Science.gov

Sample records for access control system

  1. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  2. Bibliographic Access and Control System.

    ERIC Educational Resources Information Center

    Kelly, Betsy; And Others

    1982-01-01

    Presents a brief summary of the functions of the Bibliographic Access & Control System (BACS) implemented at the Washington University School of Medicine Library, and outlines the design, development, and uses of the system. Bibliographic control of books and serials and user access to the system are also discussed. (Author/JL)

  3. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  4. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  5. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  6. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  7. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  8. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  9. Speed control system for an access gate

    SciTech Connect

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  10. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... individuals authorized to have unescorted access to the secured area are able to gain entry; (2) Ensure...

  11. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  12. Context-Based E-Health System Access Control Mechanism

    NASA Astrophysics Data System (ADS)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  13. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured...

  14. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  15. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  16. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  17. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  18. Role Based Access Control system in the ATLAS experiment

    NASA Astrophysics Data System (ADS)

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  19. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  20. Access control within military C4ISR systems

    NASA Astrophysics Data System (ADS)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  1. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  2. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  3. Access control and interlock system at the Advanced Photon Source

    SciTech Connect

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  4. Current status of link access control and encryption system

    SciTech Connect

    Springer, E.

    1984-01-01

    The purpose of this project is to develop necessary technologies for the secure protection of data communication networks. Data encryption equipment, using the federal government's Data Encryption Standard (DES) algorithm, was designed and developed. This equipment is the Link Access Control and Encryption (Link ACE) system. It protects unclassified sensitive data transmissions over unprotected lines between central computers and remote terminals. Link ACE units have been installed and are operational in the Department of Energy's Central Personnel Clearance Index (CPCI) system.

  5. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  6. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  7. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  8. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  9. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed. PMID:21751015

  10. Safety systems and access control in the National Ignition Facility.

    PubMed

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  11. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal Register... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published...

  12. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  13. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  14. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  15. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  16. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  17. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  18. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  19. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  20. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  1. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  2. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  3. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  4. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  5. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  6. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  7. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  8. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  9. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  10. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  11. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  12. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  13. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  14. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  15. Discretionary access control in a heterogeneous distributed data base management system

    SciTech Connect

    Wang, C.Y.

    1986-01-01

    An important technical problem in building a distributed database management system (DDBMS) is access control which prevents unauthorized access or malicious destruction of a database. Consider a DDBMS that uses a uniform global data model to integrate the local schemes of existing DBMSs at the sites of a network. The local DBMSs are unchanged, and the DDBMS is implemented as a module on top of the existing DBMSs at each site. The DBMS at each site is expected to retain its autonomy. That is, the local DBMS at each site maintains control of the data stored at that site. Each local DBMS decides for itself if a user (of the local DBMS or of the DDBMS) may access the data it manages. The design of the access control system for the database in such an environment presents several problems. First, the DBMSs at different sites may have different and incompatible access control mechanisms. Second, queries involving data from multiple sites must be processed by the access control mechanisms of multiple and possible different local DBMSs. Coordinating the access control mechanisms of these DBMSs to provide a consistent access control facility to the users of the heterogeneous DDBMS is a difficult task. This research discusses the problem described above. A general architecture for a DDBMS was developed. Data abstraction techniques were adapted to specify the architecture. A formal verification for the specification was completed.

  16. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  17. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  18. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  19. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  20. Generalized access control strategies for integrated services token passing systems

    NASA Astrophysics Data System (ADS)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  1. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  2. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  3. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  4. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  5. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  6. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  7. An Application Instance of Fingerprint Identification in the School Office Access Control System

    NASA Astrophysics Data System (ADS)

    Yu, Lijun

    This paper designs the school office access control system by using the fingerprint identification method, and introduces the software design and the adopted hardware modules. These include fingerprint collection, fingerprint image processing, and fingerprint identification and verification. As proved in the experimental results, this design can fully meet the expectation.

  8. Distributed data access in the LAMPF (Los Alamos Meson Physics Facility) control system

    SciTech Connect

    Schaller, S.C.; Bjorklund, E.A.

    1987-01-01

    We have extended the Los Alamos Meson Physics Facility (LAMPF) control system software to allow uniform access to data and controls throughout the control system network. Two aspects of this work are discussed here. Of primary interest is the use of standard interfaces and standard messages to allow uniform and easily expandable inter-node communication. A locally designed remote procedure call protocol will be described. Of further interest is the use of distributed databases to allow maximal hardware independence in the controls software. Application programs use local partial copies of the global device description database to resolve symbolic device names.

  9. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  10. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  11. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  12. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  13. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2010-01-01

    NASA s Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  14. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  15. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ...The Librarian of Congress announces that the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted...

  16. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ...The Copyright Office makes a nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted...

  17. Privacy-aware access control for video data in intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Vagts, Hauke; Jakoby, Andreas

    2012-06-01

    Surveillance systems became powerful. Objects can be identified and intelligent surveillance services can generate events when a specific situation occurs. Such surveillance services can be organized in a Service Oriented Architecture (SOA) to fulfill surveillance tasks for specific purposes. Therefore the services process information on a high level, e.g., just the position of an object. Video data is still required to visualize a situation to an operator and is required as evidence in court. Processing of personal related and sensitive information threatens privacy. To protect the user and to be compliant with legal requirements it must be ensured that sensitive information can only be processed for a defined propose by specific users or services. This work proposes an architecture for Access Control that enforces the separation of data between different surveillance tasks. Access controls are enforced at different levels: for the users starting the tasks, for the services within the tasks processing data stored in central store or calculated by other services and for sensor related services that extract information out of the raw data and provide them.

  18. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  19. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    NASA Astrophysics Data System (ADS)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  20. The Universal Access System.

    ERIC Educational Resources Information Center

    Scott, Neil G.

    This final report discusses the outcomes of a project that created a Universal Access System (UAS), a system that gives students with disabilities access to the same computers as their classmates. The project developed a new approach in which the needs of the individual with disabilities are handled separately from the computers and other devices…

  1. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  2. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  3. Accessibility Is the Mother of Invention: When It Comes to an Innovative Hand Control System

    ERIC Educational Resources Information Center

    Exceptional Parent, 2007

    2007-01-01

    This article features Sure Grip hand control, an innovative hand control system created by Keith Howell, the President and founder of Howell Ventures LTD. Howell was in his early teens when he experienced an accident that resulted in his quadriplegia. From that point on, Howell set about to manufacture a set of controls that would emulate the…

  4. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  5. On the control, stability, and waiting time in a slotted ALOHA random-access system

    NASA Technical Reports Server (NTRS)

    Ferguson, M. J.

    1975-01-01

    This paper explores some of the boundaries in performance of slotted ALOHA systems by analyzing a simple and almost optimal centrally supervised control. The control results in a very simple Markov chain model and allows an examination of stability, conditional waiting time distribution of transmitting terminals, and many other system measures. The key to the simplicity is to have a probability of successful packet transmission that is independent of the number of transmitting terminals. In considering waiting time, we calculate the mean and other moments of the waiting time of a terminal when it enters the system to find (n - 1) other terminals already there competing for the channel. Under this control, the average time is proportional to n. The control requires exact knowledge of the number of terminals contending for the channel, and hence is not implementable, except as an approximation.

  6. ACCESS: Detector Control and Performance

    NASA Astrophysics Data System (ADS)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  7. Novel implementations of optical switch control module and 3D-CSP for 10 Gbps active optical access system

    NASA Astrophysics Data System (ADS)

    Wakayama, Koji; Okuno, Michitaka; Matsuoka, Yasunobu; Hosomi, Kazuhiko; Sagawa, Misuzu; Sugawara, Toshiki

    2009-11-01

    We propose an optical switch control procedure for high-performance and cost-effective 10 Gbps Active Optical Access System (AOAS) in which optical switches are used instead of optical splitters in PON (Passive Optical Network). We demonstrate the implemented optical switch control module on Optical Switching Unit (OSW) with logic circuits works effectively. We also propose a compact optical 3D-CSP (Chip Scale Package) to achieve the high performance of AOAS without losing cost advantage of PON. We demonstrate the implemented 3D-CSP works effectively.

  8. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  9. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  10. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  11. Automated Computer Access Request System

    NASA Technical Reports Server (NTRS)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  12. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    NASA Astrophysics Data System (ADS)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  13. Performance of a Frequency-Hopped Real-Time Remote Control System in a Multiple Access Scenario

    NASA Astrophysics Data System (ADS)

    Cervantes, Frank

    A recent trend is observed in the context of the radio-controlled aircrafts and automobiles within the hobby grade category and Unmanned Aerial Vehicles (UAV) applications moving to the well-known Industrial, Scientific and Medical (ISM) band. Based on this technological fact, the present thesis evaluates an individual user performance by featuring a multiple-user scenario where several point-to-point co-located real-time Remote Control (RC) applications operate using Frequency Hopping Spread Spectrum (FHSS) as a medium access technique in order to handle interference efficiently. Commercial-off-the-shelf wireless transceivers ready to operate in the ISM band are considered as the operational platform supporting the above-mentioned applications. The impact of channel impairments and of different critical system engineering issues, such as working with real clock oscillators and variable packet duty cycle, are considered. Based on the previous, simulation results allowed us to evaluate the range of variation for those parameters for an acceptable system performance under Multiple Access (MA) environments.

  14. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  15. Controlling Access to Suicide Means

    PubMed Central

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  16. The role of CCTV in today's parking access and revenue control systems.

    PubMed

    Tallent, Karen

    2010-01-01

    This article provides a planning primer for facilities seeking to utilize the increased technical capability and lower costs of today's CCTV systems. The author focuses on the benefits such systems can add to a parking facility, in addition to better security. PMID:20229940

  17. ERIC Data Access System (EDAS).

    ERIC Educational Resources Information Center

    Rao, Pal V.

    The ERIC Data Access System (EDAS) is an information retrieval system developed at Eastern Illinois University to access the Educational Resources Information Center (ERIC) database and make it available to Eastern faculty and students in a convenient and timely fashion. This paper describes briefly why and how Eastern developed and implemented…

  18. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  19. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  20. Satellite multiple access systems for mobile communication

    NASA Technical Reports Server (NTRS)

    Lewis, J. L.

    1979-01-01

    This paper considers multiple access techniques for a mobile radio system which incorporates a geosynchronous orbiting satellite repeater through which mobile terminals communicate. The communication capacities of FDMA, TDMA and CDMA systems are examined for a 4 MHz bandwidth system to serve up to 10,000 users. An FDMA system with multibeam coverage is analyzed in detail. The system includes an order-wire network for demand-access control and reassignment of satellite channels. Satellite and terminal configurations are developed to a block diagram level and system costs and implementation requirements are discussed.

  1. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  2. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  3. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Design and Performance Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic irradiator must have a door or other...

  4. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  5. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  6. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  7. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  8. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  9. What's Hot--and Not--in Card Access Systems.

    ERIC Educational Resources Information Center

    Sturgeon, Julie

    2002-01-01

    Describes four uses of newer card access systems on college campuses: stored value, entitlement, access control, and vending. Discusses the continued reluctance of schools to move to cards containing computer chips rather than simply magnetic stripes. (EV)

  10. Remotely Accessible Management System (RAMS).

    ERIC Educational Resources Information Center

    Wood, Rex

    Oakland Schools, an Intermediate School District for Administration, operates a Remotely Accessible Management System (RAMS). RAMS is composed of over 100 computer programs, each of which performs procedures on the files of the 28 local school districts comprising the constituency of Oakland Schools. This regional service agency covers 900 square…

  11. Application-Defined Decentralized Access Control.

    PubMed

    Xu, Yuanzhong; Dunn, Alan M; Hofmann, Owen S; Lee, Michael Z; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%-9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications' security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  12. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  13. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  14. Integrated semiconductor-magnetic random access memory system

    NASA Technical Reports Server (NTRS)

    Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)

    2001-01-01

    The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.

  15. Fast Access Data Acquisition System

    SciTech Connect

    Dr. Vladimir Katsman

    1998-03-17

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  16. Forseeable Problems in a System of Maximum Access.

    ERIC Educational Resources Information Center

    Pemberton, John de J., Jr.

    A maximum-access cable television system will eliminate some legal and regulatory problems and introduce others. The operator of a system will no longer be responsible for and in control of what is transmitted over his system. With access unlimited and unrestricted, such regulations of content as the "fairness doctrine" and "equal time" become…

  17. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  18. Emergency access authorization for personally controlled online health care data.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2012-02-01

    Personally controlled health records (PCHR) systems have emerged to allow patients to control their own medical data. In a PCHR system, all the access privileges to a patient's data are granted by the patient. However, in many emergency cases, it is impossible for the patient to participate in access authorization on site when immediate medical treatment is needed. To solve the emergency access authorization problem in the absence of patients, we consider two cases: a) the requester is already in the PCHR system but has not obtained the access privilege of the patient's health records, and b) the requester does not even have an account in the PCHR system to submit its request. For each of the two cases, we present a method for emergency access authorization, utilizing the weighted voting and source authentication cryptographic techniques. Our methods provide an effective, secure and private solution for emergency access authorization, that makes the existing PCHR system frameworks more practical and thus improves the patients' experiences of health care when using PCHR systems. We have implemented a prototype system as a proof of concept. PMID:20703719

  19. Data Access System for Hydrology

    NASA Astrophysics Data System (ADS)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  20. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  1. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2010-01-01 2010-01-01 false Access control. 36.23 Section 36.23 Energy...

  2. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy...

  3. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy...

  4. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2014-01-01 2014-01-01 false Access control. 36.23 Section 36.23 Energy...

  5. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  6. Implementing context and team based access control in healthcare intranets.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users. PMID:12507264

  7. A Digitally Addressable Random-Access Image Selector and Random-Access Audio System.

    ERIC Educational Resources Information Center

    Bitzer, Donald L.; And Others

    The requirements of PLATO IV, a computer based education system at the University of Illinois, have led to the development of an improved, digitally addressable, random access image selector and a digitally addressable, random access audio device. Both devices utilize pneumatically controlled mechanical binary adders to position the mecahnical…

  8. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  9. KEKB accelerator control system

    NASA Astrophysics Data System (ADS)

    Akasaka, Nobumasa; Akiyama, Atsuyoshi; Araki, Sakae; Furukawa, Kazuro; Katoh, Tadahiko; Kawamoto, Takashi; Komada, Ichitaka; Kudo, Kikuo; Naito, Takashi; Nakamura, Tatsuro; Odagiri, Jun-ichi; Ohnishi, Yukiyoshi; Sato, Masayuki; Suetake, Masaaki; Takeda, Shigeru; Takeuchi, Yasunori; Yamamoto, Noboru; Yoshioka, Masakazu; Kikutani, Eji

    2003-02-01

    The KEKB accelerator control system including a control computer system, a timing distribution system, and a safety control system are described. KEKB accelerators were installed in the same tunnel where the TRISTAN accelerator was. There were some constraints due to the reused equipment. The control system is based on Experimental Physics and Industrial Control System (EPICS). In order to reduce the cost and labor for constructing the KEKB control system, as many CAMAC modules as possible are used again. The guiding principles of the KEKB control computer system are as follows: use EPICS as the controls environment, provide a two-language system for developing application programs, use VMEbus as frontend computers as a consequence of EPICS, use standard buses, such as CAMAC, GPIB, VXIbus, ARCNET, RS-232 as field buses and use ergonomic equipment for operators and scientists. On the software side, interpretive Python and SAD languages are used for coding application programs. The purpose of the radiation safety system is to protect personnel from radiation hazards. It consists of an access control system and a beam interlock system. The access control system protects people from strong radiation inside the accelerator tunnel due to an intense beam, by controlling access to the beamline area. On the other hand, the beam interlock system prevents people from radiation exposure by interlocking the beam operation. For the convenience of accelerator operation and access control, the region covered by the safety system is divided into three major access control areas: the KEKB area, the PF-AR area, and the beam-transport (BT) area. The KEKB control system required a new timing system to match a low longitudinal acceptance due to a low-alpha machine. This timing system is based on a frequency divider/multiply technique and a digital delay technique. The RF frequency of the KEKB rings and that of the injector Linac are locked with a common divisor frequency. The common

  10. Distributed Access to Administrative Systems.

    ERIC Educational Resources Information Center

    Carson, Eugene

    1987-01-01

    Administrators, faculty, and staff should have electronic access to records needed to perform their jobs, and students should have access to their own records--course registration and addresses. User-directed analysis and reporting are discussed and the security and audit issues are examined. (Author/MLW)

  11. Access control in healthcare: the methodology from legislation to practice.

    PubMed

    Ferreira, Ana; Correia, Ricardo; Chadwick, David; Antunes, Luis

    2010-01-01

    Translating legislation and regulations into access control systems in healthcare is, in practice, not a straightforward task. Excessive regulation can create barriers to appropriate patient treatment. The main objective of this paper is to present a new methodology that can define, from legislation to practice, an access control policy as well as a RBAC model, in order to comprise generic legislation and regulation issues together with the access control needs from the ends users of a healthcare information system. The methodology includes the use of document analysis as well as grounded theory and mixed methods research. This methodology can be easily applied within a healthcare practice or any other domain with similar requirements. It helps to bridge the gap between legislation and end users' needs, while integrating information security into the healthcare processes in a more meaningful way. PMID:20841770

  12. ACCESS Sub-system Performance

    NASA Astrophysics Data System (ADS)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  13. Easy Access: Auditing the System Network

    ERIC Educational Resources Information Center

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  14. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  15. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Control of public access. 420.53 Section....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and unauthorized, unescorted access to explosive hazard facilities or other hazard areas not otherwise...

  16. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  17. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  18. Multilingual Access for Information Systems.

    ERIC Educational Resources Information Center

    Peters, Carol; Sheridan, Paraic

    With the rapid growth of the global information society, the concept of library has evolved to embrace all kinds of information collections, on all kinds of storage media, and using many different access methods. The users of today's information networks and digital libraries, no longer restricted by geographic or spatial boundaries, want to be…

  19. RAPID ACCESS INFORMATION SYSTEM (RAINS)

    EPA Science Inventory

    RAINS has been designed to provide you fast, easy, flexible access to the Region's vast stores of environmental, programmatic, and administrative data and information. RAINS will allow users to approach and interact with this information in an integrated, multi-dimensional contex...

  20. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  1. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  2. Digital Autonomous Terminal Access Communication (DATAC) system

    NASA Astrophysics Data System (ADS)

    Novacki, Stanley M., III

    1987-05-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  3. Digital Autonomous Terminal Access Communication (DATAC) system

    NASA Technical Reports Server (NTRS)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  4. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  5. Embedded systems for supporting computer accessibility.

    PubMed

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol. PMID:26294501

  6. Components of the airport access system

    NASA Technical Reports Server (NTRS)

    1978-01-01

    The organizations and agencies which make up or influence the airport access system are examined. These include the airport, the airline industry, the public and private transit agencies which provide ground access to the airport, and the regulatory agencies which affect all of these organizations and their actions. Each component, with the exception of the regulatory agencies is described in terms of its legal status, its sources of funds, and the nature of its relationship with the other components. Conclusions regarding the system components' effects on airport access and recommendations for changes which appear practical are presented.

  7. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site,...

  8. Common Control System Vulnerability

    SciTech Connect

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  9. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  10. The ISOLDE control system

    NASA Astrophysics Data System (ADS)

    Deloose, I.; Pace, A.

    1994-12-01

    The two CERN isotope separators named ISOLDE have been running on the new Personal Computer (PC) based control system since April 1992. The new architecture that makes heavy use of the commercial software and hardware of the PC market has been implemented on the 1700 geographically distributed control channels of the two separators and their experimental area. Eleven MSDOS Intel-based PCs with approximately 80 acquisition and control boards are used to access the equipment and are controlled from three PCs running Microsoft Windows used as consoles through a Novell Local Area Network. This paper describes the interesting solutions found and discusses the reduced programming workload and costs that have been obtained.

  11. Segmented proportional spacing medium access control protocol for APONs

    NASA Astrophysics Data System (ADS)

    Wang, Hongbin; Yu, Yiqing; Zhou, Dongru; Meng, Bo

    2004-04-01

    Combining asynchronous transfer mode (ATM) over a passive optical network (APON) can provide broadband services as defined by the international telecommunications union (ITU). The medium access control (MAC) layer is of primary importance to the access scheme as in controls the flow of traffic in the access network. This paper presents a novel MAC protocol-segmented proportional spacing MAC protocol, which complies with ITU-T recommendations, is firstly designed for APON system based on the analysis of different type of bandwidth allocation algorithms. The main idea of protocol is: frame structure adopts the structure regulated by ITU; fine time division for the optical network unit (ONU) to apply bandwidth; the bandwidth"s application is not based on the T-interface but ONU, the bandwidth allocation algorithm uses segmented proportional spacing algorithm. At last, we compare our protocol to other MAC protocols, the results show that proportional spacing and segmented bandwidth allocation control the cell jitter with satisfactory and improve the system bandwidth efficiency at same time, the correlative conclusions are given finally.

  12. Space Station multiple access communications system

    NASA Technical Reports Server (NTRS)

    Olson, Nanci A.

    1986-01-01

    The development of a multiple access communications system (MACS) for the space-to-space communications on the Space Station is discussed. The communications capabilities of the FHMA, CDMA, TDMA, SDMA, and FDMA techniques are evaluated; FDMA was selected for the space-to-space communications on the Space Station because of its lower complexity and growth capability. The proposed space-to-space multiple access system for the Space Station is a digitally modulated Ku-band FDMA system with a distributed architecture; this system would transmit on frequencies between 13.4 and 13.7 GHz and receive on frequencies between 14.6 and 14.89 GHz, and the bandwidth will support seven high-data-rate users and 12 low-data-rate users. The IF components and antennas for the MACS are examined. A multiple access breadboard design is described.

  13. Distributed Access View Integrated Database (DAVID) system

    NASA Technical Reports Server (NTRS)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  14. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  15. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control. PMID:20703920

  16. Federal Family Education Loan Information System. Weak Computer Controls Increase Risk of Unauthorized Access to Sensitive Data. Report to the Secretary of Education.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Accounting and Information Management Div.

    This report presents an evaluation of the general controls over the Federal Family Education Loan Program (FFELP) information system maintained and operated by a contractor for the U.S. Department of Education (ED), which administers FFELP. The evaluation found that ED's general controls over the FFELP information system did not adequately protect…

  17. MFTF supervisory control system

    NASA Astrophysics Data System (ADS)

    1980-12-01

    A computerized supervisory control system is being developed for the Mirror Fusion Test Facility. The system includes nine Perkin-Elmer 7/32 and 8/32 computers connected by a block of common core memory (128 kilobytes). The network is a disk designed for reliability and redundancy. If one computer goes down, the local-control micro-processors that it controls are switched to another computer in a matter of seconds. The control consoles permit operators to open and close valves, start or stop pumps, and adjust operating levels. The experiment is controlled by two superconsoles and five satellite consoles. The software, written in PASCAL, contains such subsystems as organizing the computers into a network, operating the consoles and accessing the data base.

  18. A voice password system for access security

    SciTech Connect

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  19. Performance of code division multiple access systems

    NASA Technical Reports Server (NTRS)

    Weber, C. L.; Huth, G. K.; Batson, B. H.

    1980-01-01

    The performance of code division multiple-access (CDMA) systems is determined using direct sequence spectral spreading. Under relatively ideal conditions, the degradation in system performance as a function of the number of users is shown to have a threshold effect. This basic limitation in the number of users of the system is further limited if the powers are unequal. For two users, system performance as a function of their power ratio also has a threshold effect. System performance as a function of the amount of spectral spreading is determined. The performance of both coded and uncoded systems is predicted.

  20. NSLS control system upgrade status

    SciTech Connect

    Smith, J.; Ramamoorthy, S.; Tang, Y.; Flannigan, J.; Sathe, S.; Keane, J.; Krinsky, S.

    1993-07-01

    The NSLS control system initially installed in 1978 has undergone several modifications but the basic system architecture remained relatively unchanged. The need for faster response, increased reliability and better diagnostics made the control system upgrade a priority. Since the NSLS runs continuously, major changes to the control system are difficult. The upgrade plan had to allow continuous incremental changes to the control system without having any detrimental effect on operations. The plan had to provide for immediate improvement in a few key areas, such as data access rates, and be complete in a short time. At present, most accelerator operations utilize the upgraded control system.

  1. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  2. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  3. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  4. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  5. Search Hanford accessible reports electronically system configuration management plan

    SciTech Connect

    White, E.L.

    1995-01-01

    This Software Configuration Management Plan (SCMP) provides the requirements for control of the Search Hanford Accessible Reports Electronically (SHARE) software and documentation. The SHARE system consists of the TOPIC Text Search and Retrieval software and the programs necessary to extract information from other sources to be placed in SHARE.

  6. Obstacle Characterization in a Geocrowdsourced Accessibility System

    NASA Astrophysics Data System (ADS)

    Qin, H.; Aburizaiza, A. O.; Rice, R. M.; Paez, F.; Rice, M. T.

    2015-08-01

    Transitory obstacles - random, short-lived and unpredictable objects - are difficult to capture in any traditional mapping system, yet they have significant negative impacts on the accessibility of mobility- and visually-impaired individuals. These transitory obstacles include sidewalk obstructions, construction detours, and poor surface conditions. To identify these obstacles and assist the navigation of mobility- and visually- impaired individuals, crowdsourced mapping applications have been developed to harvest and analyze the volunteered obstacles reports from local students, faculty, staff, and residents. In this paper, we introduce a training program designed and implemented for recruiting and motivating contributors to participate in our geocrowdsourced accessibility system, and explore the quality of geocrowdsourced data with a comparative analysis methodology.

  7. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  8. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  9. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  10. 42 CFR 431.834 - Access to records: Claims processing assessment systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Access to records: Claims processing assessment... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834 Access to records: Claims processing assessment systems. The agency, upon written request, must...

  11. 50 CFR 600.420 - Control system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Confidentiality of Statistics § 600.420 Control system... statistics required by an FMP. The control system: (1) Identifies those persons who have access to the statistics. (2) Contains procedures to limit access to confidential data to authorized users. (3)...

  12. 50 CFR 600.420 - Control system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Confidentiality of Statistics § 600.420 Control system... statistics required by an FMP. The control system: (1) Identifies those persons who have access to the statistics. (2) Contains procedures to limit access to confidential data to authorized users. (3)...

  13. 50 CFR 600.420 - Control system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Confidentiality of Statistics § 600.420 Control system... statistics required by an FMP. The control system: (1) Identifies those persons who have access to the statistics. (2) Contains procedures to limit access to confidential data to authorized users. (3)...

  14. Science information systems: Archive, access, and retrieval

    NASA Technical Reports Server (NTRS)

    Campbell, William J.

    1991-01-01

    The objective of this research is to develop technology for the automated characterization and interactive retrieval and visualization of very large, complex scientific data sets. Technologies will be developed for the following specific areas: (1) rapidly archiving data sets; (2) automatically characterizing and labeling data in near real-time; (3) providing users with the ability to browse contents of databases efficiently and effectively; (4) providing users with the ability to access and retrieve system independent data sets electronically; and (5) automatically alerting scientists to anomalies detected in data.

  15. Attacking the information access problem with expert systems

    NASA Technical Reports Server (NTRS)

    Ragusa, James M.; Orwig, Gary W.

    1991-01-01

    The results of applications research directed at finding an improved method of storing and accessing information are presented. Twelve microcomputer-based expert systems shells and five laser-optical formats have been studied, and the general and specific methods of interfacing these technologies are being tested in prototype systems. Shell features and interfacing capabilities are discussed, and results from the study of five laser-optical formats are recounted including the video laser, compact, and WORM disks, and laser cards and film. Interfacing, including laser disk device driver interfacing, is discussed and it is pointed out that in order to control the laser device from within the expert systems application, the expert systems shell must be able to access the device driver software. Potential integrated applications are investigated and an initial list is provided including consumer services, travel, law enforcement, human resources, marketing, and education and training.

  16. Decentralized energy systems for clean electricity access

    NASA Astrophysics Data System (ADS)

    Alstone, Peter; Gershenson, Dimitry; Kammen, Daniel M.

    2015-04-01

    Innovative approaches are needed to address the needs of the 1.3 billion people lacking electricity, while simultaneously transitioning to a decarbonized energy system. With particular focus on the energy needs of the underserved, we present an analytic and conceptual framework that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. A historical analysis shows that the present day is a unique moment in the history of electrification where decentralized energy networks are rapidly spreading, based on super-efficient end-use appliances and low-cost photovoltaics. We document how this evolution is supported by critical and widely available information technologies, particularly mobile phones and virtual financial services. These disruptive technology systems can rapidly increase access to basic electricity services and directly inform the emerging Sustainable Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, inclusive energy systems.

  17. Remote access of modem by digital control

    NASA Technical Reports Server (NTRS)

    Lopez, H.

    1976-01-01

    Semiautomated system enables operator to measure overall quality of communications link between console (point A) and far-end location (point B). By transmitting test pattern from point A, receiving it at point B, and transmitting back to point A in loopback, unassisted operator can evaluate overall link performance.

  18. 40 CFR 35.2110 - Access to individual systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Access to individual systems. 35.2110... ASSISTANCE STATE AND LOCAL ASSISTANCE Grants for Construction of Treatment Works § 35.2110 Access to individual systems. Applicants for privately owned individual systems shall provide assurance of access...

  19. 40 CFR 35.2110 - Access to individual systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Access to individual systems. 35.2110... ASSISTANCE STATE AND LOCAL ASSISTANCE Grants for Construction of Treatment Works § 35.2110 Access to individual systems. Applicants for privately owned individual systems shall provide assurance of access...

  20. 42 CFR 495.346 - Access to systems and records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 5 2012-10-01 2012-10-01 false Access to systems and records. 495.346 Section 495... PROGRAM Requirements Specific to the Medicaid Program § 495.346 Access to systems and records. The State agency must allow HHS access to all records and systems operated by the State in support of this...

  1. 45 CFR 95.615 - Access to systems and records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Access to systems and records. 95.615 Section 95... (FFP) Specific Conditions for Ffp § 95.615 Access to systems and records. The State agency must allow the Department access to the system in all of its aspects, including pertinent state staff,...

  2. 45 CFR 95.615 - Access to systems and records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Access to systems and records. 95.615 Section 95... (FFP) Specific Conditions for Ffp § 95.615 Access to systems and records. The State agency must allow the Department access to the system in all of its aspects, including pertinent state staff,...

  3. 42 CFR 495.346 - Access to systems and records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 5 2014-10-01 2014-10-01 false Access to systems and records. 495.346 Section 495... PROGRAM Requirements Specific to the Medicaid Program § 495.346 Access to systems and records. The State agency must allow HHS access to all records and systems operated by the State in support of this...

  4. 42 CFR 495.346 - Access to systems and records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 5 2011-10-01 2011-10-01 false Access to systems and records. 495.346 Section 495... PROGRAM Requirements Specific to the Medicaid Program § 495.346 Access to systems and records. The State agency must allow HHS access to all records and systems operated by the State in support of this...

  5. 45 CFR 95.615 - Access to systems and records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Access to systems and records. 95.615 Section 95... (FFP) Specific Conditions for Ffp § 95.615 Access to systems and records. The State agency must allow the Department access to the system in all of its aspects, including pertinent state staff,...

  6. 42 CFR 495.346 - Access to systems and records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 5 2013-10-01 2013-10-01 false Access to systems and records. 495.346 Section 495... PROGRAM Requirements Specific to the Medicaid Program § 495.346 Access to systems and records. The State agency must allow HHS access to all records and systems operated by the State in support of this...

  7. 45 CFR 95.615 - Access to systems and records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Access to systems and records. 95.615 Section 95... (FFP) Specific Conditions for Ffp § 95.615 Access to systems and records. The State agency must allow the Department access to the system in all of its aspects, including pertinent state staff,...

  8. Multi-access laser communications transceiver system

    NASA Technical Reports Server (NTRS)

    Ross, Monte (Inventor); Lokerson, Donald C. (Inventor); Fitzmaurice, Michael W. (Inventor); Meyer, Daniel D. (Inventor)

    1993-01-01

    A satellite system for optical communications such as a multi-access laser transceiver system. Up to six low Earth orbiting satellites send satellite data to a geosynchronous satellite. The data is relayed to a ground station at the Earth's surface. The earth pointing geosynchronous satellite terminal has no gimbal but has a separate tracking mechanism for tracking each low Earth orbiting satellite. The tracking mechanism has a ring assembly rotatable about an axis coaxial with the axis of the field of view of the geosynchronous satellite and a pivotable arm mounted for pivotal movement on the ring assembly. An optical pickup mechanism at the end of each arm is positioned for optical communication with one of the orbiting satellites by rotation of the ring.

  9. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  10. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  11. Method and device for maximizing memory system bandwidth by accessing data in a dynamically determined order

    NASA Technical Reports Server (NTRS)

    Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Klenke, Robert (Inventor); Schwab, Andrew J. (Inventor); Moyer, Stephen A. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor)

    2000-01-01

    A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.

  12. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  13. The AMSC network control system

    NASA Technical Reports Server (NTRS)

    Garner, William B.

    1990-01-01

    The American Mobile Satellite Corporation (AMSC) is going to construct, launch, and operate a satellite system in order to provide mobile satellite services to the United States. AMSC is going to build, own, and operate a Network Control System (NCS) for managing the communications usage of the satellites, and to control circuit switched access between mobile earth terminals and feeder-link earth stations. An overview of the major NCS functional and performance requirements, the control system physical architecture, and the logical architecture is provided.

  14. Controlling user access to electronic resources without password

    SciTech Connect

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  15. Use of CDMA access technology in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ramasastry, Jay; Wiedeman, Bob

    1995-01-01

    Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.

  16. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  17. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  18. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  19. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  20. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  1. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  2. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... reports.\\10\\ \\1\\ See Exchange Act Release No. 63241 (Nov. 3, 2010), 75 FR 69792 (Nov. 15, 2010) (``Rule... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures...

  3. Online Access to Knowledge: System Design.

    ERIC Educational Resources Information Center

    Meadow, Charles T.; And Others

    1989-01-01

    Reports on design and rationale of Online Access to Knowledge, a computer intermediary developed by Online Access to Knowledge Project to enable users with little or no training or experience in bibliographic searching to conduct their own searches. Topics covered include software design, tutorials and assistance programs, and conclusions based on…

  4. Multiple access capacity trade-offs for a Ka-band personal access satellite system

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled; Motamedi, Masoud

    1990-01-01

    System capability is critical to the economic viability of a personal satellite communication system. Ka band has significant potential to support a high capacity multiple access system because of the availability of bandwidth. System design tradeoffs are performed and multiple access schemes are compared with the design goal of achieving the highest capacity and efficiency. Conclusions regarding the efficiency of the different schemes and the achievable capacities are given.

  5. Nonorthogonal CSK/CDMA with Received-Power Adaptive Access Control Scheme

    NASA Astrophysics Data System (ADS)

    Komuro, Nobuyoshi; Habuchi, Hiromasa; Tsuboi, Toshinori

    The measurements for Multiple Access Interference (MAI) problems and the improvement of the data rate are key issues on the advanced wireless networks. In this paper, the nonorthogonal Code Shift Keying Code Division Multiple Access (CSK/CDMA) with received-power adaptive access control scheme is proposed. In our system, a user who is ready to send measures the received power from other users, and then the user decides whether to transmit or refrain from transmission according to the received power and a pre-decided threshold. Not only overcoming the MAI problems, but our system also improve the throughput performance. The throughput performance of the proposed system is evaluated by theoretical analysis. Consequently, the nonorthogonal CSK/CDMA system improves by applying received-power adaptive access control. It was also found that the throughput performance of the nonorthogonal CSK/CDMA system is better than that of the orthogonal CSK/CDMA system at any Eb/N0. We conclude that the nonorthogonal CSK/CDMA system with received-power adaptive access control scheme is expected to be effective in advanced wireless networks.

  6. Accessibility

    MedlinePlus

    ... www.nlm.nih.gov/medlineplus/accessibility.html MedlinePlus Accessibility To use the sharing features on this page, ... Subscribe to RSS Follow us Disclaimers Copyright Privacy Accessibility Quality Guidelines Viewers & Players MedlinePlus Connect for EHRs ...

  7. Cancer Data Access System (CDAS) | Division of Cancer Prevention

    Cancer.gov

    The Cancer Data Access System (CDAS) is a web portal that facilitates access to PLCO data. Investigators can register with CDAS and request access to data collected through December 31, 2009 for the first 13 years of participation for each subject in the PLCO trial. Newly diagnosed cancers and deaths continue to be collected and will be available in the future. |

  8. Remotely Accessed Vehicle Traffic Management System

    NASA Astrophysics Data System (ADS)

    Al-Alawi, Raida

    2010-06-01

    The ever increasing number of vehicles in most metropolitan cities around the world and the limitation in altering the transportation infrastructure, led to serious traffic congestion and an increase in the travelling time. In this work we exploit the emergence of novel technologies such as the internet, to design an intelligent Traffic Management System (TMS) that can remotely monitor and control a network of traffic light controllers located at different sites. The system is based on utilizing Embedded Web Servers (EWS) technology to design a web-based TMS. The EWS located at each intersection uses IP technology for communicating remotely with a Central Traffic Management Unit (CTMU) located at the traffic department authority. Friendly GUI software installed at the CTMU will be able to monitor the sequence of operation of the traffic lights and the presence of traffic at each intersection as well as remotely controlling the operation of the signals. The system has been validated by constructing a prototype that resembles the real application.

  9. Precision digital control systems

    NASA Astrophysics Data System (ADS)

    Vyskub, V. G.; Rozov, B. S.; Savelev, V. I.

    This book is concerned with the characteristics of digital control systems of great accuracy. A classification of such systems is considered along with aspects of stabilization, programmable control applications, digital tracking systems and servomechanisms, and precision systems for the control of a scanning laser beam. Other topics explored are related to systems of proportional control, linear devices and methods for increasing precision, approaches for further decreasing the response time in the case of high-speed operation, possibilities for the implementation of a logical control law, and methods for the study of precision digital control systems. A description is presented of precision automatic control systems which make use of electronic computers, taking into account the existing possibilities for an employment of computers in automatic control systems, approaches and studies required for including a computer in such control systems, and an analysis of the structure of automatic control systems with computers. Attention is also given to functional blocks in the considered systems.

  10. Propulsive Reaction Control System Model

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Phan, Linh H.; Serricchio, Frederick; San Martin, Alejandro M.

    2011-01-01

    This software models a propulsive reaction control system (RCS) for guidance, navigation, and control simulation purposes. The model includes the drive electronics, the electromechanical valve dynamics, the combustion dynamics, and thrust. This innovation follows the Mars Science Laboratory entry reaction control system design, and has been created to meet the Mars Science Laboratory (MSL) entry, descent, and landing simulation needs. It has been built to be plug-and-play on multiple MSL testbeds [analysis, Monte Carlo, flight software development, hardware-in-the-loop, and ATLO (assembly, test and launch operations) testbeds]. This RCS model is a C language program. It contains two main functions: the RCS electronics model function that models the RCS FPGA (field-programmable-gate-array) processing and commanding of the RCS valve, and the RCS dynamic model function that models the valve and combustion dynamics. In addition, this software provides support functions to initialize the model states, set parameters, access model telemetry, and access calculated thruster forces.

  11. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  12. Control system design method

    DOEpatents

    Wilson, David G.; Robinett, III, Rush D.

    2012-02-21

    A control system design method and concomitant control system comprising representing a physical apparatus to be controlled as a Hamiltonian system, determining elements of the Hamiltonian system representation which are power generators, power dissipators, and power storage devices, analyzing stability and performance of the Hamiltonian system based on the results of the determining step and determining necessary and sufficient conditions for stability of the Hamiltonian system, creating a stable control system based on the results of the analyzing step, and employing the resulting control system to control the physical apparatus.

  13. Concurrency control and recovery on lightweight directory access protocol

    NASA Astrophysics Data System (ADS)

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  14. GCFR plant control system

    SciTech Connect

    Estrine, E.A.; Greiner, H.G.

    1980-05-01

    A plant control system is being designed for a gas-cooled fast breeder reactor (GCFR) demonstration plant. Control analysis is being performed as an integral part of the plant design process to ensure that control requirements are satisfied as the plant design evolves. The load control portion of the plant control system provides stable automatic (closed-loop) control of the plant over the 25% to 100% load range. Simulation results are presented to demonstrate load control system performance. The results show that the plant is controllable at full load with the control system structure selected, but gain scheduling is required to achieve desired performance over the load range.

  15. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  16. Entry control system for large populations

    SciTech Connect

    Merillat, P.D.

    1982-01-01

    An Entry Control System has been developed which is appropriate for use at an installation with a large population requiring access over a large area. This is accomplished by centralizing the data base management and enrollment functions and decentralizing the guard-assisted, positive personnel identification and access functions. Current information pertaining to all enrollees is maintained through user-friendly enrollment stations. These stations may be used to enroll individuals, alter their area access authorizations, change expiration dates, and other similar functions. An audit trail of data base alterations is provided to the System Manager. Decentrailized systems exist at each area to which access is controlled. The central system provides these systems with the necessary entry control information to allow them to operate microprocessor-driven entry control devices. The system is comprised of commercially available entry control components and is structured such that it will be able to incorporate improved devices as technology porogresses. Currently, access is granted to individuals who possess a valid credential, have current access authorization, can supply a memorized personal identification number, and whose physical hand dimensions match their profile obtained during enrollment. The entry control devices report misuses as security violations to a Guard Alarm Display and Assessment System.

  17. RDFacl: A Secure Access Control Model Based on RDF Triple

    NASA Astrophysics Data System (ADS)

    Kim, Jaehoon; Park, Seog

    An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.

  18. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  19. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  20. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  1. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  2. Program Retrieval/Dissemination: A Solid State Random Access System.

    ERIC Educational Resources Information Center

    Weeks, Walter O., Jr.

    The trend toward greater flexibility in educational methods has led to a need for better and more rapid access to a variety of aural and audiovisual resource materials. This in turn has demanded the development of a flexible, reliable system of hardware designed to aid existing distribution methods in providing such access. The system must be…

  3. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  4. Global Access-controlled Transfer e-frame (GATe)

    Energy Science and Technology Software Center (ESTSC)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, asmore » well as provides reporting capabilities.« less

  5. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  6. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  7. Digital wireless control system

    NASA Astrophysics Data System (ADS)

    Smith, R.

    1993-08-01

    The Digital Wireless Control System (DWCS) is designed to initiate high explosives safely while using a wireless remote control system. Numerous safety features have been designed into the fire control system to mitigate the hazards associated with remote initiation of high explosives. These safety features range from a telemetry (TM) fire control status system to mechanical timers and keyed power lockout switches. The environment, safety, and health (ES&H) Standard Operating Procedure (SOP) SP471970 is intended as a guide when working with the DWCS. This report describes the Digital Wireless Control System and outlines each component's theory of operation and its relationship to the system.

  8. 28 CFR 16.98 - Exemption of the Drug Enforcement Administration (DEA) Systems-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Administration (DEA) Systems-limited access. 16.98 Section 16.98 Judicial Administration DEPARTMENT OF JUSTICE... Orders System/Diversion Analysis and Detection System (ARCOS/DADS) (Justice/DEA-003) (2) Controlled... Intelligence Program (Justice/DEA-001). (2) Clandestine Laboratory Seizure System (CLSS) (Justice/DEA-002)....

  9. 28 CFR 16.98 - Exemption of the Drug Enforcement Administration (DEA) Systems-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Administration (DEA) Systems-limited access. 16.98 Section 16.98 Judicial Administration DEPARTMENT OF JUSTICE... Orders System/Diversion Analysis and Detection System (ARCOS/DADS) (Justice/DEA-003) (2) Controlled... Intelligence Program (Justice/DEA-001). (2) Clandestine Laboratory Seizure System (CLSS) (Justice/DEA-002)....

  10. Data extraction from a semi-structured electronic medical record system for outpatients: a model to facilitate the access and use of data for quality control and research.

    PubMed

    Kristianson, Krister J; Ljunggren, Henrik; Gustafsson, Lars L

    2009-12-01

    The use of clinical data from electronic medical records (EMRs) for clinical research and for evaluation of quality of care requires an extraction process. Many efforts have failed because the extracted data seemed to be unstructured, incomplete and ridden by errors. We have developed and tested a concept of extracting semi-structured EMRs (Journal III, Profdoc) data from 776 diabetes patients in a general practice clinic over a 5 year period. We used standard database management techniques commonly applied in clinical research in the pharmaceutical industry to clean up the data and make the data available for statistical analysis. The key problem was difficulties locating the data, as no standard way to enter the data in the EMR system was reinforced. Furthermore, no built-in edit checks to facilitate data entry were available. Laboratory, drug information and diagnostic data could be used directly while other data such as vital signs required much work to locate and become useful. PMID:20007655

  11. ACCESS: Design and Sub-System Performance

    NASA Technical Reports Server (NTRS)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; McCandliss, Stephan R.; Rasucher, Bernard J.; Kimble, Randy A.; Kruk, Jeffrey W.; Pelton, Russell; Mott, D. Brent; Wen, Hiting; Foltz, Roger; Quijada, Manuel A.; Gum, Jeffery S.; Gardner, Jonathan P.; Kahle, Duncan M.; Benford, Dominic J.; Woodgate, Bruce E.; Wright, Edward L.; Feldman, Paul D.; Hart, Murdock; Moos, H. Warren; Reiss, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, W. V.; Sahnow, David J.

    2012-01-01

    Establishing improved spectrophotometric standards is important for a broad range of missions and is relevant to many astrophysical problems. ACCESS, "Absolute Color Calibration Experiment for Standard Stars", is a series of rocket-borne sub-orbital missions and ground-based experiments designed to enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 -1.7 micrometer bandpass.

  12. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  13. Access Control of Cloud Service Based on UCON

    NASA Astrophysics Data System (ADS)

    Danwei, Chen; Xiuli, Huang; Xunyi, Ren

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. This paper introduces cloud computing and cloud service firstly, and then gives cloud services access control model based on UCON and negotiation technologies, and also designs the negotiation module.

  14. Distributed data access and resource management in the D0 SAM system

    SciTech Connect

    Igor V Terekhov; Ruth Pordes; Victoria White et al.

    2001-06-26

    SAM (Sequential Access through Meta-data) is the data access and job management system for the D0 high energy physics experiment at Fermilab. The SAM system is being developed and used to handle the Petabyte-scale experiment data, accessed by hundreds of D0 collaborators scattered around the world. In this paper, we present solutions to some of the distributed data processing problems from the perspective of real experience dealing with mission-critical data. We concentrate on the distributed disk caching, resource management and job control. The system has elements of the Grid Computing and has features applicable to data-intensive computing in general.

  15. Segment alignment control system

    NASA Technical Reports Server (NTRS)

    Aubrun, JEAN-N.; Lorell, Ken R.

    1988-01-01

    The segmented primary mirror for the LDR will require a special segment alignment control system to precisely control the orientation of each of the segments so that the resulting composite reflector behaves like a monolith. The W.M. Keck Ten Meter Telescope will utilize a primary mirror made up of 36 actively controlled segments. Thus the primary mirror and its segment alignment control system are directly analogous to the LDR. The problems of controlling the segments in the face of disturbances and control/structures interaction, as analyzed for the TMT, are virtually identical to those for the LDR. The two systems are briefly compared.

  16. Time division multiplexed orbital angular momentum access system

    NASA Astrophysics Data System (ADS)

    Shi, Jianyang; Fang, Yuan; Chi, Nan

    2016-03-01

    We propose and experimentally demonstrate time division multiplexed orbital angular momentum (OAM) access system to increase transmission capacity and spectral efficiency. In this system, data carried on different time tributaries share the same OAM mode. Multiple time division multiplexed OAM modes are multiplexed to realize two-dimensional (time dimension and OAM dimension) multiplexing. Therefore, the capacity and spectral efficiency of the access system will increase. The orthogonality between optical time division multiplexing (OTDM) and OAM techniques is also verified in our experiment. In a proof-of-concept experiment, 2×5-Gbps return-to-zero signal over OAM mode +4 is transmitted and investigated. The bit error ratio performance after transmission in this system can be smaller than 1×10-9. Results show that the proposed time division multiplexed OAM access system is suitable for future broadband access network.

  17. Intelligent flight control systems

    NASA Technical Reports Server (NTRS)

    Stengel, Robert F.

    1993-01-01

    The capabilities of flight control systems can be enhanced by designing them to emulate functions of natural intelligence. Intelligent control functions fall in three categories. Declarative actions involve decision-making, providing models for system monitoring, goal planning, and system/scenario identification. Procedural actions concern skilled behavior and have parallels in guidance, navigation, and adaptation. Reflexive actions are spontaneous, inner-loop responses for control and estimation. Intelligent flight control systems learn knowledge of the aircraft and its mission and adapt to changes in the flight environment. Cognitive models form an efficient basis for integrating 'outer-loop/inner-loop' control functions and for developing robust parallel-processing algorithms.

  18. New User Interface Capabilities for Control Systems

    SciTech Connect

    Kasemir, Kay

    2009-01-01

    Latest technologies promise new control system User Interface (UI) features and greater interoperability of applications. New developments using Java and Eclipse aim to unify diverse control systems and make communication between applications seamless. Web based user interfaces can improve portability and remote access. Modern programming tools improve efficiency, support testing and facilitate shared code. This paper will discuss new developments aimed at improving control system interfaces and their development environment.

  19. Temperature offset control system

    SciTech Connect

    Fried, M.

    1987-07-28

    This patent describes a temperature offset control system for controlling the operation of both heating and air conditioning systems simultaneously contained within the same premises each of which is set by local thermostats to operate at an appropriate temperature, the offset control system comprising: a central control station having means for presetting an offset temperature range, means for sensing the temperature at a central location, means for comparing the sensed temperature with the offset temperature range, means responsive to the comparison for producing a control signal indicative of whether the sensed temperature is within the offset temperature range or beyond the offset temperature range, and means for transmitting the control signal onto the standard energy lines servicing the premises; and a receiving station respectively associated with each heating and air conditioning system, the receiving stations each comprising means for receiving the same transmitted control signal from the energy lines, and switch means for controlling the energization of the respective system in response to the received control signal. The heating systems and associated local thermostat are disabled by the control signal when the control signal originates from a sensed temperature above the lower end of the offset temperature range. The air conditioning systems and associated thermostats are disabled by the same control signal when the control signal originates from a sensed temperature below the upper end of the offset temperature range.

  20. Intermittent Control Systems

    ERIC Educational Resources Information Center

    Montgomery, Thomas L.; And Others

    1975-01-01

    The technique of intermittent control systems for air quality control as developed and used by the Tennessee Valley Authority is investigated. Although controversial, all Tennessee Valley Authority sulfur dioxide elimination programs are scheduled to be operational this year. Existing or anticipated intermittent control systems are identified. (BT)

  1. Automated Serials Control System.

    ERIC Educational Resources Information Center

    Pan, Elizabeth

    In 1967, the New York State Library at Albany (NYSL) developed a tape-oriented, off-line serials control system for 10,000 active titles. The system would perform all the serials control functions: bibliographic control, check-in of current receipts, claiming for gaps in receipts and late issues, binding notification for completed sets,…

  2. JT-60 Control System

    SciTech Connect

    Yonekawa, I.; Kawamata, Y.; Totsuka, T.; Akasaka, H.; Sueoka, M.; Kurihara, K.; Kimura, T.

    2002-09-15

    The present status of the JT-60U control system is reported including its original design concept, the progress of the system, and various modifications since the JT-60 upgrade. This control system has features of a functionally distributed and hierarchical structure, using CAMAC interfaces initially, which have been replaced by versatile module Europe (VME)-bus interfaces, and a protective interlock system composed of both software and hard-wired interlock logics. Plant monitoring and control are performed by efficient data communication through CAMAC highways and Ethernet with TCP/IP protocols. Sequential control of plasma discharges is executed by a combination of a remodeled VME-bus system and a timing system. A real-time plasma control system and a human interface system have been continuously modified corresponding to the progress of JT-60U experiments.

  3. Efficient Service Delivery for High-speed Railway Communications Using MIMO and Access Control Technique

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2014-07-01

    In order to realize the notion of "anytime, anywhere" communication for high-speed train passengers, the Long Term Evolution for Railway is designed to provide broadband accesses and reliable communications for high-speed train passengers. However, with the increase of train speed, the system is subject to high bit error rate, Doppler frequency shift, and call drops. This paper is trying to solve these problems by employing the Multiple-Input Multiple-Output technique and access control schemes. The goal is to provide higher quality of services such as data rate, reliability, and delay for train passengers. Physical layer performance analysis and access control schemes are proposed in a two-hop model. Handovers and service types are also considered. Simulation results show that proposed models and schemes perform better in improving the quality of services.

  4. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  5. BCH codes for large IC random-access memory systems

    NASA Technical Reports Server (NTRS)

    Lin, S.; Costello, D. J., Jr.

    1983-01-01

    In this report some shortened BCH codes for possible applications to large IC random-access memory systems are presented. These codes are given by their parity-check matrices. Encoding and decoding of these codes are discussed.

  6. Man-computer Inactive Data Access System (McIDAS). [design, development, fabrication, and testing

    NASA Technical Reports Server (NTRS)

    1973-01-01

    A technical description is given of the effort to design, develop, fabricate, and test the two dimensional data processing system, McIDAS. The system has three basic sections: an access and data archive section, a control section, and a display section. Areas reported include hardware, system software, and applications software.

  7. Toward Federated Security and Data Access Control within a Services Oriented Architecture for Publishing Hydrologic Data

    NASA Astrophysics Data System (ADS)

    Horsburgh, J. S.; Tarboton, D. G.; Schreuders, K.; Patil, K. S.

    2010-12-01

    Academic researchers who manage experimental watersheds, observatories, and research sites need the ability to effectively collect, manage, and publish hydrologic data. This often requires the ability to control and document access to the data. One current mechanism for publishing data from experimental sites uses the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) Hydrologic Information System (HIS). The CUAHSI HIS Project has developed a software stack called HydroServer for publishing hydrologic data. HydroServer relies on a standard relational database schema for storing hydrologic observations, called the Observations Data Model (ODM), a standard set of web services for publishing observations stored in an ODM database, called WaterOneFlow, and a standard XML schema for exchanging hydrologic observations data, called Water Markup Language (WaterML). These standards make is possible for disparate investigators to publish their data as web services within a federated network of HydroServers. Once a HydroServer is operational, all Internet users can access all of the data on the server, with no requirement for users to identify themselves, or restriction on what can be accessed. There are a number of situations where data producers want to take advantage of the organization and functionality that ODM and the HydroServer software stack provides, but without providing unrestricted and unlogged access to all of the data that they are putting on their server. These include the desire of academic data collectors to: 1) control who can access/download data; 2) publish research results based on data before the data are released to the general public; 3) keep track of who is downloading and using their data to evaluate and document its impact on the community; 4) have and use a data use/access agreement and ensure that they get credit and appropriate citation for the data that they publish; 5) expose the best or highest quality data

  8. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  9. Advanced multiple access concepts in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ananasso, Fulvio

    1990-01-01

    Some multiple access strategies for Mobile Satellite Systems (MSS) are discussed. These strategies were investigated in the context of three separate studies conducted for the International Maritime Satellite Organization (INMARSAT) and the European Space Agency (ESA). Satellite-Switched Frequency Division Multiple Access (SS-FDMA), Code Division Multiple Access (CDMA), and Frequency-Addressable Beam architectures are addressed, discussing both system and technology aspects and outlining advantages and drawbacks of either solution with associated relevant hardware issues. An attempt is made to compare the considered option from the standpoint of user terminal/space segment complexity, synchronization requirements, spectral efficiency, and interference rejection.

  10. Cancer Data Access System (CDAS) | Division of Cancer Prevention

    Cancer.gov

    The Cancer Data Access System (CDAS) is a submission and tracking system for the use of data from the National Lung Screening Trial (NLST) and the Prostate, Lung, Colorectal and Ovarian (PLCO) Cancer Screening Trial.Interested investigators can register with CDAS and request access to data from either screening trial. All requests are reviewed by NCI trial leadership. Upon approval, investigators will be granted access to the requested data for a limited period. | Submission and tracking for data from the National Lung Screening Trial (NLST) and the Prostate, Lung, Colorectal and Ovarian Cancer Screening Trial (PLCO).

  11. Intelligent Control Systems Research

    NASA Technical Reports Server (NTRS)

    Loparo, Kenneth A.

    1994-01-01

    Results of a three phase research program into intelligent control systems are presented. The first phase looked at implementing the lowest or direct level of a hierarchical control scheme using a reinforcement learning approach assuming no a priori information about the system under control. The second phase involved the design of an adaptive/optimizing level of the hierarchy and its interaction with the direct control level. The third and final phase of the research was aimed at combining the results of the previous phases with some a priori information about the controlled system.

  12. Control and optimization system

    DOEpatents

    Xinsheng, Lou

    2013-02-12

    A system for optimizing a power plant includes a chemical loop having an input for receiving an input parameter (270) and an output for outputting an output parameter (280), a control system operably connected to the chemical loop and having a multiple controller part (230) comprising a model-free controller. The control system receives the output parameter (280), optimizes the input parameter (270) based on the received output parameter (280), and outputs an optimized input parameter (270) to the input of the chemical loop to control a process of the chemical loop in an optimized manner.

  13. The ILC control system.

    SciTech Connect

    Carwardine, J.; Saunders, C.; Arnold, N.; Lenkszus, F.; Rehlich, K.; Simrock, S.; Banerjee, b.; Chase, B.; Gottschalk, E.; Joireman, P.; Kasley, P.; Lackey, S.; McBride, P.; Pavlicek, V.; Patrick, J.; Votava, M.; Wolbers, S.; Furukawa, K.; Michizono, S.; Larson, R.S.; Downing, R.; DESY; FNAL; SLAC

    2007-01-01

    Since the last ICALEPCS, a small multi-region team has developed a reference design model for a control system for the International Linear Collider as part of the ILC Global Design Effort. The scale and performance parameters of the ILC accelerator require new thinking in regards to control system design. Technical challenges include the large number of accelerator systems to be controlled, the large scale of the accelerator facility, the high degree of automation needed during accelerator operations, and control system equipment requiring 'Five Nines' availability. The R&D path for high availability touches the control system hardware, software, and overall architecture, and extends beyond traditional interfaces into the technical systems. Software considerations for HA include fault detection through exhaustive out-of-band monitoring and automatic state migration to redundant systems, while the telecom industry's emerging ATCA standard - conceived, specified, and designed for High Availability - is being evaluated for suitability for ILC front-end electronics.

  14. Increasing software testability with standard access and control interfaces

    NASA Technical Reports Server (NTRS)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  15. Torque control system

    NASA Technical Reports Server (NTRS)

    Studenick, D. K.; Tyler, A. L.; Squillari, W.

    1975-01-01

    System stabilizes aximuth of gondolas which are carried by high-altitude balloons as platforms for tracking telescopes. When telescopes must be constantly aimed at specific targets, control system stabilizes gondola to within 5 arc-seconds.

  16. Controlled Access under Review: Improving the Governance of Genomic Data Access.

    PubMed

    Shabani, Mahsa; Dyke, Stephanie O M; Joly, Yann; Borry, Pascal

    2015-12-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  17. Controlled Access under Review: Improving the Governance of Genomic Data Access

    PubMed Central

    Shabani, Mahsa; Dyke, Stephanie O. M.; Joly, Yann; Borry, Pascal

    2015-01-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  18. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  19. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  20. 28 CFR 25.6 - Accessing records in the system.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...: (1) Providing information to Federal, state, or local criminal justice agencies in connection with... Section 25.6 Judicial Administration DEPARTMENT OF JUSTICE DEPARTMENT OF JUSTICE INFORMATION SYSTEMS The National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs...

  1. 28 CFR 25.6 - Accessing records in the system.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...: (1) Providing information to Federal, state, or local criminal justice agencies in connection with... Section 25.6 Judicial Administration DEPARTMENT OF JUSTICE DEPARTMENT OF JUSTICE INFORMATION SYSTEMS The National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs...

  2. 28 CFR 25.6 - Accessing records in the system.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...: (1) Providing information to Federal, state, or local criminal justice agencies in connection with... Section 25.6 Judicial Administration DEPARTMENT OF JUSTICE DEPARTMENT OF JUSTICE INFORMATION SYSTEMS The National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs...

  3. 28 CFR 25.6 - Accessing records in the system.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...: (1) Providing information to Federal, state, or local criminal justice agencies in connection with... Section 25.6 Judicial Administration DEPARTMENT OF JUSTICE DEPARTMENT OF JUSTICE INFORMATION SYSTEMS The National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs...

  4. 28 CFR 25.6 - Accessing records in the system.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...: (1) Providing information to Federal, state, or local criminal justice agencies in connection with... Section 25.6 Judicial Administration DEPARTMENT OF JUSTICE DEPARTMENT OF JUSTICE INFORMATION SYSTEMS The National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs...

  5. Control system design guide

    SciTech Connect

    Sellers, David; Friedman, Hannah; Haasl, Tudi; Bourassa, Norman; Piette, Mary Ann

    2003-05-01

    The ''Control System Design Guide'' (Design Guide) provides methods and recommendations for the control system design process and control point selection and installation. Control systems are often the most problematic system in a building. A good design process that takes into account maintenance, operation, and commissioning can lead to a smoothly operating and efficient building. To this end, the Design Guide provides a toolbox of templates for improving control system design and specification. HVAC designers are the primary audience for the Design Guide. The control design process it presents will help produce well-designed control systems that achieve efficient and robust operation. The spreadsheet examples for control valve schedules, damper schedules, and points lists can streamline the use of the control system design concepts set forth in the Design Guide by providing convenient starting points from which designers can build. Although each reader brings their own unique questions to the text, the Design Guide contains information that designers, commissioning providers, operators, and owners will find useful.

  6. Novel microsatellite control system

    SciTech Connect

    Moore, K.R.; Frigo, J.R.; Tilden, M.W.

    1996-12-31

    The authors are developing extremely simple yet quite capable analog pulse-coded neural networks for smaller-faster-cheaper spacecraft attitude and control systems. They will demonstrate a prototype microsatellite that uses the novel control system to autonomously stabilize itself in the ambient magnetic field and point itself at the brightest available light source.

  7. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  8. The Virtual Jason Control Van: A GeoBrowser Application for Automatic Data Cataloging and Access

    NASA Astrophysics Data System (ADS)

    Lerner, S.

    2001-12-01

    Today's scientific underwater remotely operated vehicles (ROVs) generate a tremendous amount of data collected from a variety of sensors in real-time. Often integrated information such as multiple video streams, vehicle telemetry, and scientific data are only available to the users in the ROV control-van during real-time operations. Although all the data is logged, it is extremely difficult for scientists to re-create this integrated information and have the ability to view and access an entire cruise dataset in an integrated fashion. We introduce a methodology of taking real-time information snapshots during events that occur within the ROV control-van and using these snapshots for data access and analysis. We take control-van snapshots during "interesting" events as defined whenever a scientist enters an event via a computer, and we also take snapshots at regular time intervals such as once a minute to ensure complete data coverage. As part of the JasonII ROV upgrade, we have developed a prototype system that automatically captures the information in the control-van during ROV operations including up to four simultaneous video sources, vehicle data, scientific instrument data, and event data. These control-van snapshots are automatically cataloged and immediately accessible and searchable via a web-browser. The system is designed for both scientific and public outreach needs and will be integrated with the SeaNet system to provide remote access on-shore for scientific collaboration and public outreach. During this past year, the prototype system has been deployed on four Jason cruises and has captured over 40,000 control-van snapshots, containing more than 160,000 images. Each control-van snapshot seamlessly integrates the four simultaneous video snapshots with vehicle data such as navigation, depth, and heading, scientific instrument data from instruments such as a ctd and a magnetometer, and event data as entered by scientists. All this information is

  9. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  10. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  11. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  12. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  13. Cockpit control system

    NASA Technical Reports Server (NTRS)

    Lesnewski, David; Snow, Russ M.; Paufler, Dave; Schnieder, George; Athousake, Roxanne; Combs, Lisa

    1993-01-01

    The purpose of this project is to provide a detail design for the cockpit control system of the Viper PFT. The statement of work for this project requires provisions for control of the ailerons, elevator, rudder, and elevator trim. The system should provide adjustment for pilot stature, rigging, and maintenance. MIL-STD-1472 is used as a model for human factors criterion. The system is designed to the pilot limit loading outlined in FAR part 23.397. The general philosophy behind this design is to provide a simple, reliable control system which will withstand the daily abuse that is experienced in the training environment without excessive cost or weight penalties.

  14. Analyzing Feedback Control Systems

    NASA Technical Reports Server (NTRS)

    Bauer, Frank H.; Downing, John P.

    1987-01-01

    Interactive controls analysis (INCA) program developed to provide user-friendly environment for design and analysis of linear control systems, primarily feedback control. Designed for use with both small- and large-order systems. Using interactive-graphics capability, INCA user quickly plots root locus, frequency response, or time response of either continuous-time system or sampled-data system. Configuration and parameters easily changed, allowing user to design compensation networks and perform sensitivity analyses in very convenient manner. Written in Pascal and FORTRAN.

  15. Automatic clutch control system

    SciTech Connect

    Kasai, H.; Ogawa, N.; Hattori, T.; Ishihara, M.; Uriuhara, M.

    1986-12-16

    This patent describes an automatic clutch control system, comprising: a clutch having a full clutch engagement point and a clutch contact point; a clutch actuator for controlling a clutch stroke; a plurality of solenoid valves for controlling the clutch actuator; clutch stroke sensor means for measuring the clutch stroke and for detecting the full clutch engagement point and the clutch contact point in the clutch stroke; control means, for feeding back a stroke signal detected by the clutch stroke sensor and for controlling the solenoid valves to control clutch engagement and disengagement.

  16. Drone Control System

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Drones, subscale vehicles like the Firebees, and full scale retired military aircraft are used to test air defense missile systems. The DFCS (Drone Formation Control System) computer, developed by IBM (International Business Machines) Federal Systems Division, can track ten drones at once. A program called ORACLS is used to generate software to track and control Drones. It was originally developed by Langley and supplied by COSMIC (Computer Software Management and Information Center). The program saved the company both time and money.

  17. The cryogenic control system of BEPCII

    NASA Astrophysics Data System (ADS)

    Li, Gang; Wang, Ke-Xiang; Zhao, Ji-Jiu; Yue, Ke-Juan; Dai, Ming-Hui; Huang, Yi-Ling; Jiang, Bo

    2008-04-01

    A superconducting cryogenic system has been designed and deployed in the Beijing Electron- Positron Collider Upgrade Project (BEPCII). The system consists of a Siemens PLC (S7-PLC, Programmable Logic Controller) for the compressor control, an Allen Bradley (AB) PLC for the cryogenic equipments, and the Experimental Physics and Industrial Control System (EPICS) that integrates the PLCs. The system fully automates the superconducting cryogenic control with process control, PID (Proportional-Integral-Differential) control loops, real-time data access and data storage, alarm handler and human machine interface. It is capable of automatic recovery as well. This paper describes the BEPCII cryogenic control system, data communication between S7-PLC and EPICS Input/Output Controllers (IOCs), and the integration of the flow control, the low level interlock, the AB-PLC, and EPICS.

  18. Digital flight control systems

    NASA Technical Reports Server (NTRS)

    Caglayan, A. K.; Vanlandingham, H. F.

    1977-01-01

    The design of stable feedback control laws for sampled-data systems with variable rate sampling was investigated. These types of sampled-data systems arise naturally in digital flight control systems which use digital actuators where it is desirable to decrease the number of control computer output commands in order to save wear and tear of the associated equipment. The design of aircraft control systems which are optimally tolerant of sensor and actuator failures was also studied. Detection of the failed sensor or actuator must be resolved and if the estimate of the state is used in the control law, then it is also desirable to have an estimator which will give the optimal state estimate even under the failed conditions.

  19. Power Systems Control Architecture

    SciTech Connect

    James Davidson

    2005-01-01

    A diagram provided in the report depicts the complexity of the power systems control architecture used by the national power structure. It shows the structural hierarchy and the relationship of the each system to those other systems interconnected to it. Each of these levels provides a different focus for vulnerability testing and has its own weaknesses. In evaluating each level, of prime concern is what vulnerabilities exist that provide a path into the system, either to cause the system to malfunction or to take control of a field device. An additional vulnerability to consider is can the system be compromised in such a manner that the attacker can obtain critical information about the system and the portion of the national power structure that it controls.

  20. IGISOL control system modernization

    NASA Astrophysics Data System (ADS)

    Koponen, J.; Hakala, J.

    2016-06-01

    Since 2010, the IGISOL research facility at the Accelerator laboratory of the University of Jyväskylä has gone through major changes. Comparing the new IGISOL4 facility to the former IGISOL3 setup, the size of the facility has more than doubled, the length of the ion transport line has grown to about 50 m with several measurement setups and extension capabilities, and the accelerated ions can be fed to the facility from two different cyclotrons. The facility has evolved to a system comprising hundreds of manual, pneumatic and electronic devices. These changes have prompted the need to modernize also the facility control system taking care of monitoring and transporting the ion beams. In addition, the control system is also used for some scientific data acquisition tasks. Basic guidelines for the IGISOL control system update have been remote control, safety, usability, reliability and maintainability. Legacy components have had a major significance in the control system hardware and for the renewed control system software the Experimental Physics and Industrial Control System (EPICS) has been chosen as the architectural backbone.

  1. Load Control System Reliability

    SciTech Connect

    Trudnowski, Daniel

    2015-04-03

    This report summarizes the results of the Load Control System Reliability project (DOE Award DE-FC26-06NT42750). The original grant was awarded to Montana Tech April 2006. Follow-on DOE awards and expansions to the project scope occurred August 2007, January 2009, April 2011, and April 2013. In addition to the DOE monies, the project also consisted of matching funds from the states of Montana and Wyoming. Project participants included Montana Tech; the University of Wyoming; Montana State University; NorthWestern Energy, Inc., and MSE. Research focused on two areas: real-time power-system load control methodologies; and, power-system measurement-based stability-assessment operation and control tools. The majority of effort was focused on area 2. Results from the research includes: development of fundamental power-system dynamic concepts, control schemes, and signal-processing algorithms; many papers (including two prize papers) in leading journals and conferences and leadership of IEEE activities; one patent; participation in major actual-system testing in the western North American power system; prototype power-system operation and control software installed and tested at three major North American control centers; and, the incubation of a new commercial-grade operation and control software tool. Work under this grant certainly supported the DOE-OE goals in the area of “Real Time Grid Reliability Management.”

  2. Desiccant humidity control system

    NASA Technical Reports Server (NTRS)

    Amazeen, J. (Editor)

    1973-01-01

    A regenerable sorbent system was investigated for controlling the humidity and carbon dioxide concentration of the space shuttle cabin atmosphere. The sorbents considered for water and carbon dioxide removal were silica gel and molecular sieves. Bed optimization and preliminary system design are discussed along with system optimization studies and weight penalites.

  3. What is system control?

    SciTech Connect

    Hirst, E.; Kirby, B.

    1999-11-01

    Just as the aviation industry needs air-traffic controllers to manage the movement of airplanes for safety and commerce, so too, the electricity industry requires system operators. The electrical-system-control functions encompass a range of activities that support commercial transactions and maintain bulk-power reliability. As part of a project for the Edison Electric Institute, the authors examined the functions and costs of system control and the issues that need to be resolved in a restructured electricity industry (Hirst and Kirby 1998).

  4. 61. View of TR spiral access stair system from transmitter ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    61. View of TR spiral access stair system from transmitter building no. 102 mezzanine level; note elevator door on right. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  5. Providing Access to Library Automation Systems for Students with Disabilities.

    ERIC Educational Resources Information Center

    California Community Colleges, Sacramento. High-Tech Center for the Disabled.

    This document provides information on the integration of assistive computer technologies and library automation systems at California Community Colleges in order to ensure access for students with disabilities. Topics covered include planning, upgrading, purchasing, implementing and using these technologies with library systems. As information…

  6. Accessing the Food Systems in Urban and Rural Minnesotan Communities

    ERIC Educational Resources Information Center

    Smith, Chery; Miller, Hannah

    2011-01-01

    Objective: Explore how urban and rural Minnesotans access the food system and to investigate whether community infrastructure supports a healthful food system. Design: Eight (4 urban and 4 rural) focus groups were conducted. Setting and Participants: Eight counties with urban influence codes of 1, 2, 4, 5, 8, and 10. Fifty-nine (urban, n = 27;…

  7. Open Access: A User Information System. Professional Paper Series, #6.

    ERIC Educational Resources Information Center

    Gleason, Bernard W.

    Focusing on the need for information systems that provide faculty, staff, and students with open access to all necessary information resources, this paper begins by discussing the issues involved in developing such systems. A review of the traditional environment looks at the traditional centralized resources versus the current trend toward…

  8. 45 CFR 95.615 - Access to systems and records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROGRAMS) Automatic Data Processing Equipment and Services-Conditions for Federal Financial Participation (FFP) Specific Conditions for Ffp § 95.615 Access to systems and records. In accordance with 45 CFR... being met and to determine the efficiency, economy and effectiveness of the system....

  9. ISAIA: Interoperable Systems for Archival Information Access

    NASA Technical Reports Server (NTRS)

    Hanisch, Robert J.

    2002-01-01

    The ISAIA project was originally proposed in 1999 as a successor to the informal AstroBrowse project. AstroBrowse, which provided a data location service for astronomical archives and catalogs, was a first step toward data system integration and interoperability. The goals of ISAIA were ambitious: '...To develop an interdisciplinary data location and integration service for space science. Building upon existing data services and communications protocols, this service will allow users to transparently query hundreds or thousands of WWW-based resources (catalogs, data, computational resources, bibliographic references, etc.) from a single interface. The service will collect responses from various resources and integrate them in a seamless fashion for display and manipulation by the user.' Funding was approved only for a one-year pilot study, a decision that in retrospect was wise given the rapid changes in information technology in the past few years and the emergence of the Virtual Observatory initiatives in the US and worldwide. Indeed, the ISAIA pilot study was influential in shaping the science goals, system design, metadata standards, and technology choices for the virtual observatory. The ISAIA pilot project also helped to cement working relationships among the NASA data centers, US ground-based observatories, and international data centers. The ISAIA project was formed as a collaborative effort between thirteen institutions that provided data to astronomers, space physicists, and planetary scientists. Among the fruits we ultimately hoped would come from this project would be a central site on the Web that any space scientist could use to efficiently locate existing data relevant to a particular scientific question. Furthermore, we hoped that the needed technology would be general enough to allow smaller, more-focused community within space science could use the same technologies and standards to provide more specialized services. A major challenge to searching

  10. Remotely controllable mixing system

    NASA Technical Reports Server (NTRS)

    Belew, R. R. (Inventor)

    1986-01-01

    This invention relates to a remotely controllable mixing system in which a plurality of mixing assemblies are arranged in an annular configuration, and wherein each assembly employs a central chamber and two outer, upper and lower chambers. Valves are positioned between chambers, and these valves for a given mixing assembly are operated by upper and lower control rotors, which in turn are driven by upper and lower drive rotors. Additionally, a hoop is compressed around upper control rotors and a hoop is compressed around lower control rotors to thus insure constant frictional engagement between all control rotors and drive rotors. The drive rollers are driven by a motor.

  11. Satellite control system nucleus for the Brazilian complete space mission

    NASA Astrophysics Data System (ADS)

    Yamaguti, Wilson; Decarvalhovieira, Anastacio Emanuel; Deoliveira, Julia Leocadia; Cardoso, Paulo Eduardo; Dacosta, Petronio Osorio

    1990-10-01

    The nucleus of the satellite control system for the Brazilian data collecting and remote sensing satellites is described. The system is based on Digital Equipment Computers and the VAX/VMS operating system. The nucleus provides the access control, the system configuration, the event management, history files management, time synchronization, wall display control, and X25 data communication network access facilities. The architecture of the nucleus and its main implementation aspects are described. The implementation experience acquired is considered.

  12. Hippo Experiment Data Access and Subseting System

    NASA Astrophysics Data System (ADS)

    Krassovski, M.; Hook, L.; Boden, T.

    2014-12-01

    HIAPER Pole-to-Pole Observations (HIPPO) was an NSF- and NOAA-funded, multi-year global airborne research project to survey the latitudinal and vertical distribution of greenhouse and related gases, and aerosols. Project scientists and support staff flew five month-long missions over the Pacific Basin on the NSF/NCAR Gulfstream V, High-performance Instrumented Airborne Platform for Environmental Research (HIAPER) aircraft between January 2009 and September 2011, spread throughout the annual cycle, from the surface to 14 km in altitude, and from 87°N to 67°S. Data from the HIPPO study of greenhouse gases and aerosols are now available to the atmospheric research community and the public. This comprehensive dataset provides the first high-resolution vertically resolved measurements of over 90 unique atmospheric species from nearly pole-to-pole over the Pacific Ocean across all seasons. The suite of atmospheric trace gases and aerosols is pertinent to understanding the carbon cycle and challenging global climate models. This dataset will provide opportunities for research across a broad spectrum of Earth sciences, including those analyzing the evolution in time and space of the greenhouse gases that affect global climate. The Carbon Dioxide Information Analysis Center (CDIAC) at Oak Ridge National Laboratory (ORNL) provides data management support for the HIPPO experiment including long-term data storage and dissemination. CDIAC has developed a relational database to house HIPPO merged 10-second meteorology, atmospheric chemistry, and aerosol data. This data set provides measurements from all Missions, 1 through 5, that took place from January of 2009 to September 2011. This presentation introduces newly build database and web interface, reflects the present state and functionality of the HIPPO Database and Exploration System as well as future plans for expansion and inclusion of combined discrete flask and GC sample GHG, Halocarbon, and hydrocarbon data.

  13. Flight control actuation system

    NASA Technical Reports Server (NTRS)

    Wingett, Paul T. (Inventor); Gaines, Louie T. (Inventor); Evans, Paul S. (Inventor); Kern, James I. (Inventor)

    2004-01-01

    A flight control actuation system comprises a controller, electromechanical actuator and a pneumatic actuator. During normal operation, only the electromechanical actuator is needed to operate a flight control surface. When the electromechanical actuator load level exceeds 40 amps positive, the controller activates the pneumatic actuator to offset electromechanical actuator loads to assist the manipulation of flight control surfaces. The assistance from the pneumatic load assist actuator enables the use of an electromechanical actuator that is smaller in size and mass, requires less power, needs less cooling processes, achieves high output forces and adapts to electrical current variations. The flight control actuation system is adapted for aircraft, spacecraft, missiles, and other flight vehicles, especially flight vehicles that are large in size and travel at high velocities.

  14. Applying the Earth System Grid Security System in a Heterogeneous Environment of Data Access Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen

    2010-05-01

    CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand

  15. HIPPO Experiment Data Access and Subseting System

    NASA Astrophysics Data System (ADS)

    Krassovski, Misha; Hook, Les; Christensen, Sigurd; Boden, Tom

    2014-05-01

    atmospheric species from nearly pole-to-pole over the Pacific Ocean across all seasons. The suite of atmospheric trace gases and aerosols is pertinent to understanding the carbon cycle and challenging global climate models. This dataset will provide opportunities for research across a broad spectrum of Earth sciences, including those analyzing the evolution in time and space of the greenhouse gases that affect global climate. The Carbon Dioxide Information Analysis Center (CDIAC) at Oak Ridge National Laboratory (ORNL) provides data management support for the HIPPO experiment including long-term data storage and dissemination. CDIAC has developed a relational database to house HIPPO merged 10-second meteorology, atmospheric chemistry, and aerosol data. This data set provides measurements from all Missions, 1 through 5, that took place from January of 2009 to September 2011. This presentation introduces newly build database and web interface, reflects the present state and functionality of the HIPPO Database and Exploration System as well as future plans for expansion and inclusion of combined discrete flask and GC sample GHG, Halocarbon, and hydrocarbon data.

  16. NUCLEAR REACTOR CONTROL SYSTEM

    DOEpatents

    Epler, E.P.; Hanauer, S.H.; Oakes, L.C.

    1959-11-01

    A control system is described for a nuclear reactor using enriched uranium fuel of the type of the swimming pool and other heterogeneous nuclear reactors. Circuits are included for automatically removing and inserting the control rods during the course of normal operation. Appropriate safety circuits close down the nuclear reactor in the event of emergency.

  17. Access 5 - Step 1: Human Systems Integration Program Plan (HSIPP)

    NASA Technical Reports Server (NTRS)

    2005-01-01

    This report describes the Human System Interface (HSI) analysis, design and test activities that will be performed to support the development of requirements and design guidelines to facilitate the incorporation of High Altitude Long Endurance (HALE) Remotely Operated Aircraft (ROA) at or above FL400 in the National Airspace System (NAS). These activities are required to support the design and development of safe, effective and reliable ROA operator and ATC interfaces. This plan focuses on the activities to be completed for Step 1 of the ACCESS 5 program. Updates to this document will be made for each of the four ACCESS 5 program steps.

  18. X10: A FORTRAN direct access data management system

    NASA Technical Reports Server (NTRS)

    Roland, D. P.

    1978-01-01

    The XIO system is a set of subroutines that provide generalized data management capability for FORTRAN programs using a direct access file. Arrays of integer, real, double precision, and character data may be stored, each logical group of data identified by a unique matrix number. A matrix may be organized and stored as batches to reduce core requirements. Batches may be accessed randomly or sequentially. The file may be checkpointed and retained, allowing for restarts with stored values. The XIO subroutines operate on either IBM 360-370/OS/VS or DEC PDP-11/RSX computing systems.

  19. Intelligent traffic control system using PLC

    NASA Astrophysics Data System (ADS)

    Barz, C.; Todea, C.; Latinovic, T.; Preradovic, D. M.; Deaconu, S.; Berdie, A.

    2016-08-01

    The paper presents the traffic control system controlled through a PLC which takes the signals from different sensors on roads. The global system developed ensures the coordination of four intersections, setting a path that respects coordination type green light, the integration of additional sensors, the implementation of probes radar to inform traffic participants about recommended speed for accessing the green state located in the intersection that will follow to cross.

  20. Computer controlled antenna system

    NASA Technical Reports Server (NTRS)

    Raumann, N. A.

    1972-01-01

    The application of small computers using digital techniques for operating the servo and control system of large antennas is discussed. The advantages of the system are described. The techniques were evaluated with a forty foot antenna and the Sigma V computer. Programs have been completed which drive the antenna directly without the need for a servo amplifier, antenna position programmer or a scan generator.

  1. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  2. Access to care for Chagas disease in the United States: a health systems analysis.

    PubMed

    Manne-Goehler, Jennifer; Reich, Michael R; Wirtz, Veronika J

    2015-07-01

    There are 300,000 estimated cases of Chagas disease in the United States but limited data on access to care. This study analyzed trends in access to care for Chagas disease in the United States and assessed the national and state barriers to access. Data on cases in blood donors and drug releases were obtained from the AABB (formerly American Association of Blood Banks) and U.S. Centers for Disease Control and Prevention (CDC), respectively. Semi-structured in-depth interviews were conducted with 30 key informants at the national level and in five states where treatment had been released. Interview responses were analyzed according to the health systems dimensions of regulation, financing, payment, organization, and persuasion. Data indicate that 1,908 cases were identified in the blood donation system from 2007 to 2013 and that CDC released 422 courses of benznidazole or nifurtimox during this period. The barriers to access at the national level include limited diagnostic and institutionalized referral and care processes, lack of financing for patient-care activities, and limited awareness and training among providers. This study demonstrates that access to treatment of Chagas disease in the United States is limited. The lack of licensing is only one of several barriers to access, highlighting the need for a health systems perspective when scaling up access to these essential medicines. PMID:25986581

  3. Fuel control system

    SciTech Connect

    Staniak, W.A.; Samuelson, R.E.; Moncelle, M.E.

    1986-10-14

    A fuel control system is described comprising: a fuel rack movable in opposite fuel-increasing and fuel-decreasing directions; a rack control member movable in opposite fuel-increasing and fuel-decreasing directions; servo system means for moving the fuel rack in response to movement of the rack control member an electrically energizable member movable in opposite fuel-increasing and fuel-decreasing directions, the electrically energizable member being urged to move in its fuel-decreasing direction when energized; first coupling means for connecting the electrically energizable member to the rack control member to move the rack control member in its fuel-decreasing direction in response to movement of the electrically energizable member in its fuel-decreasing direction; a mechanical governor control having a member movable in opposite fuel-increasing and fuel-decreasing directions; second coupling means for connecting the mechanical governor to the rack control member to move the rack control member in its fuel-decreasing direction in response to movement of the mechanical governor member in its fuel-decreasing direction; bias means for biasing the rack control member to move in its fuel-increasing direction.

  4. Access to medicines from a health system perspective

    PubMed Central

    Bigdeli, Maryam; Jacobs, Bart; Tomson, Goran; Laing, Richard; Ghaffar, Abdul; Dujardin, Bruno; Van Damme, Wim

    2013-01-01

    Most health system strengthening interventions ignore interconnections between systems components. In particular, complex relationships between medicines and health financing, human resources, health information and service delivery are not given sufficient consideration. As a consequence, populations' access to medicines (ATM) is addressed mainly through fragmented, often vertical approaches usually focusing on supply, unrelated to the wider issue of access to health services and interventions. The objective of this article is to embed ATM in a health system perspective. For this purpose, we perform a structured literature review: we examine existing ATM frameworks, review determinants of ATM and define at which level of the health system they are likely to occur; we analyse to which extent existing ATM frameworks take into account access constraints at different levels of the health system. Our findings suggest that ATM barriers are complex and interconnected as they occur at multiple levels of the health system. Existing ATM frameworks only partially address the full range of ATM barriers. We propose three essential paradigm shifts that take into account complex and dynamic relationships between medicines and other components of the health system. A holistic view of demand-side constraints in tandem with consideration of multiple and dynamic relationships between medicines and other health system resources should be applied; it should be recognized that determinants of ATM are rooted in national, regional and international contexts. These are schematized in a new framework proposing a health system perspective on ATM. PMID:23174879

  5. An Information System to Access Status Information of the LHCb Online

    NASA Astrophysics Data System (ADS)

    Frank, M.; Gaspar, C.

    2012-12-01

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  6. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  7. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  8. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  9. CNEOST Control Software System

    NASA Astrophysics Data System (ADS)

    Wang, X.; Zhao, H. B.; Xia, Y.; Lu, H.; Li, B.

    2015-03-01

    In 2013, CNEOST (China Near Earth Object Survey Telescope) adapted its hardware system for the new CCD camera. Based on the new system architecture, the control software is re-designed and implemented. The software system adopts the message passing mechanism via WebSocket protocol, and improves its flexibility, expansibility, and scalability. The user interface with responsive web design realizes the remote operating under both desktop and mobile devices. The stable operating of software system has greatly enhanced the operation efficiency while reducing the complexity, and has also made a successful attempt for the future system design of telescope and telescope cloud.

  10. CNEOST Control Software System

    NASA Astrophysics Data System (ADS)

    Wang, Xin; Zhao, Hai-bin; Xia, Yan; Lu, Hao; Li, Bin

    2016-01-01

    In 2013, CNEOST (China Near Earth Object Survey Telescope) adapted its hardware system for the new CCD camera. Based on the new system architecture, the control software is re-designed and implemented. The software system adopts the messaging mechanism based on the WebSocket protocol, and possesses good flexibility and expansibility. The user interface based on the responsive web design has realized the remote observations under both desktop and mobile devices. The stable operation of the software system has greatly enhanced the operation efficiency while reducing the complexity, and has also made a successful attempt for the future system design of telescope and telescope cloud.

  11. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  12. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    PubMed

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care. PMID:22732236

  13. Colorectal Cancer Screening in an Equal Access Healthcare System

    PubMed Central

    DeBarros, Mia; Steele, Scott R.

    2013-01-01

    Introduction: The military health system (MHS) a unique setting to analyze implementation programs as well as outcomes for colorectal cancer (CRC). Here we look at the efficacy of different CRC screening methods, attributes and results within the MHS, and current barriers to increase compliance. Materials and Methods: A literature search was conducted utilizing PubMed and the Cochrane library. Key-word combinations included colorectal cancer screening, racial disparity, risk factors, colorectal cancer, screening modalities, and randomized control trials. Directed searches were also performed of embedded references. Results: Despite screening guidelines from several national organizations, extensive barriers to widespread screening remain, especially for minority populations. These barriers are diverse, ranging from education and access problems to personal beliefs. Screening rates in MHS have been reported to be generally higher at 71% compared to national averages of 50-65%. Conclusion: CRC screening can be highly effective at improving detection of both pre-malignant and early cancers. Improved patient education and directed efforts are needed to improve CRC screening both nationally and within the MHS. PMID:23459768

  14. Asynchronous interactive control systems

    NASA Technical Reports Server (NTRS)

    Vuskovic, M. I.; Heer, E.

    1980-01-01

    A class of interactive control systems is derived by generalizing interactive manipulator control systems. The general structural properties of such systems are discussed and an appropriate general software implementation is proposed. This is based on the fact that tasks of interactive control systems can be represented as a network of a finite set of actions which have specific operational characteristics and specific resource requirements, and which are of limited duration. This has enabled the decomposition of the overall control algorithm into a set of subalgorithms, called subcontrollers, which can operate simultaneously and asynchronously. Coordinate transformations of sensor feedback data and actuator set-points have enabled the further simplification of the subcontrollers and have reduced their conflicting resource requirements. The modules of the decomposed control system are implemented as parallel processes with disjoint memory space communicating only by I/O. The synchronization mechanisms for dynamic resource allocation among subcontrollers and other synchronization mechanisms are also discussed in this paper. Such a software organization is suitable for the general form of multiprocessing using computer networks with distributed storage.

  15. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas. In addition to the requirements in...

  16. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a) The licensee shall ensure that...

  17. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  18. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  19. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  20. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  1. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  2. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  3. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  4. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  5. Neural Flight Control System

    NASA Technical Reports Server (NTRS)

    Gundy-Burlet, Karen

    2003-01-01

    The Neural Flight Control System (NFCS) was developed to address the need for control systems that can be produced and tested at lower cost, easily adapted to prototype vehicles and for flight systems that can accommodate damaged control surfaces or changes to aircraft stability and control characteristics resulting from failures or accidents. NFCS utilizes on a neural network-based flight control algorithm which automatically compensates for a broad spectrum of unanticipated damage or failures of an aircraft in flight. Pilot stick and rudder pedal inputs are fed into a reference model which produces pitch, roll and yaw rate commands. The reference model frequencies and gains can be set to provide handling quality characteristics suitable for the aircraft of interest. The rate commands are used in conjunction with estimates of the aircraft s stability and control (S&C) derivatives by a simplified Dynamic Inverse controller to produce virtual elevator, aileron and rudder commands. These virtual surface deflection commands are optimally distributed across the aircraft s available control surfaces using linear programming theory. Sensor data is compared with the reference model rate commands to produce an error signal. A Proportional/Integral (PI) error controller "winds up" on the error signal and adds an augmented command to the reference model output with the effect of zeroing the error signal. In order to provide more consistent handling qualities for the pilot, neural networks learn the behavior of the error controller and add in the augmented command before the integrator winds up. In the case of damage sufficient to affect the handling qualities of the aircraft, an Adaptive Critic is utilized to reduce the reference model frequencies and gains to stay within a flyable envelope of the aircraft.

  6. Public Access Online Library System (OLS) User's Guide.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Information Management and Services Div.

    How to access and search using the Online Library System (OLS) is described. The OLS is a computerized list of bibliographic citations compiled by the library network of the Environmental Protection Agency (EPA). It consists of several related databases and can be used by anyone to search for books, documents, journals, and other materials. In…

  7. System Features for Subject Access in the Online Catalog.

    ERIC Educational Resources Information Center

    Lawrence, Gary S.

    1985-01-01

    Describes various ways in which software systems for online catalogs can be designed to enhance subject access. Highlights include what to search (subject headings, titles, notes, authority-file records, classification numbers, and associated text); truncation and stemming; spelling correction; search strategies (headings, keywords, Boolean…

  8. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for establishing logical access... Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional practitioner. (a... practitioner that enters permissions for logical access controls into the application. The...

  9. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  10. Quantum Random Access Codes Using Single d -Level Systems

    NASA Astrophysics Data System (ADS)

    Tavakoli, Armin; Hameedi, Alley; Marques, Breno; Bourennane, Mohamed

    2015-05-01

    Random access codes (RACs) are used by a party to, with limited communication, access an arbitrary subset of information held by another party. Quantum resources are known to enable RACs that break classical limitations. Here, we study quantum and classical RACs with high-level communication. We derive average performances of classical RACs and present families of high-level quantum RACs. Our results show that high-level quantum systems can significantly increase the advantage of quantum RACs over their classical counterparts. We demonstrate our findings in an experimental realization of a quantum RAC with four-level communication.

  11. SERVOMOTOR CONTROL SYSTEM

    DOEpatents

    MacNeille, S.M.

    1958-12-01

    Control systems for automatic positioning of an electric motor operated vapor valve are described which is operable under the severe conditions existing in apparatus for electro-magnetlcally separating isotopes. In general, the system includes a rotor for turning the valve comprising two colls mounted mutually perpendicular to each other and also perpendicular to the magnetic field of the isotope separating apparatus. The coils are furnished with both a-c and d- c current by assoclate control circuitry and a position control is provided for varying the ratlo of the a-c currents in the coils and at the same time, but in an inverse manner, the ratio between the d-c currents in the coils is varied. With the present system the magnitude of the motor torque is constant for all valves of the rotor orientatlon angle.

  12. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  13. Does the public deserve free access to climate system science?

    NASA Astrophysics Data System (ADS)

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  14. Commutative algebraic methods for controllability of discrete-time polynomial systems

    NASA Astrophysics Data System (ADS)

    Kawano, Yu; Ohtsuka, Toshiyuki

    2016-02-01

    In this paper, we consider controllability of discrete-time polynomial systems. First, we present a forward accessibility (local reachability) condition that can be verified in finite time, in contrast to conventional conditions. Second, we give a backward accessibility (local controllability) condition for an invertible system and a condition to verify invertibility. Finally, we derive sufficient conditions to test whether the forward accessible system is reachable and to test the backward accessible system is controllable.

  15. Attitude control system

    NASA Technical Reports Server (NTRS)

    Vonpragenau, G. L.; Rupp, C. C. (Inventor)

    1976-01-01

    An attitude control system is described in which angular rate signals are generated by rate gyros mounted closely adjacent to gimbaled engines at the rear of a vehicle. Error signals representative of a commanded change in vehicle angle or attitude are obtained from a precision inertial platform located in the nose region of the vehicle. The rate gyro derived signals dominate at high frequencies where dynamic effects become significant, and platform signals dominate at low frequencies where precision signals are required for a steady vehicle attitude. The blended signals are applied in a conventional manner to control the gimbaling of vehicle engines about control axes.

  16. REACTOR CONTROL SYSTEM

    DOEpatents

    MacNeill, J.H.; Estabrook, J.Y.

    1960-05-10

    A reactor control system including a continuous tape passing through a first coolant passageway, over idler rollers, back through another parallel passageway, and over motor-driven rollers is described. Discrete portions of fuel or poison are carried on two opposed active sections of the tape. Driving the tape in forward or reverse directions causes both active sections to be simultaneously inserted or withdrawn uniformly, tending to maintain a more uniform flux within the reactor. The system is particularly useful in mobile reactors, where reduced inertial resistance to control rod movement is important.

  17. NASA access mechanism: Graphical user interface information retrieval system

    NASA Technical Reports Server (NTRS)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  18. NASA Access Mechanism - Graphical user interface information retrieval system

    NASA Technical Reports Server (NTRS)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  19. L-band and SHF multiple access schemes for the MSAT system

    NASA Technical Reports Server (NTRS)

    Razi, Michael; Shoamanesh, Alireza; Azarbar, Bahman

    1988-01-01

    The first generation of the Canadian Mobile Satellite (MSAT) system, planned to be operational in the early 1990s, will provide voice and data services to land, aeronautical, and maritime mobile terminals within the Canadian land mass and its territorial waters. The system will be managed by a centralized Demand Assignment Multiple Access (DAMA) control system. Users will request a communication channel by communicating with the DAMA Control System (DCS) via the appropriate signalling channels. Several access techniques for both L-band and SHF signalling channels have been investigated. For the L-band, Slotted Aloha (SA) and Reservation Aloha (RA), combined with a token scheme, are discussed here. The results of Telesat studies to date indicate that SA, when combined with token scheme, provides the most efficient access and resource management tool in a mobile propagation environment. For SHF signalling channels, slim time division multiple access (TDMA) and SA have been considered as the most suitable candidate schemes. In view of the operational environment of the SHF links, provision of a very short channel access delay and a relatively high packet success rate are highly desirable. Studies carried out generally favor slim-TDMA as the most suitable approach for SHF signalling channels.

  20. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  1. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  2. Personal Access Satellite System (PASS) study. Fiscal year 1989 results

    NASA Technical Reports Server (NTRS)

    Sue, Miles K. (Editor)

    1990-01-01

    The Jet Propulsion Laboratory is exploring the potential and feasibility of a personal access satellite system (PASS) that will offer the user greater freedom and mobility than existing or currently planned communications systems. Studies performed in prior years resulted in a strawman design and the identification of technologies that are critical to the successful implementation of PASS. The study efforts in FY-89 were directed towards alternative design options with the objective of either improving the system performance or alleviating the constraints on the user terminal. The various design options and system issues studied this year and the results of the study are presented.

  3. Encryption Devices for Use in a Conditional Access System

    NASA Astrophysics Data System (ADS)

    Pinder, Howard G.; Palgon, Michael S.

    2002-07-01

    A cable television system provides conditional access to services. The cable television system includes a headend from which service 'instances', or programs, are broadcast and a plurality of set top units for receiving the instances and selectively decrypting the instances for display to system subscribers. The service instances are encrypted using public and/or private keys provided by service providers or central authorization agents. Keys used by the set tops for selective decryption may also be public or private in nature, and such keys may be reassigned at different times to provide a cable television system in which piracy concerns are minimized.

  4. Distributed magnetic field positioning system using code division multiple access

    NASA Technical Reports Server (NTRS)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  5. Alternative multiple-access techniques for mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Smith, Patrick O.; Geraniotis, Evaggelos

    1989-01-01

    The use of Code Division Multiple Access (CDMA) to satisfy the diverse requirements of a generic (land, maritime, aeronautical) mobile satellite system (MSS) network design is discussed. Comparisons between CDMA and Frequency Division Multiple Access (FDMA) show that a CDMA network design can support significantly more voice channel allocations than FDMA when relatively simple CDMA correlation receivers are employed, provided that there is sufficient space segment equivalent isotropically radiated power (EIRP). The use of more advanced CDMA receivers can improve the spectral and power efficiency. Although the use of CDMA may not gain immediate and widespread support in the international MSS community, provision for the use of CDMA for a domestic system in the U.S., and possibly for a regional system throughout North America, is likely.

  6. Intelligence control systems

    NASA Technical Reports Server (NTRS)

    Saridis, G. N.

    1980-01-01

    The evolution of ideas of intelligent controls and their application to high level man machine interactive systems like general purpose manipulators, industrial robots, prosthetic devices for amputees, and orthotic devices for paralyzed persons are discussed. Some case studies are presented to demonstrate the feasibility of the approach.

  7. Electric turbocompound control system

    DOEpatents

    Algrain, Marcelo C.

    2007-02-13

    Turbocompound systems can be used to affect engine operation using the energy in exhaust gas that is driving the available turbocharger. A first electrical device acts as a generator in response to turbocharger rotation. A second electrical device acts as a motor to put mechanical power into the engine, typically at the crankshaft. Apparatus, systems, steps, and methods are described to control the generator and motor operations to control the amount of power being recovered. This can control engine operation closer to desirable parameters for given engine-related operating conditions compared to actual. The electrical devices can also operate in "reverse," going between motor and generator functions. This permits the electrical device associated with the crankshaft to drive the electrical device associated with the turbocharger as a motor, overcoming deficient engine operating conditions such as associated with turbocharger lag.

  8. Timing control system

    NASA Technical Reports Server (NTRS)

    Wiker, Gordon A. (Inventor); Wells, Jr., George H. (Inventor)

    1989-01-01

    A timing control system is disclosed which is particularly useful in connection with simulated mortar shells. Special circuitry is provided to assure that the shell does not overshoot, but rather detonates early in case of an improper condition; this ensures that ground personnel will not be harmed by a delayed detonation. The system responds to an externally applied frequency control code which is configured to avoid any confusion between different control modes. A premature detonation routine is entered in case an improper time-setting signal is entered, or if the shell is launched before completion of the time-setting sequence. Special provisions are also made for very early launch situations and improper detonator connections. An alternate abort mode is provided to discharge the internal power supply without a detonation in a manner that can be externally monitored, thereby providing a mechanism for non-destructive testing. The abort mode also accelerates the timing function for rapid testing.

  9. A Quality of Context-Aware Approach to Access Control in Pervasive Environments

    NASA Astrophysics Data System (ADS)

    Toninelli, Alessandra; Corradi, Antonio; Montanari, Rebecca

    The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users to share resources anywhere and anytime, but makes access control a crucial issue. User/device mobility and heterogeneity, together with network topology and conditions variability, complicate access control and call for novel solutions to dynamically adapt access decisions to the different operating conditions. Several research efforts have emerged in recent years that propose to exploit context-awareness to control access to resources based on context visibility and changes. Context-based access control requires, however, to take into account the quality of context information used to drive access decisions (QoC). Quality of context has in fact a profound impact on the correct behavior of any context-aware access control framework. Using context information with insufficient quality might increase the risk of incorrect access control decisions, thus leading to dangerous security breaches in resource sharing. In this paper we propose a QoC-aware approach to access control for anywhere, anytime resource sharing. The paper describes the design, implementation and evaluation of the Proteus policy framework, which combines two design guidelines to enable dynamic adaptation of policies depending on context changes: context-awareness with QoC guarantees and semantic technologies to allow high-level description of context/policy specification and reasoning about context/policies.

  10. Accessing files in an internet - The Jade file system

    NASA Technical Reports Server (NTRS)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  11. Accessing files in an Internet: The Jade file system

    NASA Technical Reports Server (NTRS)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  12. Controllability of Complex Systems

    NASA Astrophysics Data System (ADS)

    Slotine, Jean-Jacques

    2013-03-01

    We review recent work on controllability of complex systems. We also discuss the interplay of our results with questions of synchronization, and point out key directions of future research. Work done in collaboration with Yang-Yu Liu, Center for Complex Network Research and Departments of Physics, Computer Science and Biology, Northeastern University and Center for Cancer Systems Biology, Dana-Farber Cancer Institute; and Albert-László Barabási, Center for Complex Network Research and Departments of Physics, Computer Science and Biology, Northeastern University; Center for Cancer Systems Biology, Dana-Farber Cancer Institute; and Department of Medicine, Brigham and Women's Hospital, Harvard Medical School.

  13. Telerobot control system

    NASA Technical Reports Server (NTRS)

    Backes, Paul G. (Inventor); Tso, Kam S. (Inventor)

    1993-01-01

    This invention relates to an operator interface for controlling a telerobot to perform tasks in a poorly modeled environment and/or within unplanned scenarios. The telerobot control system includes a remote robot manipulator linked to an operator interface. The operator interface includes a setup terminal, simulation terminal, and execution terminal for the control of the graphics simulator and local robot actuator as well as the remote robot actuator. These terminals may be combined in a single terminal. Complex tasks are developed from sequential combinations of parameterized task primitives and recorded teleoperations, and are tested by execution on a graphics simulator and/or local robot actuator, together with adjustable time delays. The novel features of this invention include the shared and supervisory control of the remote robot manipulator via operator interface by pretested complex tasks sequences based on sequences of parameterized task primitives combined with further teleoperation and run-time binding of parameters based on task context.

  14. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  15. Management control system description

    SciTech Connect

    Bence, P. J.

    1990-10-01

    This Management Control System (MCS) description describes the processes used to manage the cost and schedule of work performed by Westinghouse Hanford Company (Westinghouse Hanford) for the US Department of Energy, Richland Operations Office (DOE-RL), Richland, Washington. Westinghouse Hanford will maintain and use formal cost and schedule management control systems, as presented in this document, in performing work for the DOE-RL. This MCS description is a controlled document and will be modified or updated as required. This document must be approved by the DOE-RL; thereafter, any significant change will require DOE-RL concurrence. Westinghouse Hanford is the DOE-RL operations and engineering contractor at the Hanford Site. Activities associated with this contract (DE-AC06-87RL10930) include operating existing plant facilities, managing defined projects and programs, and planning future enhancements. This document is designed to comply with Section I-13 of the contract by providing a description of Westinghouse Hanford's cost and schedule control systems used in managing the above activities. 5 refs., 22 figs., 1 tab.

  16. Web-Accessible Scientific Workflow System for Performance Monitoring

    SciTech Connect

    Roelof Versteeg; Roelof Versteeg; Trevor Rowe

    2006-03-01

    We describe the design and implementation of a web accessible scientific workflow system for environmental monitoring. This workflow environment integrates distributed, automated data acquisition with server side data management and information visualization through flexible browser based data access tools. Component technologies include a rich browser-based client (using dynamic Javascript and HTML/CSS) for data selection, a back-end server which uses PHP for data processing, user management, and result delivery, and third party applications which are invoked by the back-end using webservices. This environment allows for reproducible, transparent result generation by a diverse user base. It has been implemented for several monitoring systems with different degrees of complexity.

  17. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  18. Vehicle speed control system

    SciTech Connect

    Yoshida, D.; Tanno, T.; Fukunaga, T.

    1987-06-16

    This patent describes a vehicle speed control system for performing vehicle speed control by controlling the displacement of at least one of a hydraulic pump and a hydraulic motor of a hydraulic transmission through an electric servo device, comprising: vehicle speed setting means for generating a voltage signal corresponding to a vehicle speed to be set; compensating means interposed between the vehicle speed setting means and the electric servo device, the compensating means comprising a first delay element; and second delay element having a response characteristic slower than that of the first delay element. A selecting means for judging as to whether a voltage signal changed by the operation of the vehicle speed setting means represents an acceleration command or a deceleration command and for selecting the first delay element when the voltage signal represents an acceleration command and for selecting the second delay element when the voltage signal represents a deceleration command.

  19. Incoherent control of locally controllable quantum systems

    SciTech Connect

    Dong Daoyi; Zhang Chenbin; Rabitz, Herschel; Pechen, Alexander; Tarn, T.-J.

    2008-10-21

    An incoherent control scheme for state control of locally controllable quantum systems is proposed. This scheme includes three steps: (1) amplitude amplification of the initial state by a suitable unitary transformation, (2) projective measurement of the amplified state, and (3) final optimization by a unitary controlled transformation. The first step increases the amplitudes of some desired eigenstates and the corresponding probability of observing these eigenstates, the second step projects, with high probability, the amplified state into a desired eigenstate, and the last step steers this eigenstate into the target state. Within this scheme, two control algorithms are presented for two classes of quantum systems. As an example, the incoherent control scheme is applied to the control of a hydrogen atom by an external field. The results support the suggestion that projective measurements can serve as an effective control and local controllability information can be used to design control laws for quantum systems. Thus, this scheme establishes a subtle connection between control design and controllability analysis of quantum systems and provides an effective engineering approach in controlling quantum systems with partial controllability information.

  20. OAJ control system

    NASA Astrophysics Data System (ADS)

    Antón, J. L.; Yanes-Díaz, A.; Rueda-Teruel, S.; Luis-Simoes, R.; Chueca, S.; Lasso-Cabrera, N. M.; Bello, R.; Jiménez, D.; Suárez, O.; Guillén, L.; López-Alegre, G.; Rodríguez, M. A.; de Castro, S.; Nevot, C.; Sánchez-Artigot, J.; Moles, M.; Cenarro, A. J.; Marín-Franch, A.; Ederoclite, A.; Varela, J.; Valdivielso, L.; Cristóbal-Hornillos, D.; López-Sainz, A.; Hernández-Fuertes, J.; Díaz-Martín, M. C.; Iglesias-Marzoa, R.; Abril, J.; Lamadrid, J. L.; Maicas, N.; Rodríguez, S.; Tilve, V.; Civera, T.; Muniesa, D. J.

    2015-05-01

    The Observatorio Astrofísico de Javalambre (OAJ) is a new astronomical facility located at the Sierra de Javalambre (Teruel, Spain) whose primary role will be to conduct all-sky astronomical surveys leveraging two unprecedented telescopes with unusually large fields of view: the JST/T250, a 2.55 m telescope with a 3 deg field of view, and the JAST/T80, an 83 cm telescope with a 2 deg field of view. The immediate objective of these telescopes for the next years is carrying out two unique photometric surveys covering several thousands square degrees: J-PAS and J-PLUS, each of them with a wide range of scientific applications, like e.g. large structure cosmology and Dark Energy, galaxy evolution, supernovae, Milky Way structure and exoplanets. JST and JAST will be equipped with panoramic cameras being developed within the J-PAS collaboration, JPCam and T80Cam respectively, which make use of large format (˜10{k}×10{k}) CCDs covering the entire focal plane. CEFCA engineering team has been designing the OAJ control system as a global concept to manage, monitor, control and service the observatory systems, not only astronomical but also infrastructure and other facilities. We will give an overview of OAJ's control system from an engineering point of view.

  1. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    NASA Astrophysics Data System (ADS)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  2. Telerobotic virtual control system

    NASA Astrophysics Data System (ADS)

    Zhai, Shumin; Milgram, Paul

    1992-03-01

    A project to develop a telerobotic `virtual control' capability, currently underway at the University of Toronto, is described. The project centers on a new mode of interactive telerobotic control based on the technology of combining computer generated stereographic images with remotely transmitted stereoscopic video images. A virtual measurement technique, in conjunction with a basic level of digital image processing, comprising zooming, parallax adjustment, edge enhancement, and edge detection has been developed to assist the human operator in visualization of the remote environment and in spatial reasoning. The aim is to maintain target recognition, tactical planning, and high-level control functions in the hands of the human operator with the computer performing low-level computation and control. Control commands initiated by the operator are implemented through manipulation of a virtual image of the robot system, merged with a live video image of the remote scene. This paper discusses the philosophy and objectives of the project, with emphasis on the underlying human factor considerations in the design, and reports the progress made to date in this effort.

  3. ACCESS Earth: Promoting Accessibility to Earth System Science for Students with Disabilities

    NASA Astrophysics Data System (ADS)

    Locke, S. M.; Cohen, L.; Lightbody, N.

    2001-05-01

    ACCESS Earth is an intensive summer institute for high school students with disabilities and their teachers that is designed to encourage students with disabilities to consider careers in earth system science. Participants study earth system science concepts at a Maine coastal estuary, using Geographic Information Systems, remote sensing, and field observations to evaluate the impacts of climate change, sea level rise, and development on coastal systems. Teachers, students, and scientists work together to adapt field and laboratory activities for persons with disabilities, including those with mobility and visual impairments. Other sessions include demonstrations of assistive technology, career discussions, and opportunities for students to meet with successful scientists with disabilities from throughout the U.S. The summer institute is one of several programs in development at the University of Southern Maine to address the problem of underrepresentation of people with disabilities in the earth sciences. Other projects include a mentoring program for high school students, a web-based clearinghouse of resources for teaching earth sciences to students with disabilities, and guidebooks for adaptation of popular published earth system science curricula for disabled learners.

  4. Web access to data in a mobile ECG monitoring system.

    PubMed

    Rodriguez, Jimena; Dranca, Lacramioara; Goñi, Alfredo; Illarramendi, Arantza

    2004-01-01

    Cardiovascular diseases and, in particular, diseases related to arrhythmias are a problem that affects a significant percentage of the population, being one of the major causes of death in Europe. New advances in the fields of PDAs, mobile phones, wireless communications and vital parameter sensors have permitted the development of revolutionary medical monitoring systems, which strikingly improve the lifestyle of patients. However, not all those monitoring systems provide patients with real assistance - anywhere and at any time. We have developed a system that goes a step further than the previous approaches, being designed to capture, record and, as a distinctive feature, locally analyze the ECG signals in a PDA carried by the patient. In that sense, the system has a decision support module based on decision tree methods that can detect, with high precision, any arrhythmias that the user may be suffering. Alarms can then be activated in time to alert a medical center in order to provide the proper medical assistance. One of our aims when building the system has been to optimize limited and expensive resources like PDA memory size and wireless communication costs. Moreover, accessibility is also an important feature of the system that has been achieved by the development of web services to query the data computed in the PDA. In this way, authorized personnel (physicians and relatives) can easily obtain access to that data. PMID:15718599

  5. Gas turbine engine control system

    NASA Technical Reports Server (NTRS)

    Idelchik, Michael S. (Inventor)

    1991-01-01

    A control system and method of controlling a gas turbine engine. The control system receives an error signal and processes the error signal to form a primary fuel control signal. The control system also receives at least one anticipatory demand signal and processes the signal to form an anticipatory fuel control signal. The control system adjusts the value of the anticipatory fuel control signal based on the value of the error signal to form an adjusted anticipatory signal and then the adjusted anticipatory fuel control signal and the primary fuel control signal are combined to form a fuel command signal.

  6. A Model for Systemic Control

    NASA Astrophysics Data System (ADS)

    Schwaninger, Markus; Ambroz, Kristjan; Olaya, Camilo

    2006-06-01

    Where should one begin with a design for the self-control of social systems? That is the question addressed by this paper. The traditional concepts of control rest on the feedback loop; control is essential to the attainment of goals. However, the simple feedback loop is insufficient for the modeling of a control system for an organization or other social system. For those systems, which search for multiple goals, it is necessary to design multilevel control systems incorporating the notion of pre-control. This eminently anticipatory function has hardly been considered by past research. Pre-control as understood here is a higher-order control that takes place between different logical levels of a control system. The Model of Systemic Control (MSC), a framework for multilevel control with pre-control relationships, is expounded and illustrated by means of a System Dynamics model.

  7. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  8. A Rewritable, Random-Access DNA-Based Storage System

    PubMed Central

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-01-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications. PMID:26382652

  9. A Rewritable, Random-Access DNA-Based Storage System.

    PubMed

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-01-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications. PMID:26382652

  10. A Rewritable, Random-Access DNA-Based Storage System

    NASA Astrophysics Data System (ADS)

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  11. MIRADAS control system

    NASA Astrophysics Data System (ADS)

    Rosich Minguell, Josefina; Garzón Lopez, Francisco

    2012-09-01

    The Mid-resolution InfRAreD Astronomical Spectrograph (MIRADAS, a near-infrared multi-object echelle spectrograph operating at spectral resolution R=20,000 over the 1-2.5μm bandpass) was selected in 2010 by the Gran Telescopio Canarias (GTC) partnership as the next-generation near-infrared spectrograph for the world's largest optical/infrared telescope, and is being developed by an international consortium. The MIRADAS consortium includes the University of Florida, Universidad de Barcelona, Universidad Complutense de Madrid, Instituto de Astrofísica de Canarias, Institut de Física d'Altes Energies, Institut d'Estudis Espacials de Catalunya and Universidad Nacional Autónoma de México. This paper shows an overview of the MIRADAS control software, which follows the standards defined by the telescope to permit the integration of this software on the GTC Control System (GCS). The MIRADAS Control System is based on a distributed architecture according to a component model where every subsystem is selfcontained. The GCS is a distributed environment written in object oriented C++, which runs components in different computers, using CORBA middleware for communications. Each MIRADAS observing mode, including engineering, monitoring and calibration modes, will have its own predefined sequence, which are executed in the GCS Sequencer. These sequences will have the ability of communicating with other telescope subsystems.

  12. Crawling the Control System

    SciTech Connect

    Theodore Larrieu

    2009-10-01

    Information about accelerator operations and the control system resides in various formats in a variety of places on the lab network. There are operating procedures, technical notes, engineering drawings, and other formal controlled documents. There are programmer references and API documentation generated by tools such as doxygen and javadoc. There are the thousands of electronic records generated by and stored in databases and applications such as electronic logbooks, training materials, wikis, and bulletin boards and the contents of text-based configuration files and log files that can also be valuable sources of information. The obvious way to aggregate all these sources is to index them with a search engine that users can then query from a web browser. Toward this end, the Google "mini" search appliance was selected and implemented because of its low cost and its simple web-based configuration and management. In addition to crawling and indexing electronic documents, the appliance provides an API that has been used to supplement search results with live control system data such as current values of EPICS process variables and graphs of recent data from the archiver.

  13. OASIS: A Data Fusion System Optimized for Access to Distributed Archives

    NASA Astrophysics Data System (ADS)

    Berriman, G. B.; Kong, M.; Good, J. C.

    2002-05-01

    The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.

  14. Internal Control, Auditing, and the Automated Acquisitions System.

    ERIC Educational Resources Information Center

    Hawks, Carol Pitts

    1990-01-01

    Discusses issues and procedures involved in auditing the automated acquisitions system at Ohio State University Libraries. The audit process is explained, internal controls within the system are identified, general control mechanisms such as limited electronic access are discussed, and application control mechanisms that relate to specific…

  15. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  16. CONTROL ROOM WITH SPRINKLER SYSTEM CONTROLS, INCLUDING MANUAL CONTROL BOXES ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    CONTROL ROOM WITH SPRINKLER SYSTEM CONTROLS, INCLUDING MANUAL CONTROL BOXES FOR THE VENTILATION SYSTEM AND A PLC SWITCH FOR AUTOMATIC CO (CARBON MONOXIDE) SYSTEM. THE AIR TESTING SYSTEM IS FREE STANDING AND THE FANS ARE COMPUTER-OPERATED. - Alaskan Way Viaduct and Battery Street Tunnel, Seattle, King County, WA

  17. Smog control system

    SciTech Connect

    Eichhorn, C.D.

    1992-01-01

    A smog control system is designed comprised of fans or blowers which are located to introduce air into a smog particle destruction chamber operated with laser energy. The smog particles are broken down and the air is passed into a filtering chamber which may adopt the form of a liquid charcoal chamber. The air may be bubbled through the liquid charcoal and the effluent may then be passed into a freshening agent chamber. The air may then pass as an effluent from the freshening agent chamber. A liquid charcoal supply may be connected to the liquid charcoal chamber and the recovered liquid charcoal which has been spent may be reused for other purposes.

  18. BLTC control system software

    SciTech Connect

    Logan, J.B., Fluor Daniel Hanford

    1997-02-10

    This is a direct revision to Rev. 0 of the BLTC Control System Software. The entire document is being revised and released as HNF-SD-FF-CSWD-025, Rev 1. The changes incorporated by this revision include addition of a feature to automate the sodium drain when removing assemblies from sodium wetted facilities. Other changes eliminate locked in alarms during cold operation and improve the function of the Oxygen Analyzer. See FCN-620498 for further details regarding these changes. Note the change in the document number prefix, in accordance with HNF-MD-003.

  19. Design of the optical system for FSO access

    NASA Astrophysics Data System (ADS)

    Xu, Xiaojing; Yuan, Xiuhua; Huang, Dexiu

    2002-08-01

    Free space optics (FSO) is attractive for the 'last mile' communication in recent years for many combining advantages of fiber communication and other wireless technologies. FSO can provide high data rate with low power consumption, high immunity to interference, convenient deployment and flexibility. Optical system is an important section in the FSO transceiver terminal. In this paper the design of optical system based on a single Galileo telescope for both transmit and receive is proposed, and a polarization beam splitter is adopted to apart the receiving light from transmitting light. The configuration can avoid interference from the retroreflecting light of the ocular effectively. Some factors that affect the performance of the optical system are analyzed, such as the geometrical spreading loss and the loss increment according to pointing error and telescope maladjustment. Power budget shows that the system can satisfy the need of access for 1km in the light fog, and 2km in the thin fog.

  20. Airflow control system

    DOEpatents

    Motszko, Sean Ronald; McEnaney, Ryan Patrick; Brush, Jeffrey Alan; Zimmermann, Daniel E.

    2007-03-13

    A dual airflow control system for an environment having a first air zone and a second air zone. The system includes a first input device operable to generate a first input signal indicative of a desired airflow to the first zone and a second input device operable to generate a second input signal indicative of a desired airflow to the second zone. First and second flow regulators are configured to regulate airflow to the first and second zones, respectively, such that the first and second regulators selectively provide the airflow to each of the first and second zones based on the first and second input signals. A single actuator is associated with the first and second flow regulators. The actuator is operable to simultaneously actuate the first and second flow regulators based on an input from the first and second input devices to allow the desired airflows to the first and the second zones.

  1. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  2. Online Learning Flight Control for Intelligent Flight Control Systems (IFCS)

    NASA Technical Reports Server (NTRS)

    Niewoehner, Kevin R.; Carter, John (Technical Monitor)

    2001-01-01

    The research accomplishments for the cooperative agreement 'Online Learning Flight Control for Intelligent Flight Control Systems (IFCS)' include the following: (1) previous IFC program data collection and analysis; (2) IFC program support site (configured IFC systems support network, configured Tornado/VxWorks OS development system, made Configuration and Documentation Management Systems Internet accessible); (3) Airborne Research Test Systems (ARTS) II Hardware (developed hardware requirements specification, developing environmental testing requirements, hardware design, and hardware design development); (4) ARTS II software development laboratory unit (procurement of lab style hardware, configured lab style hardware, and designed interface module equivalent to ARTS II faceplate); (5) program support documentation (developed software development plan, configuration management plan, and software verification and validation plan); (6) LWR algorithm analysis (performed timing and profiling on algorithm); (7) pre-trained neural network analysis; (8) Dynamic Cell Structures (DCS) Neural Network Analysis (performing timing and profiling on algorithm); and (9) conducted technical interchange and quarterly meetings to define IFC research goals.

  3. Patient-centred access to health care: conceptualising access at the interface of health systems and populations

    PubMed Central

    2013-01-01

    Background Access is central to the performance of health care systems around the world. However, access to health care remains a complex notion as exemplified in the variety of interpretations of the concept across authors. The aim of this paper is to suggest a conceptualisation of access to health care describing broad dimensions and determinants that integrate demand and supply-side-factors and enabling the operationalisation of access to health care all along the process of obtaining care and benefiting from the services. Methods A synthesis of the published literature on the conceptualisation of access has been performed. The most cited frameworks served as a basis to develop a revised conceptual framework. Results Here, we view access as the opportunity to identify healthcare needs, to seek healthcare services, to reach, to obtain or use health care services, and to actually have a need for services fulfilled. We conceptualise five dimensions of accessibility: 1) Approachability; 2) Acceptability; 3) Availability and accommodation; 4) Affordability; 5) Appropriateness. In this framework, five corresponding abilities of populations interact with the dimensions of accessibility to generate access. Five corollary dimensions of abilities include: 1) Ability to perceive; 2) Ability to seek; 3) Ability to reach; 4) Ability to pay; and 5) Ability to engage. Conclusions This paper explains the comprehensiveness and dynamic nature of this conceptualisation of access to care and identifies relevant determinants that can have an impact on access from a multilevel perspective where factors related to health systems, institutions, organisations and providers are considered with factors at the individual, household, community, and population levels. PMID:23496984

  4. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    ERIC Educational Resources Information Center

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  5. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings, and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  6. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings, and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  7. Database of extended radiation maps and its access system

    NASA Astrophysics Data System (ADS)

    Verkhodanov, O. V.; Naiden, Ya. V.; Chernenkov, V. N.; Verkhodanova, N. V.

    2014-01-01

    We describe the architecture of the developed computing web server http://cmb.sao.ru allowing to synthesize the maps of extended radiation on the full sphere from the spherical harmonics in the GLESP pixelization grid, smooth them with the power beam pattern with various angular resolutions in the multipole space, and identify regions of the sky with given coordinates. We describe the server access and administration systems as well as the technique constructing the sky region maps, organized in Python in the Django web-application development framework.

  8. Alarm Management System for the D/3 Distributed Control System

    Energy Science and Technology Software Center (ESTSC)

    1997-03-19

    As industrial processes continue to grow in size and complexity, the Distrubuted Control Systems that automate and monitor these processes expand in a like manner. This increase in control system complexity has resulted in ever increasing numbers of alarms presented to the operator. The challenge for today's control system designer is to find innovative ways to present alarm information to the operator such that despite the large number of alarms, the operator is able tomore » quickly assess the status of the plant and immediately respond to the most critical alarms in a timely manner. This software package, designed and developed for the Savannah River Site Replacement High Level Waste Evaporator/Waste Removal Distributed Control System installed on the H-Area Tank Farm, provides an alarm system which utilizes the annunciator (SKID) panel as a means of statusing the plant and providing single keystroke access to the display on which an alarm resides.« less

  9. Alarm Management System for the D/3 Distributed Control System

    SciTech Connect

    McEver, M.

    1997-03-19

    As industrial processes continue to grow in size and complexity, the Distrubuted Control Systems that automate and monitor these processes expand in a like manner. This increase in control system complexity has resulted in ever increasing numbers of alarms presented to the operator. The challenge for today's control system designer is to find innovative ways to present alarm information to the operator such that despite the large number of alarms, the operator is able to quickly assess the status of the plant and immediately respond to the most critical alarms in a timely manner. This software package, designed and developed for the Savannah River Site Replacement High Level Waste Evaporator/Waste Removal Distributed Control System installed on the H-Area Tank Farm, provides an alarm system which utilizes the annunciator (SKID) panel as a means of statusing the plant and providing single keystroke access to the display on which an alarm resides.

  10. FPGA based Smart Wireless MIMO Control System

    NASA Astrophysics Data System (ADS)

    Usman Ali, Syed M.; Hussain, Sajid; Akber Siddiqui, Ali; Arshad, Jawad Ali; Darakhshan, Anjum

    2013-12-01

    In our present work, we have successfully designed, and developed an FPGA based smart wireless MIMO (Multiple Input & Multiple Output) system capable of controlling multiple industrial process parameters such as temperature, pressure, stress and vibration etc. To achieve this task we have used Xilin x Spartan 3E FPGA (Field Programmable Gate Array) instead of conventional microcontrollers. By employing FPGA kit to PC via RF transceivers which has a working range of about 100 meters. The developed smart system is capable of performing the control task assigned to it successfully. We have also provided a provision to our proposed system that can be accessed for monitoring and control through the web and GSM as well. Our proposed system can be equally applied to all the hazardous and rugged industrial environments where a conventional system cannot work effectively.

  11. Smooth migration technologies towards next-generation access systems

    NASA Astrophysics Data System (ADS)

    Yoshimoto, Naoto

    2010-01-01

    The investigation of next-generation optical access network (NG-OAN) systems as well as the corresponding standardization activities has been steadily progressing. In the near future, whenever such a NG-OAN system is deployed to meet the bandwidth demands, the smooth migration from the existing system is indispensable because current PON systems such as 1G-EPON/G-PON have been massively deployed all over the world. NGA systems should be deployed so as not to interrupt existing system operation or degrade in-service user availability. I introduce recent technical topics related to co-existence with 1G/10G-EPON as an example. In particular, a 1G/10G dual-rate dynamic bandwidth allocation (DBA) technique and a 1G/10G dual-rate burst-mode transceiver are key technologies enabling 1G- and 10Gdata to be handled simultaneously. Furthermore, from the CAPEX/OPEX reduction viewpoint, longer lifetime system is preferable. NGA systems will, therefore, be more flexible to meet later bandwidth demands, wide coverage requirement, and energy-efficient operation. WDM technology is an attractive approach to meeting these goals.

  12. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  13. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  14. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  15. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  16. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  17. Pollution control system

    SciTech Connect

    Voliva, B.H.; Bernstein, I.B.

    1984-09-25

    A pollution control system is disclosed wherein condensable pollutants are removed from a high-temperature gas stream by counterflow contact in a vertical tower with downwardly flowing, relatively cool absorbent oil. The absorbent is at a sufficiently low temperature so as to rapidly condense a portion of the pollutants in order to form a fog of fine droplets of pollutant entrained by the gas stream, which fog is incapable of being absorbed by the absorbent. The remainder of the condensable pollutants is removed by downwardly flowing absorbent oil, and the gas and entrained fog are directed from the tower to gas/droplet separation means, such as an electrostatic precipitator. The fog is thereby separated from the gas and substantially pollutant-free gas is discharged to the atmosphere.

  18. Optically controlled welding system

    NASA Technical Reports Server (NTRS)

    Gordon, Stephen S. (Inventor)

    1989-01-01

    An optically controlled welding system (10) wherein a welding torch (12) having through-the-torch viewing capabilities is provided with an optical beam splitter (56) to create a transmitted view and a reflective view of a welding operation. These views are converted to digital signals which are then processed and utilized by a computerized robotic welder (15) to make the welding torch responsive thereto. Other features includes an actively cooled electrode holder (26) which minimizes a blocked portion of the view by virtue of being constructed of a single spoke or arm (28) and a weld pool contour detector (14) comprising a laser beam directed onto the weld pool with the position of specular radiation reflected therefrom being characteristic of a penetrated or unpenetrated condition of the weld pool.

  19. Optically controlled welding system

    NASA Technical Reports Server (NTRS)

    Gordon, Stephen S. (Inventor)

    1988-01-01

    An optically controlled welding system wherein a welding torch having through-the-torch viewing capabilities is provided with an optical beam splitter to create a transmitted view and a reflective view of a welding operation. These views are converted to digital signals which are then processed and utilized by a computerized robotic welder to make the welding torch responsive thereto. Other features include an actively cooled electrode holder which minimizes a blocked portion of the view by virtue of being constructed of a single spoke or arm, and a weld pool contour detector comprising a laser beam directed onto the weld pool with the position of specular radiation reflected therefrom, being characteristic of a penetrated or unpenetrated condition of the weld pool.

  20. On Restructurable Control System Theory

    NASA Technical Reports Server (NTRS)

    Athans, M.

    1983-01-01

    The state of stochastic system and control theory as it impacts restructurable control issues is addressed. The multivariable characteristics of the control problem are addressed. The failure detection/identification problem is discussed as a multi-hypothesis testing problem. Control strategy reconfiguration, static multivariable controls, static failure hypothesis testing, dynamic multivariable controls, fault-tolerant control theory, dynamic hypothesis testing, generalized likelihood ratio (GLR) methods, and adaptive control are discussed.

  1. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  2. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  3. Thermal control system technology discipline

    NASA Technical Reports Server (NTRS)

    Ellis, Wilbert E.

    1990-01-01

    Viewgraphs on thermal control systems technology discipline for Space Station Freedom are presented. Topics covered include: heat rejection; heat acquisition and transport; monitoring and control; passive thermal control; and analysis and test verification.

  4. Division 1137 property control system

    SciTech Connect

    Pastor, D.J.

    1982-01-01

    An automated data processing property control system was developed by Mobile and Remote Range Division 1137. This report describes the operation of the system and examines ways of using it in operational planning and control.

  5. Introduction to the Personal Access Satellite System Study

    NASA Technical Reports Server (NTRS)

    Sue, Miles K.

    1990-01-01

    A recent study by the National Telecommunications and Information Administration (NTIA) has concluded that the 21st century will be the age of information in which the telecommunication infrastructure will be vital to the social and economic well being of society. To meet the challenge of the coming age, JPL has been performing studies on a personal access satellite system (PASS) for the 21st century. The PASS study can be traced back to a study in which the technical feasibility and potential applications of a high frequency, low data rate satellite system were identified using small fixed terminals. Herein, the PASS concept is described along with the strawman design. Then the key challenges are identified along with possible solutions. Finally, the plan for the future is summarized from the key results.

  6. Environment control system

    DOEpatents

    Sammarone, Dino G.

    1978-01-01

    A system for controlling the environment of an enclosed area in nuclear reactor installations. The system permits the changing of the environment from nitrogen to air, or from air to nitrogen, without the release of any radioactivity or process gas to the outside atmosphere. In changing from a nitrogen to an air environment, oxygen is inserted into the enclosed area at the same rate which the nitrogen-oxygen gas mixture is removed from the enclosed area. The nitrogen-oxygen gas mixture removed from the enclosed area is mixed with hydrogen, the hydrogen recombining with the oxygen present in the gas to form water. The water is then removed from the system and, if it contains any radioactive products, can be utilized to form concrete, which can then be transferred to a licensed burial site. The process gas is purified further by stripping it of carbon dioxide and then distilling it to remove any xenon, krypton, and other fission or non-condensable gases. The pure nitrogen is stored as either a cryogenic liquid or a gas. In changing from an air to nitrogen environment, the gas is removed from the enclosed area, mixed with hydrogen to remove the oxygen present, dried, passed through adsorption beds to remove any fission gases, and reinserted into the enclosed area. Additionally, the nitrogen stored during the nitrogen to air change, is inserted into the enclosed area, the nitrogen from both sources being inserted into the enclosed area at the same rate as the removal of the gas from the containment area. As designed, the amount of nitrogen stored during the nitrogen to air change substantially equals that required to replace oxygen removed during an air to nitrogen change.

  7. e-VLBI Access Point (eAXP) - a centralized control and EGAE configuration / management application

    NASA Astrophysics Data System (ADS)

    Ruszczyk, Chester Whitney, Alan

    Setting up experiments to utilize Experiment Guided Adaptive Endpoint (EGAE) and e-VLBI is presently a complex and time intensive process requiring scientific, Mark5 and networking knowledge. There is no central access to point to configure and manage all of these aspects of an experiment. The e-VLBI Access Point (eAXP) is a centralized control plane management tool that offers a GUI interface to augment the command line interface presently being used to set up and conduct experiments. eAXP contains three major toolsets: one to set up and execute an experiment using real-time or non-real time modes; the second to configure and manage EGAE; and a third to view statistics of the experiments. Initially the overall system architecture for eAXP is presented, followed by details of the Experiment Profiler toolset including screen shots of the system presently being tested. This will be followed by how eAXP will support real-time modes interfacing to the Dynamic Resource Allocation over GMPLS Optical Network (DRAGON) resource management project.

  8. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  9. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  10. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    NASA Astrophysics Data System (ADS)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  11. Multiwavelength optical code-division-multiple-access communication systems

    NASA Astrophysics Data System (ADS)

    Lam, Cedric Fung

    1999-10-01

    There has been tremendous interest in applying spread spectrum and code division multiple access (CDMA) techniques to fiber optic communication systems. In this dissertation, we review the previous work on optical CDMA systems, and we propose and then demonstrate new optical CDMA system designs. The explosive growth in bandwidth demand during the recent years have compelled engineers to achieve one bit per hertz or more bandwidth utilization in optical fibers. We point out that in order to achieve efficient bandwidth utilization, full orthogonality is required in optical CDMA system. At the same time, one would like to avoid having an optical local oscillator, which significantly increases the system complexity. We have studied two spectrally encoded optical CDMA systems, both of which give us full orthogonality. A balanced optical detector, which `computes' the difference between two photodetectors signals, is used to obtain negative outputs from positive-only optical intensity signals, thus achieving full orthogonality in both systems. The first system, complementary spectral intensity encoding, is a fully non-coherent. A novel balanced transmitter has been invented for this system. Unfortunately, the performance of this system is limited by beat noise interference, sometimes called speckle noise. In the second system, spectral phase encoding, a multi-wavelength mode-locked laser source is employed. Spectral phase encoding is applied to various frequency components. By sending the unmodulated carrier along the optical fiber to the receiver, we can achieve the effect of coherent demodulation without using an optical local oscillator. While this system can avoid speckle noise, it is eventually limited by cumulative shot noise. We will show in this dissertation, that cumulative shot noise is unavoidable in all optical CDMA systems. Therefore the ultimate achievable performance of optical CDMA systems under shot noise limitation will be analyzed in this work. Lastly

  12. Secure access control to hidden data by biometric features

    NASA Astrophysics Data System (ADS)

    Cancellaro, M.; Carli, M.; Egiazarian, K.; Neri, A.

    2007-04-01

    In this paper, a novel authentications system combining biometric cryptosystems with digital watermarking is presented. One of the main vulnerabilities of the existing data hiding systems is the public knowledge of the embedding domain. We propose the use of biometric data, minutiae fingerprint set, for generating the encryption key needed to decompose an image in the Tree structured Haar transform. The uniqueness of the biometrics key together with other, embedded, biometric information guarantee the authentication of the user. Experimental tests show the effectiveness of the proposed system.

  13. Aircraft control system

    NASA Technical Reports Server (NTRS)

    Kendall, Greg T. (Inventor); Morgan, Walter R. (Inventor)

    2010-01-01

    A span-loaded, highly flexible flying wing, having horizontal control surfaces mounted aft of the wing on extended beams to form local pitch-control devices. Each of five spanwise wing segments of the wing has one or more motors and photovoltaic arrays, and produces its own lift independent of the other wing segments, to minimize inter-segment loads. Wing dihedral is controlled by separately controlling the local pitch-control devices consisting of a control surface on a boom, such that inboard and outboard wing segment pitch changes relative to each other, and thus relative inboard and outboard lift is varied.

  14. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  15. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  16. LNFCS. Liquid Nitrogen Fill Control System

    SciTech Connect

    Reber, E.

    1998-12-01

    The Liquid Nitrogen Fill Control System controls the periodic filling of Germanium detector dewars with liquid nitrogen, as well as, filling portable LN2 supply tanks with liquid nitrogen from a high pressure LN2 storage tank. LNFCS major features are: Remote access, Fills detectors periodically, Monitors fills and logs results, Fully adjustable set of preferences, Graphical interface, Fully operational by command line entry, Senses if LN2 flow has stopped after fill, Individual detector fills without interrupting periodic fill, Automatic repeat fill when detectors fail to fill, Automatic filling of supply tank when 2 or more detectors fail to fill, Easy addition/deletion of detectors from fill cycle, Authorized access only, No clogging by ice of LN2 flow.

  17. System for controlling apnea

    SciTech Connect

    Holzrichter, John F

    2015-05-05

    An implanted stimulation device or air control device are activated by an external radar-like sensor for controlling apnea. The radar-like sensor senses the closure of the air flow cavity, and associated control circuitry signals (1) a stimulator to cause muscles to open the air passage way that is closing or closed or (2) an air control device to open the air passage way that is closing or closed.

  18. Search Hanford accessible reports electronically system design description. Revision 1

    SciTech Connect

    Gilomen, T.L.

    1995-12-31

    The Search Hanford Accessible Records Electronically (SHARE) system was produced by a combined team of personnel from Westinghouse Hanford Company (WHC) Corrective Action Data Systems (CADS) and Information Resource Management (IRM) Information and Scientific Systems (ISS) organizations. The ESQD Text Evaluation and exchange Tool (ETEXT) prototype was used as a basis for the requirements used to support this design/build effort. TOPIC was used to build the SHARE application. TOPIC is a text search and retrieval software product produced by the Verity Corporation. The TOPIC source code is not provided with the product, and the programs cannot be changed. TOPIC can be customized for special requirements. The software is fully documented. Help messages, menu and screen layouts, command edits and options, and internal system design are all described in the TOPIC documentation. This System Design Description (SDD) will not reiterate the TOPIC documentation and design. Instead, it will focus on the SHARE installation of TOPIC. This SDD is designed to assist the SHARE database/infobase administrator (DBA) in maintaining and supporting the application. It assumes that the assigned DBA is knowledgeable in using the TOPIC product, and is also knowledgeable in using a personal computer (PC), Disk Operating System (DOS) commands, and the document WHC-CM-3-10. SHARE is an Impact Level 4 system, and all activities related to SHARE must conform with the WHC-CM-3-10 procedures for an Impact Level 4 system. The Alternatives Analysis will be treated as a level 3-Q document, to allow for reference by potential future projects.

  19. Networked control of microgrid system of systems

    NASA Astrophysics Data System (ADS)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  20. SP-100 Control System Design

    NASA Astrophysics Data System (ADS)

    Shukla, Jaikaran N.; Halfen, Frank J.; Brynsvold, Glen V.; Syed, Akbar; Jiang, Thomas J.; Wong, Kwok K.; Otwell, Robert L.

    1994-07-01

    Recent work in lower power generic early applications for the SP-100 have resulted in control system design simplification for a 20 kWe design with thermoelectric power conversion. This paper presents the non-mission-dependent control system features for this design. The control system includes a digital computer based controller, dual purpose control rods and drives, temperature sensors, and neutron flux monitors. The thaw system is mission dependent and can be either electrical or based on NaK trace lines. Key features of the control system and components are discussed. As was the case for higher power applications, the initial on-orbit approach to criticality involves the relatively fast withdrawal of the control-rods to a near-critical position followed by slower movement through critical and into the power range. The control system performs operating maneuvers as well as providing for automatic startup, shutdown, restart, and reactor protection.

  1. The RHIC cryogenic control system

    SciTech Connect

    Farah, Y.; Sondericker, J.

    1993-08-01

    A cryogenic process control system for the RHIC Project is discussed. It is independent of the main RHIC Control System, consisting of an upgrade of the existing 24.8 Kw helium refrigerator control section with the addition of a ring control section that regulates and monitors all cryogenic signals in the RHIC tunnel. The system is fully automated, which can run without the continuous presence of operators.

  2. Title III Evaluation for the Access Road System

    SciTech Connect

    H.R. Montalv

    1998-07-28

    The objective of this evaluation is to provide recommendations to ensure consistency between the technical baseline requirements, baseline design, and the as-constructed Access Roads. Recommendations for resolving discrepancies between the as-constructed system, the technical baseline requirements, and the baseline design are included in this report. Cost and Schedule estimates are provided for all recommended modifications. This report does not address items which do not meet current safety or code requirements. These items are identified to the CMO and immediate action is taken to correct the situation. The report does identify safety and code items for which the A/E is recommending improvements. The recommended improvements will exceed the minimum requirements of applicable code and safety guide lines. These recommendations are intended to improve and enhance the operation and maintenance of the facility.

  3. SPring-8 beamline control system.

    PubMed

    Ohata, T; Konishi, H; Kimura, H; Furukawa, Y; Tamasaku, K; Nakatani, T; Tanabe, T; Matsumoto, N; Ishii, M; Ishikawa, T

    1998-05-01

    The SPring-8 beamline control system is now taking part in the control of the insertion device (ID), front end, beam transportation channel and all interlock systems of the beamline: it will supply a highly standardized environment of apparatus control for collaborative researchers. In particular, ID operation is very important in a third-generation synchrotron light source facility. It is also very important to consider the security system because the ID is part of the storage ring and is therefore governed by the synchrotron ring control system. The progress of computer networking systems and the technology of security control require the development of a highly flexible control system. An interlock system that is independent of the control system has increased the reliability. For the beamline control system the so-called standard model concept has been adopted. VME-bus (VME) is used as the front-end control system and a UNIX workstation as the operator console. CPU boards of the VME-bus are RISC processor-based board computers operated by a LynxOS-based HP-RT real-time operating system. The workstation and the VME are linked to each other by a network, and form the distributed system. The HP 9000/700 series with HP-UX and the HP 9000/743rt series with HP-RT are used. All the controllable apparatus may be operated from any workstation. PMID:15263588

  4. Distributed systems status and control

    NASA Technical Reports Server (NTRS)

    Kreidler, David; Vickers, David

    1990-01-01

    Concepts are investigated for an automated status and control system for a distributed processing environment. System characteristics, data requirements for health assessment, data acquisition methods, system diagnosis methods and control methods were investigated in an attempt to determine the high-level requirements for a system which can be used to assess the health of a distributed processing system and implement control procedures to maintain an accepted level of health for the system. A potential concept for automated status and control includes the use of expert system techniques to assess the health of the system, detect and diagnose faults, and initiate or recommend actions to correct the faults. Therefore, this research included the investigation of methods by which expert systems were developed for real-time environments and distributed systems. The focus is on the features required by real-time expert systems and the tools available to develop real-time expert systems.

  5. LAPAROSCOPIC SALPINGECTOMY IN TWO CAPTIVE LEOPARDS (PANTHERA PARDUS) USING A SINGLE PORTAL ACCESS SYSTEM.

    PubMed

    Hartman, Marthinus J; Monnet, Eric; Kirberger, Robert M; Schoeman, Johan P

    2015-12-01

    Laparoscopic salpingectomy was performed in two adult leopards (Panthera pardus) using a single portal access system, with a multicannulated single-incision laparoscopic surgery port, without any complications. The poorly developed ovarian bursa provided easy access to the uterine tube for salpingectomy. Laparoscopic salpingectomy can be safely performed in the leopard using a single portal access system. PMID:26667558

  6. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    PubMed Central

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  7. Implications of access hole size on tank waste retrieval system design and cost

    SciTech Connect

    Babcock, S.M.; Kwon, D.S.; Burks, B.L.; Stoughton, R.S.; Evans, M.S.

    1994-05-01

    The DOE Environmental Restoration and Waste Management Robotics Technology Development Program has been investigating the application of robotics technology to the retrieval of waste from single-shell storage tanks for several years. The use of a large, ``long-reach`` manipulator to position and orient a variety of tools and other equipment has been recommended. The objective of this study is to determine the appropriate access hole size for the tank waste retrieval system installation. Previous reports on the impact of access hole size on manipulator performance are summarized. In addition, the practical limitation for access hole size based on structural limitations of the waste storage tanks, the state-of-the-art size limitations for the installation of new risers, the radiation safety implications of various access hole sizes, and overall system cost implications are considered. Basic conclusions include: (1) overall cost of remediation will; be dominated by the costs of the balance of plant and time required to perform the task rather than the cost of manipulator hardware or the cost of installing a riser, (2) the most desirable solution from a manipulator controls point of view is to make the manipulator as stiff as possible and have as high as possible a natural frequency, which implies a large access hole diameter, (3) beyond some diameter; simple, uniform cross-section elements become less advantageous from a weight standpoint and alternative structures should be considered, and (4) additional shielding and contamination control measures would be required for larger holes. Parametric studies summarized in this report considered 3,790,000 1 (1,000,000 gal) tanks, while initial applications are likely to be for 2,840,000 1 (750,000 gal) tanks. Therefore, the calculations should be somewhat conservative, recognizing the limitations of the specific conditions considered.

  8. Acquiring a CD-ROM Public Access Catalog System. Part 1: The Bottom Line May Not Be the Top Priority.

    ERIC Educational Resources Information Center

    Helgerson, Linda W.

    1987-01-01

    Compares pricing of seven CD-ROM-based public access catalog systems for libraries of diverse sizes and groupings. Other features of the systems are outlined in the broad areas of database preparation, indexing, database updates, hardware, information retrieval, library controlled elements, interlibrary loan, reports, user support, future…

  9. Supervisory control systems

    NASA Technical Reports Server (NTRS)

    Sheridan, T. B.

    1974-01-01

    The various functions of a computer are considered that serve in connecting the man, with his displays and controls, to an external environment, manipulator activators and the interoceptors that are in the actuators, and to the interosensors and the motors or the actuators to drive the sensors. Projected is an improved exoskeleton mechanism with computer control and some supervisory control that may give a quadriplegic the ability to walk and run around.

  10. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  11. Controls of maglev suspension systems

    SciTech Connect

    Cai, Y.; Zhu, S.; Chen, S.S.; Rote, D.M.

    1993-06-01

    This study investigates alternative control designs of maglev vehicle suspension systems. Active and semi-active control law designs are introduced into primary and secondary suspensions of maglev vehicles. A one-dimensional vehicle with two degrees of freedom, to simulate the German Transrapid Maglev System, is used for suspension control designs. The transient and frequency responses of suspension systems and PSDs of vehicle accelerations are calculated to evaluate different control designs. The results show that active and semi-active control designs indeed improve the response of vehicle and provide an acceptable ride comfort for maglev systems.

  12. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  13. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  14. Power System Trade Studies for the Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Kohout, Lisa, L.

    2008-01-01

    A Lunar Lander Preparatory Study (LLPS) was undertaken for NASA's Lunar Lander Pre-Project in 2006 to explore a wide breadth of conceptual lunar lander designs. Civil servant teams from nearly every NASA center responded with dozens of innovative designs that addressed one or more specific lander technical challenges. Although none of the conceptual lander designs sought to solve every technical design issue, each added significantly to the technical database available to the Lunar Lander Project Office as it began operations in 2007. As part of the LLPS, a first order analysis was performed to identify candidate power systems for the ascent and descent stages of the Lunar Surface Access Module (LSAM). A power profile by mission phase was established based on LSAM subsystem power requirements. Using this power profile, battery and fuel cell systems were modeled to determine overall mass and volume. Fuel cell systems were chosen for both the descent and ascent stages due to their low mass. While fuel cells looked promising based on these initial results, several areas have been identified for further investigation in subsequent studies, including the identification and incorporation of peak power requirements into the analysis, refinement of the fuel cell models to improve fidelity and incorporate ongoing technology developments, and broadening the study to include solar power.

  15. "An On-Line Access System for TRMM Data"

    NASA Technical Reports Server (NTRS)

    Rui, Hualan

    1999-01-01

    The Tropical Rainfall Measuring Mission (TRMM), jointly sponsored by the National Aeronautics and Space Administration (NASA) of United States and the National Space Development Agency (NASDA) of Japan, provides visible, infrared, and microwave observations of tropical and subtropical rain system. The satellite observations are complemented by ground radar and rain gauge measurements to validate satellite rain estimation techniques. TRMM satellite was launched on November 27, 1997(EST). Data from TRMM are being archived, processed, and disseminated by DAAC at the Goddard Space Flight Center (GSFC) of NASA. The Goddard DAAC has been archiving Tropical Rainfall Measuring Mission (TRMM) data since the launch. The TRMM level 1 and level 2 products first have been released to public on June 15, 1998. Now, most of TRMM products, including some ground validation products are released to public. TRMM data are useful for forecast model research, disaster mitigation, climatological studies, agricultural predictions, and many other applications. An online system or user interface is designed for easy, friendly, and quick display, access, and ordering of the TRMM data. Components, features, and limitations of the system will be discussed and demonstrated. The TRMM standard products and variety of the subsets and ancillary data will be shown, and their availability will be discussed.

  16. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  17. The ATLAS Detector Control System

    NASA Astrophysics Data System (ADS)

    Lantzsch, K.; Arfaoui, S.; Franz, S.; Gutzwiller, O.; Schlenker, S.; Tsarouchas, C. A.; Mindur, B.; Hartert, J.; Zimmermann, S.; Talyshev, A.; Oliveira Damazio, D.; Poblaguev, A.; Braun, H.; Hirschbuehl, D.; Kersten, S.; Martin, T.; Thompson, P. D.; Caforio, D.; Sbarra, C.; Hoffmann, D.; Nemecek, S.; Robichaud-Veronneau, A.; Wynne, B.; Banas, E.; Hajduk, Z.; Olszowska, J.; Stanecka, E.; Bindi, M.; Polini, A.; Deliyergiyev, M.; Mandic, I.; Ertel, E.; Marques Vinagre, F.; Ribeiro, G.; Santos, H. F.; Barillari, T.; Habring, J.; Huber, J.; Arabidze, G.; Boterenbrood, H.; Hart, R.; Iakovidis, G.; Karakostas, K.; Leontsinis, S.; Mountricha, E.; Ntekas, K.; Filimonov, V.; Khomutnikov, V.; Kovalenko, S.; Grassi, V.; Mitrevski, J.; Phillips, P.; Chekulaev, S.; D'Auria, S.; Nagai, K.; Tartarelli, G. F.; Aielli, G.; Marchese, F.; Lafarguette, P.; Brenner, R.

    2012-12-01

    The ATLAS experiment is one of the multi-purpose experiments at the Large Hadron Collider (LHC) at CERN, constructed to study elementary particle interactions in collisions of high-energy proton beams. Twelve different sub detectors as well as the common experimental infrastructure are controlled and monitored by the Detector Control System (DCS) using a highly distributed system of 140 server machines running the industrial SCADA product PVSS. Higher level control system layers allow for automatic control procedures, efficient error recognition and handling, manage the communication with external systems such as the LHC controls, and provide a synchronization mechanism with the ATLAS data acquisition system. Different databases are used to store the online parameters of the experiment, replicate a subset used for physics reconstruction, and store the configuration parameters of the systems. This contribution describes the computing architecture and software tools to handle this complex and highly interconnected control system.

  18. Analysis of multiple access techniques in multi-satellite and multi-spot mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Corazza, Giovanni E.; Ferrarelli, Carlo; Vatalaro, Francesco

    1995-01-01

    In this paper the analysis of mobile satellite systems adopting constellations of multi-spot satellites over non-geostationary orbits is addressed. A link design procedure is outlined, taking into account system spectrum efficiency, probability of bit error and outage probability. A semi-analytic approach to the evaluation of outage probability in the presence of fading and imperfect power control is described, and applied to single channel per carrier (SCPC) and code division multiple access (CDMA) techniques. Some results are shown for the Globalstar, Iridium and Odyssey orbital configurations.

  19. Operating System For Numerically Controlled Milling Machine

    NASA Technical Reports Server (NTRS)

    Ray, R. B.

    1992-01-01

    OPMILL program is operating system for Kearney and Trecker milling machine providing fast easy way to program manufacture of machine parts with IBM-compatible personal computer. Gives machinist "equation plotter" feature, which plots equations that define movements and converts equations to milling-machine-controlling program moving cutter along defined path. System includes tool-manager software handling up to 25 tools and automatically adjusts to account for each tool. Developed on IBM PS/2 computer running DOS 3.3 with 1 MB of random-access memory.

  20. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  1. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  2. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  3. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  4. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Effort-control program for NE...-control program for NE multispecies limited access vessels. (a) Except as provided in §§ 648.17 and 648.82... program described in this section, unless otherwise provided elsewhere in this part. (1) End-of-year...

  5. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    .... 40354 (August 24, 1998), 63 FR 46264 (August 31, 1998) (NASD NTM-98-66). Certain market participants may... subscribers to ATSs, appropriately control the risks associated with market access, so as not to jeopardize... unaware of the trading activity occurring under its market identifier and have no mechanism to control...

  6. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  7. Fluid delivery control system

    SciTech Connect

    Hoff, Brian D.; Johnson, Kris William; Algrain, Marcelo C.; Akasam, Sivaprasad

    2006-06-06

    A method of controlling the delivery of fluid to an engine includes receiving a fuel flow rate signal. An electric pump is arranged to deliver fluid to the engine. The speed of the electric pump is controlled based on the fuel flow rate signal.

  8. Autorotation flight control system

    NASA Technical Reports Server (NTRS)

    Bachelder, Edward N. (Inventor); Lee, Dong-Chan (Inventor); Aponso, Bimal L. (Inventor)

    2011-01-01

    The present invention provides computer implemented methodology that permits the safe landing and recovery of rotorcraft following engine failure. With this invention successful autorotations may be performed from well within the unsafe operating area of the height-velocity profile of a helicopter by employing the fast and robust real-time trajectory optimization algorithm that commands control motion through an intuitive pilot display, or directly in the case of autonomous rotorcraft. The algorithm generates optimal trajectories and control commands via the direct-collocation optimization method, solved using a nonlinear programming problem solver. The control inputs computed are collective pitch and aircraft pitch, which are easily tracked and manipulated by the pilot or converted to control actuator commands for automated operation during autorotation in the case of an autonomous rotorcraft. The formulation of the optimal control problem has been carefully tailored so the solutions resemble those of an expert pilot, accounting for the performance limitations of the rotorcraft and safety concerns.

  9. The effects of hands free communication devices on clinical communication: balancing communication access needs with user control.

    PubMed

    Richardson, Joshua E; Richardson, Joshua Edwin; Ash, Joan S; Ash, Joan

    2008-01-01

    Hands Free Communication Device (HFCD) systems are a relatively new information and communication technology. HFCD systems enable clinicians to directly contact and communicate with one another using wearable, voice-controlled badges that are VoIP-based (voice-over IP) and are linked to one another over a wireless local area network (WLAN). This qualitative study utilized a grounded theory, multiple perspectives approach to understand how the use of HFCDs affected communication in the hospitals that implemented them. The study generated five themes revolving around HFCDs impact on communication. This paper specifically focuses on two of those themes: Communication Access and Control. PMID:18999046

  10. Percutaneous inner-ear access via an image-guided industrial robot system

    PubMed Central

    Baron, S; Eilers, H; Munske, B; Toennies, JL; Balachandran, R; Labadie, RF; Ortmaier, T; Webster, RJ

    2014-01-01

    Image-guided robots have been widely used for bone shaping and percutaneous access to interventional sites. However, due to high-accuracy requirements and proximity to sensitive nerves and brain tissues, the adoption of robots in inner-ear surgery has been slower. In this paper the authors present their recent work towards developing two image-guided industrial robot systems for accessing challenging inner-ear targets. Features of the systems include optical tracking of the robot base and tool relative to the patient and Kalman filter-based data fusion of redundant sensory information (from encoders and optical tracking systems) for enhanced patient safety. The approach enables control of differential robot positions rather than absolute positions, permitting simplified calibration procedures and reducing the reliance of the system on robot calibration in order to ensure overall accuracy. Lastly, the authors present the results of two phantom validation experiments simulating the use of image-guided robots in inner-ear surgeries such as cochlear implantation and petrous apex access. PMID:20718268

  11. Above the nominal limit performance evaluation of multiwavelength optical code-division multiple-access systems

    NASA Astrophysics Data System (ADS)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M. H.

    2009-03-01

    We provide an analysis for the performance of a multiwavelength optical code-division multiple-access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one-coincidence sequences with nonrepeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of the MW-OCDMA system can be critically affected when working above the nominal limit, an event that can happen when the network operates at a high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed medium access control (MAC) protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T, while the R3T is better at very high transmission rates. In general, it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  12. Alarm system for a nuclear control complex

    DOEpatents

    Scarola, Kenneth; Jamison, David S.; Manazir, Richard M.; Rescorl, Robert L.; Harmon, Daryl L.

    1994-01-01

    An advanced control room complex for a nuclear power plant, including a discrete indicator and alarm system (72) which is nuclear qualified for rapid response to changes in plant parameters and a component control system (64) which together provide a discrete monitoring and control capability at a panel (14-22, 26, 28) in the control room (10). A separate data processing system (70), which need not be nuclear qualified, provides integrated and overview information to the control room and to each panel, through CRTs (84) and a large, overhead integrated process status overview board (24). The discrete indicator and alarm system (72) and the data processing system (70) receive inputs from common plant sensors and validate the sensor outputs to arrive at a representative value of the parameter for use by the operator during both normal and accident conditions, thereby avoiding the need for him to assimilate data from each sensor individually. The integrated process status board (24) is at the apex of an information hierarchy that extends through four levels and provides access at each panel to the full display hierarchy. The control room panels are preferably of a modular construction, permitting the definition of inputs and outputs, the man machine interface, and the plant specific algorithms, to proceed in parallel with the fabrication of the panels, the installation of the equipment and the generic testing thereof.

  13. Framework for control system development

    SciTech Connect

    Cork, C.; Nishimura, Hiroshi.

    1991-11-01

    Control systems being developed for the present generation of accelerators will need to adapt to changing machine and operating state conditions. Such systems must also be capable of evolving over the life of the accelerator operation. In this paper we present a framework for the development of adaptive control systems.

  14. A telerobotic digital controller system

    NASA Technical Reports Server (NTRS)

    Brown, Richard J.

    1992-01-01

    This system is a network of joint mounted dual axes digital servo-controllers (DDSC), providing control of various joints and end effectors of different robotic systems. This report provides description of and user required information for the Digital Controller System Network (DSCN) and, in particular, the DDSC, Model DDSC-2, developed to perform the controller functions. The DDSC can control 3 phase brushless or brush type DC motors, requiring up to 8 amps. Only four wires, two for power and 2 for serial communication, are required, except for local sensor and motor connections. This highly capable, very flexible, programmable servo-controller, contained on a single, compact printed circuit board measuring only 4.5 x 5.1 inches, is applicable to control systems of all types from sub-arc second precision pointing to control of robotic joints and end effectors. This document concentrates on the robotic applications for the DDSC.

  15. Moving Object Control System

    NASA Technical Reports Server (NTRS)

    Arndt, G. Dickey (Inventor); Carl, James R. (Inventor)

    2001-01-01

    A method is provided for controlling two objects relatively moveable with respect to each other. A plurality of receivers are provided for detecting a distinctive microwave signal from each of the objects and measuring the phase thereof with respect to a reference signal. The measured phase signal is used to determine a distance between each of the objects and each of the plurality of receivers. Control signals produced in response to the relative distances are used to control the position of the two objects.

  16. TARA control, data acquisition and analysis system

    SciTech Connect

    Gaudreau, M.P.J.; Sullivan, J.D.; Fredian, T.W.; Karcher, C.A.; Sevillano, E.; Stillerman, J.; Thomas, P.

    1983-12-01

    The MIT tandem mirror (TARA) control, data acquisition and analysis system consists of two major parts: (1) a Gould 584 industrial programmable controller (PC) to control engineering functions; and (2) a VAX 11/750 based data acquisition and analysis system for physics analysis. The PC is designed for use in harsh industrial environments and has proven to be a reliable and cost-effective means for automated control. The PC configuration is dedicated to control tasks on the TARA magnet, vacuum, RF, neutral beam, diagnostics, and utility systems. The data transfer functions are used to download system operating parameters from menu selectable tables. Real time status reports are provided to video terminals and as blocks of data to the host computer for storage. The data acquisition and analysis system for TARA was designed to provide high throughput and ready access to data from earlier runs. The adopted design uses pre-existing software packages in a system which is simple, coherent, fast, and which requires a minimum of new software development. The computer configuration is a VAX 11/750 running VMS with 124 M byte massbus disk and 1.4 G byte unibus disk subsystem.

  17. SINP space physics data storage and access system

    NASA Astrophysics Data System (ADS)

    Barinova, Vera; Kalegaev, Vladimir; Parunakian, David

    In this paper we present the system for automated data retrieval and processing developed in the the Skobeltsyn Institute of Nuclear Physics. Telemetry data files containing scientific information (e.g. charged particle fluxes) are auto-matically parsed and stored in our Oracle database immediately upon arrival. Parsed telemetry files, metadata, instrument technical information and orbital parameters are also stored. Most of the data can be accessed via our public FTP server. Users can preview the data available for time intervals and channels of interest using the web interface provided. The preview plot building software has also been developed in-house. This system has been successfully used in 2009 with the following spacecraft and instru-ments: Electron-M-Pesca at Coronas-Photon (Electrons 200KeV -4 MeV+; Protons : 4 MeV -80MeV+ ;α : 5 -24 MeV/nucleon; CNO : 6 -15MeV/nucleon), DUFIK at Tatiana-2 (electrons, infrared 600nm ¡ ¡ 700nm and ultraviolet 300nm ¡ ¡ 400nm), MSGI and SKL at Meteor-M (10 spectral channels: 0,5-12,5 µm ). The data collections are available at http://smdc.sinp.msu.ru for visual preview and download.

  18. The CARIBU EBIS control and synchronization system

    NASA Astrophysics Data System (ADS)

    Dickerson, Clayton; Peters, Christopher

    2015-01-01

    The Californium Rare Isotope Breeder Upgrade (CARIBU) Electron Beam Ion Source (EBIS) charge breeder has been built and tested. The bases of the CARIBU EBIS electrical system are four voltage platforms on which both DC and pulsed high voltage outputs are controlled. The high voltage output pulses are created with either a combination of a function generator and a high voltage amplifier, or two high voltage DC power supplies and a high voltage solid state switch. Proper synchronization of the pulsed voltages, fundamental to optimizing the charge breeding performance, is achieved with triggering from a digital delay pulse generator. The control system is based on National Instruments realtime controllers and LabVIEW software implementing Functional Global Variables (FGV) to store and access instrument parameters. Fiber optic converters enable network communication and triggering across the platforms.

  19. The CARIBU EBIS control and synchronization system

    SciTech Connect

    Dickerson, Clayton Peters, Christopher

    2015-01-09

    The Californium Rare Isotope Breeder Upgrade (CARIBU) Electron Beam Ion Source (EBIS) charge breeder has been built and tested. The bases of the CARIBU EBIS electrical system are four voltage platforms on which both DC and pulsed high voltage outputs are controlled. The high voltage output pulses are created with either a combination of a function generator and a high voltage amplifier, or two high voltage DC power supplies and a high voltage solid state switch. Proper synchronization of the pulsed voltages, fundamental to optimizing the charge breeding performance, is achieved with triggering from a digital delay pulse generator. The control system is based on National Instruments realtime controllers and LabVIEW software implementing Functional Global Variables (FGV) to store and access instrument parameters. Fiber optic converters enable network communication and triggering across the platforms.

  20. Code Division Multiple Access system candidate for integrated modular avionics

    NASA Astrophysics Data System (ADS)

    Mendez, Antonio J.; Gagliardi, Robert M.

    1991-02-01

    There are government and industry trends towards avionics modularity and integrated avionics. Key requirements implicit in these trends are suitable data communication concepts compatible with the integration concept. In this paper we explore the use ofCode Division Multiple Access (CDMA) techniques as an alternative to collision detection and collision avoidance multiple access techniques.

  1. Patient access innovations: integrating patients within the system of care.

    PubMed

    Marino, Daniel J; Faber, William; Duncan, Meredith

    2015-12-01

    Clinically integrated networks seeking to ensure in-network access and strengthen patient engagement should adopt five strategic areas of focus: Extend access beyond traditional models. Manage out-migration. Make it easy for patients to stay in the network. Build patient engagement into clinical care models. Explore innovative methods to engage patients. PMID:26793943

  2. Access to Sign Language Interpreters in the Criminal Justice System.

    ERIC Educational Resources Information Center

    Miller, Katrina R.

    2001-01-01

    This study surveyed 46 professional sign language interpreters working in criminal justice settings and evaluated 22 cases to evaluate access issues for individuals with hearing impairments. Recommendations to increase the accessibility of interpreting services included providing ongoing awareness training to criminal justice personnel and…

  3. NUCLEAR REACTOR CONTROL SYSTEM

    DOEpatents

    Howard, D.F.; Motta, E.E.

    1961-06-27

    A method for controlling the excess reactivity in a nuclear reactor throughout the core life while maintaining the neutron flux distribution at the desired level is described. The control unit embodies a container having two electrodes of different surface area immersed in an electrolytic solution of a good neutron sbsorbing metal ion such as boron, gadolinium, or cadmium. Initially, the neutron absorber is plated on the larger electrode to control the greater neutron flux of a freshly refueled core. As the fuel burns up, the excess reactivity decreases and the neutron absorber is then plated onto the smaller electrode so that the number of neutrons absorbed also decreases. The excess reactivity in the core may thus be maintained without the introduction of serious perturbations in the neutron flux distributibn.

  4. AUTOMATIC FREQUENCY CONTROL SYSTEM

    DOEpatents

    Hansen, C.F.; Salisbury, J.D.

    1961-01-10

    A control is described for automatically matching the frequency of a resonant cavity to that of a driving oscillator. The driving oscillator is disconnected from the cavity and a secondary oscillator is actuated in which the cavity is the frequency determining element. A low frequency is mixed with the output of the driving oscillator and the resultant lower and upper sidebands are separately derived. The frequencies of the sidebands are compared with the secondary oscillator frequency. deriving a servo control signal to adjust a tuning element in the cavity and matching the cavity frequency to that of the driving oscillator. The driving oscillator may then be connected to the cavity.

  5. A semi-automated vascular access system (VAS) for preclinical models

    PubMed Central

    Berry-Pusey, B.N.; Chang, Y.C.; Prince, S.W.; Chu, K.; David, J.; Taschereau, R.; Silverman, R.W.; Williams, D.; Ladno, W.; Stout, D.; Tsao, T.C; Chatziioannou, A.

    2013-01-01

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform their own tail vein injections and to decrease the variability between injections a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared (NIR) light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography (PET) to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice. PMID:23877111

  6. The APS control system network

    SciTech Connect

    Sidorowicz, K.V.; McDowell, W.P.

    1995-12-31

    The APS accelerator control system is a distributed system consisting of operator interfaces, a network, and computer-controlled interfaces to hardware. This implementation of a control system has come to be called the {open_quotes}Standard Model.{close_quotes} The operator interface is a UNDC-based workstation with an X-windows graphical user interface. The workstation may be located at any point on the facility network and maintain full functionality. The function of the network is to provide a generalized communication path between the host computers, operator workstations, input/output crates, and other hardware that comprise the control system. The crate or input/output controller (IOC) provides direct control and input/output interfaces for each accelerator subsystem. The network is an integral part of all modem control systems and network performance will determine many characteristics of a control system. This paper will describe the overall APS network and examine the APS control system network in detail. Metrics are provided on the performance of the system under various conditions.

  7. National Ignition Facility integrated computer control system

    NASA Astrophysics Data System (ADS)

    Van Arsdall, Paul J.; Bettenhausen, R. C.; Holloway, Frederick W.; Saroyan, R. A.; Woodruff, J. P.

    1999-07-01

    The NIF design team is developing the Integrated Computer Control System (ICCS), which is based on an object-oriented software framework applicable to event-driven control system. The framework provides an open, extensive architecture that is sufficiently abstract to construct future mission-critical control systems. The ICCS will become operational when the first 8 out of 192 beams are activated in mid 2000. THe ICCS consists of 300 front-end processors attached to 60,000 control points coordinated by a supervisory system. Computers running either Solaris or VxWorks are networked over a hybrid configuration of switched fast Ethernet and asynchronous transfer mode (ATM). ATM carries digital motion video from sensor to operator consoles. Supervisory software is constructed by extending the reusable framework components for each specific application. The framework incorporates services for database persistence, system configuration, graphical user interface, status monitoring, event logging, scripting language, alert management, and access control. More than twenty collaborating software applications are derived from the common framework. The framework is interoperable among different kinds of computers and functions as a plug-in software bus by leveraging a common object request brokering architecture (CORBA). CORBA transparently distributes the software objects across the network. Because of the pivotal role played, CORBA was tested to ensure adequate performance.

  8. National Ignition Facility integrated computer control system

    SciTech Connect

    Van Arsdall, P.J., LLNL

    1998-06-01

    The NIF design team is developing the Integrated Computer Control System (ICCS), which is based on an object-oriented software framework applicable to event-driven control systems. The framework provides an open, extensible architecture that is sufficiently abstract to construct future mission-critical control systems. The ICCS will become operational when the first 8 out of 192 beams are activated in mid 2000. The ICCS consists of 300 front-end processors attached to 60,000 control points coordinated by a supervisory system. Computers running either Solaris or VxWorks are networked over a hybrid configuration of switched fast Ethernet and asynchronous transfer mode (ATM). ATM carries digital motion video from sensors to operator consoles. Supervisory software is constructed by extending the reusable framework components for each specific application. The framework incorporates services for database persistence, system configuration, graphical user interface, status monitoring, event logging, scripting language, alert management, and access control. More than twenty collaborating software applications are derived from the common framework. The framework is interoperable among different kinds of computers and functions as a plug-in software bus by leveraging a common object request brokering architecture (CORBA). CORBA transparently distributes the software objects across the network. Because of the pivotal role played, CORBA was tested to ensure adequate performance.

  9. Advanced flight control system study

    NASA Technical Reports Server (NTRS)

    Mcgough, J.; Moses, K.; Klafin, J. F.

    1982-01-01

    The architecture, requirements, and system elements of an ultrareliable, advanced flight control system are described. The basic criteria are functional reliability of 10 to the minus 10 power/hour of flight and only 6 month scheduled maintenance. A distributed system architecture is described, including a multiplexed communication system, reliable bus controller, the use of skewed sensor arrays, and actuator interfaces. Test bed and flight evaluation program are proposed.

  10. Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users

    NASA Astrophysics Data System (ADS)

    Long, Chengnian; Guan, Xinping

    We consider a distributed joint random access and power control scheme for interference management in wireless ad hoc networks. To derive decentralized solutions that do not require any cooperation among the users, we formulate this problem as non-cooperative joint random access and power control game, in which each user minimizes its average transmission cost with a given rate constraint. Using supermodular game theory, the existence and uniqueness of Nash equilibrium are established. Furthermore, we present an asynchronous distributed algorithm to compute the solution of the game based on myopic best response updates, which converges to Nash equilibrium globally.

  11. Dual pressure displacement control system

    SciTech Connect

    Louis, J.E.; Klocke, C.C.

    1988-02-02

    This patent describes a dual pressure servo control system for a variable displacement hydraulic unit having displacement setting means positioned by a hydraulic servo mechanism. The hydraulic unit is provided with main loop lines at least one of which is capable of being subjected to high main loop pressure during operation of the hydraulic unit, a control line including a displacement control valve providing a controlled flow of fluid under pressure to the servo mechanism, and a source of fluid under pressure for the control line comprising a low pressure source connected to the control line through a check valve and high pressure source comprising of a high pressure control line connected to the control line downstream of the check valve. The high pressure control line includes a flow restriction limiting flow to the control line means and generating a significant flow induced pressure drop in the high pressure control line once movement in the servo mechanism is initiated.

  12. Controlling hydraulic system costs

    SciTech Connect

    Smiley, C.H.

    1982-06-01

    Hydraulic system preventive maintenance is largely a matter of using the senses and common logic to spot signs of impending problems. The ability to recognize a potential malfunction can save a great deal of money in repairs and lost production.

  13. Dynamically controlled crystal growth system

    NASA Technical Reports Server (NTRS)

    Bray, Terry L. (Inventor); Kim, Larry J. (Inventor); Harrington, Michael (Inventor); DeLucas, Lawrence J. (Inventor)

    2002-01-01

    Crystal growth can be initiated and controlled by dynamically controlled vapor diffusion or temperature change. In one aspect, the present invention uses a precisely controlled vapor diffusion approach to monitor and control protein crystal growth. The system utilizes a humidity sensor and various interfaces under computer control to effect virtually any evaporation rate from a number of different growth solutions simultaneously by means of an evaporative gas flow. A static laser light scattering sensor can be used to detect aggregation events and trigger a change in the evaporation rate for a growth solution. A control/follower configuration can be used to actively monitor one chamber and accurately control replicate chambers relative to the control chamber. In a second aspect, the invention exploits the varying solubility of proteins versus temperature to control the growth of protein crystals. This system contains miniature thermoelectric devices under microcomputer control that change temperature as needed to grow crystals of a given protein. Complex temperature ramps are possible using this approach. A static laser light scattering probe also can be used in this system as a non-invasive probe for detection of aggregation events. The automated dynamic control system provides systematic and predictable responses with regard to crystal size. These systems can be used for microgravity crystallization projects, for example in a space shuttle, and for crystallization work under terrestial conditions. The present invention is particularly useful for macromolecular crystallization, e.g. for proteins, polypeptides, nucleic acids, viruses and virus particles.

  14. Choice of FDMA/SCPC access technique for aeronautical satellite voice system

    NASA Technical Reports Server (NTRS)

    Smith, G. K.

    1989-01-01

    A worldwide aeronautical mobile satellite system is about to become operational. The system architecture and access methods have been debated extensively, resulting in the selection of Time Division Multiplexing/Time Division Multiple Access (TDM/TDMA) access for packet data, and Single Channel Per Carrier (SCPC) for voice. These have become standards for airline use, and also satisfy the known requirements of ICAO for safety related communications. Voice communications are expected to absorb a high proportion of satellite bandwidth and power in the future. Here, it is explained why INMARSAT selected Frequency Division Multiple Access/SCPC satellite access for this application.

  15. Control systems on Lie groups.

    NASA Technical Reports Server (NTRS)

    Jurdjevic, V.; Sussmann, H. J.

    1972-01-01

    The controllability properties of systems which are described by an evolution equation in a Lie group are studied. The revelant Lie algebras induced by a right invariant system are singled out, and the basic properties of attainable sets are derived. The homogeneous case and the general case are studied, and results are interpreted in terms of controllability. Five examples are given.

  16. Virtual Control Systems Environment (VCSE)

    SciTech Connect

    Atkins, Will

    2012-10-08

    Will Atkins, a Sandia National Laboratories computer engineer discusses cybersecurity research work for process control systems. Will explains his work on the Virtual Control Systems Environment project to develop a modeling and simulation framework of the U.S. electric grid in order to study and mitigate possible cyberattacks on infrastructure.

  17. Virtual Control Systems Environment (VCSE)

    ScienceCinema

    Atkins, Will

    2014-02-26

    Will Atkins, a Sandia National Laboratories computer engineer discusses cybersecurity research work for process control systems. Will explains his work on the Virtual Control Systems Environment project to develop a modeling and simulation framework of the U.S. electric grid in order to study and mitigate possible cyberattacks on infrastructure.

  18. Internal crankcase ventilation system with easily accessible PCV valve

    SciTech Connect

    Balsley, R.L.

    1986-07-29

    A crankcase ventilation system is described having a flow limiting PCV valve and means defining and internal passage between a crankcase and a cylinder charge induction means of an engine, the system comprising an engine valve cover forming a part of the internal passage defining means and having an exterior wall, a cavity in the cover wall and forming a portion of the internal passage, the wall further including valve mounting means surrounding the passage and receiving the valve and a valve body seal in position to control flow through the mounting means and passage and an opening through the wall to the housing exterior and generally opposite the mounting means for removing and replacing a valve on the mounting means, and closure means normally closing the opening and preventing air leakage therethrough into the induction system, the closure means engaging the valve to maintain its installed position within the wall cavity and being openable to permit removal of the PCV valve.

  19. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  20. Control systems for Coline accelerators

    NASA Astrophysics Data System (ADS)

    Baczewski, Artur; Latała, Agata; Ceglińska, Kaja; Andrasiak, Michał

    2008-01-01

    Medical linear accelerators are the largest group of devices for therapy of cancer diseases because of their compact design, relatively low operating costs, advanced features and broad range of treatment procedures. Their reliability and ease of operation are very important but the most crucial is to ensure personnel and patient safety. For this reason the development of control and safety systems is the current "leading edge" in medical linear accelerators technology. Provided internal monitoring, machine control and steering, interlock system as well as the automatic recording of the device and patient parameters are nowadays fully controlled by the computer. This paper describes in details projects connected to advanced development of Coline accelerators. As it is crucial to assure reliable steering and monitoring of all the machine settings and actual dose delivered to the patient, advanced control systems composed of steering, control and interlock systems, communication protocol as well as data management system have been developed.

  1. CENTRAL CONTROL SYSTEM

    DOEpatents

    Borst, L.B.

    1959-09-22

    A control element is presented for neutronic reactors. The element is longitudinally expansible and compressible and remains within the reactor core at all times. The effectiveness of the element as to neutron absorption is varied by longitudinally compressing or expanding the element, the effectiveness being greatest when the element is fullv expanded and least when it is fully compressed. Two embodiments of the invention are described, one being a coiled spring and the other being an element formed from a plurality of interconnected links.

  2. Computer Interfaces for User Access to Heterogeneous Information-Retrieval Systems.

    ERIC Educational Resources Information Center

    Marcus, Richard S.; Reintjes, J. Francis

    A translating-computer-interface approach to providing a common, or virtual-system, mode of access to a network of heterogeneous online bibliographic retrieval systems has been investigated. Enhanced access to such systems by end users has been demonstrated through test usage of an experimental interface. A table-driven, rule-based message…

  3. Learning from a cluster randomized controlled trial to improve healthcare workers’ access to prevention and care for tuberculosis and HIV in Free State, South Africa: the pivotal role of information systems

    PubMed Central

    Yassi, Annalee; Adu, Prince A.; Nophale, Letshego; Zungu, Muzimkhulu

    2016-01-01

    Background Occupational tuberculosis (TB) continues to plague the healthcare workforce in South Africa. A 2-year cluster randomized controlled trial was therefore launched in 27 public hospitals in Free State province, to better understand how a combined workforce and workplace program can improve health of the healthcare workforce. Objective This mid-term evaluation aimed to analyze how well the intervention was being implemented, seek evidence of impact or harm, and draw lessons. Methods Both intervention and comparison sites had been instructed to conduct bi-annual and issue-based infection control assessments (when healthcare workers [HCW] are diagnosed with TB) and offer HCWs confidential TB and HIV counseling and testing, TB treatment and prophylaxis for HIV-positive HCWs. Intervention sites were additionally instructed to conduct quarterly workplace assessments, and also offer HCWs HIV treatment at their occupational health units (OHUs). Trends in HCW mortality, sick-time, and turnover rates (2005–2014) were analyzed from the personnel salary database (‘PERSAL’). Data submitted by the OHUs were also analyzed. Open-ended questionnaires were then distributed to OHU HCWs and in-depth interviews conducted at 17 of the sites to investigate challenges encountered. Results OHUs reported identifying and treating 23 new HCW cases of TB amongst the 1,372 workers who used the OHU for HIV and/or TB services; 39 new cases of HIV were also identified and 108 known-HIV-positive HCWs serviced. Although intervention-site workforces used these services significantly more than comparison-site healthcare staff (p<0.001), the data recorded were incomplete for both the intervention and comparison OHUs. An overall significant decline in mortality and turnover rates was documented over this period, but no significant differences between intervention and comparison sites; sick-time data proved unreliable. Severe OHU workload as well as residual confidentiality concerns

  4. From System Expansion to System Contraction: Access to Higher Education in Poland

    ERIC Educational Resources Information Center

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  5. Aircraft control system

    NASA Technical Reports Server (NTRS)

    Lisoski, Derek L. (Inventor); Kendall, Greg T. (Inventor)

    2007-01-01

    A solar rechargeable, long-duration, span-loaded flying wing, having no fuselage or rudder. Having a two-hundred foot wingspan that mounts photovoltaic cells on most all of the wing's top surface, the aircraft uses only differential thrust of its eight propellers to turn, pitch and yaw. The wing is configured to deform under flight loads to position the propellers such that the control can be achieved. Each of five segments of the wing has one or more motors and photovoltaic arrays, and produces its own lift independent of the other segments, to avoid loading them. Five two-sided photovoltaic arrays, in all, are mounted on the wing, and receive photovoltaic energy both incident on top of the wing, and which is incident also from below, through a bottom, transparent surface.

  6. Circulation Control in NASA's Vehicle Systems

    NASA Technical Reports Server (NTRS)

    Rich, Paul; McKinley, Bob; Jones, Greg

    2005-01-01

    Specific to the application of any technology to a vehicle, such as circulation control, it is important to understand the process that NASA is using to set its direction in research and development. To see how circulation control fits into any given NASA program requires the reader to understand NASA's Vehicle Systems (VS) Program. The VS Program recently celebrated its first year of existence with an annual review - an opportunity to look back on accomplishments, solicit feedback, expand national advocacy and support for the program, and recognize key contributions. Since its formation last year, Vehicle Systems has coordinated seven existing entities in a streamlined aeronautics research effort. It invests in vehicle technologies to protect the environment, make air travel more accessible and affordable for Americans, enable exploration through new aerospace missions, and augment national security. This past year has seen a series of valuable partnerships with industry, academia, and government agencies to make crucial aeronautics advances and assure America s future in flight.

  7. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  8. Kinetically Controlled Chemoselective Cyclization Simplifies the Access to Cyclic and Branched Peptides.

    PubMed

    Boll, Emmanuelle; Drobecq, Hervé; Lissy, Elizabeth; Cantrelle, François-Xavier; Melnyk, Oleg

    2016-08-01

    A bis(2-sulfanylethyl)amido group reacts significantly faster with cysteinyl peptides when installed on the C-terminal end of a peptide in comparison with the side-chain of Asp and Glu. This property enabled the design of a kinetically controlled chemoselective peptide cyclization reaction, giving straightforward access to cyclic and branched peptides in one pot. PMID:27398649

  9. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Effort-control program for NE multispecies limited access vessels. 648.82 Section 648.82 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES Management Measures...

  10. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... violation of section 337 in the infringement of certain patents. 73 FR 75131. The principal respondent was... order. 75 FR 44989-90 (July 30, 2010). The Commission also issued cease and desist orders against those... COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers...

  11. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  12. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  13. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings, and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PERMANENT PROGRAM PERFORMANCE STANDARDS PERMANENT PROGRAM...

  14. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings, and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PERMANENT PROGRAM PERFORMANCE STANDARDS PERMANENT PROGRAM...

  15. Control of Access to Memory: The Use of Task Interference as a Behavioral Probe

    ERIC Educational Resources Information Center

    Loft, Shayne; Humphreys, Michael S.; Whitney, Susannah J.

    2008-01-01

    Directed forgetting and prospective memory methods were combined to examine differences in the control of memory access. Between studying two lists of target words, participants were either instructed to forget the first list, or to continue remembering the first list. After study participants performed a lexical decision task with an additional…

  16. Longitudinal occupancy of controlled access right-of-way by utilities. A synthesis of highway practice

    SciTech Connect

    Williams, R.L.

    1996-06-01

    This synthesis will be of interest to transportation agency administrators, design engineers, maintenance engineers and maintenance staff, traffic engineers, and safety officials. It will also provide useful information to the utilities and telecommunications industries. Information is presented on the state transportation agencies` policies, practices, and experience associated with occupancy of the rights-of-way on controlled- (or Limited-) access highways.

  17. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  18. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  19. Adaptable state based control system

    NASA Technical Reports Server (NTRS)

    Rasmussen, Robert D. (Inventor); Dvorak, Daniel L. (Inventor); Gostelow, Kim P. (Inventor); Starbird, Thomas W. (Inventor); Gat, Erann (Inventor); Chien, Steve Ankuo (Inventor); Keller, Robert M. (Inventor)

    2004-01-01

    An autonomous controller, comprised of a state knowledge manager, a control executor, hardware proxies and a statistical estimator collaborates with a goal elaborator, with which it shares common models of the behavior of the system and the controller. The elaborator uses the common models to generate from temporally indeterminate sets of goals, executable goals to be executed by the controller. The controller may be updated to operate in a different system or environment than that for which it was originally designed by the replacement of shared statistical models and by the instantiation of a new set of state variable objects derived from a state variable class. The adaptation of the controller does not require substantial modification of the goal elaborator for its application to the new system or environment.

  20. Spherical LDH-Ag°-montmorillonite heterocoagulated system with a pH-dependent sol-gel structure for controlled accessibility of AgNPs immobilized on the clay lamellae.

    PubMed

    Deák, Ágota; Janovák, László; Tallósy, Szabolcs Péter; Bitó, Tamás; Sebők, Dániel; Buzás, Norbert; Pálinkó, István; Dékány, Imre

    2015-02-17

    Aqueous suspensions of spherical ZnMgAl-layered double hydroxides [LDH(sph)] and antibacterial silver nanoparticles (AgNPs) deposited on the lamellae of montmorillonite were used for the synthesis of composites, which behave like coherent gels at low pH (≲4.5) and incoherent sols at higher pH (≳4.5). The composition of the composite was chosen as LDH(sph)/Ag°-montm. = 25:75 wt % in order to ensure a sol-gel transition that can also be characterized by viscometry. This pH-sensitive heterocoagulated system consisting of oppositely charged colloid particles was suitable for the release of antimicrobial AgNPs immobilized on the clay lamellae via a pH-controlled gel-sol transition. The heterocoagulation process was also characterized by surface charge titration measurements. Spherical LDH/Ag°-montmorillonite composite samples were identified by X-ray diffraction (XRD) measurements. The morphological properties of the composites were studied, and the presence of the heterocoagulated structure was confirmed by scanning electron microscopy (SEM). The nanoscale structure of the LDH(sph)-Ag°-montmorillonite composite obtained was also verified by small-angle X-ray scattering (SAXS), and the rheological characteristics were studied at various pH values. The viscosity and yield value of the composite decreased by an order of magnitude upon increasing the pH from 3.0 to 5.5. The sol-gel transition of the composite suspension was reversible in the previously mentioned pH range. PMID:25619227