN. Our paper looks at JPL's approach to making this evolution happen, starting from improved communications. Evolving space protocols (e.g., today's CCSDS proximity and file-transfer protocols) will provide the underpinning of such communications in the next decades, just as today's rich web was enabled by progress in Internet Protocols starting from the early 1970's (ARPAnet research). A key architectural thrust of this effort is to deploy persistent infrastructure incrementally, using a layered service model, where later higher-layer capabilities (such as adaptive science planning) are enabled by earlier lower-layer services (such as automated routing of object-based messages). In practice, there is also a mind shift needed from an engineering culture raised on point-to-point single-function communications (command uplink, telemetry downlink), to one in which assets are only indirectly accessed, via well-defined interfaces. We are aiming to foster a 'community of access' both among space assets and the humans who control them. This enables appropriate (perhaps eventually optimized) sharing of services and resources to the greater benefit of all participants. We envision such usage to be as automated in the future as using a cell phone is today - with all the steps in creating the real-time link being automated.

  11. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  12. In-memory interconnect protocol configuration registers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cheng, Kevin Y.; Roberts, David A.

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less

  13. Data aggregation in wireless sensor networks using the SOAP protocol

    NASA Astrophysics Data System (ADS)

    Al-Yasiri, A.; Sunley, A.

    2007-07-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  14. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  15. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  16. An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.

    PubMed

    Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y

    2017-10-01

    We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.

  17. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  18. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  19. Telerehabilitation Versus Traditional Care Following Total Hip Replacement: A Randomized Controlled Trial Protocol.

    PubMed

    Nelson, Mark; Bourke, Michael; Crossley, Kay; Russell, Trevor

    2017-03-02

    Total hip replacement (THR) is the gold standard treatment for severe hip osteoarthritis. Effectiveness of physical rehabilitation for THR patients following discharge from hospital is supported by evidence; however, barriers such as geographical location and transport can limit access to appropriate health care. One solution to this issue is using an alternative model of care using telerehabilitation technology to deliver rehabilitation programs directly into patients' homes. A telerehabilitation model may also have potential health care cost savings for health care providers. This study aims to determine if a telerehabilitation model of care delivered remotely is as effective as face-to-face rehabilitation in the THR population and cost effective for health care providers and patients. A total of 70 people undergoing THR will be recruited to participate in a randomized, single-blind, controlled noninferiority clinical trial. The trial will compare a technology-based THR rehabilitation program to in-person care. On discharge from hospital, participants randomized to the in-person group will receive usual care, defined as a paper home exercise program (HEP) targeting strengthening exercises for quadriceps, hip abductors, extensors, and flexors; they will be advised to perform their HEP 3 times per day. At 2, 4, and 6 weeks postoperatively, they will receive a 30-minute in-person physiotherapy session with a focus on gait retraining and reviewing and progressing their HEP. The telerehabilitation protocol will involve a program similar in content to the in-person rehabilitation program, except delivery will be directly into the homes of the participants via telerehabilitation technology on an iPad. Outcomes will be evaluated preoperatively, day of discharge from in-patient physiotherapy, 6 weeks and 6 months postoperatively. The primary outcome will be the quality of life subscale of the hip disability and osteoarthritis outcome score, measured at 6 weeks. Both

  20. Simple measurement-based admission control for DiffServ access networks

    NASA Astrophysics Data System (ADS)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  1. 47 CFR 79.109 - Activating accessibility features.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol, with...

  2. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  3. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  4. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  5. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  6. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  7. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  8. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  9. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  10. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  11. Distributed reservation-based code division multiple access

    NASA Astrophysics Data System (ADS)

    Wieselthier, J. E.; Ephremides, A.

    1984-11-01

    The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.

  12. Browsing for the Best Internet Access Provider?

    ERIC Educational Resources Information Center

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  13. Reporting on blinding in trial protocols and corresponding publications was often inadequate but rarely contradictory.

    PubMed

    Hróbjartsson, Asbjørn; Pildal, Julie; Chan, An-Wen; Haahr, Mette T; Altman, Douglas G; Gøtzsche, Peter C

    2009-09-01

    To compare the reporting on blinding in protocols and articles describing randomized controlled trials. We studied 73 protocols of trials approved by the scientific/ethical committees for Copenhagen and Frederiksberg, 1994 and 1995, and their corresponding publications. Three out of 73 trials (4%) reported blinding in the protocol that contradicted that in the publication (e.g., "open" vs. "double blind"). The proportion of "double-blind" trials with a clear description of the blinding of participants increased from 11 out of 58 (19%) when based on publications alone to 39 (67%) when adding the information in the protocol. The similar proportions for the blinding of health care providers were 2 (3%) and 22 (38%); and for the blinding of data collectors, they were 8 (14%) and 14 (24%). In 52 of 58 publications (90%), it was unclear whether all patients, health care providers, and data collectors had been blinded. In 4 of the 52 trials (7%), the protocols clarified that all three key trial persons had been blinded. The reporting on blinding in both trial protocols and publications is often inadequate. We suggest developing international guidelines for the reporting of trial protocols and public access to protocols.

  14. Methods for CT automatic exposure control protocol translation between scanner platforms.

    PubMed

    McKenney, Sarah E; Seibert, J Anthony; Lamba, Ramit; Boone, John M

    2014-03-01

    An imaging facility with a diverse fleet of CT scanners faces considerable challenges when propagating CT protocols with consistent image quality and patient dose across scanner makes and models. Although some protocol parameters can comfortably remain constant among scanners (eg, tube voltage, gantry rotation time), the automatic exposure control (AEC) parameter, which selects the overall mA level during tube current modulation, is difficult to match among scanners, especially from different CT manufacturers. Objective methods for converting tube current modulation protocols among CT scanners were developed. Three CT scanners were investigated, a GE LightSpeed 16 scanner, a GE VCT scanner, and a Siemens Definition AS+ scanner. Translation of the AEC parameters such as noise index and quality reference mAs across CT scanners was specifically investigated. A variable-diameter poly(methyl methacrylate) phantom was imaged on the 3 scanners using a range of AEC parameters for each scanner. The phantom consisted of 5 cylindrical sections with diameters of 13, 16, 20, 25, and 32 cm. The protocol translation scheme was based on matching either the volumetric CT dose index or image noise (in Hounsfield units) between two different CT scanners. A series of analytic fit functions, corresponding to different patient sizes (phantom diameters), were developed from the measured CT data. These functions relate the AEC metric of the reference scanner, the GE LightSpeed 16 in this case, to the AEC metric of a secondary scanner. When translating protocols between different models of CT scanners (from the GE LightSpeed 16 reference scanner to the GE VCT system), the translation functions were linear. However, a power-law function was necessary to convert the AEC functions of the GE LightSpeed 16 reference scanner to the Siemens Definition AS+ secondary scanner, because of differences in the AEC functionality designed by these two companies. Protocol translation on the basis of

  15. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...

  16. [Donation protocol following controlled cardiac death (Maastricht type III donation). First experience].

    PubMed

    Rubio-Muñoz, J J; Pérez-Redondo, M; Alcántara-Carmona, S; Lipperheide-Vallhonrat, I; Fernández-Simón, I; Valdivia-de la Fuente, M; Villanueva-Fernández, H; Balandín-Moreno, B; Ortega-López, A; Romera-Ortega, M A; Galdos-Anuncibay, P

    2014-03-01

    To present our experience with the implementation of a donation protocol following controlled cardiac death (Maastricht type III donation). A retrospective descriptive and observational study was made. Intensive Care Unit of a third-level university hospital. Eight patients in an irreversible state, in which withdrawal of all life support had been agreed, were evaluated as potential donors. Application of the adopted protocol. Clinical data of donors, evaluation of a donation protocol following cardiac death, warm ischemia times, and short-term outcome of the recipients. Eight patients were evaluated. In one case donation was not possible because no cardiac arrest developed in the 120 minutes after extubation. The 7 remaining patients were effective kidney donors. Warm ischemia times were less than 23 minutes in all cases. Although 7 of the 14 recipients suffered delayed graft function, all of them achieved good renal function. Donation after cardiac death in patients in an overwhelming and irreversible state represents a potential source of donors not previously considered in this country. The prior development of a consensus-based protocol can help increase the number of organs in combination with those obtained after brain death. In our experience, the results of kidney transplants obtained from donors after cardiac death are good, and the success of these types of protocols could be extended to other organs such as the liver and lungs. Copyright © 2012 Elsevier España, S.L. and SEMICYUC. All rights reserved.

  17. Engineering platform and experimental protocol for design and evaluation of a neurally-controlled powered transfemoral prosthesis.

    PubMed

    Zhang, Fan; Liu, Ming; Harper, Stephen; Lee, Michael; Huang, He

    2014-07-22

    To enable intuitive operation of powered artificial legs, an interface between user and prosthesis that can recognize the user's movement intent is desired. A novel neural-machine interface (NMI) based on neuromuscular-mechanical fusion developed in our previous study has demonstrated a great potential to accurately identify the intended movement of transfemoral amputees. However, this interface has not yet been integrated with a powered prosthetic leg for true neural control. This study aimed to report (1) a flexible platform to implement and optimize neural control of powered lower limb prosthesis and (2) an experimental setup and protocol to evaluate neural prosthesis control on patients with lower limb amputations. First a platform based on a PC and a visual programming environment were developed to implement the prosthesis control algorithms, including NMI training algorithm, NMI online testing algorithm, and intrinsic control algorithm. To demonstrate the function of this platform, in this study the NMI based on neuromuscular-mechanical fusion was hierarchically integrated with intrinsic control of a prototypical transfemoral prosthesis. One patient with a unilateral transfemoral amputation was recruited to evaluate our implemented neural controller when performing activities, such as standing, level-ground walking, ramp ascent, and ramp descent continuously in the laboratory. A novel experimental setup and protocol were developed in order to test the new prosthesis control safely and efficiently. The presented proof-of-concept platform and experimental setup and protocol could aid the future development and application of neurally-controlled powered artificial legs.

  18. Access Control for Home Data Sharing: Attitudes, Needs and Practices

    DTIC Science & Technology

    2009-10-01

    cameras, mobile phones and portable music players make creating and interacting with this content easy. Home users are increasingly interested in...messages, photos, home videos, journal files and home musical recordings. Many participants considered unauthorized access by strangers, acquaintances...configuration does not allow users to share different subsets of music with different people. Facebook supplies rich, customizable access controls for

  19. [Venous access in oncology].

    PubMed

    Lesimple, T; Béguec, J F; Levêque, J M

    1998-10-31

    Many treatments administered to cancer patients require venous access either via a peripheral vein or a larger central vein at the risk of local or systemic infection, thrombus formation or venous occlusion and dysfunction. Insertion of a central catheter is an invasive procedure which must be conducted under conditions of rigorous asepsia. Strict rules based on well-defined protocols must be applied throughout its use. Local or systemic infectious complications account for 18 to 25% of all nosocomial infections and are often related to colonisation of the puncture site by a Gram positive germ. In case of infection, ablation of the central catheter is not mandatory for diagnosis or antibiotic treatment. Reported at varying frequencies in the literature from 4 to 42%, thrombus formation is unpredictable and often difficult to diagnose. Anticoagulants or fibrolytic agents are indicated but it may also be necessary to withdraw the catheter. Displacement, rupture, obstruction and extravasation are frequent complications. Back flow must be checked in all venous accesses and free flow carefully verified. The access must remain patent throughout the period of use, guaranteed by a standard heparinization and rinsing protocol. This complications must not mask the important progress achieved with the use of central venous access for specific and symptomatic treatment in cancer patients.

  20. Study protocol: a randomized controlled trial investigating the effects of a psychosexual training program for adolescents with autism spectrum disorder.

    PubMed

    Visser, Kirsten; Greaves-Lord, Kirstin; Tick, Nouchka T; Verhulst, Frank C; Maras, Athanasios; van der Vegt, Esther J M

    2015-08-28

    Previous research shows that adolescents with autism spectrum disorder (ASD) run several risks in their psychosexual development and that these adolescents can have limited access to reliable information on puberty and sexuality, emphasizing the need for specific guidance of adolescents with ASD in their psychosexual development. Few studies have investigated the effects of psychosexual training programs for adolescents with ASD and to date no randomized controlled trials are available to study the effects of psychosexual interventions for this target group. The randomized controlled trial (RCT) described in this study protocol aims to investigate the effects of the Tackling Teenage Training (TTT) program on the psychosexual development of adolescents with ASD. This parallel clinical trial, conducted in the South-West of the Netherlands, has a simple equal randomization design with an intervention and a waiting-list control condition. Two hundred adolescents and their parents participate in this study. We assess the participants in both conditions using self-report as well as parent-report questionnaires at three time points during 1 year: at baseline (T1), post-treatment (T2), and for follow-up (T3). To our knowledge, the current study is the first that uses a randomized controlled design to study the effects of a psychosexual training program for adolescents with ASD. It has a number of methodological strengths, namely a large sample size, a wide range of functionally relevant outcome measures, the use of multiple informants, and a standardized research and intervention protocol. Also some limitations of the described study are identified, for instance not making a comparison between two treatment conditions, and no use of blinded observational measures to investigate the ecological validity of the research results. Dutch Trial Register NTR2860. Registered on 20 April 2011.

  1. Supportive Mental Health Self-Monitoring among Smartphone Users with Psychological Distress: Protocol for a Fully Mobile Randomized Controlled Trial

    PubMed Central

    Beiwinkel, Till; Hey, Stefan; Bock, Olaf; Rössler, Wulf

    2017-01-01

    Mobile health (mHealth) could be widely used in the population to improve access to psychological treatment. In this paper, we describe the development of a mHealth intervention on the basis of supportive self-monitoring and describe the protocol for a randomized controlled trial to evaluate its effectiveness among smartphone users with psychological distress. Based on power analysis, a representative quota sample of N = 186 smartphone users will be recruited, with an over-sampling of persons with moderate to high distress. Over a 4-week period, the intervention will be compared to a self-monitoring without intervention group and a passive control group. Telephone interviews will be conducted at baseline, post-intervention (4 weeks), and 12-week follow-up to assess study outcomes. The primary outcome will be improvement of mental health. Secondary outcomes will include well-being, intentions toward help-seeking and help-seeking behavior, user activation, attitudes toward mental-health services, perceived stigmatization, smartphone app quality, user satisfaction, engagement, and adherence with the intervention. Additionally, data from the user’s daily life as collected during self-monitoring will be used to investigate risk and protective factors of mental health in real-world settings. Therefore, this study will allow us to demonstrate the effectiveness of a smartphone application as a widely accessible and low-cost intervention to improve mental health on a population level. It also allows to identify new assessment approaches in the field of psychiatric epidemiology. PMID:28983477

  2. Supportive Mental Health Self-Monitoring among Smartphone Users with Psychological Distress: Protocol for a Fully Mobile Randomized Controlled Trial.

    PubMed

    Beiwinkel, Till; Hey, Stefan; Bock, Olaf; Rössler, Wulf

    2017-01-01

    Mobile health (mHealth) could be widely used in the population to improve access to psychological treatment. In this paper, we describe the development of a mHealth intervention on the basis of supportive self-monitoring and describe the protocol for a randomized controlled trial to evaluate its effectiveness among smartphone users with psychological distress. Based on power analysis, a representative quota sample of N  = 186 smartphone users will be recruited, with an over-sampling of persons with moderate to high distress. Over a 4-week period, the intervention will be compared to a self-monitoring without intervention group and a passive control group. Telephone interviews will be conducted at baseline, post-intervention (4 weeks), and 12-week follow-up to assess study outcomes. The primary outcome will be improvement of mental health. Secondary outcomes will include well-being, intentions toward help-seeking and help-seeking behavior, user activation, attitudes toward mental-health services, perceived stigmatization, smartphone app quality, user satisfaction, engagement, and adherence with the intervention. Additionally, data from the user's daily life as collected during self-monitoring will be used to investigate risk and protective factors of mental health in real-world settings. Therefore, this study will allow us to demonstrate the effectiveness of a smartphone application as a widely accessible and low-cost intervention to improve mental health on a population level. It also allows to identify new assessment approaches in the field of psychiatric epidemiology.

  3. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420...

  4. Innovative dressing and securement of tunneled central venous access devices in pediatrics: a pilot randomized controlled trial.

    PubMed

    Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2017-08-30

    Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture

  5. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  6. Cognitive remediation versus active computer control in bipolar disorder with psychosis: study protocol for a randomized controlled trial.

    PubMed

    Lewandowski, Kathryn Eve; Sperry, Sarah H; Ongur, Dost; Cohen, Bruce M; Norris, Lesley A; Keshavan, Matcheri S

    2016-03-12

    Cognitive dysfunction is a major feature of bipolar disorder with psychosis and is strongly associated with functional outcomes. Computer-based cognitive remediation has shown promise in improving cognition in patients with schizophrenia. However, despite similar neurocognitive deficits between patients with schizophrenia and bipolar disorder, few studies have extended neuroscience-based cognitive remediation programs to this population. The Treatment to Enhance Cognition in Bipolar Disorder study is an investigator-initiated, parallel group, randomized, blinded clinical trial of an Internet-based cognitive remediation protocol for patients with bipolar disorder I with psychosis (n = 100). We also describe the development of our dose-matched active control paradigm. Both conditions involve 70 sessions of computer-based activities over 24 weeks. The control intervention was developed to mirror the treatment condition in dose and format but without the neuroplasticity-based task design and structure. All participants undergo neuropsychological and clinical assessment at baseline, after approximately 25 hours of study activities, post treatment, and after 6 months of no study contact to assess durability. Neuroimaging at baseline and post treatment are offered in an "opt-in" format. The primary outcomes are scores on the MATRICS battery; secondary and exploratory outcomes include measures of clinical symptoms, community functioning, and neuroimaging changes. Associations between change in cognitive measures and change in community functioning will be assessed. Baseline predictors of treatment response will be examined. The present study is the first we are aware of to implement an Internet-based cognitive remediation program in patients with bipolar disorder with psychosis and to develop a comparable web-based control paradigm. The mixed online and study-site format allows accessible treatment while providing weekly staff contact and bridging. Based on user

  7. The OPL Access Control Policy Language

    NASA Astrophysics Data System (ADS)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  8. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...

  9. Chapter 3: Commercial and Industrial Lighting Controls Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Carlson, Stephen

    This Commercial and Industrial Lighting Controls Evaluation Protocol (the protocol) describes methods to account for energy savings resulting from programmatic installation of lighting control equipment in large populations of commercial, industrial, government, institutional, and other nonresidential facilities. This protocol does not address savings resulting from changes in codes and standards, or from education and training activities. When lighting controls are installed in conjunction with a lighting retrofit project, the lighting control savings must be calculated parametrically with the lighting retrofit project so savings are not double counted.

  10. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  11. Kinesio Taping for pain control during labor: Protocol of a randomized, controlled trial.

    PubMed

    Miquelutti, Maria Amelia; Cecatti, José Guilherme

    2017-03-01

    This study protocol will evaluate the effectiveness and safety during labor and delivery of the Kinesio Taping bandage for pain sensation, satisfaction of patients, and obstetric and neonatal outcomes. A randomized controlled trial with 60 participants divided into two groups will be conducted. The intervention group will receive bandage application on the vertebral regions corresponding to uterine dermatomes - from T10 to L1 and from S2 to S4. The control group will receive bandage application away from uterine dermatomes, from T1 to T4. The primary endpoint is pain during labor. Secondary endpoints are perinatal outcomes and patient satisfaction with the bandage and with her labor. Pain levels will be evaluated on an hourly basis during labor, and intention-to-treat analysis will be performed. Risk ratios and 95% confidence intervals will be calculated. Findings on effectiveness of pain control with no adverse effects to both the mother and neonate are the first step in evaluating the systematic use of Kinesio Taping during labor. Since self-control may affect birthing experience satisfaction, discovering new alternatives for pain control may allow for a better experience. © 2017 John Wiley & Sons Australia, Ltd.

  12. Using Internet Audio to Enhance Online Accessibility

    ERIC Educational Resources Information Center

    Schwartz, Linda Matula

    2004-01-01

    Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…

  13. A multi-center prospective cohort study to evaluate the effect of differential pricing and health systems strengthening on access to medicines and management of hypertension and diabetes in Ghana: A study protocol.

    PubMed

    Mobula, Linda Meta; Sarfo, Stephen; Arthur, Lynda; Burnham, Gilbert; Plange-Rhule, Jacob; Ansong, Daniel; Gavor, Edith; Ofori-Adjei, David

    2018-02-07

    Background: There is evidence to suggest that the prevalence of non-communicable diseases (NCDs), in particular cardiovascular diseases and diabetes, are being recognized as forming a substantial proportion of the burden of disease among populations in Low- and Middle-Income Countries (LMICs).  Access to treatment is likely a key barrier to the control and prevention of NCD outcomes.  Differential pricing, an approach used to price drugs based on the purchasing power of patients in different socioeconomic segments, has been shown to be beneficial and leads to improved access and affordability. Methods: This is a quasi-experimental study, with a pragmatic trial design, to be conducted over the course of three years. A mixed methods design will be used to evaluate the effects of health systems strengthening and differential pricing on the management of diabetes, hypertension and selected cancers in Ghana. A public private partnership was established between all sites that will receive multi-level interventions, including health systems strengthening  and access to medicines interventions. Study populations and sites: Study participants will include individuals with new or recently diagnosed hypertension and diabetes (n=3,300), who present to two major referral hospitals, Komfo Anokye Teaching Hospital and Tamale Teaching Hospital, as well as three district hospitals, namely Kings Medical Centre, Agogo Presbyterian District Hospital, and Atua Government Hospital. Discussion: The objective of this study aims to test approaches intended to improve access to drugs for the treatment of hypertension and diabetes, and improve disease control. Patients with these conditions will benefit from health systems strengthening interventions (education, counseling, improved management of disease), and increased access to innovative medicines via differential pricing. Pilot programs also will facilitate health system strengthening at the participating institutions, which includes

  14. Effectiveness of the 'Home-but not Alone' mobile health application educational programme on parental outcomes: a randomized controlled trial, study protocol.

    PubMed

    Shorey, Shefaly; Ng, Yvonne Peng Mei; Danbjørg, Dorthe Boe; Dennis, Cindy-Lee; Morelius, Evalotte

    2017-01-01

    The aim of this study was to describe a study protocol that evaluates the effectiveness of the 'Home-but not Alone' educational programme delivered via a mobile health application in improving parenting outcomes. The development in mobile-based technology gives us the opportunity to develop an accessible educational programme that can be potentially beneficial to new parents. However, there is a scarcity of theory-based educational programmes that have incorporated technology such as a mobile health application in the early postpartum period. A randomized controlled trial with a two-group pre-test and post-test design. The data will be collected from 118 couples. Eligible parents will be randomly allocated to either a control group (receiving routine care) or an intervention group (routine care plus access to the 'Home-but not Alone' mobile health application. Outcome measures comprise of parenting self-efficacy, social support, parenting satisfaction and postnatal depression. Data will be collected at the baseline (on the day of discharge) and at four weeks postpartum. This will be an empirical study that evaluates a theory-based educational programme delivered via an innovative mobile health application on parental outcomes. Results from this study will enhance parenting self-efficacy, social support and parenting satisfaction, which may then reduce parental risks of postnatal depression. © 2016 John Wiley & Sons Ltd.

  15. Dual sensory loss: development of a dual sensory loss protocol and design of a randomized controlled trial

    PubMed Central

    2013-01-01

    Background Dual sensory loss (DSL) has a negative impact on health and wellbeing and its prevalence is expected to increase due to demographic aging. However, specialized care or rehabilitation programs for DSL are scarce. Until now, low vision rehabilitation does not sufficiently target concurrent impairments in vision and hearing. This study aims to 1) develop a DSL protocol (for occupational therapists working in low vision rehabilitation) which focuses on optimal use of the senses and teaches DSL patients and their communication partners to use effective communication strategies, and 2) describe the multicenter parallel randomized controlled trial (RCT) designed to test the effectiveness and cost-effectiveness of the DSL protocol. Methods/design To develop a DSL protocol, literature was reviewed and content was discussed with professionals in eye/ear care (interviews/focus groups) and DSL patients (interviews). A pilot study was conducted to test and confirm the DSL protocol. In addition, a two-armed international multi-center RCT will evaluate the effectiveness and cost-effectiveness of the DSL protocol compared to waiting list controls, in 124 patients in low vision rehabilitation centers in the Netherlands and Belgium. Discussion This study provides a treatment protocol for rehabilitation of DSL within low vision rehabilitation, which aims to be a valuable addition to the general low vision rehabilitation care. Trial registration Netherlands Trial Register (NTR) identifier: NTR2843 PMID:23941667

  16. A SERS protocol as a potential tool to access 6-mercaptopurine release accelerated by glutathione-S-transferase.

    PubMed

    Wang, Ying; Sun, Jie; Yang, Qingran; Lu, Wenbo; Li, Yan; Dong, Jian; Qian, Weiping

    2015-11-21

    The developed method for monitoring GST, an important drug metabolic enzyme, could greatly facilitate researches on relative biological fields. In this work, we have developed a SERS technique to monitor the absorbance behaviour of 6-mercaptopurine (6-MP) and its glutathione-S-transferase (GST)-accelerated glutathione (GSH)-triggered release behaviour on the surface of gold nanoflowers (GNFs), using the GNFs as excellent SERS substrates. The SERS signal was used as an indicator of absorbance or release of 6-MP on the gold surface. We found that GST can accelerate GSH-triggered release behaviour of 6-MP from the gold surface. We speculated that GST catalyzes nucleophilic GSH to competitively bind with the electrophilic substance 6-MP. Experimental results have proved that the presented SERS protocol can be utilized as an effective tool for accessing the release of anticancer drugs.

  17. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...

  18. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  19. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  20. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  1. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  2. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  3. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  4. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.

  5. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  6. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    NASA Astrophysics Data System (ADS)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  7. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group.

    PubMed

    Pradhan, Menno; Brinkman, Sally A; Beatty, Amanda; Maika, Amelia; Satriawan, Elan; de Ree, Joppe; Hasan, Amer

    2013-08-16

    This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program was developed in collaboration with the World Bank with a total budget of US$127.7 million, and targets an estimated 738,000 children aged 0 to 6 years living in approximately 6,000 poor communities. The aim of the program is to increase access to early childhood services with the secondary aim of improving school readiness. The study is being conducted across nine districts. The baseline survey contained 310 villages, of which 100 were originally allocated to the intervention arm, 20 originally allocated to a 9-month delay staggered start, 100 originally allocated to an 18-month delay staggered start and 90 allocated to a matched control group (no intervention). The study consists of two cohorts, one comprising children aged 12 to 23 months and the other comprising children aged 48 to 59 months at baseline. The data collection instruments include child observations and task/game-based assessments as well as a questionnaire suite, village head questionnaire, service level questionnaires, household questionnaire, and child caretaker questionnaire. The baseline survey was conducted from March to April 2009, midline was conducted from April to August 2010 and endline conducted early 2013. The resultant participation rates at both the district and village levels were 90%. At the child level, the participation rate was 99.92%. The retention rate at the child level at midline was 99.67%. This protocol paper provides a detailed record of the trial design including a discussion regarding difficulties faced with compliance to the randomization, compliance to the dispersion schedule of community block grants, and procurement delays for baseline and midline data collections. Considering the

  8. Quantum CSMA/CD Synchronous Communication Protocol with Entanglement

    NASA Astrophysics Data System (ADS)

    Zhou, Nanrun; Zeng, Binyang; Gong, Lihua

    By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.

  9. Osteopathic manipulative treatment and pain in preterms: study protocol for a randomised controlled trial.

    PubMed

    Cerritelli, Francesco; Cicchitti, Luca; Martelli, Marta; Barlafante, Gina; Renzetti, Cinzia; Pizzolorusso, Gianfranco; Lupacchini, Mariacristina; D'Orazio, Marianna; Marinelli, Benedetta; Cozzolino, Vincenzo; Fusilli, Paola; D'Incecco, Carmine

    2015-03-08

    Recent evidence proved the necessity to improve health care and pain management in newborns. Osteopathic manipulative treatment (OMT) has been largely used to treat painful syndromes as well as term and preterm newborns. Recent studies have demonstrated positive results of osteopathy in reducing length of stay and costs. However, no trials were carried out on pain in newborns. The aim of the present clinical trial is to explore the effectiveness of osteopathic treatment in reducing pain in a sample of preterms. A three-armed single blinded placebo-control randomised controlled trial protocol has been designed to primarily evaluate the extent to which OMT is effective in reducing pain in preterms. One hundred and twenty newborns will be enrolled from one tertiary neonatal intensive care unit in central Italy and randomised in three groups: study, sham and control. The study group will be further prospectively randomised in two subgroups: experienced osteopaths and students. All preterms will receive standard medical care. Osteopathic treatment will be applied to the study group only whilst 'soft touch' will be administer to the sham group only. Newborns will undergo manual sessions once a week for the entire period of hospitalisation. Blinding will be assured for neonatal staff and outcome assessor. Primary outcome will be the mean difference in baseline score changes of PIPP questionnaire between discharge and entry among the three groups. Secondary outcomes will be: mean difference in length of stay and costs between groups. Statistical analyses will use per-protocol analysis method. Missing data will be handled using last observation carried forward imputation technique. The present single blinded randomised controlled trial has been designed to explore potential advantages of OMT in the management of newborns' pain. Currently, based on a patient-centred need-based approach, this research will be looking at the benefit of osteopathic care rather than the efficacy

  10. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  11. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  12. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  13. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  14. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  15. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  16. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  17. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    PubMed

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  18. The spinal stenosis pedometer and nutrition lifestyle intervention (SSPANLI) randomized controlled trial protocol.

    PubMed

    Tomkins-Lane, Christy C; Lafave, Lynne M Z; Parnell, Jill A; Krishnamurthy, Ashok; Rempel, Jocelyn; Macedo, Luciana G; Moriartey, Stephanie; Stuber, Kent J; Wilson, Philip M; Hu, Richard; Andreas, Yvette M

    2013-11-14

    Because of symptoms, people with lumbar spinal stenosis (LSS) are often inactive, and this sedentary behaviour implies risk for diseases including obesity. Research has identified body mass index as the most powerful predictor of function in LSS. This suggests that function may be improved by targeting weight as a modifiable factor. An e-health lifestyle intervention was developed aimed at reducing fat mass and increasing physical activity in people with LSS. The main components of this intervention include pedometer-based physical activity promotion and nutrition education. The Spinal Stenosis Pedometer and Nutrition Lifestyle INTERVENTION (SSPANLI) was developed and piloted with 10 individuals. The protocol for a randomized controlled trail comparing the SSPANLI intervention to usual non-surgical care follows. One hundred six (106) overweight or obese individuals with LSS will be recruited. Baseline and follow-up testing includes dual energy x-ray absorptiometry, blood draw, 3-day food record, 7-day accelerometry, questionnaire, maximal oxygen consumption, neurological exam, balance testing and a Self-Paced Walking Test. During Week 1, the intervention group will receive a pedometer, and a personalized consultation with both a Dietitian and an exercise specialist. For 12 weeks participants will log on to the e-health website to access personal step goals, walking maps, nutrition videos, and motivational quotes. Participants will also have access to in-person Coffee Talk meetings every 3 weeks, and meet with the Dietitian and exercise specialist at week 6. The control group will proceed with usual care for the 12-week period. Follow-up testing will occur at Weeks 13 and 24. This lifestyle intervention has the potential to provide a unique, non-surgical management option for people with LSS. Through decreased fat mass and increased function, we may reduce risk for obesity, chronic diseases of inactivity, and pain. The use of e-health interventions provides an

  19. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    PubMed

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  20. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks

    PubMed Central

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-01-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime. PMID:27706079

  1. The Omega-3 fatty acids (Fish Oils) and Aspirin in Vascular access OUtcomes in REnal Disease (FAVOURED) study: the updated final trial protocol and rationale of post-initiation trial modifications.

    PubMed

    Viecelli, Andrea K; Pascoe, Elaine; Polkinghorne, Kevan R; Hawley, Carmel; Paul-Brent, Peta-Anne; Badve, Sunil V; Cass, Alan; Heritier, Stephane; Kerr, Peter G; Mori, Trevor A; Robertson, Amanda; Seong, Hooi L; Irish, Ashley B

    2015-06-27

    The FAVOURED study is an international multicentre, double-blind, placebo-controlled trial which commenced recruitment in 2008 and examines whether omega-3 polyunsaturated fatty acids (omega-3 PUFAs) either alone or in combination with aspirin will effectively reduce primary access failure of de novo arteriovenous fistulae (AVF) in patients with stage 4 and 5 chronic kidney disease. Publication of new evidence derived from additional studies of clopidogrel and a high screen failure rate due to prevalent aspirin usage prompted an updated trial design. The original trial protocol published in 2009 has undergone two major amendments, which were implemented in 2011. Firstly, the primary outcome 'early thrombosis' at 3 months following AVF creation was broadened to a more clinically relevant outcome of 'AVF access failure'; a composite of thrombosis, AVF abandonment and cannulation failure at 12 months. Secondly, participants unable to cease using aspirin were allowed to be enrolled and randomised to omega-3 PUFAs or placebo. The revised primary aim of the FAVOURED study is to test the hypothesis that omega-3 PUFAs will reduce rates of AVF access failure within 12 months following AVF surgery. The secondary aims are to examine the effect of omega-3 PUFAs and aspirin on the individual components of the primary end-point, to examine the safety of study interventions and assess central venous catheter requirement as a result of access failure. This multicentre international clinical trial was amended to address the clinically relevant question of whether the usability of de novo AVF at 12 months can be improved by the early use of omega-3 PUFAs and to a lesser extent aspirin. This study protocol amendment was made in response to a large trial demonstrating that clopidogrel is effective in safely preventing primary AVF thrombosis, but ineffective at increasing functional patency. Secondly, including patients taking aspirin will enroll a more representative cohort of

  2. Coping with Pain in the Motivational Context of Values: Comparison between an Acceptance-Based and a Cognitive Control-Based Protocol

    ERIC Educational Resources Information Center

    Paez-Blarrina, Marisa; Luciano, Carmen; Gutierrez-Martinez, Olga; Valdivia, Sonsoles; Rodriguez-Valverde, Miguel; Ortega, Jose

    2008-01-01

    This study compares the effect of an acceptance-based protocol (ACT) and a cognitive control-based (CONT) protocol on three measures of pain coping: tolerance, self-report, and believability. Specific methodological controls were employed to further isolate the role of the value of participating in a pain task, compared to previous investigations…

  3. The United States Department Of Agriculture Northeast Area-wide Tick Control Project: history and protocol.

    PubMed

    Pound, Joe Mathews; Miller, John Allen; George, John E; Fish, Durland

    2009-08-01

    The Northeast Area-wide Tick Control Project (NEATCP) was funded by the United States Department of Agriculture (USDA) as a large-scale cooperative demonstration project of the USDA-Agricultural Research Service (ARS)-patented 4-Poster tick control technology (Pound et al. 1994) involving the USDA-ARS and a consortium of universities, state agencies, and a consulting firm at research locations in the five states of Connecticut (CT), Maryland (MD), New Jersey (NJ), New York (NY), and Rhode Island (RI). The stated objective of the project was "A community-based field trial of ARS-patented tick control technology designed to reduce the risk of Lyme disease in northeastern states." Here we relate the rationale and history of the technology, a chronological listing of events leading to implementation of the project, the original protocol for selecting treatment, and control sites, and protocols for deployment of treatments, sampling, assays, data analyses, and estimates of efficacy.

  4. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  5. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  6. Performance assessment of a glucose control protocol in septic patients with an automated intermittent plasma glucose monitoring device.

    PubMed

    Umbrello, M; Salice, V; Spanu, P; Formenti, P; Barassi, A; Melzi d'Eril, G V; Iapichino, G

    2014-10-01

    The optimal level and modality of glucose control in critically ill patients is still debated. A protocolized approach and the use of nearly-continuous technologies are recommended to manage hyperglycemia, hypoglycemia and glycemic variability. We recently proposed a pato-physiology-based glucose control protocol which takes into account patient glucose/carbohydrate intake and insulin resistance. Aim of the present investigation was to assess the performance of our protocol with an automated intermittent plasma glucose monitoring device (OptiScanner™ 5000). OptiScanner™ was used in 6 septic patients, providing glucose measurement every 15' from a side-port of an indwelling central venous catheter. Target level of glucose was 80-150 mg/dL. Insulin infusion and kcal with nutritional support were also recorded. 6 septic patients were studied for 319 h (1277 measurements); 58 [45-65] hours for each patient (measurements/patient: 231 [172-265]). Blood glucose was at target for 93 [90-98]% of study time. Mean plasma glucose was 126 ± 11 mg/dL. Only 3 hypoglycemic episodes (78, 78, 69 mg/dL) were recorded. Glucose variability was limited: plasma glucose coefficient of variation was 11.7 ± 4.0% and plasma glucose standard deviation was 14.3 ± 5.5 mg/dL. The local glucose control protocol achieved satisfactory glucose control in septic patients along with a high degree of safeness. Automated intermittent plasma glucose monitoring seemed useful to assess the performance of the protocol. Copyright © 2013 Elsevier Ltd and European Society for Clinical Nutrition and Metabolism. All rights reserved.

  7. Performance Analysis of Modified Accelerative Preallocation MAC Protocol for Passive Star-Coupled WDMA Networks

    NASA Astrophysics Data System (ADS)

    Yun, Changho; Kim, Kiseon

    2006-04-01

    For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.

  8. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  9. Distributed Multiple Access Control for the Wireless Mesh Personal Area Networks

    NASA Astrophysics Data System (ADS)

    Park, Moo Sung; Lee, Byungjoo; Rhee, Seung Hyong

    Mesh networking technologies for both high-rate and low-rate wireless personal area networks (WPANs) are under development by several standardization bodies. They are considering to adopt distributed TDMA MAC protocols to provide seamless user mobility as well as a good peer-to-peer QoS in WPAN mesh. It has been, however, pointed out that the absence of a central controller in the wireless TDMA MAC may cause a severe performance degradation: e. g., fair allocation, service differentiation, and admission control may be hard to achieve or can not be provided. In this paper, we suggest a new framework of resource allocation for the distributed MAC protocols in WPANs. Simulation results show that our algorithm achieves both a fair resource allocation and flexible service differentiations in a fully distributed way for mesh WPANs where the devices have high mobility and various requirements. We also provide an analytical modeling to discuss about its unique equilibrium and to compute the lengths of reserved time slots at the stable point.

  10. Reducing depressive symptomatology with a smartphone app: study protocol for a randomized, placebo-controlled trial.

    PubMed

    Giosan, Cezar; Cobeanu, Oana; Mogoaşe, Cristina; Szentagotai, Aurora; Mureşan, Vlad; Boian, Rareș

    2017-05-12

    weeks. A short therapist check-in via phone will take place every week. Participants in the delayed-intervention condition will be given access to the app after 6 weeks from randomization. The primary outcome is the level of depressive symptomatology. The intervention delivered through the app to the active condition includes psychoeducational materials and exercises based on CBT for depression, while the placebo intervention uses a sham version of the app (i.e., similar structure of courses and exercises). To our knowledge, this study protocol is the first to test the efficacy of a smartphone app for depressive symptomatology in the form of a randomized controlled trial (RCT) that includes an active placebo condition. As such, this can substantially add to the body of evidence supporting the use of apps designed to decrease depression. ClinicalTrials.gov, identifier: NCT03060200 . Registered on 1 February 2017. The first participant was enrolled on 17 February 2017.

  11. Protocol to the African Charter on the Rights of Women: implications for access to abortion at the regional level.

    PubMed

    Ngwena, Charles G

    2010-08-01

    Article 14(2)(c) of the Protocol to the African Charter on the Rights of Women enjoins States Parties to take appropriate measures "to protect the reproductive rights of women by authorising medical abortion in cases of sexual assault, rape, incest, and where continued pregnancy endangers the mental and physical health of the mother or the life of the mother or the foetus." This paper considers the implications of Article 14 for access to safe, legal abortion. It is submitted that Article 14 has the potential to impact positively on regional abortion law, policy, and practice in 3 main areas. First, it takes forward the global consensus on combating abortion as a major public health danger. Second, it provides African countries with not just an incentive, but also an imperative for reforming abortion laws in a transparent manner. Third, if implemented in the context of a treaty that centers on the equality and non-discrimination of women, Article 14 has the potential to contribute toward transforming access to abortion from a crime and punishment model to a reproductive health model. Copyright 2010 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  12. Increasing the Accessibility of Science for All Students

    ERIC Educational Resources Information Center

    Langley-Turnbaugh, S. J.; Wilson, G.; Lovewell, L.

    2009-01-01

    This paper evaluates the accessibility of selected field and laboratory high school science activities, and provides suggestions for increasing accessibility for students with disabilities. We focused on GLOBE (Global Learning Observations to Benefit the Environment) protocols, specifically the new Seasons and Biomes investigation currently being…

  13. Providing Internet Access to High-Resolution Mars Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMars server is a computer program that provides Internet access to high-resolution Mars images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of Mars. The OnMars server is an implementation of the Open Geospatial Consortium (OGC) Web Map Service (WMS) server. Unlike other Mars Internet map servers that provide Martian data using an Earth coordinate system, the OnMars WMS server supports encoding of data in Mars-specific coordinate systems. The OnMars server offers access to most of the available high-resolution Martian image and elevation data, including an 8-meter-per-pixel uncontrolled mosaic of most of the Mars Global Surveyor (MGS) Mars Observer Camera Narrow Angle (MOCNA) image collection, which is not available elsewhere. This server can generate image and map files in the tagged image file format (TIFF), Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. The OnMars server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  14. Improving access to medicines for non-communicable diseases in rural India: a mixed methods study protocol using quasi-experimental design.

    PubMed

    Prashanth, N S; Elias, Maya Annie; Pati, Manoj Kumar; Aivalli, Praveenkumar; Munegowda, C M; Bhanuprakash, Srinath; Sadhana, S M; Criel, Bart; Bigdeli, Maryam; Devadasan, Narayanan

    2016-08-22

    India has the distinction of financing its healthcare mainly through out-of-pocket expenses by individual families contributing to catastrophic health expenditure and impoverishment. Nearly 70 % of the expenditure is on medicines purchased at private pharmacies. Patients with chronic ailments are especially affected, as they often need lifelong medicines. Over the past years in India, there have been several efforts to improve drug availability at government primary health centres. In this study, we aim to understand health system factors that affect utilisation and access to generic medicines for people with non-communicable diseases. This study aims to understand if (and how) a package of interventions targeting primary health centres and community participation platforms affect utilisation and access to generic medicines for people with non-communicable diseases in the current district context in India. This study will employ a quasi-experimental design and a qualitative theory-driven approach. PHCs will be randomly assigned to one of three arms of the intervention. In one arm, PHCs will receive inputs to optimise service delivery for non-communicable diseases, while the second arm will receive an additional package of interventions to strengthen community participation platforms for improving non-communicable disease care. The third arm will be the control. We will conduct household and facility surveys, before and after the intervention and will estimate the effect of the intervention by difference-in-difference analysis. Sample size for measuring effects was calculated based on obtaining at least 30 households for each primary health centre spread across three distance-based clusters. Primary outcomes include availability and utilisation of medicines at primary health centres and out-of-pocket expenditure for medicines by non-communicable disease households. Focus group discussions with patients and in-depth interviews with health workers will also be

  15. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  16. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  17. Session Types for Access and Information Flow Control

    NASA Astrophysics Data System (ADS)

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.

  18. Performance Analysis of IEEE 802.15.3 MAC Protocol with Different ACK Polices

    NASA Astrophysics Data System (ADS)

    Mehta, S.; Kwak, K. S.

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed, specially, for short range high data rates applications, to coordinate the access to the wireless medium among the competing devices. This paper uses analytical model to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various acknowledgment schemes under different parameters. Also, some important observations are obtained, which can be very useful to the protocol architectures. Finally, we come up with some important research issues to further investigate the possible improvements in the WPAN MAC.

  19. Effects of scapulohumeral rehabilitation protocol on trunk control recovery in patients with subacute stroke: A pilot randomized controlled trial.

    PubMed

    Dell'Uomo, Daniela; Morone, Giovanni; Centrella, Antonio; Paolucci, Stefano; Caltagirone, Carlo; Grasso, Maria Grazia; Traballesi, Marco; Iosa, Marco

    2017-01-01

    Despite upper limb rehabilitation is widely investigated in patients with stroke, the effects of scapulohumeral rehabilitation on trunk stabillization are mainly unknown. To test the effects of scapulohumeral rehabilitation protocol on trunk control recovery in patients with subacute stroke. A pilot randomized controlled trial with two groups of 14 patients each one performing 20 minutes per day, 5 days a week, for 6 weeks in add on to standard therapy. Experimental group performed a specific scapulohumeral rehabilitation protocol aiming to improve trunk competencies whereas control group performed conventional arm rehabilitation. Clinical scale tests and accelerometric evaluations were performed pre- and post-treatment. Experimental groups showed better scores at discharge at Trunk impairment Scale (p < 0.001), Barthel Index (p = 0.024), Trunk Control Test (p = 0.002), Sitting Balance Scale (p = 0.002), but neither at Fugl-Meyer Scale (p = 0.194) nor Modified Ashworth Scale (p = 0.114). Accelerometric analysis showed higher stability of trunk for experimental group especially during static and dynamic items. The recovery of scapulohumeral functions also acts on trunk stabilization post-stroke.

  20. Microbial Groundwater Sampling Protocol for Fecal-Rich Environments

    PubMed Central

    Harter, Thomas; Watanabe, Naoko; Li, Xunde; Atwill, Edward R; Samuels, William

    2014-01-01

    Inherently, confined animal farming operations (CAFOs) and other intense fecal-rich environments are potential sources of groundwater contamination by enteric pathogens. The ubiquity of microbial matter poses unique technical challenges in addition to economic constraints when sampling wells in such environments. In this paper, we evaluate a groundwater sampling protocol that relies on extended purging with a portable submersible stainless steel pump and Teflon® tubing as an alternative to equipment sterilization. The protocol allows for collecting a large number of samples quickly, relatively inexpensively, and under field conditions with limited access to capacity for sterilizing equipment. The protocol is tested on CAFO monitoring wells and considers three cross-contamination sources: equipment, wellbore, and ambient air. For the assessment, we use Enterococcus, a ubiquitous fecal indicator bacterium (FIB), in laboratory and field tests with spiked and blank samples, and in an extensive, multi-year field sampling campaign on 17 wells within 2 CAFOs. The assessment shows that extended purging can successfully control for equipment cross-contamination, but also controls for significant contamination of the well-head, within the well casing and within the immediate aquifer vicinity of the well-screen. Importantly, our tests further indicate that Enterococcus is frequently entrained in water samples when exposed to ambient air at a CAFO during sample collection. Wellbore and air contamination pose separate challenges in the design of groundwater monitoring strategies on CAFOs that are not addressed by equipment sterilization, but require adequate QA/QC procedures and can be addressed by the proposed sampling strategy. PMID:24903186

  1. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  2. The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.

    PubMed

    Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young

    2016-03-01

    Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

  3. Limited school drinking water access for youth

    PubMed Central

    Kenney, Erica L.; Gortmaker, Steven L.; Cohen, Juliana F.W.; Rimm, Eric B.; Cradock, Angie L.

    2016-01-01

    PURPOSE Providing children and youth with safe, adequate drinking water access during school is essential for health. This study utilized objectively measured data to investigate the extent to which schools provide drinking water access that meets state and federal policies. METHODS We visited 59 middle and high schools in Massachusetts during spring 2012. Trained research assistants documented the type, location, and working condition of all water access points throughout each school building using a standard protocol. School food service directors (FSDs) completed surveys reporting water access in cafeterias. We evaluated school compliance with state plumbing codes and federal regulations and compared FSD self-reports of water access with direct observation; data were analyzed in 2014. RESULTS On average, each school had 1.5 (SD: 0.6) water sources per 75 students; 82% (SD: 20) were functioning, and fewer (70%) were both clean and functioning. Less than half of the schools met the federal Healthy Hunger Free Kids Act requirement for free water access during lunch; 18 schools (31%) provided bottled water for purchase but no free water. Slightly over half (59%) met the Massachusetts state plumbing code. FSDs overestimated free drinking water access compared to direct observation (96% FSD-reported versus 48% observed, kappa=0.07, p=0.17). CONCLUSIONS School drinking water access may be limited. In this study, many schools did not meet state or federal policies for minimum student drinking water access. School administrative staff may not accurately report water access. Public health action is needed to increase school drinking water access. IMPLICATIONS AND CONTRIBUTIONS Adolescents’ water consumption is lower than recommended. In a sample of Massachusetts middle and high schools, about half did not meet federal and state minimum drinking water access policies. Direct observation may improve assessments of drinking water access and could be integrated into routine

  4. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  5. Validation of the Tensoval Duo Control II blood pressure monitor for clinic use and self-measurement according to the British Hypertension Society protocol and the European Society of Hypertension International Protocol Revision 2010.

    PubMed

    de Greeff, Annemarie; Shennan, Andrew H

    2013-06-01

    The Tensoval Duo Control II is an automated upper arm device that uses a combination of oscillometric and auscultatory technology to determine blood pressure noninvasively. The accuracy of this device was assessed according to the British Hypertension Society (BHS) protocol and the European Society of Hypertension International Protocol revision 2010 (ESH-IP2) in an adult population. Ethical approval was obtained. Eighty-five and 33 adult individuals, respectively, were recruited to fulfil the requirements of each protocol. Trained observers took nine sequential same-arm measurements alternating between a mercury sphygmomanometer and the device. The device had to achieve at least a B grade for both systolic and diastolic pressures to pass the BHS protocol and had to fulfil the criteria of all three phases of the ESH-IP2 protocol to receive recommendation. The device achieved an A/A grading for the BHS protocol and passed all three phases of the ESH-IP2 protocol. The mean difference±SD for the BHS/ESH protocols, respectively, was -1.8±6.5/-0.7±5.7 mmHg for systolic pressure and 1.9±5.1/2.4±4.5 mmHg for diastolic pressure. The device maintained its A/A grading throughout the low-pressure, medium-pressure and high-pressure ranges. The Tensoval Duo Control II device is recommended for clinical and home use according to both the BHS and the ESH-IP2 standard.

  6. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  7. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  8. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  9. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    PubMed

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  10. Resource use and costs of type 2 diabetes patients receiving managed or protocolized primary care: a controlled clinical trial.

    PubMed

    van der Heijden, Amber A W A; de Bruijne, Martine C; Feenstra, Talitha L; Dekker, Jacqueline M; Baan, Caroline A; Bosmans, Judith E; Bot, Sandra D M; Donker, Gé A; Nijpels, Giel

    2014-06-25

    The increasing prevalence of diabetes is associated with increased health care use and costs. Innovations to improve the quality of care, manage the increasing demand for health care and control the growth of health care costs are needed. The aim of this study is to evaluate the care process and costs of managed, protocolized and usual care for type 2 diabetes patients from a societal perspective. In two distinct regions of the Netherlands, both managed and protocolized diabetes care were implemented. Managed care was characterized by centralized organization, coordination, responsibility and centralized annual assessment. Protocolized care had a partly centralized organizational structure. Usual care was characterized by a decentralized organizational structure. Using a quasi-experimental control group pretest-posttest design, the care process (guideline adherence) and costs were compared between managed (n = 253), protocolized (n = 197), and usual care (n = 333). We made a distinction between direct health care costs, direct non-health care costs and indirect costs. Multivariate regression models were used to estimate differences in costs adjusted for confounding factors. Because of the skewed distribution of the costs, bootstrapping methods (5000 replications) with a bias-corrected and accelerated approach were used to estimate 95% confidence intervals (CI) around the differences in costs. Compared to usual and protocolized care, in managed care more patients were treated according to diabetes guidelines. Secondary health care use was higher in patients under usual care compared to managed and protocolized care. Compared to usual care, direct costs were significantly lower in managed care (€-1.181 (95% CI: -2.597 to -334)) while indirect costs were higher (€ 758 (95% CI: -353 to 2.701), although not significant. Direct, indirect and total costs were lower in protocolized care compared to usual care (though not significantly). Compared to usual care, managed

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. Controlled quantum secure communication protocol with single photons in both polarization and spatial-mode degrees of freedom

    NASA Astrophysics Data System (ADS)

    Wang, Lili; Ma, Wenping

    2016-02-01

    In this paper, we propose a new controlled quantum secure direct communication (CQSDC) protocol with single photons in both polarization and spatial-mode degrees of freedom. Based on the defined local collective unitary operations, the sender’s secret messages can be transmitted directly to the receiver through encoding secret messages on the particles. Only with the help of the third side, the receiver can reconstruct the secret messages. Each single photon in two degrees of freedom can carry two bits of information, so the cost of our protocol is less than others using entangled qubits. Moreover, the security of our QSDC network protocol is discussed comprehensively. It is shown that our new CQSDC protocol cannot only defend the outsider eavesdroppers’ several sorts of attacks but also the inside attacks. Besides, our protocol is feasible since the preparation and the measurement of single photon quantum states in both the polarization and the spatial-mode degrees of freedom are available with current quantum techniques.

  13. Accessing Multi-Dimensional Images and Data Cubes in the Virtual Observatory

    NASA Astrophysics Data System (ADS)

    Tody, Douglas; Plante, R. L.; Berriman, G. B.; Cresitello-Dittmar, M.; Good, J.; Graham, M.; Greene, G.; Hanisch, R. J.; Jenness, T.; Lazio, J.; Norris, P.; Pevunova, O.; Rots, A. H.

    2014-01-01

    Telescopes across the spectrum are routinely producing multi-dimensional images and datasets, such as Doppler velocity cubes, polarization datasets, and time-resolved “movies.” Examples of current telescopes producing such multi-dimensional images include the JVLA, ALMA, and the IFU instruments on large optical and near-infrared wavelength telescopes. In the near future, both the LSST and JWST will also produce such multi-dimensional images routinely. High-energy instruments such as Chandra produce event datasets that are also a form of multi-dimensional data, in effect being a very sparse multi-dimensional image. Ensuring that the data sets produced by these telescopes can be both discovered and accessed by the community is essential and is part of the mission of the Virtual Observatory (VO). The Virtual Astronomical Observatory (VAO, http://www.usvao.org/), in conjunction with its international partners in the International Virtual Observatory Alliance (IVOA), has developed a protocol and an initial demonstration service designed for the publication, discovery, and access of arbitrarily large multi-dimensional images. The protocol describing multi-dimensional images is the Simple Image Access Protocol, version 2, which provides the minimal set of metadata required to characterize a multi-dimensional image for its discovery and access. A companion Image Data Model formally defines the semantics and structure of multi-dimensional images independently of how they are serialized, while providing capabilities such as support for sparse data that are essential to deal effectively with large cubes. A prototype data access service has been deployed and tested, using a suite of multi-dimensional images from a variety of telescopes. The prototype has demonstrated the capability to discover and remotely access multi-dimensional data via standard VO protocols. The prototype informs the specification of a protocol that will be submitted to the IVOA for approval, with an

  14. Systematic Evaluation of the Patient-Reported Outcome (PRO) Content of Clinical Trial Protocols

    PubMed Central

    Kyte, Derek; Duffy, Helen; Fletcher, Benjamin; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; King, Madeleine; Draper, Heather; Ives, Jonathan; Brundage, Michael; Blazeby, Jane; Calvert, Melanie

    2014-01-01

    Background Qualitative evidence suggests patient-reported outcome (PRO) information is frequently absent from clinical trial protocols, potentially leading to inconsistent PRO data collection and risking bias. Direct evidence regarding PRO trial protocol content is lacking. The aim of this study was to systematically evaluate the PRO-specific content of UK National Institute for Health Research (NIHR) Health Technology Assessment (HTA) programme trial protocols. Methods and Findings We conducted an electronic search of the NIHR HTA programme database (inception to August 2013) for protocols describing a randomised controlled trial including a primary/secondary PRO. Two investigators independently reviewed the content of each protocol, using a specially constructed PRO-specific protocol checklist, alongside the ‘Standard Protocol Items: Recommendations for Interventional Trials’ (SPIRIT) checklist. Disagreements were resolved through discussion with a third investigator. 75 trial protocols were included in the analysis. Protocols included a mean of 32/51 (63%) SPIRIT recommendations (range 16–41, SD 5.62) and 11/33 (33%) PRO-specific items (range 4–18, SD 3.56). Over half (61%) of the PRO items were incomplete. Protocols containing a primary PRO included slightly more PRO checklist items (mean 14/33 (43%)). PRO protocol content was not associated with general protocol completeness; thus, protocols judged as relatively ‘complete’ using SPIRIT were still likely to have omitted a large proportion of PRO checklist items. Conclusions The PRO components of HTA clinical trial protocols require improvement. Information on the PRO rationale/hypothesis, data collection methods, training and management was often absent. This low compliance is unsurprising; evidence shows existing PRO guidance for protocol developers remains difficult to access and lacks consistency. Study findings suggest there are a number of PRO protocol checklist items that are not fully

  15. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  16. IP access networks with QoS support

    NASA Astrophysics Data System (ADS)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  17. Dry needling in a manual physiotherapy and therapeutic exercise protocol for patients with chronic mechanical shoulder pain of unspecific origin: a protocol for a randomized control trial.

    PubMed

    Tejera-Falcón, Emma; Toledo-Martel, Nuria Del Carmen; Sosa-Medina, Francisco Manuel; Santana-González, Fátima; Quintana-de la Fe, Miriam Del Pino; Gallego-Izquierdo, Tomás; Pecos-Martín, Daniel

    2017-09-18

    Shoulder pain of musculoskeletal origin is the main cause of upper limb pain of non-traumatic origin. Despite being one of the most common reasons for consultation, there is no established protocol for treatment due to the complexity of its etiology. However, it has been shown that the presence of myofascial trigger points on the shoulder muscles is a common condition associated with patients suffering from shoulder pain. This protocol has been created which describes the design of a randomized controlled trial to evaluate the effectiveness of the inclusion of dry needling (DN) within a protocol of manual physiotherapy and therapeutic exercise in the treatment of chronic shoulder pain of unspecific origin. Thirty-six participants aged 18-65 years will be recruited having mechanical chronic shoulder pain on unspecific origin and meeting the inclusion criteria. These will be randomized to one of two interventions, (i) DN, manual physiotherapy and therapeutic exercise or (ii) sham DN, manual physiotherapy and therapeutic exercise. The protocol will cover 6 weeks of treatment, with a 6-month follow-up. Our main outcome measure will be the Visual Analogue Scale for pain. This is the first study to combine the use of DN, manual physiotherapy and an exercise program with a 6-month follow-up, thus becoming a new contribution to the treatment of chronic shoulder pain, while new lines of research may be established to help determine the effects of DN on chronic shoulder pain and the frequency and proper dosage. International Standard Randomized Controlled Trial Number Register: ISRCTN30604244 ( http://www.controlled-trials.com ) 29 June 2016.

  18. A controlled, before-and-after trial of an urban sanitation intervention to reduce enteric infections in children: research protocol for the Maputo Sanitation (MapSan) study, Mozambique

    PubMed Central

    Brown, Joe; Cumming, Oliver; Bartram, Jamie; Cairncross, Sandy; Ensink, Jeroen; Holcomb, David; Knee, Jackie; Kolsky, Peter; Liang, Kaida; Liang, Song; Nala, Rassul; Norman, Guy; Rheingans, Richard; Stewart, Jill; Zavale, Olimpio; Zuin, Valentina; Schmidt, Wolf-Peter

    2015-01-01

    Introduction Access to safe sanitation in low-income, informal settlements of Sub-Saharan Africa has not significantly improved since 1990. The combination of a high faecal-related disease burden and inadequate infrastructure suggests that investment in expanding sanitation access in densely populated urban slums can yield important public health gains. No rigorous, controlled intervention studies have evaluated the health effects of decentralised (non-sewerage) sanitation in an informal urban setting, despite the role that such technologies will likely play in scaling up access. Methods and analysis We have designed a controlled, before-and-after (CBA) trial to estimate the health impacts of an urban sanitation intervention in informal neighbourhoods of Maputo, Mozambique, including an assessment of whether exposures and health outcomes vary by localised population density. The intervention consists of private pour-flush latrines (to septic tank) shared by multiple households in compounds or household clusters. We will measure objective health outcomes in approximately 760 children (380 children with household access to interventions, 380 matched controls using existing shared private latrines in poor sanitary conditions), at 2 time points: immediately before the intervention and at follow-up after 12 months. The primary outcome is combined prevalence of selected enteric infections among children under 5 years of age. Secondary outcome measures include soil-transmitted helminth (STH) reinfection in children following baseline deworming and prevalence of reported diarrhoeal disease. We will use exposure assessment, faecal source tracking, and microbial transmission modelling to examine whether and how routes of exposure for diarrhoeagenic pathogens and STHs change following introduction of effective sanitation. Ethics Study protocols have been reviewed and approved by human subjects review boards at the London School of Hygiene and Tropical Medicine, the

  19. Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade

    NASA Astrophysics Data System (ADS)

    Graça, S.; Santos, J.; Manso, M. E.

    2004-10-01

    The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.

  20. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  1. Comparison of results of cycles treated with modified mild protocol and short protocol for ovarian stimulation.

    PubMed

    Coelho, F; Aguiar, L F; Cunha, G S P; Cardinot, N; Lucena, E

    2014-01-01

    The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate.

  2. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group

    PubMed Central

    2013-01-01

    Background This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program was developed in collaboration with the World Bank with a total budget of US$127.7 million, and targets an estimated 738,000 children aged 0 to 6 years living in approximately 6,000 poor communities. The aim of the program is to increase access to early childhood services with the secondary aim of improving school readiness. Methods/Design The study is being conducted across nine districts. The baseline survey contained 310 villages, of which 100 were originally allocated to the intervention arm, 20 originally allocated to a 9-month delay staggered start, 100 originally allocated to an 18-month delay staggered start and 90 allocated to a matched control group (no intervention). The study consists of two cohorts, one comprising children aged 12 to 23 months and the other comprising children aged 48 to 59 months at baseline. The data collection instruments include child observations and task/game-based assessments as well as a questionnaire suite, village head questionnaire, service level questionnaires, household questionnaire, and child caretaker questionnaire. The baseline survey was conducted from March to April 2009, midline was conducted from April to August 2010 and endline conducted early 2013. The resultant participation rates at both the district and village levels were 90%. At the child level, the participation rate was 99.92%. The retention rate at the child level at midline was 99.67%. Discussion This protocol paper provides a detailed record of the trial design including a discussion regarding difficulties faced with compliance to the randomization, compliance to the dispersion schedule of community block grants, and procurement delays for baseline and midline

  3. A Message Exchange Protocol in Command and Control Systems Integration, using the JC3IEDM

    DTIC Science & Technology

    2014-06-01

    19TH International Command and Control Research and Technology Symposium C2 Agility: Lessons Learned from Research and Operations. A Message...distribution unlimited 13. SUPPLEMENTARY NOTES Presented at the 18th International Command & Control Research & Technology Symposium (ICCRTS) held 16...presents approaches of integration, compares their technologies , points out their advantages, proposes requirements, and provides the design of a protocol

  4. 15 CFR 784.1 - Complementary access: General information on the purpose of complementary access, affected...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... may be conducted, on a selective basis, to verify the absence of undeclared nuclear material and nuclear related activities at reportable uranium hard-rock mines and ore beneficiation plants (see § 783.1... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS COMPLEMENTARY ACCESS...

  5. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  6. An exercise protocol designed to control energy expenditure for long-term space missions.

    PubMed

    Matsuo, Tomoaki; Ohkawara, Kazunori; Seino, Satoshi; Shimojo, Nobutake; Yamada, Shin; Ohshima, Hiroshi; Tanaka, Kiyoji; Mukai, Chiaki

    2012-08-01

    Astronauts experience weight loss during spaceflight. Future space missions require a more efficient exercise program not only to maintain work efficiency, but also to control increased energy expenditure (EE). When discussing issues concerning EE incurred through exercise, excess post-exercise energy expenditure (EPEE) must also be considered. The aim of this study was to compare the total EE, including EPEE, induced by two types of interval cycling protocols with the total EE of a traditional, continuous cycling protocol. There were 10 healthy men, ages 20 to 31 yr, who completed 3 exercise sessions: sprint interval training (SIT) consisting of 7 sets of 30-s cycling at 120% VO2max with a 15-s rest between each bout; high-intensity interval aerobic training (HIAT) consisting of 3 sets of 3-min cycling at 80-90% VO2max with a 2-min active rest at 50% VO2max; and continuous aerobic training (CAT) consisting of 40 min of cycling at 60-65% VO2max. During each session, resting metabolic rate, exercise EE, and a 180-min post-exercise EE were measured. The EPEEs during the SIT, HIAT, and CAT averaged 32 +/- 19, 21 +/- 16, and 13 +/- 13 kcal, and the total EE for an entire exercise/ rest session averaged 109 +/- 20, 182 +/- 17, and 363 +/- 45 kcal, respectively. While the EPEE after the CAT was significantly less than after the SIT, the total EE with the CAT was the greatest of the three. The SIT and HIAT would be potential protocols to control energy expenditure for long space missions.

  7. Gaining Access to the Internet.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1992-01-01

    Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…

  8. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-01-01

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100

  9. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    PubMed

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  10. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    NASA Astrophysics Data System (ADS)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  11. Evaluation of an internet-based aftercare program to improve vocational reintegration after inpatient medical rehabilitation: study protocol for a cluster-randomized controlled trial.

    PubMed

    Zwerenz, Rüdiger; Gerzymisch, Katharina; Edinger, Jens; Holme, Martin; Knickenberg, Rudolf J; Spörl-Dönch, Sieglinde; Kiwus, Ulrich; Beutel, Manfred E

    2013-01-25

    Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202).

  12. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  13. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Romberger, Jeff

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions.

  14. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Transport Protocol (Transmission Control Protocol/User Datagram Protocol [TCP/UDP]) Analysis

    DTIC Science & Technology

    2015-09-01

    the network Mac8 Medium Access Control ( Mac ) (Ethernet) address observed as destination for outgoing packets subsessionid8 Zero-based index of...15. SUBJECT TERMS tactical networks, data reduction, high-performance computing, data analysis, big data 16. SECURITY CLASSIFICATION OF: 17...Integer index of row cts_deid Device (instrument) Identifier where observation took place cts_collpt Collection point or logical observation point on

  15. Resource use and costs of type 2 diabetes patients receiving managed or protocolized primary care: a controlled clinical trial

    PubMed Central

    2014-01-01

    Background The increasing prevalence of diabetes is associated with increased health care use and costs. Innovations to improve the quality of care, manage the increasing demand for health care and control the growth of health care costs are needed. The aim of this study is to evaluate the care process and costs of managed, protocolized and usual care for type 2 diabetes patients from a societal perspective. Methods In two distinct regions of the Netherlands, both managed and protocolized diabetes care were implemented. Managed care was characterized by centralized organization, coordination, responsibility and centralized annual assessment. Protocolized care had a partly centralized organizational structure. Usual care was characterized by a decentralized organizational structure. Using a quasi-experimental control group pretest-posttest design, the care process (guideline adherence) and costs were compared between managed (n = 253), protocolized (n = 197), and usual care (n = 333). We made a distinction between direct health care costs, direct non-health care costs and indirect costs. Multivariate regression models were used to estimate differences in costs adjusted for confounding factors. Because of the skewed distribution of the costs, bootstrapping methods (5000 replications) with a bias-corrected and accelerated approach were used to estimate 95% confidence intervals (CI) around the differences in costs. Results Compared to usual and protocolized care, in managed care more patients were treated according to diabetes guidelines. Secondary health care use was higher in patients under usual care compared to managed and protocolized care. Compared to usual care, direct costs were significantly lower in managed care (€-1.181 (95% CI: -2.597 to -334)) while indirect costs were higher (€758 (95% CI: -353 to 2.701), although not significant. Direct, indirect and total costs were lower in protocolized care compared to usual care (though not

  16. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Houck, F.; Rosenthal, M.; Wulf, N.

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member Statesmore » and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.« less

  17. Comparison of Results of Cycles Treated with Modified Mild Protocol and Short Protocol for Ovarian Stimulation

    PubMed Central

    Aguiar, L. F.; Cunha, G. S. P.; Cardinot, N.; Lucena, E.

    2014-01-01

    The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate. PMID:25763398

  18. Simple algorithm for improved security in the FDDI protocol

    NASA Astrophysics Data System (ADS)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.

  19. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  20. Clean Quantum and Classical Communication Protocols.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-02

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n-bit strings, showing that (in the absence of preshared entanglement) at most n+3 qubits or n+O(sqrt[n]) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  1. An accessible protocol for solid-phase extraction of N-linked glycopeptides through reductive amination by amine-functionalized magnetic nanoparticles.

    PubMed

    Zhang, Ying; Kuang, Min; Zhang, Lijuan; Yang, Pengyuan; Lu, Haojie

    2013-06-04

    In light of the significance of glycosylation for wealthy biological events, it is important to prefractionate glycoproteins/glycopeptides from complex biological samples. Herein, we reported a novel protocol of solid-phase extraction of glycopeptides through a reductive amination reaction by employing the easily accessible 3-aminopropyltriethoxysilane (APTES)-functionalized magnetic nanoparticles. The amino groups from APTES, which were assembled onto the surface of the nanoparticles through a one-step silanization reaction, could conjugate with the aldehydes from oxidized glycopeptides and, therefore, completed the extraction. To the best of our knowledge, this is the first example of applying the reductive amination reaction into the isolation of glycopeptides. Due to the elimination of the desalting step, the detection limit of glycopeptides was improved by 2 orders of magnitude, compared to the traditional hydrazide chemistry-based solid phase extraction, while the extraction time was shortened to 4 h, suggesting the high sensitivity, specificity, and efficiency for the extraction of N-linked glycopeptides by this method. In the meantime, high selectivity toward glycoproteins was also observed in the separation of Ribonuclease B from the mixtures contaminated with bovine serum albumin. What's more, this technique required significantly less sample volume, as demonstrated in the successful mapping of glycosylation of human colorectal cancer serum with the sample volume as little as 5 μL. Because of all these attractive features, we believe that the innovative protocol proposed here will shed new light on the research of glycosylation profiling.

  2. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  3. Effectiveness of a Technology-Based Supportive Educational Parenting Program on Parental Outcomes in Singapore: Protocol for a Randomized Controlled Trial.

    PubMed

    Shorey, Shefaly; Ng, Yvonne Peng Mei; Siew, An Ling; Yoong, Joanne; Mörelius, Evalotte

    2018-01-10

    Supportive educational programs during the perinatal period are scarce in Singapore. There is no continuity of care available in terms of support from community care nurses in Singapore. Parents are left on their own most of the time, which results in a stressful transition to parenthood. There is a need for easily accessible technology-based educational programs that can support parents during this crucial perinatal period. The aim of this study was to describe the study protocol of a randomized controlled trial on a technology-based supportive educational parenting program. A randomized controlled two-group pretest and repeated posttest experimental design will be used. The study will recruit 118 parents (59 couples) from the antenatal clinics of a tertiary public hospital in Singapore. Eligible parents will be randomly allocated to receive either the supportive educational parenting program or routine perinatal care from the hospital. Outcome measures include parenting self-efficacy, parental bonding, postnatal depression, social support, parenting satisfaction, and cost evaluation. Data will be collected at the antenatal period, immediate postnatal period, and at 1 month and 3 months post childbirth. Recruitment of the study participants commenced in December 2016 and is still ongoing. Data collection is projected to finish within 12 months, by December 2017. This study will identify a potentially clinically useful, effective, and cost-effective supportive educational parenting program to improve parental self-efficacy and bonding in newborn care, which will then improve parents' social support-seeking behaviors, emotional well-being, and satisfaction with parenting. It is hoped that better supported and satisfied parents will consider having more children, which may in turn influence Singapore's ailing birth rate. International Standard Randomized Controlled Trial Number (ISRCTN): 48536064; https://www.isrctn.com/ISRCTN48536064 (Archived by WebCite at http

  4. Venous Access Devices: Clinical Rounds

    PubMed Central

    Matey, Laurl; Camp-Sorrell, Dawn

    2016-01-01

    Nursing management of venous access devices (VADs) requires knowledge of current evidence, as well as knowledge of when evidence is limited. Do you know which practices we do based on evidence and those that we do based on institutional history or preference? This article will present complex VAD infection and occlusion complications and some of the controversies associated with them. Important strategies for identifying these complications, troubleshooting, and evaluating the evidence related to lack of blood return, malposition, infection, access and maintenance protocols, and scope of practice issues are presented. PMID:28083553

  5. Cryotherapy for acute ankle sprains: a randomised controlled study of two different icing protocols.

    PubMed

    Bleakley, C M; McDonough, S M; MacAuley, D C; Bjordal, J

    2006-08-01

    The use of cryotherapy in the management of acute soft tissue injury is largely based on anecdotal evidence. Preliminary evidence suggests that intermittent cryotherapy applications are most effective at reducing tissue temperature to optimal therapeutic levels. However, its efficacy in treating injured human subjects is not yet known. To compare the efficacy of an intermittent cryotherapy treatment protocol with a standard cryotherapy treatment protocol in the management of acute ankle sprains. Sportsmen (n = 44) and members of the general public (n = 45) with mild/moderate acute ankle sprains. Subjects were randomly allocated, under strictly controlled double blind conditions, to one of two treatment groups: standard ice application (n = 46) or intermittent ice application (n = 43). The mode of cryotherapy was standardised across groups and consisted of melting iced water (0 degrees C) in a standardised pack. Function, pain, and swelling were recorded at baseline and one, two, three, four, and six weeks after injury. Subjects treated with the intermittent protocol had significantly (p<0.05) less ankle pain on activity than those using a standard 20 minute protocol; however, one week after ankle injury, there were no significant differences between groups in terms of function, swelling, or pain at rest. Intermittent applications may enhance the therapeutic effect of ice in pain relief after acute soft tissue injury.

  6. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  7. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    NASA Astrophysics Data System (ADS)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  8. The development of the cell cryopreservation protocol with controlled rate thawing.

    PubMed

    Gurina, Tatyana M; Pakhomov, Alexandr V; Polyakova, Anna L; Legach, Evgeniy I; Bozhok, Galyna A

    2016-06-01

    Thawing in the water bath is often considered as a standard procedure. The thermal history of samples thawed in this way is poorly controlled, but cryopreservation and banking of cell-based products require standardization, automation and safety of all the technological stages including thawing. The programmable freezers allow implementation of the controlled cooling as well as the controlled thawing. As the cell damage occurs during the phase transformation that takes place in the cryoprotectant medium in the process of freezing-thawing, the choice of warming rates within the temperature intervals of transformations is very important. The goal of the study was to investigate the influence of warming rates within the intervals of the phase transformations in the DMSO-based cryoprotectant medium on the cell recovery and to develop a cryopreservation protocol with controlled cooling and warming rates. The temperature intervals of phase transformations such as melting of the eutectic mixture of the cryoprotectant solution (MEMCS), melting of the eutectic salt solution (MESS), melting of the main ice mass (MMIM), recrystallization before MEMCS, recrystallization before MESS and recrystallization before MMIM were determined by thermo-mechanical analysis. The biological experiments were performed on the rat testicular interstitial cells (TIC). The highest levels of the cell recovery and metabolic activity after cryopreservation were obtained using the protocol with the high (20 °C/min) warming rate in the temperature intervals of crystallization of the eutectics as well as recrystallizations and the low (1 °C/min) warming rate in the temperature intervals of melting of the eutectics as well as MMIM. The total cell recovery was 65.3 ± 2.1 %, the recovery of the 3-beta-HSD-positive (Leydig) cells was 82.9 ± 1.8 %, the MTT staining was 32.5 ± 0.9 % versus 42.1 ± 1.7 %; 57.4 ± 2.1 % and 24.0 ± 1.1 % respectively, when compared to the thawing in

  9. Information Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study

    ERIC Educational Resources Information Center

    Antony, Laljith

    2016-01-01

    Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…

  10. Recommendations for a service framework to access astronomical archives

    NASA Technical Reports Server (NTRS)

    Travisano, J. J.; Pollizzi, J.

    1992-01-01

    There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit

  11. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  12. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  13. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  14. Minor access control of Hong Kong under the Framework Convention on Tobacco Control.

    PubMed

    Kan, Ming-yue; Lau, Maggie

    2010-05-01

    Asia's tobacco control movement was strengthened owing to the need to fulfill the Framework Convention on Tobacco Control (FCTC). The present study aims to assess the compliance rates of tobacco retailers to the law forbidding the sales of tobacco to minors in Hong Kong before and after the growth of the tobacco control movement brought by the enactment of the newly amended tobacco control law with effect from 2007. The legislation was enacted to fulfill the FCTC. Two waves of territory-wide compliance checks conducted in 2006 and 2008 were compared. The compliance check was conducted using Standard Protocol. The overall compliance rate was still low though it increased from 18.9% in 2006 to 27.0% in 2008. The compliance rate of convenience stores and newspaper stands improved whereas the rate for restaurants, grocery stores and petrol stations worsened. Less tobacco retailing outlets displayed a specified warning sign required in 2008 (33.7%) comparing to 2006 (41.4%). The indoor smoking ban of the FCTC unintentionally changed the cigarette retailing landscape and finally improved the compliance rate. The case study also demonstrated that the Asia region still has much room for improvement in fulfilling the FCTC in term of effective implementation and enforcement. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  15. Non-fragile ?-? control for discrete-time stochastic nonlinear systems under event-triggered protocols

    NASA Astrophysics Data System (ADS)

    Sun, Ying; Ding, Derui; Zhang, Sunjie; Wei, Guoliang; Liu, Hongjian

    2018-07-01

    In this paper, the non-fragile ?-? control problem is investigated for a class of discrete-time stochastic nonlinear systems under event-triggered communication protocols, which determine whether the measurement output should be transmitted to the controller or not. The main purpose of the addressed problem is to design an event-based output feedback controller subject to gain variations guaranteeing the prescribed disturbance attenuation level described by the ?-? performance index. By utilizing the Lyapunov stability theory combined with S-procedure, a sufficient condition is established to guarantee both the exponential mean-square stability and the ?-? performance for the closed-loop system. In addition, with the help of the orthogonal decomposition, the desired controller parameter is obtained in terms of the solution to certain linear matrix inequalities. Finally, a simulation example is exploited to demonstrate the effectiveness of the proposed event-based controller design scheme.

  16. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol.

    PubMed

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.

  17. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  18. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  19. Security Implications of OPC, OLE, DCOM, and RPC in Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2006-01-01

    OPC is a collection of software programming standards and interfaces used in the process control industry. It is intended to provide open connectivity and vendor equipment interoperability. The use of OPC technology simplifies the development of control systems that integrate components from multiple vendors and support multiple control protocols. OPC-compliant products are available from most control system vendors, and are widely used in the process control industry. OPC was originally known as OLE for Process Control; the first standards for OPC were based on underlying services in the Microsoft Windows computing environment. These underlying services (OLE [Object Linking and Embedding],more » DCOM [Distributed Component Object Model], and RPC [Remote Procedure Call]) have been the source of many severe security vulnerabilities. It is not feasible to automatically apply vendor patches and service packs to mitigate these vulnerabilities in a control systems environment. Control systems using the original OPC data access technology can thus inherit the vulnerabilities associated with these services. Current OPC standardization efforts are moving away from the original focus on Microsoft protocols, with a distinct trend toward web-based protocols that are independent of any particular operating system. However, the installed base of OPC equipment consists mainly of legacy implementations of the OLE for Process Control protocols.« less

  20. Expectations, effect and experiences of an easily accessible self-management intervention for people with chronic pain: study protocol for a randomised controlled trial with embedded qualitative study.

    PubMed

    Nøst, Torunn Hatlen; Steinsbekk, Aslak; Bratås, Ola; Grønning, Kjersti

    2016-07-18

    People struggling with chronic pain may benefit from different types of non-pharmacological interventions such as self-management courses. Self-management courses aim to increase participants' skills and knowledge in managing chronic conditions. Community health-care services in Norway have increasingly established Healthy Life Centres (HLCs) to offer easily accessible interventions to people in need of support to better handle a life with chronic illness. The aim of this trial is to investigate the expectations, effect and experience of an easily accessible, group-based self-management course delivered at a HLC for people with chronic pain. This is an open pragmatic two-armed randomised controlled trial with an embedded qualitative study. The intervention is a self-management course comprising education, discussions, exchange of experiences between the participants, and physical movement exercises. The control group is offered a drop-in outdoor physical activity. The intervention period is 6 weeks. The primary outcome is patient activation measured by the patient activation measure (PAM). The secondary outcomes include measures of self-efficacy, pain and quality of life. Data will be collected at baseline, and after 3, 6 and 12 months. Using a mixed linear model, the number needed in each arm to achieve a power of 80 % becomes 55. To allow for dropout, the aim is to include 120 participants. Analysis will be done using mixed linear models. In the embedded qualitative study, we will perform semi-structured face-to-face interviews with a sample from both trial arms before randomisation and after 3 and 12 months. The topics elaborated will be motivation for participation and experiences with the activity related to possible changes in managing and coping with chronic pain. There is need for more knowledge on interventions delivering self-care support in an easily accessible way that aim to reach those in need of this kind of health service. This trial will

  1. Evaluation of an internet-based aftercare program to improve vocational reintegration after inpatient medical rehabilitation: study protocol for a cluster-randomized controlled trial

    PubMed Central

    2013-01-01

    Background Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Methods Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. Discussion We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. Trial registration International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202) PMID:23351836

  2. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  3. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 2: Switches and Environmental Controls. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…

  4. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  5. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  6. Serious gaming during multidisciplinary rehabilitation for patients with complex chronic pain or fatigue complaints: study protocol for a controlled trial and process evaluation

    PubMed Central

    Joosen, Margot C W; Mert, Agali; Zedlitz, Aglaia; Vrijhoef, Hubertus J M

    2017-01-01

    Introduction Many individuals suffer from chronic pain or functional somatic syndromes and face boundaries for diminishing functional limitations by means of biopsychosocial interventions. Serious gaming could complement multidisciplinary interventions through enjoyment and independent accessibility. A study protocol is presented for studying whether, how, for which patients and under what circumstances, serious gaming improves patient health outcomes during regular multidisciplinary rehabilitation. Methods and analysis A mixed-methods design is described that prioritises a two-armed naturalistic quasi-experiment. An experimental group is composed of patients who follow serious gaming during an outpatient multidisciplinary programme at two sites of a Dutch rehabilitation centre. Control group patients follow the same programme without serious gaming in two similar sites. Multivariate mixed-modelling analysis is planned for assessing how much variance in 250 patient records of routinely monitored pain intensity, pain coping and cognition, fatigue and psychopathology outcomes is attributable to serious gaming. Embedded qualitative methods include unobtrusive collection and analyses of stakeholder focus group interviews, participant feedback and semistructured patient interviews. Process analyses are carried out by a systematic approach of mixing qualitative and quantitative methods at various stages of the research. Ethics and dissemination The Ethics Committee of the Tilburg School of Social and Behavioural Sciences approved the research after reviewing the protocol for the protection of patients’ interests in conformity to the letter and rationale of the applicable laws and research practice (EC 2016.25t). Findings will be presented in research articles and international scientific conferences. Trial registration number A prospective research protocol for the naturalistic quasi-experimental outcome evaluation was entered in the Dutch trial register (registration

  7. 40 CFR 766.14 - Contents of protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Contents of protocols. 766.14 Section 766.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.14 Contents of protocols. Protocols...

  8. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  9. Easy Online Access to Helpful Internet Guides.

    ERIC Educational Resources Information Center

    Tuss, Joan

    1993-01-01

    Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)

  10. Tongue pressure profile training for dysphagia post stroke (TPPT): study protocol for an exploratory randomized controlled trial.

    PubMed

    Steele, Catriona M; Bayley, Mark A; Péladeau-Pigeon, Melanie; Stokely, Shauna L

    2013-05-07

    It is estimated that approximately 50% of stroke survivors will experience swallowing difficulty, or dysphagia. The associated sequelae of dysphagia include dehydration, malnutrition, and aspiration pneumonia, all of which have can have serious medical consequences. To improve swallowing safety and efficiency, alternative nutritional intake methods (for example, a feeding tube) or a modified diet texture (such as pureed foods or thickened liquids) may be recommended but these modifications may negatively affect quality of life. An alternative approach to treating dysphagia has emerged over the past few years, targeting stronger lingual muscles through maximal isometric pressure tasks. Although these studies have shown promising results, thin-liquid bolus control continues to be challenging for patients with dysphagia. Previous work investigating lingual pressures when healthy participants swallow has suggested that greater task specificity in lingual exercises may yield improved results with thin liquids. This is a small, exploratory randomized clinical trial being conducted with post-stroke patients 4 to 20 weeks after onset of dysphagia secondary to impaired lingual control. At enrollment, participants are randomly assigned to one of two treatment protocols, either tongue pressure profile training (TPPT) or the control treatment, tongue pressure strength-and-accuracy training (TPSAT). Each treatment protocol consists of 24 sessions of treatment over 8 to 12 weeks with monitoring of tongue pressure as well as a baseline and outcome videofluoroscopic swallowing study. Tongue pressure measures, videofluoroscopic measures, and functional outcome measures will be obtained following training of 60 participants (30 in each condition), to determine whether TPPT yields better outcomes. This study will continue to explore options beyond tube feeding and modified diets for people with neurogenic dysphagia following stroke. Should the novel protocol, TPPT, prove to be more

  11. Cryotherapy for acute ankle sprains: a randomised controlled study of two different icing protocols

    PubMed Central

    Bleakley, C M; McDonough, S M; MacAuley, D C

    2006-01-01

    Background The use of cryotherapy in the management of acute soft tissue injury is largely based on anecdotal evidence. Preliminary evidence suggests that intermittent cryotherapy applications are most effective at reducing tissue temperature to optimal therapeutic levels. However, its efficacy in treating injured human subjects is not yet known. Objective : To compare the efficacy of an intermittent cryotherapy treatment protocol with a standard cryotherapy treatment protocol in the management of acute ankle sprains. Subjects Sportsmen (n  =  44) and members of the general public (n  =  45) with mild/moderate acute ankle sprains. Methods Subjects were randomly allocated, under strictly controlled double blind conditions, to one of two treatment groups: standard ice application (n  =  46) or intermittent ice application (n  =  43). The mode of cryotherapy was standardised across groups and consisted of melting iced water (0°C) in a standardised pack. Function, pain, and swelling were recorded at baseline and one, two, three, four, and six weeks after injury. Results Subjects treated with the intermittent protocol had significantly (p<0.05) less ankle pain on activity than those using a standard 20 minute protocol; however, one week after ankle injury, there were no significant differences between groups in terms of function, swelling, or pain at rest. Conclusion Intermittent applications may enhance the therapeutic effect of ice in pain relief after acute soft tissue injury. PMID:16611722

  12. Analysis of practical backoff protocols for contention resolution with multiple servers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldberg, L.A.; MacKenzie, P.D.

    Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less

  13. A cluster randomized controlled trial of a brief tobacco cessation intervention for low-income communities in India: study protocol.

    PubMed

    Sarkar, Bidyut K; Shahab, Lion; Arora, Monika; Lorencatto, Fabiana; Reddy, K Srinath; West, Robert

    2014-03-01

    India has 275 million adult tobacco users and tobacco use is estimated to contribute to more than a million deaths in the country each year. There is an urgent need to develop and evaluate affordable, practicable and scalable interventions to promote cessation of tobacco use. Because tobacco use is so harmful, an increase of as little as 1 percentage point in long-term quit success rates can have an important public health impact. This protocol paper describes the rationale and methods of a large randomized controlled trial which aims to evaluate the effectiveness of a brief scalable smoking cessation intervention delivered by trained health professionals as an outreach programme in poor urban communities in India. This is a pragmatic, two-arm, community-based cluster randomized controlled trial focused on tobacco users in low-income communities. The treatment arm is a brief intervention comprising brief advice including training in craving control using simple yogic breathing exercises (BA-YBA) and the control arm is very brief advice (VBA). Of a total of 32 clusters, 16 will be allocated to the intervention arm and 16 to the control arm. Each cluster will have 31 participants, making a total of 992 participants. The primary outcome measure will follow the Russell Standard: self-report of sustained abstinence for at least 6 months following the intervention confirmed at the final follow-up by salivary cotinine. This trial will inform national and international policy on delivery of scalable and affordable brief outreach interventions to promote tobacco use cessation in low resource settings where tobacco users have limited access to physicians and medications. © 2014 Society for the Study of Addiction.

  14. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  15. Impact of Chest Pain Protocol with Access to Telemedicine on Implementation of Pharmacoinvasive Strategy in a Private Hospital Network.

    PubMed

    Macedo, Thiago Andrade; de Barros E Silva, Pedro Gabriel Melo; Simões, Sheila Aparecida; Okada, Mariana Yumi; Garcia, José Carlos Teixeira; Sampaio, Marcio Campos; Dantas, Roberto Nery; Oliveira, Roger Pereira; Rocha, Liliane Gomes; da Cunha Lopes, Bernardo Baptista; Frigini, Tiago; Furlan, Valter

    2016-07-01

    Brazilian registries have shown a gap between evidence-based therapies and real treatments. We aim to compare the use of the pharmacoinvasive strategy and mortality in patients with ST elevation myocardial infarction (STEMI) transferred pre- and post-chest pain protocol with access to telemedicine (CPPT) in a private hospital network. A CPPT was implemented in 22 private emergency departments in 2012. Emergency physicians and nurses of all facilities were trained to disseminate the information to comply with a chest pain protocol focusing on reperfusion therapy (pharmacoinvasive strategy) for STEMI. To conduct clinical discussions using telemedicine, a cardiologist from a reference hospital in cardiology (RHC) was available 24 h/day, 7 days/week. Using the database of all consecutive admissions, we compared the data of patients with STEMI transferred to the RHC in 2011 (pre-CPPT) and 2013-2014 (post-CPPT). We included 376 patients (113 pre-CPPT and 263 post-CPPT) with STEMI. All patients admitted in the RHC were transferred from the 22 emergency departments. Comparing pre-CPPT and post-CPPT, we did not find differences regarding age, gender, hypertension, dyslipidemia, diabetes, smoking, previous myocardial infarction, or Killip classification. However, the use of CPPT was associated with a greater use of pharmacoinvasive strategy (55.8% versus 38%; p = 0.002) and a trend toward lower in-hospital mortality (3% versus 8%; p = 0.06). The implementation of a CPPT was associated with a significant increase in the use of pharmacoinvasive strategy in patients with STEMI and a trend toward reduced in-hospital mortality in a private hospital network.

  16. So you think you've designed an effective recruitment protocol?

    PubMed

    Green, Cara; Vandall-Walker, Virginia

    2017-03-22

    Background Recruiting acutely ill patients to participate in research can be challenging. This paper outlines the difficulties the first author encountered in a study and the steps she took to overcome problems with research ethics, gain access to participants and implement a recruitment protocol in multiple hospitals. It also compares these steps with literature related to recruitment. Aim To inform and inspire neophyte researchers about the need for planning and resilience when dealing with recruitment challenges in multiple hospitals. Discussion The multiple enablers and barriers to the successful implementation of a hospital-based study recruitment protocol are explored based on a neophyte researcher's optimistic assumptions about this stage of the study. Conclusions Perseverance, adequately planning for contingencies, and accepting the barriers and challenges to recruitment are essential for completing one's research study and ensuring fulfilment as a researcher. Implications for practice Healthcare students carrying out research require adequate knowledge about conducting hospital-based, patient research to inform their recruitment plan. Maximising control over recruitment, allowing for adequate time to conduct data collection, and maintaining a good work ethic will help to ensure success.

  17. A 24-h helpline for access to expert management advice for food allergy-related anaphylaxis in children: protocol for a pragmatic randomised controlled trial

    PubMed Central

    Kelleher, Maeve M; Hourihane, Jonathan O'B; DunnGalvin, Audrey; Cullinane, Claire; Fitzsimons, John; Sheikh, Aziz

    2012-01-01

    Objectives Anaphylaxis is an important, potentially life-threatening paediatric emergency. It is responsible for considerable morbidity and, in some cases, death. Poor outcomes may be associated with an inability to differentiate between milder and potentially more severe reactions and an associated reluctance to administer self-injectable adrenaline. This study aims to assess the effectiveness of a 24-h telephone access to specialist paediatric allergy expert advice in improving the quality of life of children and their families with potentially life-threatening food allergy (ie, anaphylaxis) compared with usual clinical care. Methods and analysis Children aged less than 16 years with food allergy and who carry an adrenaline autoinjector will be recruited from the Paediatric Allergy Clinic at Cork University Hospital, Ireland and baseline disease-specific quality of life will be ascertained using the validated Food Allergy Quality of Life Questionnaire (FAQLQ). Participants will be randomised for a period of 6 months to the 24-h telephone specialist support line or usual care. The primary outcome measure of interest is a change in FAQLQ scores, which will be assessed at 0, 1 and 6 months postrandomisation. Analysis will be on an intention-to-treat basis using a 2×3 repeated measures within-between analysis of variance. Although lacking power, we will in addition assess the impact of the intervention on a range of relevant process and clinical endpoints. Ethics and dissemination This trial protocol has been approved by the Clinical Research Ethics Committee of the Cork Teaching Hospitals. The findings will be presented at international scientific conferences and will be reported on in the peer-reviewed literature in early 2013. PMID:22893666

  18. User Procedures Standardization for Network Access. NBS Technical Note 799.

    ERIC Educational Resources Information Center

    Neumann, A. J.

    User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…

  19. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  20. Steps toward improving diet and exercise for cancer survivors (STRIDE): a quasi-randomised controlled trial protocol.

    PubMed

    Frensham, Lauren J; Zarnowiecki, Dorota M; Parfitt, Gaynor; Stanley, Rebecca M; Dollman, James

    2014-06-13

    Cancer survivorship rates have increased in developed countries largely due to population ageing and improvements in cancer care. Survivorship is a neglected phase of cancer treatment and is often associated with adverse physical and psychological effects. There is a need for broadly accessible, non-pharmacological measures that may prolong disease-free survival, reduce or alleviate co-morbidities and enhance quality of life. The aim of the Steps TowaRd Improving Diet and Exercise (STRIDE) study is to evaluate the effectiveness of an online-delivered physical activity intervention for increasing walking in cancer survivors living in metropolitan and rural areas of South Australia. This is a quasi-randomised controlled trial. The intervention period is 12-weeks with 3-month follow-up. The trial will be conducted at a university setting and community health services in South Australia. Participants will be insufficiently active and aged 18 years or older. Participants will be randomly assigned to either the intervention or control group. All participants will receive a pedometer but only the intervention group will have access to the STRIDE website where they will report steps, affect and ratings of perceived exertion (RPE) during exercise daily. Researchers will use these variables to individualise weekly step goals to increase walking.The primary outcome measure is steps per day. The secondary outcomes are a) health measures (anthropometric and physiological), b) dietary habits (consumption of core foods and non-core foods) and c) quality of life (QOL) including physical, psychological and social wellbeing. Measures will be collected at baseline, post-intervention and 3-month follow-up. This protocol describes the implementation of a trial using an online resource to assist cancer survivors to become more physically active. It is an innovative tool that uses ratings of perceived exertion and daily affect to create individualised step goals for cancer survivors. The

  1. CDC/1000: a Control Data Corporation remote batch terminal emulator for Hewlett-Packard minicomputers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berg, D.E.

    1981-02-01

    The Control Data Corporation Type 200 User Terminal utilizes a unique communications protocol to provide users with batch mode remote terminal access to Control Data computers. CDC/1000 is a software subsystem that implements this protocol on Hewlett-Packard minicomputers running the Real Time Executive III, IV, or IVB operating systems. This report provides brief descriptions of the various software modules comprising CDC/1000, and contains detailed instructions for integrating CDC/1000 into the Hewlett Packard operating system and for operating UTERM, the user interface program for CDC/1000. 6 figures.

  2. Refinement for fault-tolerance: An aircraft hand-off protocol

    NASA Technical Reports Server (NTRS)

    Marzullo, Keith; Schneider, Fred B.; Dehn, Jon

    1994-01-01

    Part of the Advanced Automation System (AAS) for air-traffic control is a protocol to permit flight hand-off from one air-traffic controller to another. The protocol must be fault-tolerant and, therefore, is subtle -- an ideal candidate for the application of formal methods. This paper describes a formal method for deriving fault-tolerant protocols that is based on refinement and proof outlines. The AAS hand-off protocol was actually derived using this method; that derivation is given.

  3. The Live Access Server Scientific Product Generation Through Workflow Orchestration

    NASA Astrophysics Data System (ADS)

    Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.

    2006-12-01

    The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google

  4. Web-accessible molecular modeling with Rosetta: The Rosetta Online Server that Includes Everyone (ROSIE).

    PubMed

    Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J

    2018-01-01

    The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.

  5. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  6. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    PubMed

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  7. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    PubMed Central

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-01-01

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040

  8. The Xpress Transfer Protocol (XTP): A tutorial (expanded version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  9. A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

    NASA Astrophysics Data System (ADS)

    Alvim, Mário; Chatzikokolakis, Konstantinos; Kawamoto, Yusuke; Palamidessi, Catuscia

    2018-05-01

    In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic choice among different protocols, and its effect on the amount of leakage depends heavily on whether or not this choice is visible to the attacker. In this work, we consider operators for modeling visible and hidden choice in protocol composition, and we study their algebraic properties. We then formalize the interplay between defender and attacker in a game-theoretic framework adapted to the specific issues of QIF, where the payoff is information leakage. We consider various kinds of leakage games, depending on whether players act simultaneously or sequentially, and on whether or not the choices of the defender are visible to the attacker. In the case of sequential games, the choice of the second player is generally a function of the choice of the first player, and his/her probabilistic choice can be either over the possible functions (mixed strategy) or it can be on the result of the function (behavioral strategy). We show that when the attacker moves first in a sequential game with a hidden choice, then behavioral strategies are more advantageous for the defender than mixed strategies. This contrasts with the standard game theory, where the two types of strategies are equivalent. Finally, we establish a hierarchy of these games in terms of their information leakage and provide methods for finding optimal strategies (at the points of equilibrium) for both attacker and defender in the various cases.

  10. Access Control and Processing Studies for Ground Satellite Mobile Communications/Surveillance Systems

    DOT National Transportation Integrated Search

    1974-06-01

    The report synthesizes a set of satellite communications systems configurations to provide services to aircraft flying oceanic routes. These configurations are combined with access control methods to form complete systems. These systems are analyzed ...

  11. Of taps and toilets: quasi-experimental protocol for evaluating community-demand-driven projects.

    PubMed

    Pattanayak, Subhrendu K; Poulos, Christine; Yang, Jui-Chen; Patil, Sumeet R; Wendland, Kelly J

    2009-09-01

    Sustainable and equitable access to safe water and adequate sanitation are widely acknowledged as vital, yet neglected, development goals. Water supply and sanitation (WSS) policies are justified because of the usual efficiency criteria, but also major equity concerns. Yet, to date there are few scientific impact evaluations showing that WSS policies are effective in delivering social welfare outcomes. This lack of an evaluation culture is partly because WSS policies are characterized by diverse mechanisms, broad goals and the increasing importance of decentralized delivery, and partly because programme administrators are unaware of appropriate methods. We describe a protocol for a quasi-experimental evaluation of a community-demand-driven programme for water and sanitation in rural India, which addresses several evaluation challenges. After briefly reviewing policy and implementation issues in the sector, we describe key features of our protocol, including control group identification, pre-post measurement, programme theory, sample sufficiency and robust indicators. At its core, our protocol proposes to combine propensity score matching and difference-in-difference estimation. We conclude by briefly summarizing how quasi-experimental impact evaluations can address key issues in WSS policy design and when such evaluations are needed.

  12. Pilot studies for the North American Soil Geochemical Landscapes Project - Site selection, sampling protocols, analytical methods, and quality control protocols

    USGS Publications Warehouse

    Smith, D.B.; Woodruff, L.G.; O'Leary, R. M.; Cannon, W.F.; Garrett, R.G.; Kilburn, J.E.; Goldhaber, M.B.

    2009-01-01

    In 2004, the US Geological Survey (USGS) and the Geological Survey of Canada sampled and chemically analyzed soils along two transects across Canada and the USA in preparation for a planned soil geochemical survey of North America. This effort was a pilot study to test and refine sampling protocols, analytical methods, quality control protocols, and field logistics for the continental survey. A total of 220 sample sites were selected at approximately 40-km intervals along the two transects. The ideal sampling protocol at each site called for a sample from a depth of 0-5 cm and a composite of each of the O, A, and C horizons. The <2-mm fraction of each sample was analyzed for Al, Ca, Fe, K, Mg, Na, S, Ti, Ag, As, Ba, Be, Bi, Cd, Ce, Co, Cr, Cs, Cu, Ga, In, La, Li, Mn, Mo, Nb, Ni, P, Pb, Rb, Sb, Sc, Sn, Sr, Te, Th, Tl, U, V, W, Y, and Zn by inductively coupled plasma-mass spectrometry and inductively coupled plasma-atomic emission spectrometry following a near-total digestion in a mixture of HCl, HNO3, HClO4, and HF. Separate methods were used for Hg, Se, total C, and carbonate-C on this same size fraction. Only Ag, In, and Te had a large percentage of concentrations below the detection limit. Quality control (QC) of the analyses was monitored at three levels: the laboratory performing the analysis, the USGS QC officer, and the principal investigator for the study. This level of review resulted in an average of one QC sample for every 20 field samples, which proved to be minimally adequate for such a large-scale survey. Additional QC samples should be added to monitor within-batch quality to the extent that no more than 10 samples are analyzed between a QC sample. Only Cr (77%), Y (82%), and Sb (80%) fell outside the acceptable limits of accuracy (% recovery between 85 and 115%) because of likely residence in mineral phases resistant to the acid digestion. A separate sample of 0-5-cm material was collected at each site for determination of organic compounds. A subset

  13. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  14. Evaluating the accessibility and utility of HIV-related point-of-care diagnostics for maternal health in rural South Africa: a study protocol

    PubMed Central

    Mashamba-Thompson, T P; Drain, P K; Sartorius, B

    2016-01-01

    Introduction Poor healthcare access is a major barrier to receiving antenatal care and a cause of high maternal mortality in South Africa (SA). ‘Point-of-care’ (POC) diagnostics is a powerful emerging healthcare approach to improve healthcare access. This study focuses on evaluating the accessibility and utility of POC diagnostics for maternal health in rural SA primary healthcare (PHC) clinics in order to generate a model framework of implementation of POC diagnostics in rural South African clinics. Method and analyses We will use several research methods, including a systematic review, quasi-experiments, survey, key informant interviews and audits. We will conduct a systematic review and experimental study to determine the impact of POC diagnostics on maternal health. We will perform a cross-sectional case study of 100 randomly selected rural primary healthcare clinics in KwaZulu-Natal to measure the context and patterns of POC diagnostics access and usage by maternal health providers and patients. We will conduct interviews with relevant key stakeholders to determine the reasons for POC deficiencies regarding accessibility and utility of HIV-related POC diagnostics for maternal health. We will also conduct a vertical audit to investigate all the quality aspects of POC diagnostic services including diagnostic accuracy in a select number of clinics. On the basis of information gathered, we will propose a model framework for improved implementation of POC diagnostics in rural South African public healthcare clinics. Statistical (Stata-13) and thematic (NVIVO) data analysis will be used in this study. Ethics and dissemination The study protocol was approved by the Ethics Committee of the University of KwaZulu-Natal (BE 484/14) and the KwaZulu-Natal Department of Health based on the Helsinki Declaration (HRKM 40/15). Findings of this study will be disseminated electronically and in print. They will be presented to conferences related to HIV/AIDS, diagnostics

  15. Targeted full energy and protein delivery in critically ill patients: a study protocol for a pilot randomised control trial (FEED Trial).

    PubMed

    Fetterplace, Kate; Deane, Adam M; Tierney, Audrey; Beach, Lisa; Knight, Laura D; Rechnitzer, Thomas; Forsyth, Adrienne; Mourtzakis, Marina; Presneill, Jeffrey; MacIsaac, Christopher

    2018-01-01

    Current guidelines for the provision of protein for critically ill patients are based on incomplete evidence, due to limited data from randomised controlled trials. The present pilot randomised controlled trial is part of a program of work to expand knowledge about the clinical effects of protein delivery to critically ill patients. The primary aim of this pilot study is to determine whether an enteral feeding protocol using a volume target, with additional protein supplementation, delivers a greater amount of protein and energy to mechanically ventilated critically ill patients than a standard nutrition protocol. The secondary aims are to evaluate the potential effects of this feeding strategy on muscle mass and other patient-centred outcomes. This prospective, single-centred, pilot, randomised control trial will include 60 participants who are mechanically ventilated and can be enterally fed. Following informed consent, the participants receiving enteral nutrition in the intensive care unit (ICU) will be allocated using a randomisation algorithm in a 1:1 ratio to the intervention (high-protein daily volume-based feeding protocol, providing 25 kcal/kg and 1.5 g/kg protein) or standard care (hourly rate-based feeding protocol providing 25 kcal/kg and 1 g/kg protein). The co-primary outcomes are the average daily protein and energy delivered to the end of day 15 following randomisation. The secondary outcomes include change in quadriceps muscle layer thickness (QMLT) from baseline (prior to randomisation) to ICU discharge and other nutritional and patient-centred outcomes. This trial aims to examine whether a volume-based feeding protocol with supplemental protein increases protein and energy delivery. The potential effect of such increases on muscle mass loss will be explored. These outcomes will assist in formulating larger randomised control trials to assess mortality and morbidity. Australian New Zealand Clinical Trials Registry (ANZCTR

  16. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  17. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  18. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  19. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  20. Impact of patient access to Internet health records on glaucoma medication: randomized controlled trial.

    PubMed

    Kashiwagi, Kenji; Tsukahara, Shigeo

    2014-01-15

    Glaucoma is one of the leading causes of blindness. Reduction of intraocular pressure is the only proven way to prevent progression of glaucomatous optic neuropathy. The majority of glaucoma patients need to use antiglaucoma ophthalmic solutions over the course of their life. Thus, good adherence and persistency of glaucoma treatment are important factors for better glaucoma care. The purpose of this study was to investigate the impact of an Internet-based glaucoma care support system on glaucoma medication use. Patients were randomly divided into two groups. The non-Internet access (NIA) group consisted of patients who had access to the Internet-based glaucoma care support system during the 4-year period only when they were examined by ophthalmologists. The Internet access (IA) group consisted of patients who had the same Internet-based glaucoma care support system access as the NIA group for the first 2 years following enrollment but who were also given free access to the glaucoma care support system for the remaining 2 years. Changes in glaucoma medication use were investigated. In total, 81 patients in the IA group and 90 patients in the NIA group satisfied the study protocol. The number of antiglaucoma ophthalmic solutions used during the study period significantly increased in the NIA group (P<.03) but not in the IA group. The percentages of patients with unchanged, increased, and decreased antiglaucoma ophthalmic solution use during the study period were 61.1% (55/90), 17.8% (16/90), and 3.3% (3/90), respectively, in the NIA group, and 56.8% (46/81), 8.6% (7/81), and 13.6% (11/81), respectively, in the IA group (P<.001). Internet access significantly shifted from an increasing intraocular pressure trend to a decreasing trend in the IA group (P=.002) among the patients who did not have any medication changes. Allowing patients to browse their medical data may reduce the use and improve the effectiveness of glaucoma medication. UMIN-CTR Clinical Trial Number