Science.gov

Sample records for analysing access control

  1. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  2. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  3. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  4. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  5. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  6. Bibliographic Access and Control System.

    ERIC Educational Resources Information Center

    Kelly, Betsy; And Others

    1982-01-01

    Presents a brief summary of the functions of the Bibliographic Access & Control System (BACS) implemented at the Washington University School of Medicine Library, and outlines the design, development, and uses of the system. Bibliographic control of books and serials and user access to the system are also discussed. (Author/JL)

  7. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  8. Laboratory evaluation of the COBAS MIRA S random access analyser.

    PubMed

    Kanluan, T; Intaramanee, S; Tangvarasittichai, S; Tangvarasittichai, O; Suwanton, L; Manochiopinij, S; Tantrarongroj, S; Leangphibul, P

    1991-01-01

    The random access analyser COBAS MIRA S (Roche Diagnostics) was evaluated for two months. The instrument is a computer-controlled discrete analyser which can be run in a combination profile and single test mode. This instrument has special features, including an automatic cuvette segment changer, a reagent rack cooling system, an external keyboard and monitor, as well as a bar-code facility for the entry of test parameters, worklists and sample identification numbers. Study of within-run and between-run precision gave values of % CV 0.54-3.37 and 0.61-3.65, respectively, for a variety of assays. Linearity testing to the upper limit of each test was also studied and were found to cover the necessary pathological range. Within the two-month period, no major problems were encountered. The instrument required minimum operator attention during operation. Correlation studies with the Hitachi 705 using six clinical chemistry tests (glucose, cholesterol, triglyceride, ALP, AST, ALT) gave correlation coefficients ranging from 0.95-0.99 and slopes of 0.91-1.17. PMID:18924890

  9. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  10. Controlling Access to Suicide Means

    PubMed Central

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  11. VISPA: Direct Access and Execution of Data Analyses for Collaborations

    NASA Astrophysics Data System (ADS)

    von Asseldonk, Daniel; Erdmann, Martin; Fischer, Robert; Glaser, Christian; Müller, Gero; Quast, Thorben; Rieger, Marcel; Urban, Martin

    2015-05-01

    The VISPA project provides a graphical frontend to computing infrastructures. Currently, the focus of the project is to give an online environment for the development of data analyses. Access is provided through a web GUI, which has all functionality needed for working conditions comparable to a personal computer. This includes a new preference system as well as user configurable shortkeys. As all relevant software, data and computing resources are supplied on a common remote infrastructure the VISPA web framework offers a new way of collaborative work where analyses of colleagues can be reviewed and executed with just one click. Furthermore, VISPA can be extended to the specific needs of an experiment or other scientific use cases. This is presented in the form of a new GUI to the analysis framework Offline of the Pierre Auger collaboration.

  12. ACCESS: Detector Control and Performance

    NASA Astrophysics Data System (ADS)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  13. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  14. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  15. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  16. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Design and Performance Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic irradiator must have a door or other...

  17. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  18. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  19. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  20. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  1. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  2. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  3. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  4. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2010-01-01 2010-01-01 false Access control. 36.23 Section 36.23 Energy...

  5. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy...

  6. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy...

  7. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2014-01-01 2014-01-01 false Access control. 36.23 Section 36.23 Energy...

  8. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  9. 50 CFR 216.47 - Access to marine mammal tissue, analyses, and data.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 9 2011-10-01 2011-10-01 false Access to marine mammal tissue, analyses... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Special Exceptions § 216.47 Access to marine mammal...

  10. 50 CFR 216.47 - Access to marine mammal tissue, analyses, and data.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Access to marine mammal tissue, analyses... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Special Exceptions § 216.47 Access to marine mammal...

  11. 50 CFR 216.47 - Access to marine mammal tissue, analyses, and data.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 10 2013-10-01 2013-10-01 false Access to marine mammal tissue, analyses... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Special Exceptions § 216.47 Access to marine mammal...

  12. 50 CFR 216.47 - Access to marine mammal tissue, analyses, and data.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 10 2014-10-01 2014-10-01 false Access to marine mammal tissue, analyses... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Special Exceptions § 216.47 Access to marine mammal...

  13. 50 CFR 216.47 - Access to marine mammal tissue, analyses, and data.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 10 2012-10-01 2012-10-01 false Access to marine mammal tissue, analyses... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Special Exceptions § 216.47 Access to marine mammal...

  14. Speed control system for an access gate

    SciTech Connect

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  15. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  16. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  17. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  18. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  19. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Control of public access. 420.53 Section....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and unauthorized, unescorted access to explosive hazard facilities or other hazard areas not otherwise...

  20. Quality control considerations in performing washability analyses

    SciTech Connect

    Graham, R.D.

    1984-10-01

    The author describes, in considerable detail, the procedures for carrying out washability analyses as laid down in ASTM Standard Test Method D4371. These include sampling, sample preparation, hydrometer standardisation, washability testing, and analysis of specific gravity fractions.

  1. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  2. Context-Based E-Health System Access Control Mechanism

    NASA Astrophysics Data System (ADS)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  3. Application-Defined Decentralized Access Control.

    PubMed

    Xu, Yuanzhong; Dunn, Alan M; Hofmann, Owen S; Lee, Michael Z; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%-9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications' security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  4. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  5. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  6. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  7. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... individuals authorized to have unescorted access to the secured area are able to gain entry; (2) Ensure...

  8. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site,...

  9. The Galaxy platform for accessible, reproducible and collaborative biomedical analyses: 2016 update

    PubMed Central

    Afgan, Enis; Baker, Dannon; van den Beek, Marius; Blankenberg, Daniel; Bouvier, Dave; Čech, Martin; Chilton, John; Clements, Dave; Coraor, Nate; Eberhard, Carl; Grüning, Björn; Guerler, Aysam; Hillman-Jackson, Jennifer; Von Kuster, Greg; Rasche, Eric; Soranzo, Nicola; Turaga, Nitesh; Taylor, James; Nekrutenko, Anton; Goecks, Jeremy

    2016-01-01

    High-throughput data production technologies, particularly ‘next-generation’ DNA sequencing, have ushered in widespread and disruptive changes to biomedical research. Making sense of the large datasets produced by these technologies requires sophisticated statistical and computational methods, as well as substantial computational power. This has led to an acute crisis in life sciences, as researchers without informatics training attempt to perform computation-dependent analyses. Since 2005, the Galaxy project has worked to address this problem by providing a framework that makes advanced computational tools usable by non experts. Galaxy seeks to make data-intensive research more accessible, transparent and reproducible by providing a Web-based environment in which users can perform computational analyses and have all of the details automatically tracked for later inspection, publication, or reuse. In this report we highlight recently added features enabling biomedical analyses on a large scale. PMID:27137889

  10. The Galaxy platform for accessible, reproducible and collaborative biomedical analyses: 2016 update.

    PubMed

    Afgan, Enis; Baker, Dannon; van den Beek, Marius; Blankenberg, Daniel; Bouvier, Dave; Čech, Martin; Chilton, John; Clements, Dave; Coraor, Nate; Eberhard, Carl; Grüning, Björn; Guerler, Aysam; Hillman-Jackson, Jennifer; Von Kuster, Greg; Rasche, Eric; Soranzo, Nicola; Turaga, Nitesh; Taylor, James; Nekrutenko, Anton; Goecks, Jeremy

    2016-07-01

    High-throughput data production technologies, particularly 'next-generation' DNA sequencing, have ushered in widespread and disruptive changes to biomedical research. Making sense of the large datasets produced by these technologies requires sophisticated statistical and computational methods, as well as substantial computational power. This has led to an acute crisis in life sciences, as researchers without informatics training attempt to perform computation-dependent analyses. Since 2005, the Galaxy project has worked to address this problem by providing a framework that makes advanced computational tools usable by non experts. Galaxy seeks to make data-intensive research more accessible, transparent and reproducible by providing a Web-based environment in which users can perform computational analyses and have all of the details automatically tracked for later inspection, publication, or reuse. In this report we highlight recently added features enabling biomedical analyses on a large scale. PMID:27137889

  11. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  12. Thermal analyses for quality control of plastics, ceramics, and explosives

    SciTech Connect

    Brown, C.R.; Garrod, M.J.; Whitaker, R.B.

    1990-01-01

    Thermal analyses are performed for production quality control (q.c.) and for surveillance at Mound on plastic, ceramic, explosive and pyrotechnic materials. For the weapons surveillance program, weapon components are disassembled after varying times in the field; thermal and other analyses are then performed on the component materials. The types of thermal analyses done include: differential scanning calorimetry (DSC), differential thermal analysis (DTA), thermogravimetry (TG), thermomechanical analysis (TMA), and high temperature TG/DTA. 5 refs., 4 figs.

  13. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  14. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured...

  15. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  16. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  17. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  18. MATISSE: A novel tool to access, visualize and analyse data from planetary exploration missions

    NASA Astrophysics Data System (ADS)

    Zinzi, A.; Capria, M. T.; Palomba, E.; Giommi, P.; Antonelli, L. A.

    2016-04-01

    The increasing number and complexity of planetary exploration space missions require new tools to access, visualize and analyse data to improve their scientific return. ASI Science Data Center (ASDC) addresses this request with the web-tool MATISSE (Multi-purpose Advanced Tool for the Instruments of the Solar System Exploration), allowing the visualization of single observation or real-time computed high-order products, directly projected on the three-dimensional model of the selected target body. Using MATISSE it will be no longer needed to download huge quantity of data or to write down a specific code for every instrument analysed, greatly encouraging studies based on joint analysis of different datasets. In addition the extremely high-resolution output, to be used offline with a Python-based free software, together with the files to be read with specific GIS software, makes it a valuable tool to further process the data at the best spatial accuracy available. MATISSE modular structure permits addition of new missions or tasks and, thanks to dedicated future developments, it would be possible to make it compliant to the Planetary Virtual Observatory standards currently under definition. In this context the recent development of an interface to the NASA ODE REST API by which it is possible to access to public repositories is set.

  19. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed. PMID:21751015

  20. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  1. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  2. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  3. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  4. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  5. Role Based Access Control system in the ATLAS experiment

    NASA Astrophysics Data System (ADS)

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  6. Access control within military C4ISR systems

    NASA Astrophysics Data System (ADS)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  7. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  8. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  9. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  10. An accessible, scalable ecosystem for enabling and sharing diverse mass spectrometry imaging analyses.

    PubMed

    Fischer, Curt R; Ruebel, Oliver; Bowen, Benjamin P

    2016-01-01

    Mass spectrometry imaging (MSI) is used in an increasing number of biological applications. Typical MSI datasets contain unique, high-resolution mass spectra from tens of thousands of spatial locations, resulting in raw data sizes of tens of gigabytes per sample. In this paper, we review technical progress that is enabling new biological applications and that is driving an increase in the complexity and size of MSI data. Handling such data often requires specialized computational infrastructure, software, and expertise. OpenMSI, our recently described platform, makes it easy to explore and share MSI datasets via the web - even when larger than 50 GB. Here we describe the integration of OpenMSI with IPython notebooks for transparent, sharable, and replicable MSI research. An advantage of this approach is that users do not have to share raw data along with analyses; instead, data is retrieved via OpenMSI's web API. The IPython notebook interface provides a low-barrier entry point for data manipulation that is accessible for scientists without extensive computational training. Via these notebooks, analyses can be easily shared without requiring any data movement. We provide example notebooks for several common MSI analysis types including data normalization, plotting, clustering, and classification, and image registration. PMID:26365033

  11. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  12. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  13. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  14. Implementing context and team based access control in healthcare intranets.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users. PMID:12507264

  15. Modified FDR Controlling Procedure for Multi-Stage Analyses

    PubMed Central

    Tuglus, Catherine; van der Laan, Mark J.

    2009-01-01

    Multiple testing has become an integral component in genomic analyses involving microarray experiments where a large number of hypotheses are tested simultaneously. However, before applying more computationally intensive methods, it is often desirable to complete an initial truncation of the variable set using a simpler and faster supervised method such as univariate regression. Once such a truncation is completed, multiple testing methods applied to any subsequent analysis no longer control the appropriate Type I error rates. Here we propose a modified marginal Benjamini & Hochberg step-up FDR controlling procedure for multi-stage analyses (FDR-MSA), which correctly controls Type I error in terms of the entire variable set when only a subset of the initial set of variables is tested. The method is presented with respect to a variable importance application. As the initial subset size increases, we observe convergence to the standard Benjamini & Hochberg step-up FDR controlling multiple testing procedures. We demonstrate the power and Type I error control through simulation and application to the Golub Leukemia data from 1999. PMID:19222379

  16. Access control in healthcare: the methodology from legislation to practice.

    PubMed

    Ferreira, Ana; Correia, Ricardo; Chadwick, David; Antunes, Luis

    2010-01-01

    Translating legislation and regulations into access control systems in healthcare is, in practice, not a straightforward task. Excessive regulation can create barriers to appropriate patient treatment. The main objective of this paper is to present a new methodology that can define, from legislation to practice, an access control policy as well as a RBAC model, in order to comprise generic legislation and regulation issues together with the access control needs from the ends users of a healthcare information system. The methodology includes the use of document analysis as well as grounded theory and mixed methods research. This methodology can be easily applied within a healthcare practice or any other domain with similar requirements. It helps to bridge the gap between legislation and end users' needs, while integrating information security into the healthcare processes in a more meaningful way. PMID:20841770

  17. Emergency access authorization for personally controlled online health care data.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2012-02-01

    Personally controlled health records (PCHR) systems have emerged to allow patients to control their own medical data. In a PCHR system, all the access privileges to a patient's data are granted by the patient. However, in many emergency cases, it is impossible for the patient to participate in access authorization on site when immediate medical treatment is needed. To solve the emergency access authorization problem in the absence of patients, we consider two cases: a) the requester is already in the PCHR system but has not obtained the access privilege of the patient's health records, and b) the requester does not even have an account in the PCHR system to submit its request. For each of the two cases, we present a method for emergency access authorization, utilizing the weighted voting and source authentication cryptographic techniques. Our methods provide an effective, secure and private solution for emergency access authorization, that makes the existing PCHR system frameworks more practical and thus improves the patients' experiences of health care when using PCHR systems. We have implemented a prototype system as a proof of concept. PMID:20703719

  18. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  19. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  20. Controlling user access to electronic resources without password

    SciTech Connect

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  1. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  2. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  3. Doping control analyses in horseracing: a clinician's guide.

    PubMed

    Wong, Jenny K Y; Wan, Terence S M

    2014-04-01

    Doping(1) in sports is highly detrimental, not only to the athletes involved but to the sport itself as well as to the confidence of the spectators and other participants. To protect the integrity of any sport, there must be in place an effective doping control program. In human sports, a 'top-down' and generally unified approach is taken where the rules and regulations against doping for the majority of elite sport events held in any country are governed by the World Anti-Doping Agency (WADA). However, in horseracing, there is no single organisation regulating this form of equestrian sport; instead, the rules and regulations are provided by individual racing authorities and so huge variations exist in the doping control programs currently in force around the world. This review summarises the current status of doping control analyses in horseracing, from sample collection, to the analyses of the samples, and to the need for harmonisation as well as exploring some of the difficulties currently faced by racing authorities, racing chemists and regulatory veterinarians worldwide. PMID:24485918

  4. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  5. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  6. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  7. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  8. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  9. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  10. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  11. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  12. Access control and interlock system at the Advanced Photon Source

    SciTech Connect

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  13. Accessibility

    MedlinePlus

    ... www.nlm.nih.gov/medlineplus/accessibility.html MedlinePlus Accessibility To use the sharing features on this page, ... Subscribe to RSS Follow us Disclaimers Copyright Privacy Accessibility Quality Guidelines Viewers & Players MedlinePlus Connect for EHRs ...

  14. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  15. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  16. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  17. RDFacl: A Secure Access Control Model Based on RDF Triple

    NASA Astrophysics Data System (ADS)

    Kim, Jaehoon; Park, Seog

    An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.

  18. Current status of link access control and encryption system

    SciTech Connect

    Springer, E.

    1984-01-01

    The purpose of this project is to develop necessary technologies for the secure protection of data communication networks. Data encryption equipment, using the federal government's Data Encryption Standard (DES) algorithm, was designed and developed. This equipment is the Link Access Control and Encryption (Link ACE) system. It protects unclassified sensitive data transmissions over unprotected lines between central computers and remote terminals. Link ACE units have been installed and are operational in the Department of Energy's Central Personnel Clearance Index (CPCI) system.

  19. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  20. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  1. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control. PMID:20703920

  2. Segmented proportional spacing medium access control protocol for APONs

    NASA Astrophysics Data System (ADS)

    Wang, Hongbin; Yu, Yiqing; Zhou, Dongru; Meng, Bo

    2004-04-01

    Combining asynchronous transfer mode (ATM) over a passive optical network (APON) can provide broadband services as defined by the international telecommunications union (ITU). The medium access control (MAC) layer is of primary importance to the access scheme as in controls the flow of traffic in the access network. This paper presents a novel MAC protocol-segmented proportional spacing MAC protocol, which complies with ITU-T recommendations, is firstly designed for APON system based on the analysis of different type of bandwidth allocation algorithms. The main idea of protocol is: frame structure adopts the structure regulated by ITU; fine time division for the optical network unit (ONU) to apply bandwidth; the bandwidth"s application is not based on the T-interface but ONU, the bandwidth allocation algorithm uses segmented proportional spacing algorithm. At last, we compare our protocol to other MAC protocols, the results show that proportional spacing and segmented bandwidth allocation control the cell jitter with satisfactory and improve the system bandwidth efficiency at same time, the correlative conclusions are given finally.

  3. Comparative Analyses of Physiological Responses of Cynodon dactylon Accessions from Southwest China to Sulfur Dioxide Toxicity

    PubMed Central

    Wang, Ling; Li, Yiqiao; Cai, Shizhen

    2014-01-01

    Sulfur dioxide (SO2), a major air pollutant in developing countries, is highly toxic to plants. To achieve better air quality and landscape, planting appropriate grass species in severe SO2 polluted areas is very critical. Cynodon dactylon, a widely used warm season turfgrass species, has good SO2-tolerant ability. In this study, we selected 9 out of 38 C. dactylon accessions from Southwest China as representatives of high, intermediate SO2-tolerant and SO2-sensitive accessions to comparatively analyze their physiological differences in leaves under SO2 untreated and treated conditions. Our results revealed that SO2-tolerant C. dactylon accessions showed higher soluble sugar, proline, and chlorophyll a contents under both SO2 treated and untreated conditions; higher chlorophyll b and carotenoid under SO2 treated condition; lower reactive oxygen species (ROS) level, oxidative damages, and superoxide dismutase (SOD) activities under SO2 treated condition; and higher peroxidase (POD) activities under SO2 untreated condition. Further results indicated that SO2-tolerant C. dactylon accessions had higher sulfur contents under both SO2 treated and untreated conditions, consistent with higher SO activities under both SO2 treated and untreated conditions, and higher SiR activities under SO2 treated condition. Taken together, our results indicated that SO2 tolerance of C. dactylon might be largely related to soluble sugar, proline and chlorophyll a contents, and SO enzyme activity. PMID:25097893

  4. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  5. Global Access-controlled Transfer e-frame (GATe)

    Energy Science and Technology Software Center (ESTSC)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, asmore » well as provides reporting capabilities.« less

  6. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  7. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  8. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  9. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  10. Access Control of Cloud Service Based on UCON

    NASA Astrophysics Data System (ADS)

    Danwei, Chen; Xiuli, Huang; Xunyi, Ren

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. This paper introduces cloud computing and cloud service firstly, and then gives cloud services access control model based on UCON and negotiation technologies, and also designs the negotiation module.

  11. Osiris: accessible and reproducible phylogenetic and phylogenomic analyses within the Galaxy workflow management system

    PubMed Central

    2014-01-01

    Background Phylogenetic tools and ‘tree-thinking’ approaches increasingly permeate all biological research. At the same time, phylogenetic data sets are expanding at breakneck pace, facilitated by increasingly economical sequencing technologies. Therefore, there is an urgent need for accessible, modular, and sharable tools for phylogenetic analysis. Results We developed a suite of wrappers for new and existing phylogenetics tools for the Galaxy workflow management system that we call Osiris. Osiris and Galaxy provide a sharable, standardized, modular user interface, and the ability to easily create complex workflows using a graphical interface. Osiris enables all aspects of phylogenetic analysis within Galaxy, including de novo assembly of high throughput sequencing reads, ortholog identification, multiple sequence alignment, concatenation, phylogenetic tree estimation, and post-tree comparative analysis. The open source files are available on in the Bitbucket public repository and many of the tools are demonstrated on a public web server (http://galaxy-dev.cnsi.ucsb.edu/osiris/). Conclusions Osiris can serve as a foundation for other phylogenomic and phylogenetic tool development within the Galaxy platform. PMID:24990571

  12. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  13. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal Register... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published...

  14. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  15. Controlled Access under Review: Improving the Governance of Genomic Data Access.

    PubMed

    Shabani, Mahsa; Dyke, Stephanie O M; Joly, Yann; Borry, Pascal

    2015-12-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  16. Controlled Access under Review: Improving the Governance of Genomic Data Access

    PubMed Central

    Shabani, Mahsa; Dyke, Stephanie O. M.; Joly, Yann; Borry, Pascal

    2015-01-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  17. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  18. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  19. Safety systems and access control in the National Ignition Facility.

    PubMed

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  20. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  1. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  2. Hypertension Detection, Management, Control and Associated Factors Among Residents Accessing Community Health Services In Beijing

    PubMed Central

    JIANG, Bin; LIU, Hongmei; RU, Xiaojuan; ZHANG, Hui; WU, Shengping; WANG, Wenzhi

    2014-01-01

    The aim of this study was to analyse high blood pressure detection, management, control and associated factors among residents accessing community health services (CHSs) in Beijing. We screened for HBP in 9524 individuals aged 50 years or older who accessed care in four Beijing CHSs. Among the 9397 residents with questionnaire responses that qualified them for inclusion in the study, 5029 patients with HBP were identified, 1510 (i.e., 30% of the HBP patient group) of whom were newly identified cases. The rate of hypertension detection was 53.5%. Among the 5029 HBP patients, the rates of awareness, treatment and control of hypertension were 70.0%, 62.1% and 29.6%, respectively. In general, the rate of hypertension control was higher when the rates of hypertension awareness and treatment were higher in subgroups stratified by different sociodemographic and risk factors, except for the overweight and obesity subgroups. In conclusion, suboptimal HBP awareness, treatment, and control are still major problems confronting CHSs in Beijing. Control of hypertension in the population may be improved by increasing awareness and improving the treatment of hypertension in CHSs. PMID:24784167

  3. Metabolomics Analyses of Cancer Cells in Controlled Microenvironments.

    PubMed

    Gravel, Simon-Pierre; Avizonis, Daina; St-Pierre, Julie

    2016-01-01

    The tumor microenvironment is a complex and heterogeneous milieu in which cancer cells undergo metabolic reprogramming to fuel their growth. Cancer cell lines grown in vitro using traditional culture methods represent key experimental models to gain a mechanistic understanding of tumor biology. This protocol describes the use of gas chromatography-mass spectrometry (GC-MS) to assess metabolic changes in cancer cells grown under varied levels of oxygen and nutrients that may better mimic the tumor microenvironment. Intracellular metabolite changes, metabolite uptake and release, as well as stable isotope ((13)C) tracer analyses are done in a single experimental setup to provide an integrated understanding of metabolic adaptation. Overall, this chapter describes some essential tools and methods to perform comprehensive metabolomics analyses. PMID:27581029

  4. A stochastic control approach to Slotted-ALOHA random access protocol

    NASA Astrophysics Data System (ADS)

    Pietrabissa, Antonio

    2013-12-01

    ALOHA random access protocols are distributed protocols based on transmission probabilities, that is, each node decides upon packet transmissions according to a transmission probability value. In the literature, ALOHA protocols are analysed by giving necessary and sufficient conditions for the stability of the queues of the node buffers under a control vector (whose elements are the transmission probabilities assigned to the nodes), given an arrival rate vector (whose elements represent the rates of the packets arriving in the node buffers). The innovation of this work is that, given an arrival rate vector, it computes the optimal control vector by defining and solving a stochastic control problem aimed at maximising the overall transmission efficiency, while keeping a grade of fairness among the nodes. Furthermore, a more general case in which the arrival rate vector changes in time is considered. The increased efficiency of the proposed solution with respect to the standard ALOHA approach is evaluated by means of numerical simulations.

  5. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  6. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  7. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  8. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  9. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  10. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  11. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  12. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  13. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  14. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  15. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  16. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  17. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  18. Birth Control Pills and Nonprofessional Voice: Acoustic Analyses

    ERIC Educational Resources Information Center

    Amir, Ofer; Biron-Shental, Tal; Shabtai, Esther

    2006-01-01

    Purpose: Two studies are presented here. Study 1 was aimed at evaluating whether the voice characteristics of women who use birth control pills that contain different progestins differ from the voice characteristics of a control group. Study 2 presents a meta-analysis that combined the results of Study 1 with those from 3 recent studies that…

  19. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  20. Advanced stability theory analyses for laminar flow control

    NASA Technical Reports Server (NTRS)

    Orszag, S. A.

    1980-01-01

    Recent developments of the SALLY computer code for stability analysis of laminar flow control wings are summarized. Extensions of SALLY to study three dimensional compressible flows, nonparallel and nonlinear effects are discussed.

  1. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  2. ECONOMIC AND ENERGY ANALYSES OF REGIONAL WATER POLLUTION CONTROL

    EPA Science Inventory

    Two strategic approaches to water quality control in Oregon's Willamette River are presently being utilized: point source treatment and flow augmentation from reservoirs. Input/Output analysis (I/O) provides an econometric methodology to study direct and indirect energy response ...

  3. QUALITY ASSURANCE AND QUALITY CONTROL FOR RADIOCHEMICAL ANALYSES AND MEASUREMENTS

    EPA Science Inventory

    Require that each batch of samples analyzed be accompanied by appropriate quality control samples to evaluate accuracy and precision of the results. Require a documented data review and validation process by a minimum of three people before data is released to the client. Requi...

  4. Concurrency control and recovery on lightweight directory access protocol

    NASA Astrophysics Data System (ADS)

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  5. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  6. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  7. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  8. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  9. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas. In addition to the requirements in...

  10. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a) The licensee shall ensure that...

  11. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  13. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  14. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  15. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  16. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  17. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  18. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  19. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for establishing logical access... Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional practitioner. (a... practitioner that enters permissions for logical access controls into the application. The...

  20. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  1. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  2. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  3. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  4. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  5. A Quality of Context-Aware Approach to Access Control in Pervasive Environments

    NASA Astrophysics Data System (ADS)

    Toninelli, Alessandra; Corradi, Antonio; Montanari, Rebecca

    The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users to share resources anywhere and anytime, but makes access control a crucial issue. User/device mobility and heterogeneity, together with network topology and conditions variability, complicate access control and call for novel solutions to dynamically adapt access decisions to the different operating conditions. Several research efforts have emerged in recent years that propose to exploit context-awareness to control access to resources based on context visibility and changes. Context-based access control requires, however, to take into account the quality of context information used to drive access decisions (QoC). Quality of context has in fact a profound impact on the correct behavior of any context-aware access control framework. Using context information with insufficient quality might increase the risk of incorrect access control decisions, thus leading to dangerous security breaches in resource sharing. In this paper we propose a QoC-aware approach to access control for anywhere, anytime resource sharing. The paper describes the design, implementation and evaluation of the Proteus policy framework, which combines two design guidelines to enable dynamic adaptation of policies depending on context changes: context-awareness with QoC guarantees and semantic technologies to allow high-level description of context/policy specification and reasoning about context/policies.

  6. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  7. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  8. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  9. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  10. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  11. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  12. Summary of dynamic analyses of the advanced neutron source reactor inner control rods

    SciTech Connect

    Hendrich, W.R.

    1995-08-01

    A summary of the structural dynamic analyses that were instrumental in providing design guidance to the Advanced Neutron source (ANS) inner control element system is presented in this report. The structural analyses and the functional constraints that required certain performance parameters were combined to shape and guide the design effort toward a prediction of successful and reliable control and scram operation to be provided by these inner control rods.

  13. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  14. Discretionary access control in a heterogeneous distributed data base management system

    SciTech Connect

    Wang, C.Y.

    1986-01-01

    An important technical problem in building a distributed database management system (DDBMS) is access control which prevents unauthorized access or malicious destruction of a database. Consider a DDBMS that uses a uniform global data model to integrate the local schemes of existing DBMSs at the sites of a network. The local DBMSs are unchanged, and the DDBMS is implemented as a module on top of the existing DBMSs at each site. The DBMS at each site is expected to retain its autonomy. That is, the local DBMS at each site maintains control of the data stored at that site. Each local DBMS decides for itself if a user (of the local DBMS or of the DDBMS) may access the data it manages. The design of the access control system for the database in such an environment presents several problems. First, the DBMSs at different sites may have different and incompatible access control mechanisms. Second, queries involving data from multiple sites must be processed by the access control mechanisms of multiple and possible different local DBMSs. Coordinating the access control mechanisms of these DBMSs to provide a consistent access control facility to the users of the heterogeneous DDBMS is a difficult task. This research discusses the problem described above. A general architecture for a DDBMS was developed. Data abstraction techniques were adapted to specify the architecture. A formal verification for the specification was completed.

  15. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  16. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  17. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  18. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  19. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  20. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    ERIC Educational Resources Information Center

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  1. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings, and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  2. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings, and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  3. Disturbance rejection performance analyses of closed loop control systems by reference to disturbance ratio.

    PubMed

    Alagoz, Baris Baykant; Deniz, Furkan Nur; Keles, Cemal; Tan, Nusret

    2015-03-01

    This study investigates disturbance rejection capacity of closed loop control systems by means of reference to disturbance ratio (RDR). The RDR analysis calculates the ratio of reference signal energy to disturbance signal energy at the system output and provides a quantitative evaluation of disturbance rejection performance of control systems on the bases of communication channel limitations. Essentially, RDR provides a straightforward analytical method for the comparison and improvement of implicit disturbance rejection capacity of closed loop control systems. Theoretical analyses demonstrate us that RDR of the negative feedback closed loop control systems are determined by energy spectral density of controller transfer function. In this manner, authors derived design criteria for specifications of disturbance rejection performances of PID and fractional order PID (FOPID) controller structures. RDR spectra are calculated for investigation of frequency dependence of disturbance rejection capacity and spectral RDR analyses are carried out for PID and FOPID controllers. For the validation of theoretical results, simulation examples are presented. PMID:25311160

  4. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  5. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ...The Librarian of Congress announces that the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted...

  6. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  7. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  8. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  9. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ...The Copyright Office makes a nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted...

  10. Increasing software testability with standard access and control interfaces

    NASA Technical Reports Server (NTRS)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  11. Prepotent response inhibition and interference control in autism spectrum disorders: two meta-analyses.

    PubMed

    Geurts, Hilde M; van den Bergh, Sanne F W M; Ruzzano, Laura

    2014-08-01

    There is a substantial amount of data providing evidence for, but also against the hypothesis that individuals with autism spectrum disorders (ASD) encounter inhibitory control deficits. ASD is often associated with interference control deficits rather than prepotent response inhibition. Moreover, the developmental trajectory for these inhibitory control processes is hypothesized to differ in ASD as compared to typical development. In efforts to gain a more comprehensive perspective of inhibition in ASD, separate quantitative analysis for prepotent response inhibition studies and interference control studies were conducted. Together, these two meta-analyses included 41 studies with a combined sample size of 1,091 people with ASD (M age 14.8 years), and 1,306 typically developing (TD) controls (M age 13.8 years).The meta-analyses indicated that individuals with ASD show increased difficulties in prepotent response inhibition (effect size 0.55) and in interference control (effect size 0.31). In addition, age was a relevant moderator for prepotent response inhibition but not for interference control. Exploratory analyses revealed that when IQ was taken into account, heterogeneity considerably decreased among interference control studies but not among prepotent response inhibition. In contrast to the general belief, both prepotent response inhibition and interference control problems were observed in individuals with ASD. However, a large variation between studies was also found. Therefore, there remain factors beyond inhibition type, age, or IQ that significantly influence inhibitory control performance among individuals with ASD. PMID:24596300

  12. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  13. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  14. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  15. Generalized access control strategies for integrated services token passing systems

    NASA Astrophysics Data System (ADS)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  16. Deciphering interference control in adults with ADHD by using distribution analyses and electromyographic activity.

    PubMed

    Suarez, Isabel; Burle, B; Tobon, C; Pineda, D; Lopera, F; Hasbroucq, T; Casini, L

    2015-07-01

    A deficit in "interference control" is commonly found in adults with Attention Deficit Hyperactivity Disorder (ADHD). This has mainly been interpreted as difficulties in inhibiting inappropriate responses. However, interference control involves processes other than simply the ability to inhibit. Consequently, we used sophisticated analysis to decipher the additional processes of interference control in these patients. We compared interference control between 16 adults with ADHD and 15 control adults performing a Simon task. In most studies, performance is generally reported in terms of mean error rates and reaction times (RTs). However, here we used distribution analyses of behavioral data, complemented by analyses of electromyographic (EMG) activity. This allowed us to better quantify the control of interference, specifically the part that remains hidden when pure correct trials are not distinguished from partial errors. Partial errors correspond to sub-threshold EMG bursts induced by incorrect responses that immediately precede a correct response. Moreover, besides "online" control, we also investigated cognitive control effects manifesting across consecutive trials. The main findings were that adults with ADHD were slower and showed a larger interference effect in comparison to controls. However, the data revealed that the larger interference effect was due neither to higher impulse expression, nor to a deficit in inhibition but that these patients presented a larger interference effect than the controls after congruent trials. We propose and discuss the hypothesis that the interference control deficit found in adults with ADHD is secondary to impairments in sustained attention. PMID:26057599

  17. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon.

    PubMed

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S

    2015-06-15

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome-Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S-RQC and 80S-Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome-translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel. PMID:25877867

  18. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  19. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  20. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  1. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  2. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  3. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  4. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  5. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... reports.\\10\\ \\1\\ See Exchange Act Release No. 63241 (Nov. 3, 2010), 75 FR 69792 (Nov. 15, 2010) (``Rule... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures...

  6. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Effort-control program for NE...-control program for NE multispecies limited access vessels. (a) Except as provided in §§ 648.17 and 648.82... program described in this section, unless otherwise provided elsewhere in this part. (1) End-of-year...

  7. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    .... 40354 (August 24, 1998), 63 FR 46264 (August 31, 1998) (NASD NTM-98-66). Certain market participants may... subscribers to ATSs, appropriately control the risks associated with market access, so as not to jeopardize... unaware of the trading activity occurring under its market identifier and have no mechanism to control...

  8. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  9. 78 FR 63479 - Meta-Analyses of Randomized Controlled Clinical Trials (RCTs) for the Evaluation of Risk To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-24

    ... HUMAN SERVICES Food and Drug Administration Meta-Analyses of Randomized Controlled Clinical Trials (RCTs... scientific approaches for the conduct and assessment of meta-analyses of randomized controlled clinical... others from the general public, about the use of meta-analyses of randomized trials as a tool for...

  10. Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users

    NASA Astrophysics Data System (ADS)

    Long, Chengnian; Guan, Xinping

    We consider a distributed joint random access and power control scheme for interference management in wireless ad hoc networks. To derive decentralized solutions that do not require any cooperation among the users, we formulate this problem as non-cooperative joint random access and power control game, in which each user minimizes its average transmission cost with a given rate constraint. Using supermodular game theory, the existence and uniqueness of Nash equilibrium are established. Furthermore, we present an asynchronous distributed algorithm to compute the solution of the game based on myopic best response updates, which converges to Nash equilibrium globally.

  11. A low-order model for analysing effects of blade fatigue load control

    NASA Astrophysics Data System (ADS)

    Kallesøe, B. S.

    2006-09-01

    A new low-order mathematical model is introduced to analyse blade dynamics and blade load-reducing control strategies for wind turbines. The model consists of a typical wing section model combined with a rotor speed model, leading to four structural degrees of freedom (flapwise, edgewise and torsional blade oscillations and rotor speed). The aerodynamics is described by an unsteady aerodynamic model. The equations of motion are derived in non-linear and linear form. The linear equations of motion are used for stability analysis and control design. The non-linear equations of motion are used for time simulations to evaluate control performance. The stability analysis shows that the model is capable of predicting classical flutter and stall-induced vibrations. The results from the stability analysis are compared with known results, showing good agreement. The model is used to compare the performance of one proportional-integral-derivative controller and two full-state feedback controllers. Copyright

  12. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  13. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  14. Nonorthogonal CSK/CDMA with Received-Power Adaptive Access Control Scheme

    NASA Astrophysics Data System (ADS)

    Komuro, Nobuyoshi; Habuchi, Hiromasa; Tsuboi, Toshinori

    The measurements for Multiple Access Interference (MAI) problems and the improvement of the data rate are key issues on the advanced wireless networks. In this paper, the nonorthogonal Code Shift Keying Code Division Multiple Access (CSK/CDMA) with received-power adaptive access control scheme is proposed. In our system, a user who is ready to send measures the received power from other users, and then the user decides whether to transmit or refrain from transmission according to the received power and a pre-decided threshold. Not only overcoming the MAI problems, but our system also improve the throughput performance. The throughput performance of the proposed system is evaluated by theoretical analysis. Consequently, the nonorthogonal CSK/CDMA system improves by applying received-power adaptive access control. It was also found that the throughput performance of the nonorthogonal CSK/CDMA system is better than that of the orthogonal CSK/CDMA system at any Eb/N0. We conclude that the nonorthogonal CSK/CDMA system with received-power adaptive access control scheme is expected to be effective in advanced wireless networks.

  15. Toward Federated Security and Data Access Control within a Services Oriented Architecture for Publishing Hydrologic Data

    NASA Astrophysics Data System (ADS)

    Horsburgh, J. S.; Tarboton, D. G.; Schreuders, K.; Patil, K. S.

    2010-12-01

    Academic researchers who manage experimental watersheds, observatories, and research sites need the ability to effectively collect, manage, and publish hydrologic data. This often requires the ability to control and document access to the data. One current mechanism for publishing data from experimental sites uses the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) Hydrologic Information System (HIS). The CUAHSI HIS Project has developed a software stack called HydroServer for publishing hydrologic data. HydroServer relies on a standard relational database schema for storing hydrologic observations, called the Observations Data Model (ODM), a standard set of web services for publishing observations stored in an ODM database, called WaterOneFlow, and a standard XML schema for exchanging hydrologic observations data, called Water Markup Language (WaterML). These standards make is possible for disparate investigators to publish their data as web services within a federated network of HydroServers. Once a HydroServer is operational, all Internet users can access all of the data on the server, with no requirement for users to identify themselves, or restriction on what can be accessed. There are a number of situations where data producers want to take advantage of the organization and functionality that ODM and the HydroServer software stack provides, but without providing unrestricted and unlogged access to all of the data that they are putting on their server. These include the desire of academic data collectors to: 1) control who can access/download data; 2) publish research results based on data before the data are released to the general public; 3) keep track of who is downloading and using their data to evaluate and document its impact on the community; 4) have and use a data use/access agreement and ensure that they get credit and appropriate citation for the data that they publish; 5) expose the best or highest quality data

  16. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  17. Analyses and tests of the B-1 aircraft structural mode control system

    NASA Technical Reports Server (NTRS)

    Wykes, J. H.; Byar, T. R.; Macmiller, C. J.; Greek, D. C.

    1980-01-01

    Analyses and flight tests of the B-1 structural mode control system (SMCS) are presented. Improvements in the total dynamic response of a flexible aircraft and the benefits to ride qualities, handling qualities, crew efficiency, and reduced dynamic loads on the primary structures, were investigated. The effectiveness and the performance of the SMCS, which uses small aerodynamic surfaces at the vehicle nose to provide damping to the structural modes, were evaluated.

  18. Efficient Service Delivery for High-speed Railway Communications Using MIMO and Access Control Technique

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2014-07-01

    In order to realize the notion of "anytime, anywhere" communication for high-speed train passengers, the Long Term Evolution for Railway is designed to provide broadband accesses and reliable communications for high-speed train passengers. However, with the increase of train speed, the system is subject to high bit error rate, Doppler frequency shift, and call drops. This paper is trying to solve these problems by employing the Multiple-Input Multiple-Output technique and access control schemes. The goal is to provide higher quality of services such as data rate, reliability, and delay for train passengers. Physical layer performance analysis and access control schemes are proposed in a two-hop model. Handovers and service types are also considered. Simulation results show that proposed models and schemes perform better in improving the quality of services.

  19. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  20. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  1. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  2. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  3. Kinetically Controlled Chemoselective Cyclization Simplifies the Access to Cyclic and Branched Peptides.

    PubMed

    Boll, Emmanuelle; Drobecq, Hervé; Lissy, Elizabeth; Cantrelle, François-Xavier; Melnyk, Oleg

    2016-08-01

    A bis(2-sulfanylethyl)amido group reacts significantly faster with cysteinyl peptides when installed on the C-terminal end of a peptide in comparison with the side-chain of Asp and Glu. This property enabled the design of a kinetically controlled chemoselective peptide cyclization reaction, giving straightforward access to cyclic and branched peptides in one pot. PMID:27398649

  4. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Effort-control program for NE multispecies limited access vessels. 648.82 Section 648.82 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES Management Measures...

  5. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... violation of section 337 in the infringement of certain patents. 73 FR 75131. The principal respondent was... order. 75 FR 44989-90 (July 30, 2010). The Commission also issued cease and desist orders against those... COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers...

  6. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  7. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  8. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  9. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings, and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PERMANENT PROGRAM PERFORMANCE STANDARDS PERMANENT PROGRAM...

  10. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings, and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PERMANENT PROGRAM PERFORMANCE STANDARDS PERMANENT PROGRAM...

  11. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  12. An Application Instance of Fingerprint Identification in the School Office Access Control System

    NASA Astrophysics Data System (ADS)

    Yu, Lijun

    This paper designs the school office access control system by using the fingerprint identification method, and introduces the software design and the adopted hardware modules. These include fingerprint collection, fingerprint image processing, and fingerprint identification and verification. As proved in the experimental results, this design can fully meet the expectation.

  13. Control of Access to Memory: The Use of Task Interference as a Behavioral Probe

    ERIC Educational Resources Information Center

    Loft, Shayne; Humphreys, Michael S.; Whitney, Susannah J.

    2008-01-01

    Directed forgetting and prospective memory methods were combined to examine differences in the control of memory access. Between studying two lists of target words, participants were either instructed to forget the first list, or to continue remembering the first list. After study participants performed a lexical decision task with an additional…

  14. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  15. Longitudinal occupancy of controlled access right-of-way by utilities. A synthesis of highway practice

    SciTech Connect

    Williams, R.L.

    1996-06-01

    This synthesis will be of interest to transportation agency administrators, design engineers, maintenance engineers and maintenance staff, traffic engineers, and safety officials. It will also provide useful information to the utilities and telecommunications industries. Information is presented on the state transportation agencies` policies, practices, and experience associated with occupancy of the rights-of-way on controlled- (or Limited-) access highways.

  16. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  17. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  18. High-Alpha Research Vehicle Lateral-Directional Control Law Description, Analyses, and Simulation Results

    NASA Technical Reports Server (NTRS)

    Davidson, John B.; Murphy, Patrick C.; Lallman, Frederick J.; Hoffler, Keith D.; Bacon, Barton J.

    1998-01-01

    This report contains a description of a lateral-directional control law designed for the NASA High-Alpha Research Vehicle (HARV). The HARV is a F/A-18 aircraft modified to include a research flight computer, spin chute, and thrust-vectoring in the pitch and yaw axes. Two separate design tools, CRAFT and Pseudo Controls, were integrated to synthesize the lateral-directional control law. This report contains a description of the lateral-directional control law, analyses, and nonlinear simulation (batch and piloted) results. Linear analysis results include closed-loop eigenvalues, stability margins, robustness to changes in various plant parameters, and servo-elastic frequency responses. Step time responses from nonlinear batch simulation are presented and compared to design guidelines. Piloted simulation task scenarios, task guidelines, and pilot subjective ratings for the various maneuvers are discussed. Linear analysis shows that the control law meets the stability margin guidelines and is robust to stability and control parameter changes. Nonlinear batch simulation analysis shows the control law exhibits good performance and meets most of the design guidelines over the entire range of angle-of-attack. This control law (designated NASA-1A) was flight tested during the Summer of 1994 at NASA Dryden Flight Research Center.

  19. Spatially Explicit Analyses of Anopheline Mosquitoes Indoor Resting Density: Implications for Malaria Control

    PubMed Central

    Kamdem, Colince; Fouet, Caroline; Etouna, Joachim; Etoa, François-Xavier; Simard, Frédéric; Besansky, Nora J.; Costantini, Carlo

    2012-01-01

    Background The question of sampling and spatial aggregation of malaria vectors is central to vector control efforts and estimates of transmission. Spatial patterns of anopheline populations are complex because mosquitoes' habitats and behaviors are strongly heterogeneous. Analyses of spatially referenced counts provide a powerful approach to delineate complex distribution patterns, and contributions of these methods in the study and control of malaria vectors must be carefully evaluated. Methodology/Principal Findings We used correlograms, directional variograms, Local Indicators of Spatial Association (LISA) and the Spatial Analysis by Distance IndicEs (SADIE) to examine spatial patterns of Indoor Resting Densities (IRD) in two dominant malaria vectors sampled with a 5×5 km grid over a 2500 km2 area in the forest domain of Cameroon. SADIE analyses revealed that the distribution of Anopheles gambiae was different from regular or random, whereas there was no evidence of spatial pattern in Anopheles funestus (Ia = 1.644, Pa<0.05 and Ia = 1.464, Pa>0.05, respectively). Correlograms and variograms showed significant spatial autocorrelations at small distance lags, and indicated the presence of large clusters of similar values of abundance in An. gambiae while An. funestus was characterized by smaller clusters. The examination of spatial patterns at a finer spatial scale with SADIE and LISA identified several patches of higher than average IRD (hot spots) and clusters of lower than average IRD (cold spots) for the two species. Significant changes occurred in the overall spatial pattern, spatial trends and clusters when IRDs were aggregated at the house level rather than the locality level. All spatial analyses unveiled scale-dependent patterns that could not be identified by traditional aggregation indices. Conclusions/Significance Our study illustrates the importance of spatial analyses in unraveling the complex spatial patterns of malaria vectors, and

  20. Distributed data access in the LAMPF (Los Alamos Meson Physics Facility) control system

    SciTech Connect

    Schaller, S.C.; Bjorklund, E.A.

    1987-01-01

    We have extended the Los Alamos Meson Physics Facility (LAMPF) control system software to allow uniform access to data and controls throughout the control system network. Two aspects of this work are discussed here. Of primary interest is the use of standard interfaces and standard messages to allow uniform and easily expandable inter-node communication. A locally designed remote procedure call protocol will be described. Of further interest is the use of distributed databases to allow maximal hardware independence in the controls software. Application programs use local partial copies of the global device description database to resolve symbolic device names.

  1. Chroni - an Android Application for Geochronologists to Access Archived Sample Analyses from the NSF-Funded Geochron.Org Data Repository.

    NASA Astrophysics Data System (ADS)

    Nettles, J. J.; Bowring, J. F.

    2014-12-01

    NSF requires data management plans as part of funding proposals and geochronologists, among other scientists, are archiving their data and results to the public cloud archives managed by the NSF-funded Integrated Earth Data Applications, or IEDA. GeoChron is a database for geochronology housed within IEDA. The software application U-Pb_Redux developed at the Cyber Infrastructure Research and Development Lab for the Earth Sciences (CIRDLES.org) at the College of Charleston provides seamless connectivity to GeoChron for uranium-lead (U-Pb) geochronologists to automatically upload and retrieve their data and results. U-Pb_Redux also manages publication-quality documents including report tables and graphs. CHRONI is a lightweight mobile application for Android devices that provides easy access to these archived data and results. With CHRONI, U-Pb geochronologists can view archived data and analyses downloaded from the Geochron database, or any other location, in a customizable format. CHRONI uses the same extensible markup language (XML) schema and documents used by U-Pb_Redux and GeoChron. Report Settings are special XML files that can be customized in U-Pb_Redux, stored in the cloud, and then accessed and used in CHRONI to create the same customized data display on the mobile device. In addition to providing geologists effortless and mobile access to archived data and analyses, CHRONI allows users to manage their GeoChron credentials, quickly download private and public files via a specified IEDA International Geo Sample Number (IGSN) or URL, and view specialized graphics associated with particular IGSNs. Future versions of CHRONI will be developed to support iOS compatible devices. CHRONI is an open source project under the Apache 2 license and is hosted at https://github.com/CIRDLES/CHRONI. We encourage community participation in its continued development.

  2. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  3. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  4. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    PubMed Central

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  5. ACCIDENT ANALYSES & CONTROL OPTIONS IN SUPPORT OF THE SLUDGE WATER SYSTEM SAFETY ANALYSIS

    SciTech Connect

    WILLIAMS, J.C.

    2003-11-15

    This report documents the accident analyses and nuclear safety control options for use in Revision 7 of HNF-SD-WM-SAR-062, ''K Basins Safety Analysis Report'' and Revision 4 of HNF-SD-SNF-TSR-001, ''Technical Safety Requirements - 100 KE and 100 KW Fuel Storage Basins''. These documents will define the authorization basis for Sludge Water System (SWS) operations. This report follows the guidance of DOE-STD-3009-94, ''Preparation Guide for US. Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports'', for calculating onsite and offsite consequences. The accident analysis summary is shown in Table ES-1 below. While this document describes and discusses potential control options to either mitigate or prevent the accidents discussed herein, it should be made clear that the final control selection for any accident is determined and presented in HNF-SD-WM-SAR-062.

  6. Quality control and conduct of genome-wide association meta-analyses

    PubMed Central

    Winkler, Thomas W; Day, Felix R; Croteau-Chonka, Damien C; Wood, Andrew R; Locke, Adam E; Mägi, Reedik; Ferreira, Teresa; Fall, Tove; Graff, Mariaelisa; Justice, Anne E; Luan, Jian'an; Gustafsson, Stefan; Randall, Joshua C; Vedantam, Sailaja; Workalemahu, Tsegaselassie; Kilpeläinen, Tuomas O; Scherag, André; Esko, Tonu; Kutalik, Zoltán; Heid, Iris M; Loos, Ruth JF

    2014-01-01

    Rigorous organization and quality control (QC) are necessary to facilitate successful genome-wide association meta-analyses (GWAMAs) of statistics aggregated across multiple genome-wide association studies. This protocol provides guidelines for [1] organizational aspects of GWAMAs, and for [2] QC at the study file level, the meta-level across studies, and the meta-analysis output level. Real–world examples highlight issues experienced and solutions developed by the GIANT Consortium that has conducted meta-analyses including data from 125 studies comprising more than 330,000 individuals. We provide a general protocol for conducting GWAMAs and carrying out QC to minimize errors and to guarantee maximum use of the data. We also include details for use of a powerful and flexible software package called EasyQC. For consortia of comparable size to the GIANT consortium, the present protocol takes a minimum of about 10 months to complete. PMID:24762786

  7. The Virtual Jason Control Van: A GeoBrowser Application for Automatic Data Cataloging and Access

    NASA Astrophysics Data System (ADS)

    Lerner, S.

    2001-12-01

    Today's scientific underwater remotely operated vehicles (ROVs) generate a tremendous amount of data collected from a variety of sensors in real-time. Often integrated information such as multiple video streams, vehicle telemetry, and scientific data are only available to the users in the ROV control-van during real-time operations. Although all the data is logged, it is extremely difficult for scientists to re-create this integrated information and have the ability to view and access an entire cruise dataset in an integrated fashion. We introduce a methodology of taking real-time information snapshots during events that occur within the ROV control-van and using these snapshots for data access and analysis. We take control-van snapshots during "interesting" events as defined whenever a scientist enters an event via a computer, and we also take snapshots at regular time intervals such as once a minute to ensure complete data coverage. As part of the JasonII ROV upgrade, we have developed a prototype system that automatically captures the information in the control-van during ROV operations including up to four simultaneous video sources, vehicle data, scientific instrument data, and event data. These control-van snapshots are automatically cataloged and immediately accessible and searchable via a web-browser. The system is designed for both scientific and public outreach needs and will be integrated with the SeaNet system to provide remote access on-shore for scientific collaboration and public outreach. During this past year, the prototype system has been deployed on four Jason cruises and has captured over 40,000 control-van snapshots, containing more than 160,000 images. Each control-van snapshot seamlessly integrates the four simultaneous video snapshots with vehicle data such as navigation, depth, and heading, scientific instrument data from instruments such as a ctd and a magnetometer, and event data as entered by scientists. All this information is

  8. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  9. Controlled Access Headings in EAD Finding Aids: Current Practices in Number of and Types of Headings Assigned

    ERIC Educational Resources Information Center

    Mascaro, Michelle

    2011-01-01

    This article presents the findings from a study of controlled access headings assigned to encoded archival description finding aids in the Ohio Library and Information Network Finding Aid Repository, focusing on the number of headings per finding aid and the category of terms assigned. Assigning multiple controlled access headings was widely…

  10. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  11. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  12. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  13. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  14. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    NASA Astrophysics Data System (ADS)

    Gibbon, T. B.; Osadchiy, A. V.; Kjær, R.; Jensen, J. B.; Monroy, I. Tafur

    2009-06-01

    Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 2 31-1 PRBS pattern. The results suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient control in WDM access networks.

  15. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  16. NEOREG: design and implementation of an online Neonatal Registration System to access, follow and analyse the data of newborns with congenital cytomegalovirus infection.

    PubMed

    Steurbaut, Kristof; De Backere, Femke; Keymeulen, Annelies; De Leenheer, Marc; Smets, Koenraad; De Turck, Filip

    2013-09-01

    Today's registration of newborns with congenital cytomegalovirus (cCMV) infection is still performed on paper-based forms in Flanders, Belgium. This process has a large administrative impact. It is important that all screening tests are registered to have a complete idea of the impact of cCMV. Although these registrations are usable in computerised data analysis, these data are not available in a format to perform electronic processing. An online Neonatal Registry (NEOREG) System was designed and developed to access, follow and analyse the data of newborns remotely. It allows remote access and monitoring by the physician. The Java Enterprise layered application provides patients' diagnostic registration and treatment follow-up through a web interface and uses document forms in Portable Document Format (PDF), which incorporate all the elements from the existing forms. Forms are automatically processed to structured EHRs. Modules are included to perform statistical analysis. The design was driven by extendibility, security and usability requirements. The website load time, throughput and execution time of data analysis were evaluated in detail. The NEOREG system is able to replace the existing paper-based CMV records. PMID:23323747

  17. Dramatic reduction of read disturb through pulse width control in spin torque random access memory

    NASA Astrophysics Data System (ADS)

    Wang, Zihui; Wang, Xiaobin; Gan, Huadong; Jung, Dongha; Satoh, Kimihiro; Lin, Tsann; Zhou, Yuchen; Zhang, Jing; Huai, Yiming; Chang, Yao-Jen; Wu, Te-ho

    2013-09-01

    Magnetizations dynamic effect in low current read disturb region is studied both experimentally and theoretically. Dramatic read error rate reduction through read pulse width control is theoretically predicted and experimentally observed. The strong dependence of read error rate upon pulse width contrasts conventional energy barrier approach and can only be obtained considering detailed magnetization dynamics at long time thermal magnetization reversal region. Our study provides a design possibility for ultra-fast low current spin torque random access memory.

  18. Multidimensional morphometric 3D MRI analyses for detecting brain abnormalities in children: impact of control population.

    PubMed

    Wilke, Marko; Rose, Douglas F; Holland, Scott K; Leach, James L

    2014-07-01

    Automated morphometric approaches are used to detect epileptogenic structural abnormalities in 3D MR images in adults, using the variance of a control population to obtain z-score maps in an individual patient. Due to the substantial changes the developing human brain undergoes, performing such analyses in children is challenging. This study investigated six features derived from high-resolution T1 datasets in four groups: normal children (1.5T or 3T data), normal clinical scans (3T data), and patients with structural brain lesions (3T data), with each n = 10. Normative control data were obtained from the NIH study on normal brain development (n = 401). We show that control group size substantially influences the captured variance, directly impacting the patient's z-scores. Interestingly, matching on gender does not seem to be beneficial, which was unexpected. Using data obtained at higher field scanners produces slightly different base rates of suprathreshold voxels, as does using clinically derived normal studies, suggesting a subtle but systematic effect of both factors. Two approaches for controlling suprathreshold voxels in a multidimensional approach (combining features and requiring a minimum cluster size) were shown to be substantial and effective in reducing this number. Finally, specific strengths and limitations of such an approach could be demonstrated in individual cases. PMID:25050423

  19. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  20. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  1. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    PubMed

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care. PMID:22732236

  2. Layered Multicast Encryption of Motion JPEG2000 Code Streams for Flexible Access Control

    NASA Astrophysics Data System (ADS)

    Nakachi, Takayuki; Toyoshima, Kan; Tonomura, Yoshihide; Fujii, Tatsuya

    In this paper, we propose a layered multicast encryption scheme that provides flexible access control to motion JPEG2000 code streams. JPEG2000 generates layered code streams and offers flexible scalability in characteristics such as resolution and SNR. The layered multicast encryption proposal allows a sender to multicast the encrypted JPEG2000 code streams such that only designated groups of users can decrypt the layered code streams. While keeping the layering functionality, the proposed method offers useful properties such as 1) video quality control using only one private key, 2) guaranteed security, and 3) low computational complexity comparable to conventional non-layered encryption. Simulation results show the usefulness of the proposed method.

  3. MPEG-21 as an access control tool for the National Health Service Care Records Service.

    PubMed

    Brox, Georg A

    2005-01-01

    Since the launch of the National Health Service (NHS) Care Records Service with plans to share patient information across England, there has been an emphasis on the need for manageable access control methods. MPEG-21 is a structured file format which includes an Intellectual Property Management and Protection (IPMP) function using XML to present all digitally stored items in the patient record. Using DICreator software, patient records consisting of written text, audio-recordings, non-X-ray digital imaging and video sequences were linked up successfully. Audio records were created using Talk-Back 2002 to standardize and optimize recording quality. The recorded reports were then linked and archived using iTunes. A key was used each time the file was displayed to secure access to confidential patient data. The building of the correct file structure could be monitored during the entire creation of the file. The results demonstrated the ability to ensure secure access of the MPEG-21 file by both health-care professionals and patients by use of different keys and a specific MPEG-21 browser. The study also showed that the enabling of IPMP will provide accurate audit trails to authenticate appropriate access to medical information. PMID:16035983

  4. Global analyses of mRNA translational control during early Drosophila embryogenesis

    PubMed Central

    Qin, Xiaoli; Ahn, Soyeon; Speed, Terence P; Rubin, Gerald M

    2007-01-01

    Background In many animals, the first few hours of life proceed with little or no transcription, and developmental regulation at these early stages is dependent on maternal cytoplasm rather than the zygotic nucleus. Translational control is critical for early Drosophila embryogenesis and is exerted mainly at the gene level. To understand post-transcriptional regulation during Drosophila early embryonic development, we used sucrose polysomal gradient analyses and GeneChip analysis to illustrate the translation profile of individual mRNAs. Results We determined ribosomal density and ribosomal occupancy of over 10,000 transcripts during the first ten hours after egg laying. Conclusion We report the extent and general nature of gene regulation at the translational level during early Drosophila embryogenesis on a genome-wide basis. The diversity of the translation profiles indicates multiple mechanisms modulating transcript-specific translation. Cluster analyses suggest that the genes involved in some biological processes are co-regulated at the translational level at certain developmental stages. PMID:17448252

  5. Flight test and analyses of the B-1 structural mode control system at supersonic flight conditions

    NASA Technical Reports Server (NTRS)

    Wykes, J. H.; Kelpl, M. J.; Brosnan, M. J.

    1983-01-01

    A practical structural mode control system (SMCS) that could be turned on at takeoff and be left on for the entire flight was demonstrated. The SMCS appears to be more effective in damping the key fuselage bending modes at supersonic speeds than at the design point of Mach 0.85 (for fixed gains). The SMCS has an adverse effect on high frequency symmetric modes; however, this adverse effect did not make the system unstable and does not appear to affect ride quality performance. The vertical ride quality analyses indicate that the basic configuration without active systems is satisfactory for long term exposure. If clear air turbulence were to be encountered, indications are that the SMCS would be very effective in reducing the adverse accelerations. On the other hand, lateral ride quality analyses indicate that the aircraft with the SMCS on does not quite meet the long term exposure criteria, but would be satisfactory for shot term exposure at altitude. Again, the lateral SMCS was shown to be very effective in reducing peak lateral accelerations.

  6. Quality control and conduct of genome-wide association meta-analyses.

    PubMed

    Winkler, Thomas W; Day, Felix R; Croteau-Chonka, Damien C; Wood, Andrew R; Locke, Adam E; Mägi, Reedik; Ferreira, Teresa; Fall, Tove; Graff, Mariaelisa; Justice, Anne E; Luan, Jian'an; Gustafsson, Stefan; Randall, Joshua C; Vedantam, Sailaja; Workalemahu, Tsegaselassie; Kilpeläinen, Tuomas O; Scherag, André; Esko, Tonu; Kutalik, Zoltán; Heid, Iris M; Loos, Ruth J F

    2014-05-01

    Rigorous organization and quality control (QC) are necessary to facilitate successful genome-wide association meta-analyses (GWAMAs) of statistics aggregated across multiple genome-wide association studies. This protocol provides guidelines for (i) organizational aspects of GWAMAs, and for (ii) QC at the study file level, the meta-level across studies and the meta-analysis output level. Real-world examples highlight issues experienced and solutions developed by the GIANT Consortium that has conducted meta-analyses including data from 125 studies comprising more than 330,000 individuals. We provide a general protocol for conducting GWAMAs and carrying out QC to minimize errors and to guarantee maximum use of the data. We also include details for the use of a powerful and flexible software package called EasyQC. Precise timings will be greatly influenced by consortium size. For consortia of comparable size to the GIANT Consortium, this protocol takes a minimum of about 10 months to complete. PMID:24762786

  7. A network access control framework for 6LoWPAN networks.

    PubMed

    Oliveira, Luís M L; Rodrigues, Joel J P C; de Sousa, Amaro F; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  8. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  9. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  10. An interaction-based access control model (IBAC) for collaborative services

    SciTech Connect

    Altunay, Mine; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  11. A Randomized Controlled Trial of a Mobile Clinical Decision Aid to Improve Access to Kidney Transplantation: iChoose Kidney

    PubMed Central

    Patzer, Rachel E.; Basu, Mohua; Mohan, Sumit; Smith, Kayla D.; Wolf, Michael; Ladner, Daniela; Friedewald, John J.; Chiles, Mariana; Russell, Allison; McPherson, Laura; Gander, Jennifer; Pastan, Stephen

    2016-01-01

    Kidney transplantation is the preferred treatment for patients with end-stage renal disease, as it substantially increases a patient's survival and is cost saving compared to a lifetime of dialysis. However, transplantation is not universally chosen by patients with renal failure, and limited knowledge about the survival benefit of transplantation vs. dialysis may play a role. We created a mobile application clinical decision aid called iChoose Kidney to improve access to individualized prognosis information comparing dialysis and transplantation outcomes. We describe the iChoose Kidney study, a randomized controlled trial designed to test the clinical efficacy of a mobile health decision aid among end-stage renal disease patients referred for kidney transplantation at three large, diverse transplant centers across the U.S. Approximately 450 patients will be randomized to receive either: (1) standard of care or “usual” transplantation education, or (2) standard of care plus iChoose Kidney. The primary outcome is change in knowledge about the survival benefit of kidney transplantation vs. dialysis from baseline to immediate follow-up; secondary outcomes include change in treatment preferences, improved decisional conflict, and increased access to kidney transplantation. Analyses are also planned to examine effectiveness across subgroups of race, socioeconomic status, health literacy and health numeracy. Engaging patients in health care choices can increase patient empowerment and improve knowledge and understanding of treatment choices. If the effectiveness of iChoose Kidney has a greater impact on patients with low health literacy, lower socioeconomic status, and minority race, this decision aid could help reduce disparities in access to kidney transplantation.

  12. Concordance of Results from Randomized and Observational Analyses within the Same Study: A Re-Analysis of the Women’s Health Initiative Limited-Access Dataset

    PubMed Central

    Bolland, Mark J.; Grey, Andrew; Gamble, Greg D.; Reid, Ian R.

    2015-01-01

    Background Observational studies (OS) and randomized controlled trials (RCTs) often report discordant results. In the Women’s Health Initiative Calcium and Vitamin D (WHI CaD) RCT, women were randomly assigned to CaD or placebo, but were permitted to use personal calcium and vitamin D supplements, creating a unique opportunity to compare results from randomized and observational analyses within the same study. Methods WHI CaD was a 7-year RCT of 1g calcium/400IU vitamin D daily in 36,282 post-menopausal women. We assessed the effects of CaD on cardiovascular events, death, cancer and fracture in a randomized design- comparing CaD with placebo in 43% of women not using personal calcium or vitamin D supplements- and in a observational design- comparing women in the placebo group (44%) using personal calcium and vitamin D supplements with non-users. Incidence was assessed using Cox proportional hazards models, and results from the two study designs deemed concordant if the absolute difference in hazard ratios was ≤0.15. We also compared results from WHI CaD to those from the WHI Observational Study(WHI OS), which used similar methodology for analyses and recruited from the same population. Results In WHI CaD, for myocardial infarction and stroke, results of unadjusted and 6/8 covariate-controlled observational analyses (age-adjusted, multivariate-adjusted, propensity-adjusted, propensity-matched) were not concordant with the randomized design results. For death, hip and total fracture, colorectal and total cancer, unadjusted and covariate-controlled observational results were concordant with randomized results. For breast cancer, unadjusted and age-adjusted observational results were concordant with randomized results, but only 1/3 other covariate-controlled observational results were concordant with randomized results. Multivariate-adjusted results from WHI OS were concordant with randomized WHI CaD results for only 4/8 endpoints. Conclusions Results of

  13. Multilevel Growth Curve Analyses of Treatment Effects of a Web-Based Intervention for Stress Reduction: Randomized Controlled Trial

    PubMed Central

    Raeder, Sabine; Kraft, Pål; Bjørkli, Cato Alexander

    2013-01-01

    Background Stress is commonly experienced by many people and it is a contributing factor to many mental and physical health conditions, However, few efforts have been made to develop and test the effects of interventions for stress. Objective The aim of this study was to examine the effects of a Web-based stress-reduction intervention on stress, investigate mindfulness and procrastination as potential mediators of any treatment effects, and test whether the intervention is equally effective for females as males, all ages, and all levels of education. Methods We employed a randomized controlled trial in this study. Participants were recruited online via Facebook and randomly assigned to either the stress intervention or a control condition. The Web-based stress intervention was fully automated and consisted of 13 sessions over 1 month. The controls were informed that they would get access to the intervention after the final data collection. Data were collected at baseline and at 1, 2, and 6 months after intervention onset by means of online questionnaires. Outcomes were stress, mindfulness, and procrastination, which were all measured at every measurement occasion. Results A total of 259 participants were included and were allocated to either the stress intervention (n=126) or the control condition (n=133). Participants in the intervention and control group were comparable at baseline; however, results revealed that participants in the stress intervention followed a statistically different (ie, cubic) developmental trajectory in stress levels over time compared to the controls. A growth curve analysis showed that participants in the stress intervention (unstandardized beta coefficient [B]=–3.45, P=.008) recovered more quickly compared to the control group (B=–0.81, P=.34) from baseline to 1 month. Although participants in the stress intervention did show increases in stress levels during the study period (B=2.23, P=.008), long-term stress levels did decrease

  14. Targeting intensive versus conventional glycaemic control for type 1 diabetes mellitus: a systematic review with meta-analyses and trial sequential analyses of randomised clinical trials

    PubMed Central

    Kähler, Pernille; Grevstad, Berit; Almdal, Thomas; Gluud, Christian; Wetterslev, Jørn; Vaag, Allan; Hemmingsen, Bianca

    2014-01-01

    Objective To assess the benefits and harms of targeting intensive versus conventional glycaemic control in patients with type 1 diabetes mellitus. Design A systematic review with meta-analyses and trial sequential analyses of randomised clinical trials. Data sources The Cochrane Library, MEDLINE, EMBASE, Science Citation Index Expanded and LILACS to January 2013. Study selection Randomised clinical trials that prespecified different targets of glycaemic control in participants at any age with type 1 diabetes mellitus were included. Data extraction Two authors independently assessed studies for inclusion and extracted data. Results 18 randomised clinical trials included 2254 participants with type 1 diabetes mellitus. All trials had high risk of bias. There was no statistically significant effect of targeting intensive glycaemic control on all-cause mortality (risk ratio 1.16, 95% CI 0.65 to 2.08) or cardiovascular mortality (0.49, 0.19 to 1.24). Targeting intensive glycaemic control reduced the relative risks for the composite macrovascular outcome (0.63, 0.41 to 0.96; p=0.03), and nephropathy (0.37, 0.27 to 0.50; p<0.00001. The effect estimates of retinopathy, ketoacidosis and retinal photocoagulation were not consistently statistically significant between random and fixed effects models. The risk of severe hypoglycaemia was significantly increased with intensive glycaemic targets (1.40, 1.01 to 1.94). Trial sequential analyses showed that the amount of data needed to demonstrate a relative risk reduction of 10% were, in general, inadequate. Conclusions There was no significant effect towards improved all-cause mortality when targeting intensive glycaemic control compared with conventional glycaemic control. However, there may be beneficial effects of targeting intensive glycaemic control on the composite macrovascular outcome and on nephropathy, and detrimental effects on severe hypoglycaemia. Notably, the data for retinopathy and ketoacidosis were inconsistent

  15. Design, stability and robustness analyses of neural networks in control systems

    NASA Astrophysics Data System (ADS)

    Shen, Jie

    1998-12-01

    Artificial Neural Network (ANN), also known as connectionist learning and parallel distributed processing, is finding its applications in diverse fields: many branches of engineering, health sciences, cognitive science, archaeology, finance, etc. This research tries to make some efforts to emphasize "design" methodology in ANN, and to explore the structures by which ANN can solve difficult problems by identifying proper ANN architecture. Two classes of ANN--multi-layer neural networks and recurrent networks--are investigated in the context of control of systems and estimation of unknown parameters. The multi-layer neural networks converge to optimal solutions by satisfying mathematical formulations associated with the Hamilton approach and the dynamic programming approach. A benchmark aerospace application is used for illustration. A variant of the Hopfield network, called the Modified Hopfield Neural Network (MHNN), is proposed to show the design approach to the determination of weights in recurrent networks. It is shown how the equilibrium point of this network helps with inversion operations arising in optimal gain determination. Control of dynamic systems using recurrent neural networks are presented. The robustness of the recurrent networks to parameter variation is considered in the context of weights. Analyses are carried out in the frequency domain and the time domain.

  16. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  17. Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect

    NASA Astrophysics Data System (ADS)

    von Helden, Josef; Bente, Ingo

    Network Access Control (NAC) is the most promising approach to provide protection against sophisticated attacks that first compromise endpoints to subsequently continue their evil work in networks accessible via the compromised endpoint. Trusted Network Connect (TNC) is a NAC approach featuring interoperability and unforgeability due to its openness, broad vendor support and integration of Trusted Computing functions.

  18. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    NASA Astrophysics Data System (ADS)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  19. Reporting of analyses from randomized controlled trials with multiple arms: a systematic review

    PubMed Central

    2013-01-01

    Background Multiple-arm randomized trials can be more complex in their design, data analysis, and result reporting than two-arm trials. We conducted a systematic review to assess the reporting of analyses in reports of randomized controlled trials (RCTs) with multiple arms. Methods The literature in the MEDLINE database was searched for reports of RCTs with multiple arms published in 2009 in the core clinical journals. Two reviewers extracted data using a standardized extraction form. Results In total, 298 reports were identified. Descriptions of the baseline characteristics and outcomes per group were missing in 45 reports (15.1%) and 48 reports (16.1%), respectively. More than half of the articles (n = 171, 57.4%) reported that a planned global test comparison was used (that is, assessment of the global differences between all groups), but 67 (39.2%) of these 171 articles did not report details of the planned analysis. Of the 116 articles reporting a global comparison test, 12 (10.3%) did not report the analysis as planned. In all, 60% of publications (n = 180) described planned pairwise test comparisons (that is, assessment of the difference between two groups), but 20 of these 180 articles (11.1%) did not report the pairwise test comparisons. Of the 204 articles reporting pairwise test comparisons, the comparisons were not planned for 44 (21.6%) of them. Less than half the reports (n = 137; 46%) provided baseline and outcome data per arm and reported the analysis as planned. Conclusions Our findings highlight discrepancies between the planning and reporting of analyses in reports of multiple-arm trials. PMID:23531230

  20. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  1. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  2. Control of Echinococcus multilocularis: strategies, feasibility and cost-benefit analyses.

    PubMed

    Hegglin, Daniel; Deplazes, Peter

    2013-04-01

    Echinococcus multilocularis, the zoonotic agent of human alveolar echinococcosis, has considerably extended its range and became more prevalent in many parts of the endemic areas. Accordingly, there is an increasing demand for measures to prevent human infections. Rising public awareness of this zoonosis and individual protective actions should be part of every prevention program. Considering the high reproduction of E. multilocularis in domestic dogs which live in close contact to humans, a monthly deworming scheme for domestic dogs with access to rodents is likely to be of high importance. This holds true if only low prevalences in domestic dogs are recorded, as high densities of these pets can easily outweigh low infections rates. Thus, in central Europe their estimated contribution to environmental contamination with E. multilocularis eggs ranges between 4% and 19%. The estimated contribution of domestic cats is insignificant (<0.3%) due to low parasite reproduction in this species. Control of the parasite by reducing its main wildlife hosts (foxes, vole species) is barely achievable on a larger scale and is generally not well accepted due to ecological considerations and animal welfare concerns. In general, the frequency of the parasite sharply decreases when anthelmintic baits are regularly distributed to foxes. However, eradication of the parasite is unlikely and long-term baiting campaigns are actually the most effective tool to significantly lower the infection pressure with parasite eggs. Regarding the long latency of 5-15 years of alveolar echinococcosis, however, such measures can only be cost effective if they are pursued for several decades and concentrate on restricted areas which are most relevant for the transmission of alveolar echinococcosis such as highly endemic areas in densely populated zones. Thus, the implementation of this approach strongly depends on factors such as public attitude, available financial resources and priority setting of

  3. IMPROVING CONTROL ROOM DESIGN AND OPERATIONS BASED ON HUMAN FACTORS ANALYSES OR HOW MUCH HUMAN FACTORS UPGRADE IS ENOUGH ?

    SciTech Connect

    HIGGINS,J.C.; OHARA,J.M.; ALMEIDA,P.

    2002-09-19

    THE JOSE CABRERA NUCLEAR POWER PLANT IS A ONE LOOP WESTINGHOUSE PRESSURIZED WATER REACTOR. IN THE CONTROL ROOM, THE DISPLAYS AND CONTROLS USED BY OPERATORS FOR THE EMERGENCY OPERATING PROCEDURES ARE DISTRIBUTED ON FRONT AND BACK PANELS. THIS CONFIGURATION CONTRIBUTED TO RISK IN THE PROBABILISTIC SAFETY ASSESSMENT WHERE IMPORTANT OPERATOR ACTIONS ARE REQUIRED. THIS STUDY WAS UNDERTAKEN TO EVALUATE THE IMPACT OF THE DESIGN ON CREW PERFORMANCE AND PLANT SAFETY AND TO DEVELOP DESIGN IMPROVEMENTS.FIVE POTENTIAL EFFECTS WERE IDENTIFIED. THEN NUREG-0711 [1], PROGRAMMATIC, HUMAN FACTORS, ANALYSES WERE CONDUCTED TO SYSTEMATICALLY EVALUATE THE CR-LA YOUT TO DETERMINE IF THERE WAS EVIDENCE OF THE POTENTIAL EFFECTS. THESE ANALYSES INCLUDED OPERATING EXPERIENCE REVIEW, PSA REVIEW, TASK ANALYSES, AND WALKTHROUGH SIMULATIONS. BASED ON THE RESULTS OF THESE ANALYSES, A VARIETY OF CONTROL ROOM MODIFICATIONS WERE IDENTIFIED. FROM THE ALTERNATIVES, A SELECTION WAS MADE THAT PROVIDED A REASONABLEBALANCE BE TWEEN PERFORMANCE, RISK AND ECONOMICS, AND MODIFICATIONS WERE MADE TO THE PLANT.

  4. Controls on microbial accessibility to soil organic carbon following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, Courtney; Boutton, Thomas; Olk, Dan; Filley, Timothy

    2010-05-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic carbon (SOC) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and hydrology. To elucidate the controls on microbial accessibility to SOC, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas Agrilife La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, and plant biopolymer chemistry in SOC were tracked. Respiration rates declined exponentially over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total SOC was mineralized to CO2 throughout the incubation. After day 84 a significantly (p<0.05) greater portion of SOC was mineralized from soils of older woody clusters (34-86 years) than from soils of younger woody clusters (14-23 years) and the native grassland. Invading woody stands of ≃≥35 years of age represent a transition point in WPE where respiration dynamics become distinct in wooded elements compared to grasslands; this distinction has been previously observed through changes in belowground SOC accrual, C input chemistry, and mycorrhizal productivity. Despite documented SOC accrual following WPE at La Copita, we observed no evidence of enhanced SOC stabilization in these respiration experiments. In fact, a greater proportion of total SOC was lost from the soil of mature woody stands than from young stands, suggesting SOC accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. Compound-specific analyses indicated there was a significant (p<0.05) loss of C from carbohydrates, amino acids, and amino sugars during the incubation. Amino nitrogen tended to become more concentrated during the incubation, although the trend was not significant. Relatively

  5. Considerations for Comprehensive Analyses of Sporozoite-Based Controlled Human Malaria Infection Studies

    PubMed Central

    Lover, Andrew A.

    2015-01-01

    There has been renewed interest in the use of sporozoite-based approaches for controlled human malaria infections (CHMIs), and several sets of human challenge studies have recently completed. A study undertaken in Tanzania and published in 2014 found dose dependence between 10,000 and 25,000 sporozoite doses, as well as divergent times-to-parasitemia relative to earlier studies in European volunteers, with important implications for planning future studies. Analysis of time-to-event data has had extensive development in recent years, but these methods have had limited exposure outside biostatistics. Expansion of the published analyses to include recent methodological approaches optimized for the types of data used could provide a richer analysis of these studies and may result in alternative findings. Specifically, in a re-analysis of these data using survival analysis techniques, the differences recorded in prepatent periods between the two dosing regimens do not reach statistical significance, and there is no evidence for statistically significant differences in prepatent periods between the Dutch and Tanzanian study sites. Although these findings do not impact the reported safety and tolerability of challange with cryopreserved Plasmodium falciparum sporozoites (PfSPZ), or invalidate the authors' hypotheses regarding naturally acquired immunity and its effect on parasite growth rates and prepatent periods, they highlight important opportunities to more fully use datasets from these trials and related CHMI experiments in the planning of future challenge studies. PMID:26392161

  6. Multi-Targeted Antiangiogenic Tyrosine Kinase Inhibitors in Advanced Non-Small Cell Lung Cancer: Meta-Analyses of 20 Randomized Controlled Trials and Subgroup Analyses

    PubMed Central

    Zhang, Yaxiong; Kang, Shiyang; Fang, Wenfeng; Qin, Tao; Huang, Yan; Zhao, Hongyun; Zhang, Li

    2014-01-01

    Background Multi-targeted antiangiogenic tyrosine kinase inhibitors (MATKIs) have been studied in many randomized controlled trials (RCTs) for treatment of advanced non-small cell lung cancer (NSCLC). We seek to summarize the most up-to-date evidences and perform a timely meta-analysis. Methods Electronic databases were searched for eligible studies. We defined the experimental arm as MATKI-containing group and the control arm as MATKI-free group. The extracted data on objective response rates (ORR), disease control rates (DCR), progression-free survival (PFS) and overall survival (OS) were pooled. Subgroup and sensitivity analyses were conducted. Results Twenty phase II/III RCTs that involved a total of 10834 participants were included. Overall, MATKI-containing group was associated with significant superior ORR (OR 1.29, 95% CI 1.08 to 1.55, P = 0.006) and prolonged PFS (HR 0.83, 0.78 to 0.90, P = 0.005) compared to the MATKI-free group. However, no significant improvements in DCR (OR 1.08, 1.00 to 1.17, P = 0.054) or OS (HR 0.97, 0.93 to 1.01, P = 0.106) were observed. Subgroup analyses showed that the benefits were predominantly presented in pooled results of studies enrolling previously-treated patients, studies not limiting to enroll non-squamous NSCLC, and studies using MATKIs in combination with the control regimens as experimental therapies. Conclusions This up-to-date meta-analysis showed that MATKIs did increase ORR and prolong PFS, with no significant improvement in DCR and OS. The advantages of MATKIs were most prominent in patients who received a MATKI in combination with standard treatments and in patients who had previously experienced chemotherapy. We suggest further discussion as to the inclusion criteria of future studies on MATKIs regarding histology. PMID:25329056

  7. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2010-01-01

    NASA s Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  8. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  9. Control of substrate access to the active site in methane monooxygenase.

    PubMed

    Lee, Seung Jae; McCormick, Michael S; Lippard, Stephen J; Cho, Uhn-Soo

    2013-02-21

    Methanotrophs consume methane as their major carbon source and have an essential role in the global carbon cycle by limiting escape of this greenhouse gas to the atmosphere. These bacteria oxidize methane to methanol by soluble and particulate methane monooxygenases (MMOs). Soluble MMO contains three protein components, a 251-kilodalton hydroxylase (MMOH), a 38.6-kilodalton reductase (MMOR), and a 15.9-kilodalton regulatory protein (MMOB), required to couple electron consumption with substrate hydroxylation at the catalytic diiron centre of MMOH. Until now, the role of MMOB has remained ambiguous owing to a lack of atomic-level information about the MMOH-MMOB (hereafter termed H-B) complex. Here we remedy this deficiency by providing a crystal structure of H-B, which reveals the manner by which MMOB controls the conformation of residues in MMOH crucial for substrate access to the active site. MMOB docks at the α(2)β(2) interface of α(2)β(2)γ(2) MMOH, and triggers simultaneous conformational changes in the α-subunit that modulate oxygen and methane access as well as proton delivery to the diiron centre. Without such careful control by MMOB of these substrate routes to the diiron active site, the enzyme operates as an NADH oxidase rather than a monooxygenase. Biological catalysis involving small substrates is often accomplished in nature by large proteins and protein complexes. The structure presented in this work provides an elegant example of this principle. PMID:23395959

  10. Privacy-aware access control for video data in intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Vagts, Hauke; Jakoby, Andreas

    2012-06-01

    Surveillance systems became powerful. Objects can be identified and intelligent surveillance services can generate events when a specific situation occurs. Such surveillance services can be organized in a Service Oriented Architecture (SOA) to fulfill surveillance tasks for specific purposes. Therefore the services process information on a high level, e.g., just the position of an object. Video data is still required to visualize a situation to an operator and is required as evidence in court. Processing of personal related and sensitive information threatens privacy. To protect the user and to be compliant with legal requirements it must be ensured that sensitive information can only be processed for a defined propose by specific users or services. This work proposes an architecture for Access Control that enforces the separation of data between different surveillance tasks. Access controls are enforced at different levels: for the users starting the tasks, for the services within the tasks processing data stored in central store or calculated by other services and for sensor related services that extract information out of the raw data and provide them.

  11. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  12. Gate controllable resistive random access memory devices using reduced graphene oxide

    NASA Astrophysics Data System (ADS)

    Hazra, Preetam; Resmi, A. N.; Jinesh, K. B.

    2016-04-01

    The biggest challenge in the resistive random access memory (ReRAM) technology is that the basic operational parameters, such as the set and reset voltages, the current on-off ratios (hence the power), and their operational speeds, strongly depend on the active and electrode materials and their processing methods. Therefore, for its actual technological implementations, the unification of the operational parameters of the ReRAM devices appears to be a difficult task. In this letter, we show that by fabricating a resistive memory device in a thin film transistor configuration and thus applying an external gate bias, we can control the switching voltage very accurately. Taking partially reduced graphene oxide, the gate controllable switching is demonstrated, and the possible mechanisms are discussed.

  13. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  14. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  15. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  16. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  17. Ore controls in the Charters Towers goldfield, NE Australia: Constraints from geological, geophysical and numerical analyses

    USGS Publications Warehouse

    Kreuzer, O.P.; Blenkinsop, T.G.; Morrison, R.J.; Peters, S.G.

    2007-01-01

    The approach taken in this paper, namely synthesising a wealth of previous information with new data and a genetic model, in combination with integrated numerical analyses, led to new insights into the geological controls on the localisation of auriferous veins and residual prospectivity of the Charters Towers goldfield, NE Australia. The method also has implications for the assessment of other "mature" goldfields worldwide. Despite a number of different ore controls having operated within the Charters Towers goldfield, the controlling factors can be linked to a single genetic model for orogenic, granitoid-hosted lode-gold mineralisation in a brittle deformation regime (D4) of NE-SW to NNE-SSW shortening, under conditions of supralithostatic fluid pressure and low stress difference. Spatial autocorrelation results suggest district-scale alignment of the auriferous veins parallel to and overlapping with the ESE-WNW- to E-W-striking Charters Towers-Ravenswood lineament, a major crustal boundary in the basement to the Ravenswood batholith. At the camp-scale, auriferous veins have abundance and proximity relationships with NW-SE-, NNW-SSE-, NE-SW- and ENE-WSW-oriented lineaments, suggesting that structures that controlled gold deposition in one camp did not necessarily control mineralisation in other camps. Fractal dimensions obtained with the box-counting method range from 1.02 to 1.10, whereas veins in the Charters Towers City camp are characterised by a significantly higher fractal dimension of 1.28. This discrepancy may be taken to imply that most or all outcropping and near-surface deposits within the Charters Towers City camp have been found and that new discoveries are more likely to occur at greater levels of depth, or outside the boundaries of this camp. The new understanding has implications for the assessment of the residual prospectivity of the Charters Towers goldfield, where large areas of prospective rock types and structures (e.g., approximately 40% of

  18. A highly efficient SDRAM controller supporting variable-length burst access and batch process for discrete reads

    NASA Astrophysics Data System (ADS)

    Li, Nan; Wang, Junzheng

    2016-03-01

    A highly efficient Synchronous Dynamic Random Access Memory (SDRAM) controller supporting variable-length burst access and batch process for discrete reads is proposed in this paper. Based on the Principle of Locality, command First In First Out (FIFO) and address range detector are designed within this controller to accelerate its responses to discrete read requests, which dramatically improves the average Effective Bus Utilization Ratio (EBUR) of SDRAM. Our controller is finally verified by driving the Micron 256-Mb SDRAM MT48LC16M16A2. Successful simulation and verification results show that our controller exhibits much higher EBUR than do most existing designs in case of discrete reads.

  19. Polymorphisms in the XPC gene affect urinary bladder cancer risk: a case-control study, meta-analyses and trial sequential analyses

    PubMed Central

    Sankhwar, Monica; Sankhwar, Satya Narayan; Bansal, Sandeep Kumar; Gupta, Gopal; Rajender, Singh

    2016-01-01

    Compromised activity of the DNA repair enzymes may raise the risk of a number of cancers. We analyzed polymorphisms in the Xeroderma Pigmentosum, Complementation Group C (XPC) gene for their correlation with urinary bladder cancer. Ala499Val and Lys939Gln polymorphisms were genotyped in 234 urinary bladder cancer cases and 258 control samples. A significant association between Ala499Val polymorphism and bladder cancer was observed (OR = 1.78, CI = 1.19–2.66, p = 0.005); however, Lys939Gln was unrelated (OR = 0.97, CI = 0.65–1.45, P = 0.89). Further analysis revealed that Ala499Val was a significant risk factor only in the presence of smoking (OR = 2.23, CI = 1.28–3.87, p < 0.004) or tobacco chewing (OR = 2.40, CI = 1.43–4.04, p = 0.0008). To further appraise the association, we undertook meta-analyses on seven studies (2893 cases and 3056 controls) on Ala499Val polymorphism and eleven studies (5064 cases and 5208 controls) on Lys939Gln polymorphism. Meta-analyses corroborated the above results, showing strong association of Ala499Val (OR = 1.54, CI = 1.21–1.97, p = 0.001) but not that of Lys939Gln (OR = 1.13, CI = 0.95–1.34, p = 0.171) with urinary bladder cancer risk. In conclusion, XPC Ala499Val substitution increases urinary bladder cancer risk, but Lys939Gln appears to be neutral. PMID:27246180

  20. Polymorphisms in the XPC gene affect urinary bladder cancer risk: a case-control study, meta-analyses and trial sequential analyses.

    PubMed

    Sankhwar, Monica; Sankhwar, Satya Narayan; Bansal, Sandeep Kumar; Gupta, Gopal; Rajender, Singh

    2016-01-01

    Compromised activity of the DNA repair enzymes may raise the risk of a number of cancers. We analyzed polymorphisms in the Xeroderma Pigmentosum, Complementation Group C (XPC) gene for their correlation with urinary bladder cancer. Ala499Val and Lys939Gln polymorphisms were genotyped in 234 urinary bladder cancer cases and 258 control samples. A significant association between Ala499Val polymorphism and bladder cancer was observed (OR = 1.78, CI = 1.19-2.66, p = 0.005); however, Lys939Gln was unrelated (OR = 0.97, CI = 0.65-1.45, P = 0.89). Further analysis revealed that Ala499Val was a significant risk factor only in the presence of smoking (OR = 2.23, CI = 1.28-3.87, p < 0.004) or tobacco chewing (OR = 2.40, CI = 1.43-4.04, p = 0.0008). To further appraise the association, we undertook meta-analyses on seven studies (2893 cases and 3056 controls) on Ala499Val polymorphism and eleven studies (5064 cases and 5208 controls) on Lys939Gln polymorphism. Meta-analyses corroborated the above results, showing strong association of Ala499Val (OR = 1.54, CI = 1.21-1.97, p = 0.001) but not that of Lys939Gln (OR = 1.13, CI = 0.95-1.34, p = 0.171) with urinary bladder cancer risk. In conclusion, XPC Ala499Val substitution increases urinary bladder cancer risk, but Lys939Gln appears to be neutral. PMID:27246180

  1. Controlled Access of p53 to the Nucleus Regulates its Proteasomal Degradation by MDM2

    PubMed Central

    Davis, James R.; Mossalam, Mohanad; Lim, Carol S.

    2013-01-01

    The tumor suppressor p53 can be sent to the proteasome for degradation by placing its nucleo-cytoplasmic shuttling under ligand control. Endogenous p53 is ubiquitinated by MDM2 in the nucleus, and controlling the access of p53 to the nuclear compartment regulates its ubiquitination and proteasomal degradation. This was accomplished by the use of a “protein switch” that places nuclear translocation under the control of externally applied dexamethasone. Fluorescence microscopy revealed that sending protein switch p53 (PS-p53) to the nucleus produces a distinct punctate distribution in both the cytoplasm and nucleus. The nuclear role in accessing the proteasome was investigated by inhibiting classical nuclear export with leptomycin B. Trapping PS-p53 in the nucleus only allows this punctate staining in that compartment, suggesting that PS-p53 must translocate first to the nuclear compartment for cytoplasmic punctate staining to occur. The role of MDM2 binding was explored by inhibiting MDM2/p53 binding with nutlin-3. Inhibition of this interaction blocked both nuclear export and cytoplasmic and nuclear punctate staining, providing evidence that any change in localization after nuclear translocation is due to MDM2 binding. Further, blocking the proteolytic activity of the proteasome maintained the nuclear localization of the construct. Truncations of p53 were made to determine smaller constructs still capable of interacting with MDM2, and their subcellular localization and degradation potential was observed. PS-p53 and a smaller construct, construct containing the two MDM2 binding regions of p53 (Box I+V) were indeed degraded by the proteasome as measured by loss of enhanced green fluorescent protein that was also fused to the construct. The influence of these constructs on p53 gene transactivation function was assessed, and revealed that PS-p53 decreased gene transactivation, while PS-p53(BoxI+V) did not significantly change baseline gene transactivation. PMID

  2. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  3. A method for protecting and controlling access to JPEG2000 images

    NASA Astrophysics Data System (ADS)

    Serrão, Carlos; Serra, Antonio; Fonseca, Pedro; Salles Dias, Jose M.

    2003-11-01

    The image compression standard JPEG2000 brings not only powerful compression performance but also new functionality unavailable in previous standards (such as region of interest, scalability and random access to image data, through flexible code stream description of the image). ISO/IEC JTC1/SC29/WG1, which is the ISO Committee working group for JPEG2000 standardization is currently defining additional parts to the standard that will allow extended functionalities. One of these extensions is Part 8 JPSEC - JPEG2000 security, which deals with the protection and access control of JPEG2000 code-stream. This paper reports the JPSEC activities detailing with the three core experiments which are in progress to supply the JPEG2000 ISO Committee, with the appropriate protection technology. These core experiments are focusing on the protection of the code-stream itself and on the overall security infrastructure that is needed to manage the access rights of users and applications to that protected code-stream. Regarding the encryption/scrambling process, this one deals with the JPEG2000 code stream in such a way that only the packets, which contain image data information are encrypted. All the other code-stream data will be in clear mode. This paper will also advance details of one of the JPSEC proposed solutions for the security infrastructure - OpenSDRM (Open and Secure Digital Rights Management), which provides security and rights management from the content provider to the content final user. A use case where this security infrastructure was successfully used will also be provided.

  4. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  5. Disclosure of researcher allegiance in meta-analyses and randomised controlled trials of psychotherapy: a systematic appraisal

    PubMed Central

    Dragioti, Elena; Dimoliatis, Ioannis

    2015-01-01

    Objective Psychotherapy research may suffer from factors such as a researcher’s own therapy allegiance. The aim of this study was to evaluate if researcher allegiance (RA) was reported in meta-analyses and randomised controlled trials (RCTs) of psychotherapeutic treatments. Design Systematic approach using meta-analyses of different types of psychotherapies. Data sources Medline, PsycINFO and Cochrane Database of Systematic Reviews. Methods We evaluated meta-analyses of RCTs regarding various types of psychotherapies. Meta-analyses were eligible if they included at least one RCT with RA and they were published in journals in Medline, PsycINFO and Cochrane Database of Systematic Reviews with an impact factor larger than 5. Results We identified 146 eligible meta-analyses that synthesised data from a total of 1198 unique RCTs. Only 25 of the meta-analyses (17.2%) reported allegiance and only 6 (4.1%) used a proper method to control its effect. Of the 1198 eligible primary RCTs, 793 (66.3%) were allegiant. Authors in 25 of these 793 RCTs (3.2%) reported their allegiance while only one study (0.2%) controlled for its effect. Conclusions The vast majority among a group of published meta-analyses and RCTs of psychotherapeutic treatments seldom reported and evaluated the allegiance effect. The results of the present study highlight a major lack of this information in meta-analyses and their included studies, though meta-analyses perform slightly better than RCTs. Stringent guidelines should be adopted by journals in order to improve reporting and attenuate possible effects of RA in future research. PMID:26033943

  6. Using Controlled Landslide Initiation Experiments to Test Limit-Equilibrium Analyses of Slope Stability

    NASA Astrophysics Data System (ADS)

    Reid, M. E.; Iverson, R. M.; Brien, D. L.; Iverson, N. R.; Lahusen, R. G.; Logan, M.

    2004-12-01

    Most studies of landslide initiation employ limit equilibrium analyses of slope stability. Owing to a lack of detailed data, however, few studies have tested limit-equilibrium predictions against physical measurements of slope failure. We have conducted a series of field-scale, highly controlled landslide initiation experiments at the USGS debris-flow flume in Oregon; these experiments provide exceptional data to test limit equilibrium methods. In each of seven experiments, we attempted to induce failure in a 0.65m thick, 2m wide, 6m3 prism of loamy sand placed behind a retaining wall in the 31° sloping flume. We systematically investigated triggering of sliding by groundwater injection, by prolonged moderate-intensity sprinkling, and by bursts of high intensity sprinkling. We also used vibratory compaction to control soil porosity and thereby investigate differences in failure behavior of dense and loose soils. About 50 sensors were monitored at 20 Hz during the experiments, including nests of tiltmeters buried at 7 cm spacing to define subsurface failure geometry, and nests of tensiometers and pore-pressure sensors to define evolving pore-pressure fields. In addition, we performed ancillary laboratory tests to measure soil porosity, shear strength, hydraulic conductivity, and compressibility. In loose soils (porosity of 0.52 to 0.55), abrupt failure typically occurred along the flume bed after substantial soil deformation. In denser soils (porosity of 0.41 to 0.44), gradual failure occurred within the soil prism. All failure surfaces had a maximum length to depth ratio of about 7. In even denser soil (porosity of 0.39), we could not induce failure by sprinkling. The internal friction angle of the soils varied from 28° to 40° with decreasing porosity. We analyzed stability at failure, given the observed pore-pressure conditions just prior to large movement, using a 1-D infinite-slope method and a more complete 2-D Janbu method. Each method provides a static

  7. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  8. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  9. Point and counterpoint: patient control of access to data in their electronic health records.

    PubMed

    Caine, Kelly; Tierney, William M

    2015-01-01

    Information collection, storage, and management is central to the practice of health care. For centuries, patients' and providers' expectations kept medical records confidential between providers and patients. With the advent of electronic health records, patient health information has become more widely available to providers and health care managers and has broadened its potential use beyond individual patient care. Adhering to the principles of Fair Information Practice, including giving patients control over the availability and use of their individual health records, would improve care by fostering the sharing of sensitive information between patients and providers. However, adherence to such principles could put patients at risk for unsafe care as a result of both missed opportunities for providing needed care as well as provision of contraindicated care, as it would prevent health care providers from having full access to health information. Patients' expectations for the highest possible quality and safety of care, therefore, may be at odds with their desire to limit provider access to their health records. Conversely, provider expectations that patients would willingly seek care for embarrassing conditions and disclose sensitive information may be at odds with patients' information privacy rights. An open dialogue between patients and providers will be necessary to balance respect for patient rights with provider need for patient information. PMID:25480723

  10. e-VLBI Access Point (eAXP) - a centralized control and EGAE configuration / management application

    NASA Astrophysics Data System (ADS)

    Ruszczyk, Chester Whitney, Alan

    Setting up experiments to utilize Experiment Guided Adaptive Endpoint (EGAE) and e-VLBI is presently a complex and time intensive process requiring scientific, Mark5 and networking knowledge. There is no central access to point to configure and manage all of these aspects of an experiment. The e-VLBI Access Point (eAXP) is a centralized control plane management tool that offers a GUI interface to augment the command line interface presently being used to set up and conduct experiments. eAXP contains three major toolsets: one to set up and execute an experiment using real-time or non-real time modes; the second to configure and manage EGAE; and a third to view statistics of the experiments. Initially the overall system architecture for eAXP is presented, followed by details of the Experiment Profiler toolset including screen shots of the system presently being tested. This will be followed by how eAXP will support real-time modes interfacing to the Dynamic Resource Allocation over GMPLS Optical Network (DRAGON) resource management project.

  11. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  12. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  13. Operational, control and protective system transient analyses of the closed-cycle GT-HTGR power plant

    NASA Astrophysics Data System (ADS)

    Openshaw, F. L.; Chan, T. W.

    1980-11-01

    This paper presents a description of the analyses of the control/protective system preliminary designs for the gas turbine high-temperature gas-cooled reactor (GT-HTGR) power plant. The purpose of these systems is the control and safe operation of the plant in accordance with utility practice for large nuclear generation stations, and in the event of an abnormal or accident condition to shut the plant down in an orderly manner and maintain it in a safe shutdown condition. Several unique characteristics inherent in the operation of the closed-cycle multiple-loop GT-HTGR design have presented special modeling and/or control design requirements or resulted in unusual conditions. The GT-HTGR dynamic modeling, control/protective system design, and transient analyses are illustrated in this paper through discussion of a few selected transient events and the special modeling and control operation for these events.

  14. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    PubMed Central

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  15. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    PubMed Central

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  16. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  17. Controlling electronic access to the spin excitations of a single molecule in a tunnel junction

    NASA Astrophysics Data System (ADS)

    Hirjibehedin, Cyrus F.; Warner, Ben; El Hallak, Fadi; Prueser, Henning; Ajibade, Afolabi; Gill, Tobias G.; Fisher, Andrew J.; Persson, Mats

    Spintronic phenomena can be utilized to create new devices with applications in data storage and sensing. Scaling these down to the single molecule level requires controlling the properties of the current-carrying orbitals to enable access to spin states through phenomena such as inelastic electron tunneling. Here we show that the spintronic properties of a tunnel junction containing a single molecule can be controlled by their coupling to the local environment. For tunneling through iron phthalocyanine (FePc) on an insulating copper nitride (Cu2N) monolayer above Cu(001), we find that spin transitions may be strongly excited depending on the binding site of the central Fe atom. Different interactions between the Fe and the underlying Cu or N atoms shift the Fe d-orbitals with respect to the Fermi energy, and control the relative strength of the spin excitations, an effect that can described in a simple co-tunneling model. This work demonstrates the importance of the atomic-scale environment in the development of single molecule spintronic devices.

  18. Spatial Accessibility of Drug Treatment Facilities and the Effects on Locus of Control, Drug Abuse, and Service Use among Heroin-Injecting Mexican American Men

    PubMed Central

    Kao, Dennis; Torres, Luis R.; Guerrero, Erick G.; Mauldin, Rebecca; Bordnick, Patrick S.

    2014-01-01

    Background This study explores the spatial accessibility of outpatient drug treatment facilities and the potential relationship with drug abuse-related outcomes among Mexican American heroin users. Methods Secondary data on 219 current and former heroin-injecting Mexican American men aged 45 and older were drawn from a research study in Houston, Texas. We used geographic information systems (GIS) to derive two spatial accessibility measures: distance from one’s place of residence to the closest drug treatment facility (in minutes); and the number of facilities within a 10-minute driving distance from one’s place of residence. Exploratory logistic regression analyses examined the association between the spatial accessibility of drug treatment facilities and several drug abuse-related outcomes: internal locus of control (LOC); perceived chances and worries of injecting in the next six months; treatment utilization; and location of last heroin purchase. Results Participants with greater spatial access to treatment programs were more likely to report a higher chance of injecting in the near future. However, while current heroin users were more worried about injecting in the next six months, greater spatial access to treatment programs seemed to have a buffering effect. Finally, those who lived closer to a treatment programs were more likely to have last purchased heroin inside the neighborhood versus outside the neighborhood. Spatial accessibility was not associated with internal LOC or treatment utilization. Conclusion The findings showed that the presence of outpatient treatment facilities—particularly services in Spanish—may influence perceived risk of future heroin use and purchasing behaviors among Mexican American men. Implications for future spatially-informed drug abuse research and the planning of culturally and linguistically responsive drug treatment programs are discussed. PMID:24440123

  19. Follow-up study of chrysotile asbestos textile workers: cohort mortality and case-control analyses.

    PubMed

    Dement, J M; Brown, D P; Okun, A

    1994-10-01

    Previous studies of mortality among white males employed in a Charleston, South Carolina asbestos textile plant using chrysotile demonstrated significant excess mortality due to asbestos-related disease and a steep exposure-response relationship for lung cancer. This cohort was further studied by adding 15 years of follow-up and including mortality among white female and black male workers. Nested case-control analyses were undertaken to further explore possible differences in lung cancer risk by textile operation as well as possible confounding by mineral oil exposures. Preliminary data for white males have been previously published. White males experienced statistically significant excess mortality due to lung cancer (standardized mortality ratio [SMR] = 2.30; confidence interval [CI] = 1.88-2.79), all causes (SMR = 1.48; CI = 1.38-158), all cancers (SMR = 1.50; CI = 1.29-1.72), diabetes mellitus (SMR = 2.05; CI = 1.18-3.33), heart disease (SMR = 1.41; CI = 1.26-1.58), cerebrovascular disease (SMR = 1.50; CI = 1.08-2.02), pneumoconiosis and other respiratory diseases (SMR = 4.10; CI = 3.10-5.31), and accidents (SMR = 1.49; CI = 1.15-1.91). Among white females, statistically significant excesses occurred for lung cancer (SMR = 2.75; CI = 2.06-3.61), all causes (SMR = 1.21; CI = 1.11-1.32), pneumoconiosis and other respiratory diseases (SMR = 2.40; CI = 1.53-3.60), and other respiratory cancers (SMR = 14.98; CI = 4.08-38.7). Among the total cohort of black males, the only statistically significant excess observed was for pneumoconiosis (SMR = 2.19; CI = 1.23-3.62). Based on historical exposure measurements at the plant, there was a positive exposure-response relationship for both lung cancer and pneumoconiosis. Data for the entire cohort demonstrate an increase in the lung cancer relative risk of 2-3% for each fiber/cc-year of cumulative chrysotile exposure. This relationship was more consistent for the white male workers. The excess risk for lung cancer among

  20. Development and characterization of 96 microsatellite markers suitable for QTL mapping and accession control in an Arabidopsis core collection

    PubMed Central

    2014-01-01

    Background To identify plant genes involved in various key traits, QTL mapping is a powerful approach. This approach is based on the use of mapped molecular markers to identify genomic regions controlling quantitative traits followed by a fine mapping and eventually positional cloning of candidate genes. Mapping technologies using SNP markers are still rather expensive and not feasible in every laboratory. In contrast, microsatellite (also called SSR for Simple Sequence Repeat) markers are technologically less demanding and less costly for any laboratory interested in genetic mapping. Results In this study, we present the development and the characterization of a panel of 96 highly polymorphic SSR markers along the Arabidopsis thaliana genome allowing QTL mapping among accessions of the Versailles 24 core collection that covers a high percentage of the A. thaliana genetic diversity. These markers can be used for any QTL mapping analysis involving any of these accessions. We optimized the use of these markers in order to reveal polymorphism using standard PCR conditions and agarose gel electrophoresis. In addition, we showed that the use of only three of these markers allows differentiating all 24 accessions which makes this set of markers a powerful tool to control accession identity or any cross between any of these accessions. Conclusion The set of SSR markers developed in this study provides a simple and efficient tool for any laboratory focusing on QTL mapping in A. thaliana and a simple means to control seed stock or crosses between accessions. PMID:24447639

  1. Controlling multidrug-resistant tuberculosis and access to expensive drugs: a rational framework.

    PubMed Central

    Pablos-Mendez, Ariel; Gowda, Deepthiman K.; Frieden, Thomas R.

    2002-01-01

    The emergence and spread of multidrug-resistant tuberculosis (MDR-TB), i.e. involving resistance to at least isoniazid and rifampicin, could threaten the control of TB globally. Controversy has emerged about the best way of confronting MDR-TB in settings with very limited resources. In 1999, the World Health Organization (WHO) created a working group on DOTS-Plus, an initiative exploring the programmatic feasibility and cost-effectiveness of treating MDR-TB in low-income and middle-income countries, in order to consider the management of MDR-TB under programme conditions. The challenges of implementation have proved more daunting than those of access to second-line drugs, the prices of which are dropping. Using data from the WHO/International Union Against Tuberculosis and Lung Disease surveillance project, we have grouped countries according to the proportion of TB patients completing treatment successfully and the level of MDR-TB among previously untreated patients. The resulting matrix provides a reasonable framework for deciding whether to use second-line drugs in a national programme. Countries in which the treatment success rate, i.e. the proportion of new patients who complete the scheduled treatment, irrespective of whether bacteriological cure is documented, is below 70% should give the highest priority to introducing or improving DOTS, the five-point TB control strategy recommended by WHO and the International Union Against Tuberculosis and Lung Disease. A poorly functioning programme can create MDR-TB much faster than it can be treated, even if unlimited resources are available. There is no single prescription for controlling MDR-TB but the various tools available should be applied wisely. Firstly, good DOTS and infection control; then appropriate use of second-line drug treatment. The interval between the two depends on the local context and resources. As funds are allocated to treat MDR-TB, human and financial resources should be increased to expand

  2. Capabilities and applications of a computer program system for dynamic loads analyses of flexible airplanes with active controls /DYLOFLEX/

    NASA Technical Reports Server (NTRS)

    Perry, B., III; Goetz, R. C.; Kroll, R. I.; Miller, R. D.

    1979-01-01

    This paper describes and illustrates the capabilities of the DYLOFLEX Computer Program System. DYLOFLEX is an integrated system of computer programs for calculating dynamic loads of flexible airplanes with active control systems. A brief discussion of the engineering formulation for each of the nine DYLOFLEX programs is described. The capabilities of the system are illustrated by the analyses of two example configurations.

  3. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  4. A Multi-Domain Access Control Infrastructure Based on Diameter and EAP

    NASA Astrophysics Data System (ADS)

    Ben Ayed, Souheil; Teraoka, Fumio

    The evolution of Internet, the growth of Internet users and the new enabled technological capabilities place new requirements to form the Future Internet. Many features improvements and challenges were imposed to build a better Internet, including securing roaming of data and services over multiple administrative domains. In this research, we propose a multi-domain access control infrastructure to authenticate and authorize roaming users through the use of the Diameter protocol and EAP. The Diameter Protocol is a AAA protocol that solves the problems of previous AAA protocols such as RADIUS. The Diameter EAP Application is one of Diameter applications that extends the Diameter Base Protocol to support authentication using EAP. The contributions in this paper are: 1) first implementation of Diameter EAP Application, called DiamEAP, capable of practical authentication and authorization services in a multi-domain environment, 2) extensibility design capable of adding any new EAP methods, as loadable plugins, without modifying the main part, and 3) provision of EAP-TLS plugin as one of the most secure EAP methods. DiamEAP Server basic performances were evaluated and tested in a real multi-domain environment where 200 users attempted to access network using the EAP-TLS method during an event of 4 days. As evaluation results, the processing time of DiamEAP using the EAP-TLS plugin for authentication of 10 requests is about 20ms while that for 400 requests/second is about 1.9 second. Evaluation and operation results show that DiamEAP is scalable and stable with the ability to handle more than 6 hundreds of authentication requests per second without any crashes. DiamEAP is supported by the AAA working group of the WIDE Project.

  5. A functional approach for research on cognitive control: Analysing cognitive control tasks and their effects in terms of operant conditioning.

    PubMed

    Liefooghe, Baptist; De Houwer, Jan

    2016-02-01

    Cognitive control is an important mental ability that is examined using a multitude of cognitive control tasks and effects. The present paper presents the first steps in the elaboration of a functional approach, which aims to uncover the communalities and differences between different cognitive control tasks and their effects. Based on the idea that responses in cognitive control tasks qualify as operant behaviour, we propose to reinterpret cognitive control tasks in terms of operant contingencies and cognitive control effects as instances of moderated stimulus control. We illustrate how our approach can be used to uncover communalities between topographically different cognitive control tasks and can lead to novel questions about the processes underlying cognitive control. PMID:26033418

  6. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    NASA Astrophysics Data System (ADS)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  7. Time series analyses reveal environmental and fisheries controls on Atlantic horse mackerel (Trachurus trachurus) catch rates

    NASA Astrophysics Data System (ADS)

    Leitão, Francisco

    2015-12-01

    Time-series models (Dynamic factorial analyses and; Min/max autocorrelation factor analysis) were used to explore the relative influences of environmental variables and fishing pressure of trawl, seine and artisanal fleets on catch rates on Trachurus trachurus in ICES IXa sub-divisions (IXaCN-North coast; IXa- CS-South coast; IXaS-Algarve, South coast, Algarve). Fishing effort influenced catch rates in all areas with a 2 year lag and fishing pressure for each area was related to specific fleet sectors effort. In IXaCN, winter upwelling (spawning peak) and both summer northerly wind and wind magnitude (outside of the spawning peak) were strongly correlated with catch rates. In IXaCS summer/autumn westerly winds were related with catch rates. Northerly winds in spring, upwelling and SST (winter and autumn) were related with catch rates in IXaS-Algarve. For species with a long spawning season such as horse mackerel, seasonal analyses at broad regional scales can detract from a better understanding of variability in short term sub-stock catch rates. Favorable environmental conditions, even during seasons with low spawning activity can positively affect catch rates. Ignoring the role of regional oceanographic features on the spatial distribution of the sub-stocks when analysing variability in catch rates can lead to poor inferences about the productivity of the populations.

  8. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    NASA Astrophysics Data System (ADS)

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  9. Ongoing Spontaneous Activity Controls Access to Consciousness: A Neuronal Model for Inattentional Blindness

    PubMed Central

    2005-01-01

    Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden “ignition” of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of “inattentional blindness,” in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness. PMID:15819609

  10. Analysis of driver injury severity in wrong-way driving crashes on controlled-access highways.

    PubMed

    Pour-Rouholamin, Mahdi; Zhou, Huaguo

    2016-09-01

    For more than five decades, wrong-way driving (WWD) has been notorious as a traffic safety issue for controlled-access highways. Numerous studies and efforts have tried to identify factors that contribute to WWD occurrences at these sites in order to delineate between WWD and non-WWD crashes. However, none of the studies investigate the effect of various confounding variables on the injury severity being sustained by the at-fault drivers in a WWD crash. This study tries to fill this gap in the existing literature by considering possible variables and taking into account the ordinal nature of injury severity using three different ordered-response models: ordered logit or proportional odds (PO), generalized ordered logit (GOL), and partial proportional odds (PPO) model. The findings of this study reveal that a set of variables, including driver's age, condition (i.e., intoxication), seatbelt use, time of day, airbag deployment, type of setting, surface condition, lighting condition, and type of crash, has a significant effect on the severity of a WWD crash. Additionally, a comparison was made between the three proposed methods. The results corroborate that the PPO model outperforms the other two models in terms of modeling injury severity using our database. Based on the findings, several countermeasures at the engineering, education, and enforcement levels are recommended. PMID:27263080

  11. Controlling the taste receptor accessible structure of rebaudioside A via binding to bovine serum albumin.

    PubMed

    Mudgal, Samriddh; Keresztes, Ivan; Feigenson, Gerald W; Rizvi, S S H

    2016-04-15

    We illustrate a method that uses bovine serum albumin (BSA) to control the receptor-accessible part of rebaudioside A (Reb A). The critical micelle concentration (CMC) of Reb A was found to be 4.5 mM and 5 mM at pH 3 and 6.7 respectively. NMR studies show that below its CMC, Reb A binds weakly to BSA to generate a Reb A-protein complex ("RPC"), which is only modestly stable under varying conditions of pH (3.0-6.7) and temperature (4-40°C) with its binding affinities determined to be in the range of 5-280 mM. Furthermore, saturation transfer difference (STD) NMR experiments confirm that the RPC has fast exchange of the bitterness-instigating diterpene of Reb A into the binding sites of BSA. Our method can be used to alter the strength of Reb A-receptor interaction, as a result of binding of Reb A to BSA, which may ultimately lead to moderation of its taste. PMID:26616927

  12. An energy-efficient media access control protocol for chain-type wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Wang, Yu; Chen, Chang Wen

    2005-06-01

    We present in this paper an energy efficient media access control (MAC) protocol for chain-type wireless sensor networks. The chain-type sensor networks are fundamentally different from traditional sensor networks in that the sensor nodes in this class of networks are deployed along narrow and elongated geographical areas and form a chain-type topology. Recently, we have successfully developed hierarchical network architecture, sensor deployment strategy, and corresponding network initialization and operation protocols for this class of sensor networks. In this paper, we present a novel TDMA scheduling protocol that takes full advantages of the available channel reuse inherent in the chain-type sensor networks to develop energy efficient and high data throughput MAC protocols for sensor data transmission. The synchronized TDMA scheduling allows the nodes to power on only when it is scheduled to send and receive and therefore results in additional energy saving. Within a cluster, parallel transmission is made possible because of the linear distribution of nodes within the chain-type topology and this yields the desired high throughput. Preliminary simulations have been carried out to show that the proposed TDMA scheduling outperforms the well-know SMAC scheme in terms of energy efficiency and data throughput under various duty cycles.

  13. Prevention and control of neglected tropical diseases: overview of randomized trials, systematic reviews and meta-analyses

    PubMed Central

    Kappagoda, Shanthi

    2014-01-01

    Abstract Objective To analyse evidence from randomized controlled trials (RCTs) on the prevention and control of neglected tropical diseases (NTDs) and to identify areas where evidence is lacking. Methods The Cochrane Central Register of Controlled Trials and PubMed were searched for RCTs and the Cochrane Database of Systematic Reviews and PubMed were searched for meta-analyses and systematic reviews, both from inception to 31 December 2012. Findings Overall, 258 RCTs were found on American trypanosomiasis, Buruli ulcer, dengue, geohelminth infection, leishmaniasis, leprosy, lymphatic filariasis, onchocerciasis, rabies, schistosomiasis or trachoma. No RCTs were found on cysticercosis, dracunculiasis, echinococcosis, foodborne trematodes, or human African trypanosomiasis. The most studied diseases were geohelminth infection (51 RCTs) and leishmaniasis (46 RCTs). Vaccines, chemoprophylaxis and interventions targeting insect vectors were evaluated in 113, 99 and 39 RCTs, respectively. Few addressed how best to deliver preventive chemotherapy, such as the choice of dosing interval (10) or target population (4), the population coverage needed to reduce transmission (2) or the method of drug distribution (1). Thirty-one publications containing 32 systematic reviews (16 with and 16 without meta-analyses) were found on American trypanosomiasis, dengue, geohelminths, leishmaniasis, leprosy, lymphatic filariasis, onchocerciasis, schistosomiasis or trachoma. Together, they included only 79 of the 258 published RCTs (30.6%). Of 36 interventions assessed, 8 were judged effective in more than one review. Conclusion Few RCTs on the prevention or control of the principal NTDs were found. Trials on how best to deliver preventive chemotherapy were particularly rare. PMID:24839325

  14. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  15. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  16. High-Alpha Research Vehicle (HARV) longitudinal controller: Design, analyses, and simulation resultss

    NASA Technical Reports Server (NTRS)

    Ostroff, Aaron J.; Hoffler, Keith D.; Proffitt, Melissa S.; Brown, Philip W.; Phillips, Michael R.; Rivers, Robert A.; Messina, Michael D.; Carzoo, Susan W.; Bacon, Barton J.; Foster, John F.

    1994-01-01

    This paper describes the design, analysis, and nonlinear simulation results (batch and piloted) for a longitudinal controller which is scheduled to be flight-tested on the High-Alpha Research Vehicle (HARV). The HARV is an F-18 airplane modified for and equipped with multi-axis thrust vectoring. The paper includes a description of the facilities, a detailed review of the feedback controller design, linear analysis results of the feedback controller, a description of the feed-forward controller design, nonlinear batch simulation results, and piloted simulation results. Batch simulation results include maximum pitch stick agility responses, angle of attack alpha captures, and alpha regulation for full lateral stick rolls at several alpha's. Piloted simulation results include task descriptions for several types of maneuvers, task guidelines, the corresponding Cooper-Harper ratings from three test pilots, and some pilot comments. The ratings show that desirable criteria are achieved for almost all of the piloted simulation tasks.

  17. Special environmental control and life support equipment test analyses and hardware

    NASA Technical Reports Server (NTRS)

    Callahan, David M.

    1995-01-01

    This final report summarizes NAS8-38250 contract events, 'Special Environmental Control and Life Support Systems Test Analysis and Hardware'. This report is technical and includes programmatic development. Key to the success of this contract was the evaluation of Environmental Control and Life Support Systems (ECLSS) test results via sophisticated laboratory analysis capabilities. The history of the contract, including all subcontracts, is followed by the support and development of each Task.

  18. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  19. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  20. Sequential analyses, multiple controlling stimuli, and temporal patterning in first-language transmission

    PubMed Central

    Moerk, Ernst L.

    1999-01-01

    Although inferences of causality from contingencies are problematic, as Hume argued, and are difficult to prove empirically, explanatory accounts of normal language acquisition and all remedial interventions rely on presumptions of environmental effectiveness. Careful sequential analyses of verbal behaviors can strongly corroborate dependencies by means of establishing either (a) contiguous contingencies or (b) topographical resemblances between antecedents and delayed consequences that could not be explained without assuming such dependencies. The promises, as well as the methodological and conceptual challenges, of such sequential analyses of verbal training and learning are exemplified on the basis of mother-child interactions. Concomitant variation over shorter and longer intervals, and immediate as well as lagged contingencies, are interpreted as indicators of dependency relationships. By focusing on behavioral evidence, extensive similarities or even homologies between first-language training and learning and basic behavioral principles established mostly through nonhuman research can be demonstrated. Nevertheless, expansions and innovations in the behavioral repertoire are suggested as conducive to mutual enrichment of the two fields of the experimental analysis of behavior and first-language acquisition. PMID:22477160

  1. Protocol for analyses of adverse event data from randomized controlled trials of statin therapy.

    PubMed

    2016-06-01

    The Cholesterol Treatment Trialists' (CTT) Collaboration was originally established to conduct individual participant data meta-analyses of major vascular events, cause-specific mortality, and site-specific cancers in large, long-term, randomized trials of statin therapy (and other cholesterol-modifying treatments). The results of the trials of statin therapy and their associated meta-analyses have shown that statins significantly reduce the risk of major vascular events without any increase in the risk of nonvascular causes of death or of site-specific cancer, but do produce small increases in the incidence of myopathy, diabetes, and, probably, hemorrhagic stroke. The CTT Collaboration has not previously sought data on other outcomes, and so a comprehensive meta-analysis of all adverse events recorded in each of the eligible trials has not been conducted. This protocol prospectively describes plans to extend the CTT meta-analysis data set so as to provide a more complete understanding of the nature and magnitude of any other effects of statin therapy. PMID:27264221

  2. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  3. Design of a torque-controlled manipulator to analyse the admittance of the wrist joint.

    PubMed

    Schouten, Alfred C; de Vlugt, Erwin; van Hilten, J J Bob; van der Helm, Frans C T

    2006-06-30

    This paper describes the design of a torque-controlled manipulator to identify the dynamics of the wrist joint. With torque disturbances, the subject can actively control the joint angle, giving a natural task. The application of a hybrid haptic controller guarantees linearity over a large bandwidth and adjustable virtual dynamics. The haptic controller has a bandwidth of 50 Hz, meaning that the virtual dynamics are realistically felt at up to 50 Hz. To let the subject 'feel' the torque, disturbances as well as possible the apparent, or virtual, dynamics of the device must be small. The minimal apparent inertia of the device is 1.6 g m(2), which is of the same order as for a normal wrist, and the minimal damping and stiffness are negligible. To judge the accuracy of the manipulator, loads of known physical properties were attached and their parameters were quantified. The parameters of the loads were estimated with a maximum error of 5%. As the eigenfrequency of a (co)-contracted human wrist is approximately 15 Hz, the 50-Hz bandwidth of the haptic device is sufficient to measure all relevant dynamics of the human wrist. With this device, the dynamics of the human wrist joint can be measured under varying virtual dynamics, as well as the effect of neurological dysfunction on human motor control, for example. PMID:16434105

  4. Basal ganglia lesions and psychological analyses of the control of voluntary movement.

    PubMed

    Wing, A M; Miller, E

    1984-01-01

    Psychological accounts of the voluntary control of movement recognize the contribution of perceptual and decision processes as well as processes such as motor memory and timing that are more obviously a part of motor control. A model including these and other components is outlined in relation to tracking, a task that has often been used to study human perceptual-motor performance. The need for experimental control in addressing such multi-process models is emphasized. A number of studies of perceptual-motor performance deficits in patients with Parkinson's disease are reviewed. The methods by which the studies relate the behavioural data to the hypothesized underlying processes may be broadly grouped according to whether they use a subtractive logic or take a decompositional approach. These studies suggest that the basal ganglia play a role in the activation of pre-planned movement. PMID:6568151

  5. What Controls the Teaching of "Friluftsliv"? Analysing a Pedagogic Discourse within Swedish Physical Education

    ERIC Educational Resources Information Center

    Backman, Erik

    2011-01-01

    Research indicates that outdoor teaching practices within a physical education (PE) context are controlled by several factors with the potential to weaken or strengthen PE teachers' communication of pedagogic messages. Drawing on 12 qualitative interviews with PE teachers in compulsory schools in Sweden, the findings in this study suggest that…

  6. Neurodynamics of executive control processes in bilinguals: evidence from ERP and source reconstruction analyses.

    PubMed

    Heidlmayr, Karin; Hemforth, Barbara; Moutier, Sylvain; Isel, Frédéric

    2015-01-01

    The present study was designed to examine the impact of bilingualism on the neuronal activity in different executive control processes namely conflict monitoring, control implementation (i.e., interference suppression and conflict resolution) and overcoming of inhibition. Twenty-two highly proficient but non-balanced successive French-German bilingual adults and 22 monolingual adults performed a combined Stroop/Negative priming task while event-related potential (ERP) were recorded online. The data revealed that the ERP effects were reduced in bilinguals in comparison to monolinguals but only in the Stroop task and limited to the N400 and the sustained fronto-central negative-going potential time windows. This result suggests that bilingualism may impact the process of control implementation rather than the process of conflict monitoring (N200). Critically, our study revealed a differential time course of the involvement of the anterior cingulate cortex (ACC) and the prefrontal cortex (PFC) in conflict processing. While the ACC showed major activation in the early time windows (N200 and N400) but not in the latest time window (late sustained negative-going potential), the PFC became unilaterally active in the left hemisphere in the N400 and the late sustained negative-going potential time windows. Taken together, the present electroencephalography data lend support to a cascading neurophysiological model of executive control processes, in which ACC and PFC may play a determining role. PMID:26124740

  7. Effortful Control and Adaptive Functioning of Homeless Children: Variable-Focused and Person-Focused Analyses

    ERIC Educational Resources Information Center

    Obradovic, Jelena

    2010-01-01

    Homeless children show significant developmental delays across major domains of adaptation, yet research on protective processes that may contribute to resilient adaptation in this highly disadvantaged group of children is extremely rare. This study examined the role of effortful control for adaption in 58 homeless children, ages 5-6, during their…

  8. Neurodynamics of executive control processes in bilinguals: evidence from ERP and source reconstruction analyses

    PubMed Central

    Heidlmayr, Karin; Hemforth, Barbara; Moutier, Sylvain; Isel, Frédéric

    2015-01-01

    The present study was designed to examine the impact of bilingualism on the neuronal activity in different executive control processes namely conflict monitoring, control implementation (i.e., interference suppression and conflict resolution) and overcoming of inhibition. Twenty-two highly proficient but non-balanced successive French–German bilingual adults and 22 monolingual adults performed a combined Stroop/Negative priming task while event-related potential (ERP) were recorded online. The data revealed that the ERP effects were reduced in bilinguals in comparison to monolinguals but only in the Stroop task and limited to the N400 and the sustained fronto-central negative-going potential time windows. This result suggests that bilingualism may impact the process of control implementation rather than the process of conflict monitoring (N200). Critically, our study revealed a differential time course of the involvement of the anterior cingulate cortex (ACC) and the prefrontal cortex (PFC) in conflict processing. While the ACC showed major activation in the early time windows (N200 and N400) but not in the latest time window (late sustained negative-going potential), the PFC became unilaterally active in the left hemisphere in the N400 and the late sustained negative-going potential time windows. Taken together, the present electroencephalography data lend support to a cascading neurophysiological model of executive control processes, in which ACC and PFC may play a determining role. PMID:26124740

  9. Estimating feedforward vs. feedback control of speech production through kinematic analyses of unperturbed articulatory movements

    PubMed Central

    Kim, Kwang S.; Max, Ludo

    2014-01-01

    To estimate the contributions of feedforward vs. feedback control systems in speech articulation, we analyzed the correspondence between initial and final kinematics in unperturbed tongue and jaw movements for consonant-vowel (CV) and vowel-consonant (VC) syllables. If movement extents and endpoints are highly predictable from early kinematic information, then the movements were most likely completed without substantial online corrections (feedforward control); if the correspondence between early kinematics and final amplitude or position is low, online adjustments may have altered the planned trajectory (feedback control) (Messier and Kalaska, 1999). Five adult speakers produced CV and VC syllables with high, mid, or low vowels while movements of the tongue and jaw were tracked electromagnetically. The correspondence between the kinematic parameters peak acceleration or peak velocity and movement extent as well as between the articulators' spatial coordinates at those kinematic landmarks and movement endpoint was examined both for movements across different target distances (i.e., across vowel height) and within target distances (i.e., within vowel height). Taken together, results suggest that jaw and tongue movements for these CV and VC syllables are mostly under feedforward control but with feedback-based contributions. One type of feedback-driven compensatory adjustment appears to regulate movement duration based on variation in peak acceleration. Results from a statistical model based on multiple regression are presented to illustrate how the relative strength of these feedback contributions can be estimated. PMID:25426056

  10. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  11. Analyses of geological and hydrodynamic controls on methane emissions experienced in a Lower Kittanning coal mine

    PubMed Central

    Karacan, C. Özgen; Goodman, Gerrit V.R.

    2015-01-01

    This paper presents a study assessing potential factors and migration paths of methane emissions experienced in a room-and-pillar mine in Lower Kittanning coal, Indiana County, Pennsylvania. Methane emissions were not excessive at idle mining areas, but significant methane was measured during coal mining and loading. Although methane concentrations in the mine did not exceed 1% limit during operation due to the presence of adequate dilution airflow, the source of methane and its migration into the mine was still a concern. In the course of this study, structural and depositional properties of the area were evaluated to assess complexity and sealing capacity of roof rocks. Composition, gas content, and permeability of Lower Kittanning coal, results of flotation tests, and geochemistry of groundwater obtained from observation boreholes were studied to understand the properties of coal and potential effects of old abandoned mines within the same area. These data were combined with the data obtained from exploration boreholes, such as depths, elevations, thicknesses, ash content, and heat value of coal. Univariate statistical and principal component analyses (PCA), as well as geostatistical simulations and co-simulations, were performed on various spatial attributes to reveal interrelationships and to establish area-wide distributions. These studies helped in analyzing groundwater quality and determining gas-in-place (GIP) of the Lower Kittanning seam. Furthermore, groundwater level and head on the Lower Kittanning coal were modeled and flow gradients within the study area were examined. Modeling results were interpreted with the structural geology of the Allegheny Group of formations above the Lower Kittanning coal to understand the potential source of gas and its migration paths. Analyses suggested that the source of methane was likely the overlying seams such as the Middle and Upper Kittanning coals and Freeport seams of the Allegheny Group. Simulated ground

  12. Optimal design and experimental analyses of a new micro-vibration control payload-platform

    NASA Astrophysics Data System (ADS)

    Sun, Xiaoqing; Yang, Bintang; Zhao, Long; Sun, Xiaofen

    2016-07-01

    This paper presents a new payload-platform, for precision devices, which possesses the capability of isolating the complex space micro-vibration in low frequency range below 5 Hz. The novel payload-platform equipped with smart material actuators is investigated and designed through optimization strategy based on the minimum energy loss rate, for the aim of achieving high drive efficiency and reducing the effect of the magnetic circuit nonlinearity. Then, the dynamic model of the driving element is established by using the Lagrange method and the performance of the designed payload-platform is further discussed through the combination of the controlled auto regressive moving average (CARMA) model with modified generalized prediction control (MGPC) algorithm. Finally, an experimental prototype is developed and tested. The experimental results demonstrate that the payload-platform has an impressive potential of micro-vibration isolation.

  13. Load- and displacement-controlled finite element analyses on fusion and non-fusion spinal implants.

    PubMed

    Zhong, Z-C; Chen, S-H; Hung, C-H

    2009-02-01

    This study used finite element (FE) analysis with the load-controlled method (LCM) and the displacement-controlled method (DCM) to examine motion differences at the implant level and adjacent levels between fusion and non-fusion implants. A validated three-dimensional intact (INT) L1-L5 FE model was used. At the L3-L4 level, the INT model was modified to surgery models, including the artificial disc replacement (ADR) of ProDisc II, and the anterior lumbar interbody fusion (ALIF) cage with pedicle screw fixation. The LCM imposed 10 Nm moments of four physiological motions and a 150 N preload at the top of L1. The DCM process was in accordance with the hybrid testing protocol. The average percentage changes in the range of motion (ROM) for whole non-operated levels were used to predict adjacent level effects (ALE%). At the implant level, the ALIF model showed similar stability with both control methods. The ADR model using the LCM had a higher ROM than the model using the DCM, especially in extension and torsion. At the adjacent levels, the ALIF model increased ALE% (at least 17 per cent) using the DCM compared with the LCM. The ADR model had an ALE% close to that of the INT model, using the LCM (average within 6 per cent), while the ALE% decreased when using the DCM. The study suggests that both control methods can be adopted to predict the fusion model at the implant level, and similar stabilization characteristics can be found. The LCM will emphasize the effects of the non-fusion implants. The DCM was more clinically relevant in evaluating the fusion model at the adjacent levels. In conclusion, both the LCM and the DCM should be considered in numerical simulations to obtain more realistic data in spinal implant biomechanics. PMID:19278192

  14. Three key regions for supervisory attentional control: Evidence from neuroimaging meta-analyses

    PubMed Central

    Cieslik, Edna C.; Mueller, Veronika I.; Eickhoff, Claudia R.; Langner, Robert; Eickhoff, Simon B.

    2014-01-01

    The supervisory attentional system has been proposed to mediate non-routine, goal-oriented behaviour by guiding the selection and maintenance of the goal-relevant task schema. Here, we aimed to delineate the brain regions that mediate these high-level control processes via neuroimaging meta-analysis. In particular, we investigated the core neural correlates of a wide range of tasks requiring supervisory control for the suppression of a routine action in favour of another, non-routine one. Our sample comprised n = 173 experiments employing go/no-go, stop-signal, Stroop or spatial interference tasks. Consistent convergence across all four paradigm classes was restricted to right anterior insula and inferior frontal junction, with anterior midcingulate cortex and pre-supplementary motor area being consistently involved in all but the go/no-go task. Taken together with lesion studies in patients, our findings suggest that the controlled activation and maintenance of adequate task schemata relies, across paradigms, on a right-dominant midcingulo-insular-inferior frontal core network. This also implies that the role of other prefrontal and parietal regions may be less domain-general than previously thought. PMID:25446951

  15. Controls upon microbial accessibility to soil organic matter following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, C. A.; Boutton, T. W.; Filley, T. R.

    2009-12-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic matter (SOM) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and soil hydrology. To elucidate the controls upon microbial accessibility to SOM, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas A&M Agricultural Experimental Station La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, plant biopolymer chemistry in SOM, and microbial community structure were tracked. Respiration rates declined steadily over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total carbon was mineralized to CO2 throughout the incubation. After day 84 a significantly (p < 0.05) greater portion of carbon was mineralized from soils of older woody clusters (34-86 years) than from soils of younger clusters (14-23 years) and the native grassland. Approximately 80% of patterns seen in cumulative CO2 loss could be explained by the proportions of macro- and micro-aggregates within each soil, suggesting soil structure is a major controlling factor of respiration rates. Despite documented carbon accrual within La Copita soils due to WPE, we observed no evidence of enhanced carbon stabilization in these respiration experiments. In fact, a greater proportion of total carbon was lost from the soil of mature woody stands than from young stands, suggesting carbon accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. A cluster approximately 34 years in age represents a transition point in WPE where respiration dynamics become distinct between grassland and wooded elements. By day 84 of the incubation CO2 respired from all soils was depleted with respect to bulk SOM (1.5 to 5‰) and this

  16. Variability analyses suggest that supraspino-spinal interactions provide dynamic stability in motor control.

    PubMed

    Wang, H; Jung, R

    2002-03-15

    Effects of supraspino-spinal feedforward-feedback (FF-FB) interactions on variability in locomotor rhythm and coordination were examined in in vitro brain-spinal cord lamprey preparations. Spinal locomotor networks were activated by applying 0.2 mM N-methyl-DL-aspartate (NMA) to three spinal pools: gill, rostral and caudal. Bathing the brain with zero Ca(2+) saline altered supraspinal-spinal drive and FF-FB interaction while spino-supraspinal feedback was changed by applying NMA to the caudal pool only. Wavelet analyses indicated a non-uniform energy distribution in ventral root (VR) activity that shifted between frequency bands on FF-FB interruption. Wavelet analysis was used to extract 300-s long epochs of low frequency burst rhythm. These were analyzed using a sliding-window time-varying covariance method. From the autocovariance in each window, the cycle period and height of the first side lobe peak were determined. Rostral VR variability (determined from standard deviation and coefficient of variation of all cycle periods and the mean peak height) was significantly higher than caudal VR variability. FF-FB interruption significantly decreased the rostral VR cycle period and variability but the rostro-caudal gradient remained. The intersegmental delay was also affected. The caudal VR rhythm with NMA in the caudal pool only was slower but more variable than with NMA over the entire cord. These results indicate that the locomotor rhythm in the presence of supraspino-spinal interactions is slower but has a higher variability. The higher variability may reflect a dynamic stability of the system. Additionally, differences in local neural organization likely contribute to rostro-caudal differences in variability of the motor output. PMID:11879799

  17. The acceptability and impact of a randomised controlled trial of welfare rights advice accessed via primary health care: qualitative study

    PubMed Central

    Moffatt, Suzanne; Mackintosh, Joan; White, Martin; Howel, Denise; Sandell, Adam

    2006-01-01

    Background Qualitative research is increasingly used alongside randomised controlled trials (RCTs) to study a range of factors including participants' experiences of a trial. The need for a sound evidence base within public health will increase the need for RCTs of non-clinical interventions. Welfare rights advice has been proposed as an intervention with potential to reduce health inequalities. This qualitative study, nested within an RCT of the impact of welfare rights advice, examined the acceptability of the intervention, the acceptability of the research process and the perceived impact of the intervention. Methods 25 men and women aged 60 years or over were recruited from four general practices in Newcastle upon Tyne (UK), a sub-sample of those who consented to be contacted (n = 96) during the RCT baseline interview. Semi-structured interviews were undertaken and analysed using the Framework Method. Results Participants viewed the trial positively although, despite agreeing that the information leaflet was clear, some had agreed to participate without being fully aware of what was involved. Some participants were unaware of the implications of randomisation. Most thought it fair, but a few concerns were raised about the control condition. The intervention was acceptable and made participants feel confident about applying for benefit entitlements. 14 out of 25 participants received some financial award; median weekly income gain was £57 (€84, $101). The perceived impact of additional finances was considerable and included: increased affordability of necessities and occasional expenses; increased capacity to deal with emergencies; and a reduction in stress related to financial worries. Overall, perceived independence and ability to participate in society increased. Most participants perceived benefits to their mental well-being, but no-one reported an improvement in physical health. The RCT showed little or no effect on a wide range of outcome measures

  18. Autonomous and controlled motivational regulations for multiple health-related behaviors: between- and within-participants analyses

    PubMed Central

    Hagger, M.S.; Hardcastle, S.J.; Chater, A.; Mallett, C.; Pal, S.; Chatzisarantis, N.L.D.

    2014-01-01

    Self-determination theory has been applied to the prediction of a number of health-related behaviors with self-determined or autonomous forms of motivation generally more effective in predicting health behavior than non-self-determined or controlled forms. Research has been confined to examining the motivational predictors in single health behaviors rather than comparing effects across multiple behaviors. The present study addressed this gap in the literature by testing the relative contribution of autonomous and controlling motivation to the prediction of a large number of health-related behaviors, and examining individual differences in self-determined motivation as a moderator of the effects of autonomous and controlling motivation on health behavior. Participants were undergraduate students (N = 140) who completed measures of autonomous and controlled motivational regulations and behavioral intention for 20 health-related behaviors at an initial occasion with follow-up behavioral measures taken four weeks later. Path analysis was used to test a process model for each behavior in which motivational regulations predicted behavior mediated by intentions. Some minor idiosyncratic findings aside, between-participants analyses revealed significant effects for autonomous motivational regulations on intentions and behavior across the 20 behaviors. Effects for controlled motivation on intentions and behavior were relatively modest by comparison. Intentions mediated the effect of autonomous motivation on behavior. Within-participants analyses were used to segregate the sample into individuals who based their intentions on autonomous motivation (autonomy-oriented) and controlled motivation (control-oriented). Replicating the between-participants path analyses for the process model in the autonomy- and control-oriented samples did not alter the relative effects of the motivational orientations on intention and behavior. Results provide evidence for consistent effects

  19. Nutraceuticals and Blood Pressure Control: Results from Clinical Trials and Meta-Analyses.

    PubMed

    Cicero, Arrigo F G; Colletti, Alessandro

    2015-09-01

    Beyond the well-known effects on blood pressure (BP) of the dietary approaches to stop hypertension (DASH) and the Mediterranean diets, a large number of studies has investigated the possible BP lowering effect of different dietary supplements and nutraceuticals, the most part of them being antioxidant agents with a high tolerability and safety profile. In particular relatively large body of evidence support the use of potassium, L-arginine, vitamin C, cocoa flavonoids, beetroot juice, coenzyme Q10, controlled-release melatonin, and aged garlic extract. However there is a need for data about the long-term safety of a large part of the above discussed products. Moreover further clinical research is advisable to identify between the available active nutraceuticals those with the best cost-effectiveness and risk-benefit ratio for a large use in general population with low-added cardiovascular risk related to uncomplicated hypertension. PMID:25788027

  20. Review of the Reporting of Survival Analyses within Randomised Controlled Trials and the Implications for Meta-Analysis

    PubMed Central

    Batson, Sarah; Greenall, Gemma; Hudson, Pollyanna

    2016-01-01

    Background Meta-analysis is a growing approach to evidence synthesis and network meta-analysis in particular represents an important and developing method within Health Technology Assessment (HTA). Meta-analysis of survival data is usually performed using the individual summary statistic—the hazard ratio (HR) from each randomised controlled trial (RCT). Objectives The objectives of this study are to: (i) review the methods and reporting of survival analyses in oncology RCTs; and (ii) assess the suitability and relevance of survival data reported in RCTs for inclusion into meta-analysis. Methods Five oncology journals were searched to identify Phase III RCTs published between April and July 2015. Eligible studies included those that analysed a survival outcome. Results Thirty-two RCTs reporting survival outcomes in cancer populations were identified. None of the publications reported details relating to a strategy for statistical model building, the goodness of fit of the final model, or final model validation for the analysis of survival outcomes. The majority of studies (88%) reported the use of Cox proportional hazards (PH) regression to analyse survival endpoints. However, most publications failed to report the validation of the statistical models in terms of the PH assumption. Conclusions This review highlights deficiencies in terms of reporting the methods and validity of survival analyses within oncology RCTs. We support previous recommendations to encourage authors to improve the reporting of survival analyses in journal publications. We also recommend that the final choice of a statistical model for survival should be informed by goodness of model fit to a given dataset, and that model assumptions are validated. The failure of trial investigators and statisticians to investigate the PH for RCT survival data is likely to result in clinical decisions based on inappropriate methods. The development of alternative approaches for the meta-analysis of survival

  1. Patterns and Prevalence of School Access, Transitions and Equity in South Africa: Secondary Analyses of BT20 Large-Scale Data Sources. CREATE Pathways to Access. Research Monograph No. 27

    ERIC Educational Resources Information Center

    Fleisch, Brahm; Shindler, Jennifer

    2009-01-01

    This monograph looks at patterns and prevalence of initial school enrolment, late entry, attainment promotion, and repetition in urban South Africa. The paper pays special attention to the particular gender nature of the patterns of school participation. The study analyses data generated in the genuine representative cohort study, Birth-to-Twenty…

  2. Cohort and case-control analyses of workers exposed to vinyl chloride: An update

    SciTech Connect

    Wu, W.A.; Steenland, K.; Brown, D.; Wells, V.; Jones, J.; Schulte, P.; Halperin, W.

    1989-06-01

    The mortality in a cohort of workers at a vinyl chloride polymerization plant has been updated, extending the period of observation in the original study from 1974 to 1986. Workers at this plant may have been exposed to vinyl chloride monomer and/or polyvinyl chloride dust, or may have had no exposure to either substance. Seventy-six percent of the work force worked in jobs with potential exposure to vinyl chloride monomer. Among the total cohort, statistically significant excess risks were observed for liver, lung, and brain cancer. For the subcohort of workers exposed to vinyl chloride monomer, the standardized mortality ratio (SMR) for liver cancer was 333 (90% confidence interval (CI) 202 to 521). However, there were no significant excesses of either brain (SMR = 145, 90% CI 78 to 249) or lung cancer (SMR = 115, 90% CI 96 to 141). To investigate dose response, nested case-control studies for liver, brain, and lung cancer were conducted among the total cohort (including the nonexposed). For these studies there were two exposure variables, cumulative dose of vinyl chloride monomer and cumulative dose of polyvinyl chloride dust. Cumulative dose was defined as the product of level and duration of exposure. The only significant association between disease risk and cumulative dose was for liver cancer and cumulative dose of vinyl chloride monomer. Further division of the liver cancers into angiosarcoma (n = 12) and other liver cancers (n = 7), based on review of death certificates and medical records, showed that the dose response existed only for angiosarcomas.

  3. Power of univariate and multivariate analyses of repeated measurements in controlled clinical trials.

    PubMed

    Overall, J E; Atlas, R S

    1999-04-01

    The power of univariate and multivariate tests of significance is compared in relation to linear and nonlinear patterns of treatment effects in a repeated measurement design. Bonferroni correction was used to control the experiment-wise error rate in combining results from univariate tests of significance accomplished separately on average level, linear, quadratic, and cubic trend components. Multivariate tests on these same components of the overall treatment effect, as well as a multivariate test for between-groups difference on the original repeated measurements, were also evaluated for power against the same representative patterns of treatment effects. Results emphasize the advantage of parsimony that is achieved by transforming multiple repeated measurements into a reduced set of mean ngful composite variables representing average levels and rates of change. The Bonferroni correction applied to the separate univariate tests provided experiment-wise protection against Type I error, produced slightly greater experiment-wise power than a multivariate test applied to the same components of the data patterns, and provided substantially greater power than a multivariate test on the complete set of original repeated measurements. The separate univariate tests provide interpretive advantage regarding locus of the treatment effects. PMID:10348408

  4. Wavefront sensing and control performance modeling of the Thirty Meter telescope for systematic trade analyses

    NASA Astrophysics Data System (ADS)

    Nissly, Carl; Seo, Byoung-Joon; Troy, Mitchell; Chanan, Gary; Roberts, Scott; Rogers, John

    2014-08-01

    We have developed an integrated optical model of the semi-static performance of the Thirty Meter Telescope. The model includes surface and rigid body errors of all telescope optics as well as a model of the Alignment and Phasing System Shack-Hartmann wavefront sensors and control algorithms. This integrated model allows for simulation of the correction of the telescope wavefront, including optical errors on the secondary and tertiary mirrors, using the primary mirror segment active degrees of freedom. This model provides the estimate of the predicted telescope performance for system engineering and error budget development. In this paper we present updated performance values for the TMT static optical errors in terms of Normalized Point Source Sensitivity and RMS wavefront error after Adaptive Optics correction. As an example of a system level trade, we present the results from an analysis optimizing the number of Shack-Hartmann lenslets per segment. We trade the number of lenslet rings over each primary mirror segment against the telescope performance metrics of PSSN and RMS wavefront error.

  5. Slotted Aloha multiple access and error control coding for land mobile satellite networks

    NASA Astrophysics Data System (ADS)

    Lutz, Erich

    1992-10-01

    This paper considers a satellite network with data messages being transmitted by land mobile users according to slotted Aloha multiple access. The mobile communication links suffering from multipath fading and signal shadowing are modelled as Gilbert-Elliott channels. FEC block coding is used to correct transmission errors. The maximum achievable information throughput and the mean packet delay are derived from a combined analysis of the multiple access and FEC/ARQ protocol. The results show that the additional overhead necessary for FEC is outweighed by the benefit in throughput and delay. Finally, the capture effect and its consequences are discussed.

  6. Transcriptomic and proteomic analyses of the Aspergillus fumigatus hypoxia response using an oxygen-controlled fermenter

    PubMed Central

    2012-01-01

    Background Aspergillus fumigatus is a mold responsible for the majority of cases of aspergillosis in humans. To survive in the human body, A. fumigatus must adapt to microenvironments that are often characterized by low nutrient and oxygen availability. Recent research suggests that the ability of A. fumigatus and other pathogenic fungi to adapt to hypoxia contributes to their virulence. However, molecular mechanisms of A. fumigatus hypoxia adaptation are poorly understood. Thus, to better understand how A. fumigatus adapts to hypoxic microenvironments found in vivo during human fungal pathogenesis, the dynamic changes of the fungal transcriptome and proteome in hypoxia were investigated over a period of 24 hours utilizing an oxygen-controlled fermenter system. Results Significant increases in transcripts associated with iron and sterol metabolism, the cell wall, the GABA shunt, and transcriptional regulators were observed in response to hypoxia. A concomitant reduction in transcripts was observed with ribosome and terpenoid backbone biosynthesis, TCA cycle, amino acid metabolism and RNA degradation. Analysis of changes in transcription factor mRNA abundance shows that hypoxia induces significant positive and negative changes that may be important for regulating the hypoxia response in this pathogenic mold. Growth in hypoxia resulted in changes in the protein levels of several glycolytic enzymes, but these changes were not always reflected by the corresponding transcriptional profiling data. However, a good correlation overall (R2 = 0.2, p < 0.05) existed between the transcriptomic and proteomics datasets for all time points. The lack of correlation between some transcript levels and their subsequent protein levels suggests another regulatory layer of the hypoxia response in A. fumigatus. Conclusions Taken together, our data suggest a robust cellular response that is likely regulated both at the transcriptional and post-transcriptional level in response to hypoxia

  7. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  8. Population and forensic genetic analyses of mitochondrial DNA control region variation from six major provinces in the Korean population.

    PubMed

    Hong, Seung Beom; Kim, Ki Cheol; Kim, Wook

    2015-07-01

    We generated complete mitochondrial DNA (mtDNA) control region sequences from 704 unrelated individuals residing in six major provinces in Korea. In addition to our earlier survey of the distribution of mtDNA haplogroup variation, a total of 560 different haplotypes characterized by 271 polymorphic sites were identified, of which 473 haplotypes were unique. The gene diversity and random match probability were 0.9989 and 0.0025, respectively. According to the pairwise comparison of the 704 control region sequences, the mean number of pairwise differences between individuals was 13.47±6.06. Based on the result of mtDNA control region sequences, pairwise FST genetic distances revealed genetic homogeneity of the Korean provinces on a peninsular level, except in samples from Jeju Island. This result indicates there may be a need to formulate a local mtDNA database for Jeju Island, to avoid bias in forensic parameter estimates caused by genetic heterogeneity of the population. Thus, the present data may help not only in personal identification but also in determining maternal lineages to provide an expanded and reliable Korean mtDNA database. These data will be available on the EMPOP database via accession number EMP00661. PMID:25900647

  9. Multi-component access to a commercially available weight loss program: A randomized controlled trial

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This study examined weight loss between a community-based, intensive behavioral counseling program (Weight Watchers PointsPlus that included three treatment access modes and a self-help condition. A total of 292 participants were randomized to a Weight Watchers (WW; n=147) or a self-help condition (...

  10. Enrollment Quota Control, Elite Selection and Access to Education in Rural China

    ERIC Educational Resources Information Center

    Zhao, Luan

    2010-01-01

    In China, the access to education is determined by not only student's demand for schooling, but also the allocation of educational resources and the schools' selection of candidate students. Based on the data obtained from the rural life level and rural social assistance household surveys in four provinces in 2005, the demand-identified bivariate…

  11. Enhancer control of local accessibility to V(D)J recombinase.

    PubMed Central

    McMurry, M T; Hernandez-Munain, C; Lauzurica, P; Krangel, M S

    1997-01-01

    We have studied the role of transcriptional enhancers in providing recombination signal sequence (RSS) accessibility to V(D)J recombinase by examining mice carrying a transgenic human T-cell receptor (TCR) delta gene minilocus. This transgene is composed of unrearranged variable (Vdelta and Vdelta2), diversity (Ddelta3), joining (Jdelta1 and Jdelta3), and constant (Cdelta) gene segments. Previous data indicated that with the TCR delta enhancer (Edelta) present in the Jdelta3-Cdelta intron, V(D)J recombination proceeds stepwise, first V to D and then VD to J. With the enhancer deleted or mutated, V-to-D rearrangement is intact, but VD-to-J rearrangement is inhibited. We proposed that Edelta is necessary for J segment but not D segment accessibility and that J segment inaccessibility in the enhancerless minilocus resulted in the observed V(D)J recombination phenotype. In this study, we tested this notion by using ligation-mediated PCR to assess the formation of recombination-activating gene (RAG)-dependent double-strand breaks (DSBs) at RSSs 3' of Ddelta3 and 5' of Jdelta1. In five lines of mice carrying multicopy integrants of constructs that either lacked Edelta or carried an inactivated Edelta, the frequency of DSBs 5' of Jdelta1 was dramatically reduced relative to that in the wild type, whereas the frequency of DSBs 3' of Ddelta3 was unaffected. We interpret these results to indicate that Edelta is required for Jdelta1 but not Ddelta3 accessibility within the minilocus, and we conclude that enhancers regulate V(D)J recombination by providing local accessibility to the recombinase. cis-acting elements other than Edelta must maintain Ddelta3 in an accessible state in the absence of Edelta. The analysis of DSB formation in a single-copy minilocus integrant indicates that efficient DSB formation at the accessible RSS 3' of Ddelta3 requires an accessible partner RSS, arguing that RSS synapsis is required for DSB formation in chromosomal substrates in vivo. PMID

  12. Novel implementations of optical switch control module and 3D-CSP for 10 Gbps active optical access system

    NASA Astrophysics Data System (ADS)

    Wakayama, Koji; Okuno, Michitaka; Matsuoka, Yasunobu; Hosomi, Kazuhiko; Sagawa, Misuzu; Sugawara, Toshiki

    2009-11-01

    We propose an optical switch control procedure for high-performance and cost-effective 10 Gbps Active Optical Access System (AOAS) in which optical switches are used instead of optical splitters in PON (Passive Optical Network). We demonstrate the implemented optical switch control module on Optical Switching Unit (OSW) with logic circuits works effectively. We also propose a compact optical 3D-CSP (Chip Scale Package) to achieve the high performance of AOAS without losing cost advantage of PON. We demonstrate the implemented 3D-CSP works effectively.

  13. The effects of hands free communication devices on clinical communication: balancing communication access needs with user control.

    PubMed

    Richardson, Joshua E; Richardson, Joshua Edwin; Ash, Joan S; Ash, Joan

    2008-01-01

    Hands Free Communication Device (HFCD) systems are a relatively new information and communication technology. HFCD systems enable clinicians to directly contact and communicate with one another using wearable, voice-controlled badges that are VoIP-based (voice-over IP) and are linked to one another over a wireless local area network (WLAN). This qualitative study utilized a grounded theory, multiple perspectives approach to understand how the use of HFCDs affected communication in the hospitals that implemented them. The study generated five themes revolving around HFCDs impact on communication. This paper specifically focuses on two of those themes: Communication Access and Control. PMID:18999046

  14. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    PubMed

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services. PMID:27240842

  15. Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hurni, Philipp

    This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.

  16. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... described in § 648.4(a)(13)(i)(J) for the entire fishing year preceding the carry-over year, limited access... fishery consistent with § 648.4(a)(13)(i)(B)(2) or the TAC is adjusted consistent with § 648.260. (3... and calls out of the fishery at 10 p.m. on Friday, the next day, that vessel shall be assessed 2...

  17. Toxic Substances Control Act (TSCA) chemical substances inventory: PMN number to EPA accession number link (for microcomputers). Data file

    SciTech Connect

    Not Available

    1994-05-01

    The PMN Number to EPA Accession Number Link Diskette provides a cross-reference of these numbers for commenced PMNs on the confidential portion of the Toxic Substances Control Act (TSCA) Master Inventory File. Neither this cross-reference nor the additional information included is TSCA Confidential Business Information. Provided on the diskette for each confidential commenced PMN are the PMN Case Number, EPA Accession Number, Generic Name, and EPA special flags. For more detailed information on the confidential portion of the TSCA Inventory, including generic names, users can consult the introductory material of the printed TSCA Inventory: 1985 Edition and its 1990 Supplement. New versions of this file may be issued in the future.

  18. Clinical utility of far-infrared therapy for improvement of vascular access blood flow and pain control in hemodialysis patients

    PubMed Central

    Choi, Soo Jeong; Cho, Eun Hee; Jo, Hye Min; Min, Changwook; Ji, Young Sok; Park, Moo Yong; Kim, Jin Kuk; Hwang, Seung Duk

    2015-01-01

    Background Maintenance of a well-functioning vascular access and minimal needling pain are important goals for achieving adequate dialysis and improving the quality of life in hemodialysis (HD) patients. Far-infrared (FIR) therapy may improve endothelial function and increase access blood flow (Qa) and patency in HD patients. The aim of this study was to evaluate effects of FIR therapy on Qa and patency, and needling pain in HD patients. Methods This prospective clinical trial enrolled 25 outpatients who maintained HD with arteriovenous fistula. The other 25 patients were matched as control with age, sex, and diabetes. FIR therapy was administered for 40 minutes during HD 3 times/wk and continued for 12 months. The Qa was measured by the ultrasound dilution method, whereas pain was measured by a numeric rating scale at baseline, then once per month. Results One patient was transferred to another facility, and 7 patients stopped FIR therapy because of an increased body temperature and discomfort. FIR therapy improved the needling pain score from 4 to 2 after 1 year. FIR therapy increased the Qa by 3 months and maintained this change until 1 year, whereas control patients showed the decrease in Qa. The 1-year unassisted patency with FIR therapy was not significantly different from control. Conclusion FIR therapy improved needling pain. Although FIR therapy improved Qa, the unassisted patency was not different compared with the control. A larger and multicenter study is needed to evaluate the effect of FIR therapy. PMID:27069856

  19. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    NASA Astrophysics Data System (ADS)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  20. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  1. Accessibility Is the Mother of Invention: When It Comes to an Innovative Hand Control System

    ERIC Educational Resources Information Center

    Exceptional Parent, 2007

    2007-01-01

    This article features Sure Grip hand control, an innovative hand control system created by Keith Howell, the President and founder of Howell Ventures LTD. Howell was in his early teens when he experienced an accident that resulted in his quadriplegia. From that point on, Howell set about to manufacture a set of controls that would emulate the…

  2. Prevention of Relapse and Recurrence in Adults with Major Depressive Disorder: Systematic Review and Meta-Analyses of Controlled Trials

    PubMed Central

    Lau, Wai Keat; Sim, Jordan; Sum, Min Yi; Baldessarini, Ross J.

    2016-01-01

    Background: Findings of substantial remaining morbidity in treated major depressive disorder (MDD) led us to review controlled trials of treatments aimed at preventing early relapses or later recurrences in adults diagnosed with MDD to summarize available data and to guide further research. Methods: Reports (n = 97) were identified through systematic, computerized literature searching up to February 2015. Treatment versus control outcomes were summarized by random-effects meta-analyses. Results: In 45 reports of 72 trials (n = 14 450 subjects) lasting 33.4 weeks, antidepressants were more effective than placebos in preventing relapses (response rates [RR] = 1.90, confidence interval [CI]: 1.73–2.08; NNT = 4.4; p < 0.0001). In 35 reports of 37 trials (n = 7253) lasting 27.0 months, antidepressants were effective in preventing recurrences (RR = 2.03, CI 1.80–2.28; NNT = 3.8; p < 0.0001), with minor differences among drug types. In 17 reports of 22 trials (n = 1 969) lasting 23.7 months, psychosocial interventions yielded inconsistent or inconclusive results. Conclusions: Despite evidence of the efficacy of drug treatment compared to placebos or other controls, the findings further underscore the substantial, unresolved morbidity in treated MDD patients and strongly encourage further evaluations of specific, improved individual and combination therapies (pharmacological and psychological) conducted over longer times, as well as identifying clinical predictors of positive or unfavorable responses and of intolerability of long-term treatments in MDD. PMID:26152228

  3. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation: Control modules C4, C6

    SciTech Connect

    1997-03-01

    This Manual represents Revision 5 of the user documentation for the modular code system referred to as SCALE. The history of the SCALE code system dates back to 1969 when the current Computational Physics and Engineering Division at Oak Ridge National Laboratory (ORNL) began providing the transportation package certification staff at the U. S. Atomic Energy Commission with computational support in the use of the new KENO code for performing criticality safety assessments with the statistical Monte Carlo method. From 1969 to 1976 the certification staff relied on the ORNL staff to assist them in the correct use of codes and data for criticality, shielding, and heat transfer analyses of transportation packages. However, the certification staff learned that, with only occasional use of the codes, it was difficult to become proficient in performing the calculations often needed for an independent safety review. Thus, shortly after the move of the certification staff to the U.S. Nuclear Regulatory Commission (NRC), the NRC staff proposed the development of an easy-to-use analysis system that provided the technical capabilities of the individual modules with which they were familiar. With this proposal, the concept of the Standardized Computer Analyses for Licensing Evaluation (SCALE) code system was born. This volume is part of the manual related to the control modules for the newest updated version of this computational package.

  4. One electron-controlled multiple-valued dynamic random-access-memory

    NASA Astrophysics Data System (ADS)

    Kye, H. W.; Song, B. N.; Lee, S. E.; Kim, J. S.; Shin, S. J.; Choi, J. B.; Yu, Y.-S.; Takahashi, Y.

    2016-02-01

    We propose a new architecture for a dynamic random-access-memory (DRAM) capable of storing multiple values by using a single-electron transistor (SET). The gate of a SET is designed to be connected to a plurality of DRAM unit cells that are arrayed at intersections of word lines and bitlines. In this SET-DRAM hybrid scheme, the multiple switching characteristics of SET enables multiple value data stored in a DRAM unit cell, and this increases the storage functionality of the device. Moreover, since refreshing data requires only a small amount of SET driving current, this enables device operating with low standby power consumption.

  5. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  6. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 3: Software and Hardware. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for the disabled or the elderly, the book focuses on hardware and software. The guide's 13 chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  7. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  8. Effect of Information and Telephone-Guided Access to Community Support for People with Chronic Kidney Disease: Randomised Controlled Trial

    PubMed Central

    Blakeman, Tom; Blickem, Christian; Kennedy, Anne; Reeves, David; Bower, Peter; Gaffney, Hannah; Gardner, Caroline; Lee, Victoria; Jariwala, Praksha; Dawson, Shoba; Mossabir, Rahena; Brooks, Helen; Richardson, Gerry; Spackman, Eldon; Vassilev, Ivaylo; Chew-Graham, Carolyn; Rogers, Anne

    2014-01-01

    Background Implementation of self-management support in traditional primary care settings has proved difficult, encouraging the development of alternative models which actively link to community resources. Chronic kidney disease (CKD) is a common condition usually diagnosed in the presence of other co-morbidities. This trial aimed to determine the effectiveness of an intervention to provide information and telephone-guided access to community support versus usual care for patients with stage 3 CKD. Methods and Findings In a pragmatic, two-arm, patient level randomised controlled trial 436 patients with a diagnosis of stage 3 CKD were recruited from 24 general practices in Greater Manchester. Patients were randomised to intervention (215) or usual care (221). Primary outcome measures were health related quality of life (EQ-5D health questionnaire), blood pressure control, and positive and active engagement in life (heiQ) at 6 months. At 6 months, mean health related quality of life was significantly higher for the intervention group (adjusted mean difference = 0.05; 95% CI = 0.01, 0.08) and blood pressure was controlled for a significantly greater proportion of patients in the intervention group (adjusted odds-ratio = 1.85; 95% CI = 1.25, 2.72). Patients did not differ significantly in positive and active engagement in life. The intervention group reported a reduction in costs compared with control. Conclusions An intervention to provide tailored information and telephone-guided access to community resources was associated with modest but significant improvements in health related quality of life and better maintenance of blood pressure control for patients with stage 3 CKD compared with usual care. However, further research is required to identify the mechanisms of action of the intervention. Trial Registration Controlled-Trials.com ISRCTN45433299 PMID:25330169

  9. Cancer control in developing countries: using health data and health services research to measure and improve access, quality and efficiency

    PubMed Central

    2010-01-01

    Background Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. Discussion This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) Process: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) Outcome: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. Summary There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international

  10. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  11. Effective Simulation and Control Approaches for Alleviating the Access to High-Cost Manipulators

    ERIC Educational Resources Information Center

    Mihali, Raul; Sobh, Tarek

    2005-01-01

    A problem that becomes increasingly obvious over time derives from purchasing and working with large scale, industrial type of manipulators. Primarily affected are higher level educational institutions, where manipulators are likely to be exposed to student projects that demand diversity in control strategies and various controlling software and…

  12. An Open-Access Educational Tool for Teaching Motion Dynamics in Multi-Axis Servomotor Control

    ERIC Educational Resources Information Center

    Rivera-Guillen, J. R.; de Jesus Rangel-Magdaleno, J.; de Jesus Romero-Troncoso, R.; Osornio-Rios, R. A.; Guevara-Gonzalez, R. G.

    2012-01-01

    Servomotors are widely used in computerized numerically controlled (CNC) machines, hence motion control is a major topic covered in undergraduate/graduate engineering courses. Despite the fact that several syllabi include the motion dynamics topic in their courses, there are neither suitable tools available for designing and simulating multi-axis…

  13. Generalized control and data access at the LANSCE Accelerator Complex -- Gateway, migrators, and other servers

    SciTech Connect

    Schaller, S.C.; Oothoudt, M.A.

    1995-12-01

    All large accelerator control systems eventually outlast the technologies with which they were built. This has happened several times during the lifetime of the accelerators at Los Alamos in the LAMPF/PSR beam delivery complex. Most recently, the EPICS control system has been integrated with the existing LAMPF and PSR control systems. In this paper, the authors discuss the provisions that were made to provide uniform, and nearly transparent sharing of data among the three control systems. The data sharing mechanisms have now been in use during a very successful beam production period. They comment on the successes and failures of the project and indicate the control system properties that make such sharing possible.

  14. Utilizing SELinux to mandate ultra-secure access control of medical records.

    PubMed

    Croll, Peter R; Henricksen, Matt; Caelli, Bill; Liu, Vicky

    2007-01-01

    Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure that sensitive health information can be adequately protected yet still be accessible only to those that "need-to-know". To achieve this and ensure sustainability over the longer term, it is advocated that an alternative, stable and secure system architecture is required. This paper considers the adoption of a model targeted at health information that provides much higher degrees of protection. A purpose built demonstrator that was developed based on enterprise-level systems software products is detailed. The long term aim is to provide a viable solution by utilizing contemporary, commercially supported operating system and allied software. The advantages and limitations in its application with a medical database are discussed. The future needs in terms of research, software development and changes in organizational policy for healthcare providers, are outlined. PMID:17911767

  15. On the control, stability, and waiting time in a slotted ALOHA random-access system

    NASA Technical Reports Server (NTRS)

    Ferguson, M. J.

    1975-01-01

    This paper explores some of the boundaries in performance of slotted ALOHA systems by analyzing a simple and almost optimal centrally supervised control. The control results in a very simple Markov chain model and allows an examination of stability, conditional waiting time distribution of transmitting terminals, and many other system measures. The key to the simplicity is to have a probability of successful packet transmission that is independent of the number of transmitting terminals. In considering waiting time, we calculate the mean and other moments of the waiting time of a terminal when it enters the system to find (n - 1) other terminals already there competing for the channel. Under this control, the average time is proportional to n. The control requires exact knowledge of the number of terminals contending for the channel, and hence is not implementable, except as an approximation.

  16. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... electronic prescriptions for controlled substances are current and in good standing. (c) After one individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised....

  17. Performance of a Frequency-Hopped Real-Time Remote Control System in a Multiple Access Scenario

    NASA Astrophysics Data System (ADS)

    Cervantes, Frank

    A recent trend is observed in the context of the radio-controlled aircrafts and automobiles within the hobby grade category and Unmanned Aerial Vehicles (UAV) applications moving to the well-known Industrial, Scientific and Medical (ISM) band. Based on this technological fact, the present thesis evaluates an individual user performance by featuring a multiple-user scenario where several point-to-point co-located real-time Remote Control (RC) applications operate using Frequency Hopping Spread Spectrum (FHSS) as a medium access technique in order to handle interference efficiently. Commercial-off-the-shelf wireless transceivers ready to operate in the ISM band are considered as the operational platform supporting the above-mentioned applications. The impact of channel impairments and of different critical system engineering issues, such as working with real clock oscillators and variable packet duty cycle, are considered. Based on the previous, simulation results allowed us to evaluate the range of variation for those parameters for an acceptable system performance under Multiple Access (MA) environments.

  18. Questa baseline and pre-mining ground-water-quality investigation. 16. Quality assurance and quality control for water analyses

    USGS Publications Warehouse

    McCleskey, R. Blaine; Nordstrom, D. Kirk; Naus, Cheryl A.

    2004-01-01

    The Questa baseline and pre-mining ground-water quality investigation has the main objective of inferring the ground-water chemistry at an active mine site. Hence, existing ground-water chemistry and its quality assurance and quality control is of crucial importance to this study and a substantial effort was spent on this activity. Analyses of seventy-two blanks demonstrated that contamination from processing, handling, and analyses were minimal. Blanks collected using water deionized with anion and cation exchange resins contained elevated concentrations of boron (0.17 milligrams per liter (mg/L)) and silica (3.90 mg/L), whereas double-distilled water did not. Boron and silica were not completely retained by the resins because they can exist as uncharged species in water. Chloride was detected in ten blanks, the highest being 3.9 mg/L, probably as the result of washing bottles, filter apparatuses, and tubing with hydrochloric acid. Sulfate was detected in seven blanks; the highest value was 3.0 mg/L, most likely because of carryover from the high sulfate waters sampled. With only a few exceptions, the remaining blank analyses were near or below method detection limits. Analyses of standard reference water samples by cold-vapor atomic fluorescence spectrometry, ion chromatography, inductively coupled plasma-optical emission spectrometry, inductively coupled plasma-mass spectrometry, FerroZine, graphite furnace atomic absorption spectrometry, hydride generation atomic spectrometry, and titration provided an accuracy check. For constituents greater than 10 times the detection limit, 95 percent of the samples had a percent error of less than 8.5. For constituents within 10 percent of the detection limit, the percent error often increased as a result of measurement imprecision. Charge imbalance was calculated using WATEQ4F and 251 out of 257 samples had a charge imbalance less than 11.8 percent. The charge imbalance for all samples ranged from -16 to 16 percent. Spike

  19. Is paleoanthropology science? Naming new fossils and control of access to them.

    PubMed

    Tattersall, Ian; Schwartz, Jeffrey H

    2002-12-15

    Progress in paleoanthropology is impeded when new fossil materials are published but unavailable for comparative study, as is too often the case. In this commentary, we review the stages of description and analysis that new fossils must undergo and conclude that it is disingenuous to argue that fossils have not been properly "published" when descriptions and new names formulated in accordance with the International Code of Zoological Nomenclature have appeared in leading scientific journals. Once such names and descriptions have been published, it is imperative that the original fossils concerned be available to the scientific community for comparative analysis, for by the very nature of science, no statement about such fossils, however carefully prepared by the original describers (or anyone else), can be regarded as definitive. Science is a system of provisional knowledge that constantly requires re-examination and testing. It cannot function as a system in which assertions have to be left unchallenged for want of free access to the primary data. PMID:12467080

  20. Suicidal Behavior and Firearm Access: Results from the Second Injury Control and Risk Survey

    ERIC Educational Resources Information Center

    Betz, Marian E.; Barber, Catherine; Miller, Matthew

    2011-01-01

    The association between home firearms and the likelihood and nature of suicidal thoughts and plans was examined using the Second Injury Control and Risk Survey, a 2001-2003 representative telephone survey of U.S. households. Of 9,483 respondents, 7.4% reported past-year suicidal thoughts, 21.3% with a plan. Similar proportions of those with and…

  1. Access Point Analysis: What Do Adolescents in South Africa Say about Tobacco Control Programmes?

    ERIC Educational Resources Information Center

    Swart, Dehran; Panday, Saadhna; Reddy, S Priscilla; Bergstrom, Erik; de Vries, Hein

    2006-01-01

    This paper explores adolescent preferences for the setting, timing, delivery format, provider and key elements of tobacco control programmes. The need for programme sensitivity towards urban/rural, gender and ethnic subgroups is also discussed. Schools were purposively selected from the Southern Cape-Karoo Region, South Africa. Twelve prevention…

  2. Minding the gap: Frequency of indels in mtDNA control region sequence data and influence on population genetic analyses

    USGS Publications Warehouse

    Pearce, J.M.

    2006-01-01

    Insertions and deletions (indels) result in sequences of various lengths when homologous gene regions are compared among individuals or species. Although indels are typically phylogenetically informative, occurrence and incorporation of these characters as gaps in intraspecific population genetic data sets are rarely discussed. Moreover, the impact of gaps on estimates of fixation indices, such as FST, has not been reviewed. Here, I summarize the occurrence and population genetic signal of indels among 60 published studies that involved alignments of multiple sequences from the mitochondrial DNA (mtDNA) control region of vertebrate taxa. Among 30 studies observing indels, an average of 12% of both variable and parsimony-informative sites were composed of these sites. There was no consistent trend between levels of population differentiation and the number of gap characters in a data block. Across all studies, the average influence on estimates of ??ST was small, explaining only an additional 1.8% of among population variance (range 0.0-8.0%). Studies most likely to observe an increase in ??ST with the inclusion of gap characters were those with < 20 variable sites, but a near equal number of studies with few variable sites did not show an increase. In contrast to studies at interspecific levels, the influence of indels for intraspecific population genetic analyses of control region DNA appears small, dependent upon total number of variable sites in the data block, and related to species-specific characteristics and the spatial distribution of mtDNA lineages that contain indels. ?? 2006 Blackwell Publishing Ltd.

  3. Environmental Assessment for Proposed Access Control and Traffic Improvements at Los Alamos National Laboratory, Los Alamos, New Mexico

    SciTech Connect

    N /A

    2002-08-23

    The National Nuclear Security Administration (NNSA) has assigned a continuing role to Los Alamos National Laboratory (LANL) in carrying out NNSA's national security mission. It is imperative that LANL continue this enduring responsibility and that NNSA adequately safeguard LANL capabilities. NNSA has identified the need to restrict vehicular access to certain areas within LANL for the purpose of permanently enhancing the physical security environment at LANL. It has also identified the need to change certain traffic flow patterns for the purpose of enhancing physical safety at LANL. The Proposed Action would include the construction of eastern and western bypass roads around the LANL Technical Area (TA) 3 area and the installation of vehicle access controls and related improvements to enhance security along Pajarito Road and in the LANL core area. This Proposed Action would modify the current roadway network and traffic patterns. It would also result in traversing Areas of Environmental Interest identified in the LANL Habitat Management Plan, demolition of part of an historic structure at Building 3-40, and traversing several potential release sites and part of the Los Alamos County landfill. The No Action Alternative was also considered. Under this alternative NNSA would not construct the eastern or western bypass roads, any access-control stations, or related improvements. Diamond Drive would continue to serve as the primary conduit for most vehicle traffic within the LANL core area regardless of actual trip destinations. The No Action Alternative does not meet NNSA's purpose and need for action. The proposed bypass road corridors traverse both developed and undeveloped areas. Several potential release sites are present. These would either be sampled and remediated in accordance with New Mexico Environment Department requirements before construction or avoided to allow for future remediation. In some cases, contaminant levels may fall below remediation thresholds

  4. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation. Control modules -- Volume 1, Revision 4

    SciTech Connect

    Landers, N.F.; Petrie, L.M.; Knight, J.R.

    1995-04-01

    SCALE--a modular code system for Standardized Computer Analyses Licensing Evaluation--has been developed by Oak Ridge National Laboratory at the request of the US Nuclear Regulatory Commission. The SCALE system utilizes well-established computer codes and methods within standard analysis sequences that (1) allow an input format designed for the occasional user and/or novice, (2) automate the data processing and coupling between modules, and (3) provide accurate and reliable results. System development has been directed at problem-dependent cross-section processing and analysis of criticality safety, shielding, heat transfer, and depletion/decay problems. Since the initial release of SCALE in 1980, the code system has been heavily used for evaluation of nuclear fuel facility and package designs. This revision documents Version 4.2 of the system. This manual is divided into three volumes: Volume 1--for the control module documentation, Volume 2--for the functional module documentation, and Volume 3 for the documentation of the data libraries and subroutine libraries.

  5. Control volume analyses of glottal flow using a fully-coupled numerical fluid-structure interaction model

    NASA Astrophysics Data System (ADS)

    Yang, Jubiao; Krane, Michael; Zhang, Lucy

    2013-11-01

    Vocal fold vibrations and the glottal jet are successfully simulated using the modified Immersed Finite Element method (mIFEM), a fully coupled dynamics approach to model fluid-structure interactions. A self-sustained and steady vocal fold vibration is captured given a constant pressure input at the glottal entrance. The flow rates at different axial locations in the glottis are calculated, showing small variations among them due to the vocal fold motion and deformation. To further facilitate the understanding of the phonation process, two control volume analyses, specifically with Bernoulli's equation and Newton's 2nd law, are carried out for the glottal flow based on the simulation results. A generalized Bernoulli's equation is derived to interpret the correlations between the velocity and pressure temporally and spatially along the center line which is a streamline using a half-space model with symmetry boundary condition. A specialized Newton's 2nd law equation is developed and divided into terms to help understand the driving mechanism of the glottal flow.

  6. Analyses of nuclear ldhA gene and mtDNA control region sequences of Atlantic northern bluefin tuna populations.

    PubMed

    Ely, B; Stoner, D S; Bremer, Alvarado J R; Dean, J M; Addis, P; Cau, A; Thelen, E J; Jones, W J; Black, D E; Smith, L; Scott, K; Naseri, I; Quattro, J M

    2002-12-01

    There has been considerable debate about whether the Atlantic northern bluefin tuna exist as a single panmictic unit. We have addressed this issue by examining both mitochondrial DNA control region nucleotide sequences and nuclear gene ldhA allele frequencies in replicate size or year class samples of northern bluefin tuna from the Mediterranean Sea and the northwestern Atlantic Ocean. Pairwise comparisons of multiple year class samples from the 2 regions provided no evidence for population subdivision. Similarly, analyses of molecular variance of both mitochondrial and ldhA data revealed no significant differences among or between samples from the 2 regions. These results demonstrate the importance of analyzing multiple year classes and large sample sizes to obtain accurate estimates when using allele frequencies to characterize a population. It is important to note that the absence of genetic evidence for population substructure does not unilaterally constitute evidence of a single panmictic population, as genetic differentiation can be prevented by large population sizes and by migration. PMID:14961233

  7. Sensitivity analyses for clustered data: an illustration from a large-scale clustered randomized controlled trial in education.

    PubMed

    Abe, Yasuyo; Gee, Kevin A

    2014-12-01

    In this paper, we demonstrate the importance of conducting well-thought-out sensitivity analyses for handling clustered data (data in which individuals are grouped into higher order units, such as students in schools) that arise from cluster randomized controlled trials (RCTs). This is particularly relevant given the rise in rigorous impact evaluations that use cluster randomized designs across various fields including education, public health and social welfare. Using data from a recently completed cluster RCT of a school-based teacher professional development program, we demonstrate our use of four commonly applied methods for analyzing clustered data. These methods include: (1) hierarchical linear modeling (HLM); (2) feasible generalized least squares (FGLS); (3) generalized estimating equations (GEE); and (4) ordinary least squares (OLS) regression with cluster-robust (Huber-White) standard errors. We compare our findings across each method, showing how inconsistent results - in terms of both effect sizes and statistical significance - emerged across each method and our analytic approach to resolving such inconsistencies. PMID:25090223

  8. Advanced nuclear magnetic resonance lanthanide probe analyses of short-range conformational interrelations controlling ribonucleic acid structures.

    PubMed

    Yokoyama, S; Inagaki, F; Miyazawa, T

    1981-05-12

    An advanced method was developed for lanthanide-probe analyses of the conformations of flexible biomolecules such as nucleotides. The new method is to determine structure parameters (such as internal-rotation angles) and population parameters for local conformational equilibria of flexible sites, together with standard deviations of these parameters. As the prominent advantage of this method, the interrelations among local conformations of flexible sites may be quantitatively elucidated from the experimental data of lanthanide-induced shifts and relaxations and vicinal coupling constants. As a structural unit of ribonucleic acids, the molecular conformations and conformational equilibria of uridine 3'-monophosphate in aqueous solution were analyzed. The stable local conformers about the C3'-O3' bond are the G+ (phi' = 281 +/- 11 degrees) and G- (phi' = 211 +/- 8 degrees) forms. The internal rotation about the C3'-O3' bond and the ribose-ring puckering are interrelated; 97 +/- 5% of the C3'-endo ribose ring is associated with the G- form while 70 +/- 22% o the C2'-endo ribose ring is associated with the G+ form. An interdependency also exists between the internal rotation about the C4'-C5' bond and the ribose-ring puckering. These short-range conformational interrelations are probably important in controlling the dynamic aspects of ribonucleic acid structures. PMID:6166319

  9. Improving Access to Online Health Information With Conversational Agents: A Randomized Controlled Experiment

    PubMed Central

    2016-01-01

    Background Conventional Web-based search engines may be unusable by individuals with low health literacy for finding health-related information, thus precluding their use by this population. Objective We describe a conversational search engine interface designed to allow individuals with low health and computer literacy identify and learn about clinical trials on the Internet. Methods A randomized trial involving 89 participants compared the conversational search engine interface (n=43) to the existing conventional keyword- and facet-based search engine interface (n=46) for the National Cancer Institute Clinical Trials database. Each participant performed 2 tasks: finding a clinical trial for themselves and finding a trial that met prespecified criteria. Results Results indicated that all participants were more satisfied with the conversational interface based on 7-point self-reported satisfaction ratings (task 1: mean 4.9, SD 1.8 vs mean 3.2, SD 1.8, P<.001; task 2: mean 4.8, SD 1.9 vs mean 3.2, SD 1.7, P<.001) compared to the conventional Web form-based interface. All participants also rated the trials they found as better meeting their search criteria, based on 7-point self-reported scales (task 1: mean 3.7, SD 1.6 vs mean 2.7, SD 1.8, P=.01; task 2: mean 4.8, SD 1.7 vs mean 3.4, SD 1.9, P<.01). Participants with low health literacy failed to find any trials that satisfied the prespecified criteria for task 2 using the conventional search engine interface, whereas 36% (5/14) were successful at this task using the conversational interface (P=.05). Conclusions Conversational agents can be used to improve accessibility to Web-based searches in general and clinical trials in particular, and can help decrease recruitment bias against disadvantaged populations. PMID:26728964

  10. Accessibility control on copper(II) complexes in mesostructured porous silica obtained by direct synthesis using bidentate organosilane ligands.

    PubMed

    Zhou, Wen-Juan; Albela, Belén; Perriat, Pascal; He, Ming-Yuan; Bonneviot, Laurent

    2010-08-17

    The accessibility of metal(II) complexes in 2D hexagonal mesostructured porous silicas obtained by direct synthesis is controlled using an appropriate organosilane ligand. This is exemplified here using copper(II) as a transition metal probe and a neutral or negatively charged ligand: N-(2-aminoethyl)-3-aminopropyltrimethoxysilane, L(A), and, N-salicylaldimine-propylamine-trimethoxysilane, L(B)(-), respectively. L(A) leads to inaccessible complexes located into the pore wall and called "embedded" sites here where silanolate groups from the siliceous network block the access to Cu(II) ions. By contrast, L(B)(-) generates accessible complexes, named "showing-on" sites here. The copper-containing silicas were synthesized with various metal molar ratios (M/SiO(2) = 0.5-3%) in basic media, with cetyltrimethylammonium p-toluenesulfonate (CTATos) as template and with sodium silicate solution as silicon source. A soft template extraction procedure has been developed to preserve the complex integrity of the showing-on copper sites during the treatment. The embedded copper(II) and nickel(II) sites were compared. Materials containing embedded, showing-on, and grafted sites were also compared with regard to pore size, surface polarity, and metal leaching. The material containing showing-on sites was found to be catalytically active for the hydroxylation of phenol into catechol and hydroquinone. Both textural and structural properties of the material and the copper sites were investigated using XRD, TEM, N(2) sorption isotherms, TGA, FT-IR, UV-visible, and EPR spectroscopies. PMID:20695596

  11. Low access to a highly effective therapy: a challenge for international tuberculosis control.

    PubMed Central

    Dye, Christopher; Watt, Catherine J.; Bleed, Daniel

    2002-01-01

    OBJECTIVE: To determine the scale of the tuberculosis (TB) problem facing the international Stop TB Partnership by measuring the gap between present rates of case detection and treatment success, and the global targets (70% and 85%, respectively) to be reached by 2005 under the WHO DOTS strategy. METHODS: We analysed case notifications submitted annually to WHO from up to 202 (of 210) countries and territories between 1980 and 2000, and the results of treatment for patients registered between 1994 and 1999. FINDINGS: Many of the 148 national DOTS programmes in existence by the end of 2000 have shown that they can achieve high treatment success rates, close to or exceeding the target of 85%. However, we estimate that only 27% of all the new smear-positive cases that arose in 2000 were notified under DOTS, and only 19% were successfully treated. The increment in case-finding has been steady at about 133 000 additional smear-positive cases in each year since 1994. In the interval 1999- 2000, more than half of the extra cases notified under DOTS were in Ethiopia, India, Myanmar, the Philippines, and South Africa. CONCLUSION: With the current rate of progress in DOTS expansion, the target of 70% case detection will not be reached until 2013. To reach this target by 2005, DOTS programmes must find an additional 333 000 cases each year. The challenge now is to show that DOTS expansion in the major endemic countries can significantly accelerate case finding while maintaining high cure rates. PMID:12131999

  12. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications

    PubMed Central

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  13. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications.

    PubMed

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  14. Providing open access data online to advance malaria research and control

    PubMed Central

    2013-01-01

    Background To advance research on malaria, the outputs from existing studies and the data that fed into them need to be made freely available. This will ensure new studies can build on the work that has gone before. These data and results also need to be made available to groups who are developing public health policies based on up-to-date evidence. The Malaria Atlas Project (MAP) has collated and geopositioned over 50,000 parasite prevalence and vector occurrence survey records contributed by over 3,000 sources including research groups, government agencies and non-governmental organizations worldwide. This paper describes the results of a project set up to release data gathered, used and generated by MAP. Methods Requests for permission to release data online were sent to 236 groups who had contributed unpublished prevalence (parasite rate) surveys. An online explorer tool was developed so that users can visualize the spatial distribution of the vector and parasite survey data before downloading it. In addition, a consultation group was convened to provide advice on the mode and format of release for data generated by MAP’s modelling work. New software was developed to produce a suite of publication-quality map images for download from the internet for use in external publications. Conclusion More than 40,000 survey records can now be visualized on a set of dynamic maps and downloaded from the MAP website on a free and unrestricted basis. As new data are added and new permissions to release existing data come in, the volume of data available for download will increase. The modelled data output from MAP’s own analyses are also available online in a range of formats, including image files and GIS surface data, for use in advocacy, education, further research and to help parameterize or validate other mathematical models. PMID:23680401

  15. Differences in Causal Estimates from Longitudinal Analyses of Residualized versus Simple Gain Scores: Contrasting Controls for Selection and Regression Artifacts

    ERIC Educational Resources Information Center

    Larzelere, Robert E.; Ferrer, Emilio; Kuhn, Brett R.; Danelia, Ketevan

    2010-01-01

    This study estimates the causal effects of six corrective actions for children's problem behaviors, comparing four types of longitudinal analyses that correct for pre-existing differences in a cohort of 1,464 4- and 5-year-olds from Canadian National Longitudinal Survey of Children and Youth (NLSCY) data. Analyses of residualized gain scores found…

  16. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    PubMed

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems. PMID:22616194

  17. Speaking Two Languages for the Price of One: Bypassing Language Control Mechanisms via Accessibility-Driven Switches.

    PubMed

    Kleinman, Daniel; Gollan, Tamar H

    2016-05-01

    How do bilinguals switch easily between languages in everyday conversation, even though studies have consistently found that switching slows responses? In previous work, researchers have not considered that although switches may happen for different reasons, only some switches-including those typically studied in laboratory experiments-might be costly. Using a repeated picture-naming task, we found that bilinguals can maintain and use two languages as efficiently as a single language, switching between them frequently without any cost, if they switch only when a word is more accessible in the other language. These results suggest that language switch costs arise during lexical selection, that top-down language control mechanisms can be suspended, and that language-mixing efficiency can be strategically increased with instruction. Thus, bilinguals might switch languages spontaneously because doing so is not always costly, and there appears to be greater flexibility and efficiency in the cognitive mechanisms that enable switching than previously assumed. PMID:27016240

  18. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    PubMed Central

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  19. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    PubMed

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  20. Comparison of Estimates between Cohort and Case–Control Studies in Meta-Analyses of Therapeutic Interventions: A Meta-Epidemiological Study

    PubMed Central

    Lanza, Amy; Ravaud, Philippe; Riveros, Carolina; Dechartres, Agnes

    2016-01-01

    Background Observational studies are increasingly being used for assessing therapeutic interventions. Case–control studies are generally considered to have greater risk of bias than cohort studies, but we lack evidence of differences in effect estimates between the 2 study types. We aimed to compare estimates between cohort and case–control studies in meta-analyses of observational studies of therapeutic interventions by using a meta-epidemiological study. Methods We used a random sample of meta-analyses of therapeutic interventions published in 2013 that included both cohort and case–control studies assessing a binary outcome. For each meta-analysis, the ratio of estimates (RE) was calculated by comparing the estimate in case–control studies to that in cohort studies. Then, we used random-effects meta-analysis to estimate a combined RE across meta-analyses. An RE < 1 indicated that case–control studies yielded larger estimates than cohort studies. Results The final analysis included 23 meta-analyses: 138 cohort and 133 case–control studies. Treatment effect estimates did not significantly differ between case–control and cohort studies (combined RE 0.97 [95% CI 0.86–1.09]). Heterogeneity was low, with between–meta-analysis variance τ2 = 0.0049. Estimates did not differ between case–control and prospective or retrospective cohort studies (RE = 1.05 [95% CI 0.96–1.15] and RE = 0.99 [95% CI, 0.83–1.19], respectively). Sensitivity analysis of studies reporting adjusted estimates also revealed no significant difference (RE = 1.03 [95% CI 0.91–1.16]). Heterogeneity was also low for these analyses. Conclusion We found no significant difference in treatment effect estimates between case–control and cohort studies assessing therapeutic interventions. PMID:27159025

  1. Eight New Genomes and Synthetic Controls Increase the Accessibility of Rapid Melt-MAMA SNP Typing of Coxiella burnetii

    PubMed Central

    Byström, Mona; Forsman, Mats; Frangoulidis, Dimitrios; Janse, Ingmar; Larsson, Pär; Lindgren, Petter; Öhrman, Caroline; van Rotterdam, Bart; Sjödin, Andreas; Myrtennäs, Kerstin

    2014-01-01

    The case rate of Q fever in Europe has increased dramatically in recent years, mainly because of an epidemic in the Netherlands in 2009. Consequently, there is a need for more extensive genetic characterization of the disease agent Coxiella burnetii in order to better understand the epidemiology and spread of this disease. Genome reference data are essential for this purpose, but only thirteen genome sequences are currently available. Current methods for typing C. burnetii are criticized for having problems in comparing results across laboratories, require the use of genomic control DNA, and/or rely on markers in highly variable regions. We developed in this work a method for single nucleotide polymorphism (SNP) typing of C. burnetii isolates and tissue samples based on new assays targeting ten phylogenetically stable synonymous canonical SNPs (canSNPs). These canSNPs represent previously known phylogenetic branches and were here identified from sequence comparisons of twenty-one C. burnetii genomes, eight of which were sequenced in this work. Importantly, synthetic control templates were developed, to make the method useful to laboratories lacking genomic control DNA. An analysis of twenty-one C. burnetii genomes confirmed that the species exhibits high sequence identity. Most of its SNPs (7,493/7,559 shared by >1 genome) follow a clonal inheritance pattern and are therefore stable phylogenetic typing markers. The assays were validated using twenty-six genetically diverse C. burnetii isolates and three tissue samples from small ruminants infected during the epidemic in the Netherlands. Each sample was assigned to a clade. Synthetic controls (vector and PCR amplified) gave identical results compared to the corresponding genomic controls and are viable alternatives to genomic DNA. The results from the described method indicate that it could be useful for cheap and rapid disease source tracking at non-specialized laboratories, which requires accurate genotyping

  2. Impact of adolescent sucrose access on cognitive control, recognition memory, and parvalbumin immunoreactivity

    PubMed Central

    Killcross, Simon; Hambly, Luke D.; Morris, Margaret J.; Westbrook, R. Fred

    2015-01-01

    In this study we sought to determine the effect of daily sucrose consumption in young rats on their subsequent performance in tasks that involve the prefrontal cortex and hippocampus. High levels of sugar consumption have been associated with the development of obesity, however less is known about how sugar consumption influences behavioral control and high-order cognitive processes. Of particular concern is the fact that sugar intake is greatest in adolescence, an important neurodevelopmental period. We provided sucrose to rats when they were progressing through puberty and adolescence. Cognitive performance was assessed in adulthood on a task related to executive function, a rodent analog of the Stroop task. We found that sucrose-exposed rats failed to show context-appropriate responding during incongruent stimulus compounds presented at test, indicative of impairments in prefrontal cortex function. Sucrose exposed rats also showed deficits in an on object-in-place recognition memory task, indicating that both prefrontal and hippocampal function was impaired. Analysis of brains showed a reduction in expression of parvalbumin-immunoreactive GABAergic interneurons in the hippocampus and prefrontal cortex, indicating that sucrose consumption during adolescence induced long-term pathology, potentially underpinning the cognitive deficits observed. These results suggest that consumption of high levels of sugar-sweetened beverages by adolescents may also impair neurocognitive functions affecting decision-making and memory, potentially rendering them at risk for developing mental health disorders. PMID:25776039

  3. TRMM On-Orbit Performance Re-Accessed After Control Change

    NASA Technical Reports Server (NTRS)

    Bilanow, Steve

    2006-01-01

    The Tropical Rainfall Measuring Mission (TRMM) spacecraft, a joint mission between the U.S. and Japan, launched onboard an HI1 rocket on November 27,1997 and transitioned in August, 2001 from an average operating altitude of 350 kilometers to 402.5 kilometers. Due to problems using the Earth Sensor Assembly (ESA) at the higher altitude, TRMM switched to a backup attitude control mode. Prior to the orbit boost TRMM controlled pitch and roll to the local vertical using ESA measurements while using gyro data to propagate yaw attitude between yaw updates from the Sun sensors. After the orbit boost, a Kalman filter used 3-axis gyro data with Sun sensor and magnetometers to estimate onboard attitude. While originally intended to meet a degraded attitude accuracy of 0.7 degrees, the new control mode met the original 0.2 degree attitude accuracy requirement after improving onboard ephemeris prediction and adjusting the magnetometer calibration onboard. Independent roll attitude checks using a science instrument, the Precipitation Radar (PR) which was built in Japan, provided a novel insight into the pointing performance. The PR data helped identify the pointing errors after the orbit boost, track the performance improvements, and show subtle effects from ephemeris errors and gyro bias errors. It also helped identify average bias trends throughout the mission. Roll errors tracked by the PR from sample orbits pre-boost and post-boost are shown in Figure 1. Prior to the orbit boost the largest attitude errors were due to occasional interference in the ESA. These errors were sometime larger than 0.2 degrees in pitch and roll, but usually less, as estimated from a comprehensive review of the attitude excursions using gyro data. Sudden jumps in the onboard roll show up as spikes in the reported attitude since the control responds within tens of seconds to null the pointing error. The PR estimated roll tracks well with an estimate of the roll history propagated using gyro data

  4. Achieving fertility control through woman’s autonomy and access to maternal healthcare: Are we on track? In-depth analysis of PDHS-2012-13

    PubMed Central

    Hassan, Sehar-un-Nisa; Siddiqui, Salma; Mahmood, Ayeshah

    2015-01-01

    Background and Objective: Fertility control preferences and maternal healthcare have recently become a major concern for developing nations with evidence suggesting that low fertility control rates and poor maternal healthcare are among major obstructions in ensuring health and social status for women. Our objective was toanalyze the factors that influence women’s autonomy, access to maternal healthcare, and fertility control preferences in Pakistan. Methods: Data consisted of 11,761 ever-married women of ages 15-49 years from PDHS, 2012-13. Variables included socio-demographics, women’s autonomy, fertility control preferences and access to maternal healthcare. Results: Findings from multivariate analysis showed that women’s younger age, having less than three number of children and independent or joint decision-making (indicators of high autonomy) remained the most significant predictors for access to better quality maternal healthcare and better fertility control preferences when other variables were controlled. Conclusion: Women’s access to good quality maternal health care and fertility control preferences are directly and indirectly influenced by their demographic characteristics and decision-making patterns in domestic affairs. PMID:26870096

  5. Use of results of microbiological analyses for risk-based control of Listeria monocytogenes in marinated broiler legs.

    PubMed

    Aarnisalo, Kaarina; Vihavainen, Elina; Rantala, Leila; Maijala, Riitta; Suihko, Maija-Liisa; Hielm, Sebastian; Tuominen, Pirkko; Ranta, Jukka; Raaska, Laura

    2008-02-10

    Microbial risk assessment provides a means of estimating consumer risks associated with food products. The methods can also be applied at the plant level. In this study results of microbiological analyses were used to develop a robust single plant level risk assessment. Furthermore, the prevalence and numbers of Listeria monocytogenes in marinated broiler legs in Finland were estimated. These estimates were based on information on the prevalence, numbers and genotypes of L. monocytogenes in 186 marinated broiler legs from 41 retail stores. The products were from three main Finnish producers, which produce 90% of all marinated broiler legs sold in Finland. The prevalence and numbers of L. monocytogenes were estimated by Monte Carlo simulation using WinBUGS, but the model is applicable to any software featuring standard probability distributions. The estimated mean annual number of L. monocytogenes-positive broiler legs sold in Finland was 7.2x10(6) with a 95% credible interval (CI) 6.7x10(6)-7.7x10(6). That would be 34%+/-1% of the marinated broiler legs sold in Finland. The mean number of L. monocytogenes in marinated broiler legs estimated at the sell-by-date was 2 CFU/g, with a 95% CI of 0-14 CFU/g. Producer-specific L. monocytogenes strains were recovered from the products throughout the year, which emphasizes the importance of characterizing the isolates and identifying strains that may cause problems as part of risk assessment studies. As the levels of L. monocytogenes were low, the risk of acquiring listeriosis from these products proved to be insignificant. Consequently there was no need for a thorough national level risk assessment. However, an approach using worst-case and average point estimates was applied to produce an example of single producer level risk assessment based on limited data. This assessment also indicated that the risk from these products was low. The risk-based approach presented in this work can provide estimation of public health risk

  6. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  7. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  8. Central venous Access device SeCurement And Dressing Effectiveness (CASCADE) in paediatrics: protocol for pilot randomised controlled trials

    PubMed Central

    Gibson, Victoria; Long, Debbie A; Williams, Tara; Hallahan, Andrew; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2016-01-01

    Introduction Paediatric central venous access devices (CVADs) are associated with a 25% incidence of failure. Securement and dressing are strategies used to reduce failure and complication; however, innovative technologies have not been evaluated for their effectiveness across device types. The primary aim of this research is to evaluate the feasibility of launching a full-scale randomised controlled efficacy trial across three CVAD types regarding CVAD securement and dressing, using predefined feasibility criteria. Methods and analysis Three feasibility randomised, controlled trials are to be undertaken at the Royal Children's Hospital and the Lady Cilento Children's Hospital, Brisbane, Australia. CVAD securement and dressing interventions under examination compare current practice with sutureless securement devices, integrated securement dressings and tissue adhesive. In total, 328 paediatric patients requiring a peripherally inserted central catheter (n=100); non-tunnelled CVAD (n=180) and tunnelled CVAD (n=48) to be inserted will be recruited and randomly allocated to CVAD securement and dressing products. Primary outcomes will be study feasibility measured by eligibility, recruitment, retention, attrition, missing data, parent/staff satisfaction and effect size. CVAD failure and complication (catheter-associated bloodstream infection, local infection, venous thrombosis, occlusion, dislodgement and breakage) will be compared between groups. Ethics and dissemination Ethical approval to conduct the research has been obtained. All dissemination will be undertaken using the CONSORT Statement recommendations. Additionally, the results will be sent to the relevant organisations which lead CVAD focused clinical practice guidelines development. Trial registration numbers ACTRN12614001327673; ACTRN12615000977572; ACTRN12614000280606. PMID:27259529

  9. Sustained attention in mice: expanding the translational utility of the SAT by incorporating the Michigan Controlled Access Response Port (MICARP).

    PubMed

    St Peters, Megan; Cherian, Ajeesh Koshy; Bradshaw, Marc; Sarter, Martin

    2011-12-01

    Advances in mouse genetic technology have spurred increasing interest in the development of cognitive tasks for mice. Here, we describe and discuss the modifications necessary to adapt a task for the assessment of sustained attention performance for use in mice, including for taxing the top-down control of such performance. The validity of the Sustained Attention Task (SAT), including the distractor version (dSAT), has previously been demonstrated in rats and humans. This task requires moveable or retractable operanda; insertion of operanda into the operant chambers cues animals to respond to a prior signal or non-signal event, reporting either a hit or a miss, or a correct rejection or false alarm, respectively. Retractable levers did not support sufficiently high and stable levels of performance in mice. Given the widespread use of static nose-poke devices for testing operant performance in mice, we therefore designed and fabricated a retractable nose-poke device. As this device extends into chambers, a hole for nose-poking is slowly opened and closed again as the device retracts (termed the "Michigan Controlled Access Response Port", MICARP). Results describe the effects of variation of signal duration and event rate, trial outcome and trial type probability, effects of mice deprivation levels, and the reliability of SAT and dSAT performance. Mice perform the SAT and dSAT at levels comparable to those observed in rats. This task will be of assistance in expanding the translational usefulness of the SAT and dSAT. PMID:21888929

  10. Fine Mapping and Characterization of Candidate Genes that Control Resistance to Cercospora sojina K. Hara in Two Soybean Germplasm Accessions

    PubMed Central

    Pham, Anh-Tung; Harris, Donna K.; Buck, James; Hoskins, Aaron; Serrano, Jonathan; Abdel-Haleem, Hussein; Cregan, Perry; Song, Qijian; Boerma, H. Roger; Li, Zenglu

    2015-01-01

    Frogeye leaf spot (FLS), caused by the fungus Cercospora sojina K. Hara, may cause a significant yield loss to soybean growers in regions with a warm and humid climate. Two soybean accessions, PI 594891 and PI 594774, were identified to carry a high level of resistance similar to that conditioned by the Rcs3 gene in 'Davis'. Previously, we reported that the resistance to FLS in these two plant introductions (PIs) was controlled by a novel gene (s) on chromosome 13 that is different from Rcs3. To fine-map the novel FLS resistance gene(s) in these two PIs, F2: 3 seeds from the crosses between PI 594891 and PI 594774, and the FLS susceptible genotype 'Blackhawk' were genotyped with SNP markers that were designed based on the SoySNP50k iSelect BeadChip data to identify recombinant events and locate candidate genes. Analysis of lines possessing key recombination events helped narrow down the FLS-resistance genomic region in PI 594891 from 3.3 Mb to a 72.6 kb region with five annotated genes. The resistance gene in PI 594774 was fine-mapped into a 540 kb region that encompasses the 72.6 kb region found in PI 594891. Sequencing five candidate genes in PI 594891 identified three genes that have several mutations in the promoter, intron, 5', and 3' UTR regions. qPCR analysis showed a difference in expression levels of these genes in both lines compared to Blackhawk in the presence of C. sojina. Based on phenotype, genotype and haplotype analysis results, these two soybean accessions might carry different resistance alleles of the same gene or two different gene(s). The identified SNPs were used to develop Kompetitive Allele Specific PCR (KASP) assays to detect the resistance alleles on chromosome 13 from the two PIs for marker-assisted selection. PMID:25993056

  11. Access to a polymerase chain reaction assay method targeting 13 respiratory viruses can reduce antibiotics: a randomised, controlled trial

    PubMed Central

    2011-01-01

    Background Viral respiratory infections are common worldwide and range from completely benign disease to life-threatening illness. Symptoms can be unspecific, and an etiologic diagnosis is rarely established because of a lack of suitable diagnostic tools. Improper use of antibiotics is common in this setting, which is detrimental in light of the development of bacterial resistance. It has been suggested that the use of diagnostic tests could reduce antibiotic prescription rates. The objective of this study was to evaluate whether access to a multiplex polymerase chain reaction (PCR) assay panel for etiologic diagnosis of acute respiratory tract infections (ARTIs) would have an impact on antibiotic prescription rate in primary care clinical settings. Methods Adult patients with symptoms of ARTI were prospectively included. Nasopharyngeal and throat swabs were analysed by using a multiplex real-time PCR method targeting thirteen viruses and two bacteria. Patients were recruited at 12 outpatient units from October 2006 through April 2009, and samples were collected on the day of inclusion (initial visit) and after 10 days (follow-up visit). Patients were randomised in an open-label treatment protocol to receive a rapid or delayed result (on the following day or after eight to twelve days). The primary outcome measure was the antibiotic prescription rate at the initial visit, and the secondary outcome was the total antibiotic prescription rate during the study period. Results A total sample of 447 patients was randomised. Forty-one were excluded, leaving 406 patients for analysis. In the group of patients randomised for a rapid result, 4.5% (9 of 202) of patients received antibiotics at the initial visit, compared to 12.3% (25 of 204) (P = 0.005) of patients in the delayed result group. At follow-up, there was no significant difference between the groups: 13.9% (28 of 202) in the rapid result group and 17.2% (35 of 204) in the delayed result group (P = 0

  12. Increasing access to care for sick newborns: evidence from the Ghana Newhints cluster-randomised controlled trial

    PubMed Central

    Manu, Alexander; Hill, Zelee; ten Asbroek, Augustinus HA; Soremekun, Seyi; Weobong, Benedict; Gyan, Thomas; Tawiah-Agyemang, Charlotte; Danso, Samuel; Amenga-Etego, Seeba; Owusu-Agyei, Seth; Kirkwood, Betty R

    2016-01-01

    Objectives To evaluate the impact of Newhints community-based surveillance volunteer (CBSV) assessments and referrals on access to care for sick newborns and on existing inequities in access. Design We evaluated a prospective cohort nested within the Newhints cluster-randomised controlled trial. Setting Community-based intervention involving more than 750 000, predominantly rural, population in seven contiguous districts in the Brong-Ahafo Region, Ghana. Participants Participants were recently delivered women (from more than 120 000 women under surveillance) and their 16 168 liveborn babies. Qualitative in-depth interviews with referral narratives (IDIs) were conducted with 92 mothers, CBSVs and health facility front-desk and maternity/paediatrics ward staff. Interventions Newhints trained and effectively supervised 475 CBSVs (existing within the Ghana Health Service) in 49 of 98 supervisory zones (clusters) to assess and refer newborns with any of the 10-key-danger signs to health facilities within the first week after birth; promote independent care seeking for sick newborns and problem-solve around barriers between November 2008 and December 2009. Primary outcomes The main evaluation outcomes were rates of compliance with referrals and independent care seeking for newborn illnesses. Results Of 4006 sampled, 2795 (69.8%) recently delivered women received CBSV assessment visits and 279 (10.0%) newborns were referred with danger signs. Compliance with referrals was unprecedentedly high (86.0%) with women in the poorest quintile (Q1) complying better than the least poor (Q5):87.5%(Q1) vs 69.7%(Q5); p=0.038. Three-quarters went to hospitals; 18% were admitted and 58% received outpatient treatment. Some (24%) mothers were turned away at facilities and follow-on IDIs showed that some of these untreated babies subsequently died. Independent care seeking for severe newborn illness increased from 55.4% in control to 77.3% in Newhints zones, especially among Q1 where

  13. Flight Services and Aircraft Access: Active Flow Control Vertical Tail and Insect Accretion and Mitigation Flight Test

    NASA Technical Reports Server (NTRS)

    Whalen, Edward A.

    2016-01-01

    This document serves as the final report for the Flight Services and Aircraft Access task order NNL14AA57T as part of NASA Environmentally Responsible Aviation (ERA) Project ITD12A+. It includes descriptions of flight test preparations and execution for the Active Flow Control (AFC) Vertical Tail and Insect Accretion and Mitigation (IAM) experiments conducted on the 757 ecoDemonstrator. For the AFC Vertical Tail, this is the culmination of efforts under two task orders. The task order was managed by Boeing Research & Technology and executed by an enterprise-wide Boeing team that included Boeing Research & Technology, Boeing Commercial Airplanes, Boeing Defense and Space and Boeing Test and Evaluation. Boeing BR&T in St. Louis was responsible for overall Boeing project management and coordination with NASA. The 757 flight test asset was provided and managed by the BCA ecoDemonstrator Program, in partnership with Stifel Aircraft Leasing and the TUI Group. With this report, all of the required deliverables related to management of this task order have been met and delivered to NASA as summarized in Table 1. In addition, this task order is part of a broader collaboration between NASA and Boeing.

  14. Multigenic Control of Pod Shattering Resistance in Chinese Rapeseed Germplasm Revealed by Genome-Wide Association and Linkage Analyses

    PubMed Central

    Liu, Jia; Wang, Jun; Wang, Hui; Wang, Wenxiang; Zhou, Rijin; Mei, Desheng; Cheng, Hongtao; Yang, Juan; Raman, Harsh; Hu, Qiong

    2016-01-01

    The majority of rapeseed cultivars shatter seeds upon maturity especially under hot-dry and windy conditions, reducing yield and gross margin return to growers. Here, we identified quantitative trait loci (QTL) for resistance to pod shatter in an unstructured diverse panel of 143 rapeseed accessions, and two structured populations derived from bi-parental doubled haploid (DH) and inter-mated (IF2) crosses derived from R1 (resistant to pod shattering) and R2 (prone to pod shattering) accessions. Genome-wide association analysis identified six significant QTL for resistance to pod shatter located on chromosomes A01, A06, A07, A09, C02, and C05. Two of the QTL, qSRI.A09 delimited with the SNP marker Bn-A09-p30171993 (A09) and qSRI.A06 delimited with the SNP marker Bn-A06-p115948 (A06) could be repeatedly detected across environments in a diversity panel, DH and IF2 populations, suggesting that at least two loci on chromosomes A06 and A09 were the main contributors to pod shatter resistance in Chinese germplasm. Significant SNP markers identified in this study especially those that appeared repeatedly across environments provide a cost-effective and an efficient method for introgression and pyramiding of favorable alleles for pod shatter resistance via marker-assisted selection in rapeseed improvement programs. PMID:27493651

  15. Multigenic Control of Pod Shattering Resistance in Chinese Rapeseed Germplasm Revealed by Genome-Wide Association and Linkage Analyses.

    PubMed

    Liu, Jia; Wang, Jun; Wang, Hui; Wang, Wenxiang; Zhou, Rijin; Mei, Desheng; Cheng, Hongtao; Yang, Juan; Raman, Harsh; Hu, Qiong

    2016-01-01

    The majority of rapeseed cultivars shatter seeds upon maturity especially under hot-dry and windy conditions, reducing yield and gross margin return to growers. Here, we identified quantitative trait loci (QTL) for resistance to pod shatter in an unstructured diverse panel of 143 rapeseed accessions, and two structured populations derived from bi-parental doubled haploid (DH) and inter-mated (IF2) crosses derived from R1 (resistant to pod shattering) and R2 (prone to pod shattering) accessions. Genome-wide association analysis identified six significant QTL for resistance to pod shatter located on chromosomes A01, A06, A07, A09, C02, and C05. Two of the QTL, qSRI.A09 delimited with the SNP marker Bn-A09-p30171993 (A09) and qSRI.A06 delimited with the SNP marker Bn-A06-p115948 (A06) could be repeatedly detected across environments in a diversity panel, DH and IF2 populations, suggesting that at least two loci on chromosomes A06 and A09 were the main contributors to pod shatter resistance in Chinese germplasm. Significant SNP markers identified in this study especially those that appeared repeatedly across environments provide a cost-effective and an efficient method for introgression and pyramiding of favorable alleles for pod shatter resistance via marker-assisted selection in rapeseed improvement programs. PMID:27493651

  16. Energy-Efficiency Analysis of a Distributed Queuing Medium Access Control Protocol for Biomedical Wireless Sensor Networks in Saturation Conditions

    PubMed Central

    Otal, Begonya; Alonso, Luis; Verikoukis, Christos

    2011-01-01

    The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC) protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs). The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors’ energy consumption in order to prolong sensors’ battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions). In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs), which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ) MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead. PMID:22319351

  17. Sustained attention in mice: expanding the translational utility of the SAT by incorporating the Michigan Controlled Access Response Port (MICARP)

    PubMed Central

    St. Peters, Megan; Cherian, Ajeesh Koshy; Bradshaw, Marc; Sarter, Martin

    2011-01-01

    Advances in mouse genetic technology have spurred increasing interest in the development of cognitive tasks for mice. Here, we describe and discuss the modifications necessary to adapt a task for the assessment of sustained attention performance for use in mice, including for taxing the top-down control of such performance. The validity of the Sustained Attention Task (SAT), including the distractor version (dSAT), have previously been demonstrated in rats and humans. This task requires moveable or retractable operanda; insertion of operanda into the operant chambers cues animals to respond to a prior signal or non-signal event, reporting either a hit or a miss, or a correct rejection or false alarm, respectively. Retractable levers did not support sufficiently high and stable levels of performance in mice. Given the widespread use of static nose-poke devices for testing operant performance in mice, we therefore designed and fabricated a retractable nose-poke device. As this device extends into chambers, a hole for nose-poking is slowly opened and closed again as the device retracts (termed the “Michigan Controlled Access Response Port”; MICARP). Results describe the effects of variation of signal duration and event rate, trial outcome and trial type probability, effects of mice deprivation levels, and the reliability of SAT and dSAT performance. Mice perform the SAT and dSAT at levels comparable to those observed in rats. This task will be of assistance in expanding the translational usefulness of the SAT and dSAT. PMID:21888929

  18. Timing of access to secondary healthcare services and lower extremity amputations in patients with diabetes: a case–control study

    PubMed Central

    Buckley, Claire M; Ali, Fauzi; Roberts, Graham A; Kearney, Patricia M; Perry, Ivan J; Bradley, Colin P

    2015-01-01

    Objective To investigate the association between timing of patient access to secondary healthcare services for diabetes management and lower extremity amputation (LEA) among patients with diabetes. Research design and methods A case–control study was conducted in the secondary healthcare system in Ireland. Cases were 116 patients with diabetes who underwent a first major non-traumatic LEA between 2006 and 2012. Controls were 348 patients with diabetes, over 45 years, admitted to the same hospital as an emergency or electively, frequency-matched for gender, type of diabetes, and year. Data were collected for 7 years prior to the event year. ORs for LEA in patients with diabetes comparing early versus late referral from primary to secondary healthcare were calculated. Results Statistically significant risk factors associated with LEA in patients with diabetes included being single, chronic kidney disease, hypertension, and hyperglycemia. Documented retinopathy was a significant protective factor. In unconditional logistic regression analysis adjusted for potential confounders, there was no evidence of a reduced risk of LEA among patients referred earlier to secondary healthcare for diabetes management. Conclusions Specialist referral may need to occur earlier than the 7-year cut-off used to demonstrate an effect on reducing LEA risk. Documented retinopathy was associated with reduced risk of LEA, most likely as a proxy for better self-care. Variation in the management of diabetes in primary care may also be impacting on outcomes. Efforts to develop more integrated care between primary and secondary services may be beneficial, rather than focusing on timing of referral to secondary healthcare. PMID:26336607

  19. A program for mass spectrometer control and data processing analyses in isotope geology; written in BASIC for an 8K Nova 1120 computer

    USGS Publications Warehouse

    Stacey, J.S.; Hope, J.

    1975-01-01

    A system is described which uses a minicomputer to control a surface ionization mass spectrometer in the peak switching mode, with the object of computing isotopic abundance ratios of elements of geologic interest. The program uses the BASIC language and is sufficiently flexible to be used for multiblock analyses of any spectrum containing from two to five peaks. In the case of strontium analyses, ratios are corrected for rubidium content and normalized for mass spectrometer fractionation. Although almost any minicomputer would be suitable, the model used was the Data General Nova 1210 with 8K memory. Assembly language driver program and interface hardware-descriptions for the Nova 1210 are included.

  20. Single-Cell Analyses of ESCs Reveal Alternative Pluripotent Cell States and Molecular Mechanisms that Control Self-Renewal

    PubMed Central

    Papatsenko, Dmitri; Darr, Henia; Kulakovskiy, Ivan V.; Waghray, Avinash; Makeev, Vsevolod J.; MacArthur, Ben D.; Lemischka, Ihor R.

    2015-01-01

    Summary Analyses of gene expression in single mouse embryonic stem cells (mESCs) cultured in serum and LIF revealed the presence of two distinct cell subpopulations with individual gene expression signatures. Comparisons with published data revealed that cells in the first subpopulation are phenotypically similar to cells isolated from the inner cell mass (ICM). In contrast, cells in the second subpopulation appear to be more mature. Pluripotency Gene Regulatory Network (PGRN) reconstruction based on single-cell data and published data suggested antagonistic roles for Oct4 and Nanog in the maintenance of pluripotency states. Integrated analyses of published genomic binding (ChIP) data strongly supported this observation. Certain target genes alternatively regulated by OCT4 and NANOG, such as Sall4 and Zscan10, feed back into the top hierarchical regulator Oct4. Analyses of such incoherent feedforward loops with feedback (iFFL-FB) suggest a dynamic model for the maintenance of mESC pluripotency and self-renewal. PMID:26267829

  1. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 4: Update to Books 1, 2, and 3.

    ERIC Educational Resources Information Center

    Borden, Peter A., Ed.; Vanderheiden, Gregg C., Ed.

    This update to the three-volume first edition of the "Rehab/Education ResourceBook Series" describes special software and products pertaining to communication, control, and computer access, designed specifically for the needs of disabled and elderly people. The 22 chapters cover: speech aids; pointing and typing aids; training and communication…

  2. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    PubMed Central

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  3. Improving access to shared decision-making for Hispanics/Latinos with inadequately controlled type 2 diabetes mellitus

    PubMed Central

    Davidson, Jaime A; Rosales, Aracely; Shillington, Alicia C; Bailey, Robert A; Kabir, Chris; Umpierrez, Guillermo E

    2015-01-01

    Purpose To describe the cultural and linguistic adaptation and Spanish translation of an English-language patient decision aid (PDA) for use in supporting shared decision-making in Hispanics/Latinos with type 2 diabetes mellitus (T2DM), a group at a high risk for complications. Patients and methods A steering committee of endocrinologists, a primary care physician, a certified diabetes educator, and a dietician, each with extensive experience in providing care to Hispanics/Latinos was convened to assess a PDA developed for English-speaking patients with T2DM. English content was reviewed for cultural sensitivity and appropriateness for a Hispanic/Latino population. A consensus-building process and iterative version edits incorporated clinician perspectives. The content was adapted to be consistent with traditional Hispanic/Latino cultural communication precepts (eg, avoidance of hostile confrontation; value for warm interaction; respect for authority; value of family support for decisions). The PDA was translated by native-speaking individuals with diabetes expertise. Results The PDA underwent testing during cognitive interviews with ten Spanish-speaking Hispanics/Latinos with T2DM to ensure that the content is reflective of the experience, understanding, and language Hispanic/Latino patients use to describe diabetes and treatment. Content edits were made to assure a literacy level appropriate to the audience, and the PDA was produced for online video dissemination. Conclusion High-quality, well-developed tools to facilitate shared decision-making in populations with limited access to culturally sensitive information can narrow gaps and align care with individual patient preferences. A newly developed PDA is available for shared decision-making that provides culturally appropriate treatment information for inadequately controlled Hispanics/Latinos with T2DM. The impact on the overall health of patients and care management of T2DM requires further study. PMID

  4. Structural control on epithermal mineralization in the Troud-Chah Shirin belt using point pattern and Fry analyses, north of Iran

    NASA Astrophysics Data System (ADS)

    Mehrabi, B.; Ghasemi, S. M.; Tale, F. E.

    2015-07-01

    The Troud-Chah Shirin belt, located in the Alborz magmatic belt, is one of several mineralized belt in Iran. Ore mineralization in this belt is controlled by faults and fractures. The spatial distribution of mineralization is the foremost concern in regional exploration and it could be considered as a very important tool in the investigation of mineral deposits. In this study, we use point pattern and Fry analyses to known occurrences and distribution of epithermal mineral deposits, and results show that structural controls play the major role in distribution of these ore deposits. A mechanism of structural controls on epithermal mineralization, which is involves a more-or-less regular T fractures of extension faults/fractures at and/or around intersections of F1 and F2 trending strike-slip faults/fractures. Spatial data and structural controls can apply for future exploration, for possibly undiscovered occurrences of epithermal ore deposits.

  5. Acceptance and commitment therapy - Do we know enough? Cumulative and sequential meta-analyses of randomized controlled trials.

    PubMed

    Hacker, Thomas; Stone, Paul; MacBeth, Angus

    2016-01-15

    Acceptance and Commitment Therapy (ACT) has accrued a substantial evidence base. Recent systematic and meta-analytic reviews suggest that ACT is effective compared to control conditions. However, these reviews appraise the efficacy of ACT across a broad range of presenting problems, rather than addressing specific common mental health difficulties. Focussing on depression and anxiety we performed a meta-analysis of trials of ACT. We incorporated sequential meta-analysis (SMA) techniques to critically appraise the sufficiency of the existing evidence base. Findings suggest that ACT demonstrates at least moderate group and pre-post effects for symptom reductions for both anxiety and depression. However using SMA findings are more qualified. There is currently insufficient evidence to confidently conclude that ACT for anxiety is efficacious when compared to active control conditions or as primary treatment for anxiety. Similarly, using SMA, there is currently insufficient evidence to suggest a moderate efficacy of ACT for depression compared to active control conditions. To stimulate further research we offer specific estimates of additional numbers of participants required to reach sufficiency to help inform future studies. We also discuss the appropriate strategies for future research into ACT for anxiety given the current evidence suggests no differential efficacy of ACT in the treatment of anxiety compared to active control conditions. PMID:26571105

  6. Mutuality Meets the Market: Analysing Changes in the Control of Quality Assurance in United Kingdom Higher Education 1992-2012

    ERIC Educational Resources Information Center

    Brown, Roger

    2013-01-01

    There has been a tendency in the literature to see changes in quality assurance as part of a process of increased state control. This article suggests a more nuanced approach that also takes account of the different trajectories of the pre- and post-1992 sectors. It finds that whilst there have been increases in both state oversight and market…

  7. Combining case-control and case-trio data from the same population in genetic association analyses: overview of approaches and illustration with a candidate gene study.

    PubMed

    Infante-Rivard, Claire; Mirea, Lucia; Bull, Shelley B

    2009-09-01

    In genetic association studies, investigators compare allele or genotype frequencies in unrelated case and control subjects or examine preferential allele transmissions from parents to affected offspring. In many genetic case-control studies, the collection of DNA material extends to relatives such as parents of cases. Thus, case-control and case-parent trio association analyses are possible. Whereas the goal of collecting genetic information from family members in a study initially designed as a case-control study is to enrich the genetic analysis, increase power, or address concern about population structure bias, methods of combining genetic data from unrelated case and control subjects with genetic trio data from the same study population are not well known. A number of hybrid approaches have been developed that utilize such data together. In this paper, the authors describe key features of genetic case-control and case-parent trio studies and review commonly used methods of genetic analysis for case-parent trio designs. In addition, they provide a pragmatic review of statistical methods and available software for existing hybrid approaches that combine various components of case-control and genetic trio data. The application of all methods is illustrated using a candidate gene study of childhood leukemia that included case-control subjects and their parents. PMID:19635737

  8. Cryogenic propellant thermal control system design considerations, analyses, and concepts applied to a Mars human exploration mission

    NASA Technical Reports Server (NTRS)

    Plachta, David W.; Tucker, Stephen; Hoffman, David J.

    1993-01-01

    This paper analyzes, defines, and sizes cryogenic storage thermal control systems that meet the requirements of future NASA Mars human exploration missions. The design issues of this system include the projection of the existing Multilayer Insulation data base for cryogenic storage to much thicker (10 cm or more) insulation systems, the unknown heat leak from mechanical interfaces, and the thermal and structural performance effects of the large tank sizes required for a Mars mission. Acknowledging these unknown effects, heat loss projections are made based on extrapolation of the existing data base. The results indicate that hydrogen, methane, and oxygen are feasible propellants, and that the best suited thermal control sytems are 'thick' MLI, thermodynamic vent sytems, cryocoolers, and vacuum jackets.

  9. Historical Data Analyses and Scientific Knowledge Suggest Complete Removal of the Abnormal Toxicity Test as a Quality Control Test

    PubMed Central

    Garbe, Joerg H O; Ausborn, Susanne; Beggs, Claire; Bopst, Martin; Joos, Angelika; Kitashova, Alexandra A; Kovbasenco, OLga; Schiller, Claus-Dieter; Schwinger, Martina; Semenova, Natalia; Smirnova, Lilia; Stodart, Fraser; Visalli, Thomas; Vromans, Lisette

    2014-01-01

    In the early 1900s, the abnormal toxicity test (ATT) was developed as an auxiliary means to ensure safe and consistent antiserum production. Today, the ATT is utilized as a quality control (QC) release test according to pharmacopoeial or other regulatory requirements. The study design has not been changed since around 1940. The evidence of abnormal toxicity testing as a prediction for harmful batches is highly questionable and lacks a scientific rationale. Numerous reviews of historical ATT results have revealed that no reliable conclusions can be drawn from this QC measure. Modern pharmaceutical manufacturers have thorough control of the manufacturing process and comply with good manufacturing practice rules. Contaminants are appropriately controlled by complying with the validated manufacturing processes and strict QC batch release confirming batch-to-batch consistency. Recognizing that product safety, efficacy, and stability can be ensured with strict QC measures, nowadays most regulatory authorities do not require the ATT for most product classes. In line with the replacement, reduction, and refinement (3Rs) initiative, the test requirement has been deleted from approximately 80 monographs of the European Pharmacopoeia and for the majority of product classes in the United States. For these reasons, it is recommended that the ATT should be consistently omitted world-wide and be removed from pharmacopoeias and other regulatory requirements. PMID:25209378

  10. Historical data analyses and scientific knowledge suggest complete removal of the abnormal toxicity test as a quality control test.

    PubMed

    Garbe, Joerg H O; Ausborn, Susanne; Beggs, Claire; Bopst, Martin; Joos, Angelika; Kitashova, Alexandra A; Kovbasenco, Olga; Schiller, Claus-Dieter; Schwinger, Martina; Semenova, Natalia; Smirnova, Lilia; Stodart, Fraser; Visalli, Thomas; Vromans, Lisette

    2014-11-01

    In the early 1900s, the abnormal toxicity test (ATT) was developed as an auxiliary means to ensure safe and consistent antiserum production. Today, the ATT is utilized as a quality control (QC) release test according to pharmacopoeial or other regulatory requirements. The study design has not been changed since around 1940. The evidence of abnormal toxicity testing as a prediction for harmful batches is highly questionable and lacks a scientific rationale. Numerous reviews of historical ATT results have revealed that no reliable conclusions can be drawn from this QC measure. Modern pharmaceutical manufacturers have thorough control of the manufacturing process and comply with good manufacturing practice rules. Contaminants are appropriately controlled by complying with the validated manufacturing processes and strict QC batch release confirming batch-to-batch consistency. Recognizing that product safety, efficacy, and stability can be ensured with strict QC measures, nowadays most regulatory authorities do not require the ATT for most product classes. In line with the replacement, reduction, and refinement (3Rs) initiative, the test requirement has been deleted from approximately 80 monographs of the European Pharmacopoeia and for the majority of product classes in the United States. For these reasons, it is recommended that the ATT should be consistently omitted world-wide and be removed from pharmacopoeias and other regulatory requirements. PMID:25209378

  11. Conceptual framework for analysing farm-specific economic effects of helminth infections in ruminants and control strategies.

    PubMed

    van der Voort, Mariska; Charlier, Johannes; Lauwers, Ludwig; Vercruysse, Jozef; Van Huylenbroeck, Guido; Van Meensel, Jef

    2013-05-01

    Helminth infections are considered to be an important constraint on livestock productivity worldwide. The economic impact of these infections or their control strategies has traditionally been assessed by their effect on animal performance indicators or traditional economic calculation methods (e.g. budgeting and cost-benefit analysis). Because the impact of helminth infections has become more subtle and is farm-specific, one needs more refined economic evaluations of actions meant to increase or maintain the health of livestock on individual farms. This paper proposes an interdisciplinary framework that combines the developments in the veterinary control of helminth infections with economic performance measurements to identify farm-specific and profitable anthelmintic management decisions. Our framework positions individual farms' performance against performance benchmarks and is based on the farms' efficiency in transforming input(s) into output(s). We show how this positioning makes it possible to establish a linkage between input and output transformation, helminth infection levels and effects of control strategies. Furthermore, the framework allows for the identification of improvement paths that are not necessarily related to the helminth infection, but which may lead to other management improvements. We discuss the epidemiological information required and which complementary methods (e.g. efficiency analysis and budgeting techniques) can be used to make the framework operational. PMID:23219140

  12. RAPID-L Highly Automated Fast Reactor Concept Without Any Control Rods (1) Reactor concept and plant dynamics analyses

    SciTech Connect

    Kambe, Mitsuru; Tsunoda, Hirokazu; Mishima, Kaichiro; Iwamura, Takamichi

    2002-07-01

    The 200 kWe uranium-nitride fueled lithium cooled fast reactor concept 'RAPID-L' to achieve highly automated reactor operation has been demonstrated. RAPID-L is designed for Lunar base power system. It is one of the variants of RAPID (Refueling by All Pins Integrated Design), fast reactor concept, which enable quick and simplified refueling. The essential feature of RAPID concept is that the reactor core consists of an integrated fuel assembly instead of conventional fuel subassemblies. In this small size reactor core, 2700 fuel pins are integrated altogether and encased in a fuel cartridge. Refueling is conducted by replacing a fuel cartridge. The reactor can be operated without refueling for up to 10 years. Unique challenges in reactivity control systems design have been attempted in RAPID-L concept. The reactor has no control rod, but involves the following innovative reactivity control systems: Lithium Expansion Modules (LEM) for inherent reactivity feedback, Lithium Injection Modules (LIM) for inherent ultimate shutdown, and Lithium Release Modules (LRM) for automated reactor startup. All these systems adopt lithium-6 as a liquid poison instead of B{sub 4}C rods. In combination with LEMs, LIMs and LRMs, RAPID-L can be operated without operator. This is the first reactor concept ever established in the world. This reactor concept is also applicable to the terrestrial fast reactors. In this paper, RAPID-L reactor concept and its transient characteristics are presented. (authors)

  13. Social determinants of equity in access to healthcare for tuberculosis patients in Republic of Macedonia – results from a case-control study

    PubMed Central

    Gudeva Nikovska, Dance; Tozija, Fimka

    2014-01-01

    Background: Health is a complex phenomenon and equity as a basic human right an integral part of constitutions in almost all countries in the world. In Republic of Macedonia (RM), Tuberculosis (TB) is clustered regionally and in certain ethnic groups. The main objective of this study was to analyze Social Determinants of Health (SDH) and equity in access to healthcare services for TB patients in RM, aimed at complex analysis of factors that cause inequities. Methods: Case-control study was conducted in the period March–December, 2013; "cases" are households of TB patients registered in the period July, 2012–June, 2013 and controls are households with no TB patients in their immediate vicinity. World Health Organization (WHO) World Health Survey questionnaire was used to collect data. Results: Analysis of SDH of TB patients shows that patients are mostly males, of lower socio-economic status, are less educated, unemployed and TB is clustered in certain ethnic groups. Analysis of access has identified these determinants as important barriers in access to health services. Conclusion: The study has documented the basic SDH of TB patients in RM, as well as barriers in access to healthcare, providing useful baseline information to facilitate determination where to concentrate future efforts. PMID:25279382

  14. Sociopolitical Analyses.

    ERIC Educational Resources Information Center

    Van Galen, Jane, Ed.; And Others

    1992-01-01

    This theme issue of the serial "Educational Foundations" contains four articles devoted to the topic of "Sociopolitical Analyses." In "An Interview with Peter L. McLaren," Mary Leach presented the views of Peter L. McLaren on topics of local and national discourses, values, and the politics of difference. Landon E. Beyer's "Educational Studies and…

  15. Numerical analyses of passive and active flow control over a micro air vehicle with an optimized airfoil

    NASA Astrophysics Data System (ADS)

    Gada, Komal Kantilal

    Numerical investigations of an optimized thin airfoil with a passive and an active flow control device (riblets and rotary cylinder) have been performed. The objectives of the thesis were to investigate the tip vortices reduction using riblets and decrease in flow separation, using a rotary cylinder for improved lift-to-drag ratio. The investigations has application potentials in improving performances of Micro Air Vehicles (MAVs). The airfoil has a chord length of 19.66 cm and a span of 25 cm. with the free stream mean velocity was set at 20 m/s. The Reynolds number was calculated as 3 x 10 4. Investigations with base model of the airfoil have shown flow separation at approximately 85% chord length at an angle of attack of 17 degrees. For investigation using passive flow control device, i.e. riblets, investigations were performed for different radial sizes but at a fixed location. It was found that with 1 mm radial size riblet, the tip vortices were reduced by approximately 95%, as compared to the baseline model. Although negligible lift-to-drag improvement was seen, a faster dissipation rate in turbulent kinetic energy was observed. Furthermore, investigations were carried out using the active flow control device. The rotary cylinder with a 0.51 cm in diameter was placed slightly downstream of the location of flow separation, i.e. at x/c = 0.848. Investigations were performed at different cylinder's rotations, corresponding to different tangential velocities of being higher than, equal to and less than the free stream mean velocity. Results have shown approximately 10% improvement in lift to drag ratio when the tangential velocity is near the free stream mean velocity. Further investigation may include usage of the riblets and the rotary cylinder combined, to increase the stability as well as the lift-to-drag ratio of the MAVs.

  16. INCORPORATION OF HUMAN FACTORS ENGINEERING ANALYSES AND TOOLS INTO THE DESIGN PROCESS FOR DIGITAL CONTROL ROOM UPGRADES.

    SciTech Connect

    O'HARA,J.M.; BROWN,W.

    2004-09-19

    Many nuclear power plants are modernizing with digital instrumentation and control systems and computer-based human-system interfaces (HSIs). The purpose of this paper is to summarize the human factors engineering (HFE) activities that can help to ensure that the design meets personnel needs. HFE activities should be integrated into the design process as a regular part of the engineering effort of a plant modification. The HFE activities will help ensure that human performance issues are addressed, that new technology supports task performance, and that the HSIs are designed in a manner that is compatible with human physiological, cognitive and social characteristics.

  17. Exploring the physical controls of regional patterns of flow duration curves - Part 1: Insights from statistical analyses

    NASA Astrophysics Data System (ADS)

    Cheng, L.; Yaeger, M.; Viglione, A.; Coopersmith, E.; Ye, S.; Sivapalan, M.

    2012-11-01

    The flow duration curve (FDC) is a classical method used to graphically represent the relationship between the frequency and magnitude of streamflow. In this sense it represents a compact signature of temporal runoff variability that can also be used to diagnose catchment rainfall-runoff responses, including similarity and differences between catchments. This paper is aimed at extracting regional patterns of the FDCs from observed daily flow data and elucidating the physical controls underlying these patterns, as a way to aid towards their regionalization and predictions in ungauged basins. The FDCs of total runoff (TFDC) using multi-decadal streamflow records for 197 catchments across the continental United States are separated into the FDCs of two runoff components, i.e., fast flow (FFDC) and slow flow (SFDC). In order to compactly display these regional patterns, the 3-parameter mixed gamma distribution is employed to characterize the shapes of the normalized FDCs (i.e., TFDC, FFDC and SFDC) over the entire data record. This is repeated to also characterize the between-year variability of "annual" FDCs for 8 representative catchments chosen across a climate gradient. Results show that the mixed gamma distribution can adequately capture the shapes of the FDCs and their variation between catchments and also between years. Comparison between the between-catchment and between-year variability of the FDCs revealed significant space-time symmetry. Possible relationships between the parameters of the fitted mixed gamma distribution and catchment climatic and physiographic characteristics are explored in order to decipher and point to the underlying physical controls. The baseflow index (a surrogate for the collective impact of geology, soils, topography and vegetation, as well as climate) is found to be the dominant control on the shapes of the normalized TFDC and SFDC, whereas the product of maximum daily precipitation and the fraction of non-rainy days was found to

  18. Exploring the physical controls of regional patterns of flow duration curves - Part 1: Insights from statistical analyses

    NASA Astrophysics Data System (ADS)

    Cheng, L.; Yaeger, M.; Viglione, A.; Coopersmith, E.; Ye, S.; Sivapalan, M.

    2012-06-01

    The Flow Duration Curve (FDC) is a classical method used to graphically represent the relationship between the frequency and magnitude of streamflow. In this sense it represents a compact signature of temporal runoff variability that can also be used to diagnose catchment rainfall-runoff responses, including similarity and differences between catchments. This paper is aimed at extracting regional patterns of the FDCs from observed daily flow data and elucidating the physical controls underlying these patterns, as a way to aid towards their regionalization and predictions in ungauged basins. The FDCs of total runoff (TFDC) using multi-decadal streamflow records for 197 catchments across the continental United States are separated into the FDCs of two runoff components, i.e., fast flow (FFDC) and slow flow (SFDC). In order to compactly display these regional patterns the 3-parameter mixed gamma distribution is employed to characterize the shapes of the normalized FDCs (i.e., TFDC, FFDC and SFDC) over the entire data record. This is repeated to also characterize the between-year variability of "annual" FDCs for 8 representative catchments chosen across a climate gradient. Results show that the mixed gamma distribution can adequately capture the shapes of the FDCs and their variation between catchments and also between years. Comparison between the between-catchment and between-year variability of the FDCs revealed significant space-time symmetry. Possible relationships between the parameters of the fitted mixed gamma distribution and catchment climatic and physiographic characteristics are explored in order to decipher and point to the underlying physical controls. The baseflow index (a surrogate for the collective impact of geology, soils, topology and vegetation, as well as climate) is found to be the dominant control on the shapes of the normalized TFDC and SFDC, whereas the product of maximum daily precipitation and the fraction of non-rainy days was found to

  19. Quasi-laminar stability and sensitivity analyses for turbulent flows: Prediction of low-frequency unsteadiness and passive control

    NASA Astrophysics Data System (ADS)

    Mettot, Clément; Sipp, Denis; Bézard, Hervé

    2014-04-01

    This article presents a quasi-laminar stability approach to identify in high-Reynolds number flows the dominant low-frequencies and to design passive control means to shift these frequencies. The approach is based on a global linear stability analysis of mean-flows, which correspond to the time-average of the unsteady flows. Contrary to the previous work by Meliga et al. ["Sensitivity of 2-D turbulent flow past a D-shaped cylinder using global stability," Phys. Fluids 24, 061701 (2012)], we use the linearized Navier-Stokes equations based solely on the molecular viscosity (leaving aside any turbulence model and any eddy viscosity) to extract the least stable direct and adjoint global modes of the flow. Then, we compute the frequency sensitivity maps of these modes, so as to predict before hand where a small control cylinder optimally shifts the frequency of the flow. In the case of the D-shaped cylinder studied by Parezanović and Cadot [J. Fluid Mech. 693, 115 (2012)], we show that the present approach well captures the frequency of the flow and recovers accurately the frequency control maps obtained experimentally. The results are close to those already obtained by Meliga et al., who used a more complex approach in which turbulence models played a central role. The present approach is simpler and may be applied to a broader range of flows since it is tractable as soon as mean-flows — which can be obtained either numerically from simulations (Direct Numerical Simulation (DNS), Large Eddy Simulation (LES), unsteady Reynolds-Averaged-Navier-Stokes (RANS), steady RANS) or from experimental measurements (Particle Image Velocimetry - PIV) — are available. We also discuss how the influence of the control cylinder on the mean-flow may be more accurately predicted by determining an eddy-viscosity from numerical simulations or experimental measurements. From a technical point of view, we finally show how an existing compressible numerical simulation code may be used in

  20. The natural oscillation of two types of ENSO events based on analyses of CMIP5 model control runs

    NASA Astrophysics Data System (ADS)

    Xu, Kang; Su, Jingzhi; Zhu, Congwen

    2014-07-01

    The eastern- and central-Pacific El Niño-Southern Oscillation (EP- and CP-ENSO) have been found to be dominant in the tropical Pacific Ocean, and are characterized by interannual and decadal oscillation, respectively. In the present study, we defined the EP- and CP-ENSO modes by singular value decomposition (SVD) between SST and sea level pressure (SLP) anomalous fields. We evaluated the natural features of these two types of ENSO modes as simulated by the pre-industrial control runs of 20 models involved in phase five of the Coupled Model Intercomparison Project (CMIP5). The results suggested that all the models show good skill in simulating the SST and SLP anomaly dipolar structures for the EP-ENSO mode, but only 12 exhibit good performance in simulating the tripolar CP-ENSO modes. Wavelet analysis suggested that the ensemble principal components in these 12 models exhibit an interannual and multi-decadal oscillation related to the EP- and CP-ENSO, respectively. Since there are no changes in external forcing in the pre-industrial control runs, such a result implies that the decadal oscillation of CP-ENSO is possibly a result of natural climate variability rather than external forcing.

  1. Two Model-Based Methods for Policy Analyses of Fine Particulate Matter Control in China: Source Apportionment and Source Sensitivity

    NASA Astrophysics Data System (ADS)

    Li, X.; Zhang, Y.; Zheng, B.; Zhang, Q.; He, K.

    2013-12-01

    Anthropogenic emissions have been controlled in recent years in China to mitigate fine particulate matter (PM2.5) pollution. Recent studies show that sulfate dioxide (SO2)-only control cannot reduce total PM2.5 levels efficiently. Other species such as nitrogen oxide, ammonia, black carbon, and organic carbon may be equally important during particular seasons. Furthermore, each species is emitted from several anthropogenic sectors (e.g., industry, power plant, transportation, residential and agriculture). On the other hand, contribution of one emission sector to PM2.5 represents contributions of all species in this sector. In this work, two model-based methods are used to identify the most influential emission sectors and areas to PM2.5. The first method is the source apportionment (SA) based on the Particulate Source Apportionment Technology (PSAT) available in the Comprehensive Air Quality Model with extensions (CAMx) driven by meteorological predictions of the Weather Research and Forecast (WRF) model. The second method is the source sensitivity (SS) based on an adjoint integration technique (AIT) available in the GEOS-Chem model. The SA method attributes simulated PM2.5 concentrations to each emission group, while the SS method calculates their sensitivity to each emission group, accounting for the non-linear relationship between PM2.5 and its precursors. Despite their differences, the complementary nature of the two methods enables a complete analysis of source-receptor relationships to support emission control policies. Our objectives are to quantify the contributions of each emission group/area to PM2.5 in the receptor areas and to intercompare results from the two methods to gain a comprehensive understanding of the role of emission sources in PM2.5 formation. The results will be compared in terms of the magnitudes and rankings of SS or SA of emitted species and emission groups/areas. GEOS-Chem with AIT is applied over East Asia at a horizontal grid

  2. Planning and monitoring of placebo-controlled survival trials: comparison of the triangular test with usual interim analyses methods

    PubMed Central

    Hulot, Jean-Sébastien; Cucherat, Michel; Charlesworth, Andrew; Van Veldhuisen, Dirk J; Corvol, Jean-Christophe; Mallet, Alain; Boissel, Jean-Pierre; Hampton, John; Lechat, Philippe

    2003-01-01

    Aims For ethical and economic reasons, interim analysis of phase III clinical trials is essential. This study was conducted to compare the efficiency of two interim analysis procedures, which could be used to allow early termination of a clinical trial. Methods We made a post hoc application of two interim analysis methods (Lan & DeMets with O’Brien–Flemming modification, and the triangular test according to Whitehead) by using individual patient data from four published placebo-controlled survival trials. We determined the date the trial would have been stopped had each method been used, and we estimated consequent results in terms of events and patient numbers included in the trial, the duration of the trial, and on treatment effect. Results The triangular test provided the lowest number of events required to reach a conclusion of the trials while providing an accurate estimate of experimental treatment effects. The triangular test thus indicated the smallest number of patients that would have been enrolled, and the shortest trial duration. The difference between the methods was most important with a detrimental effect of experimental treatment: the number of required events was reduced by 75% and the trial duration was shortened by 48% with the triangular test compared to the Lan & DeMets method. Conclusions Stopping a trial early must depend on the clinical context. It is most important to stop a placebo-controlled trial as soon as possible when the experimental treatment can be shown deleterious. In such a situation the triangular test is more appropriate than the Lan & DeMets method. When a treatment effect is no different from, or better than, placebo the triangular test is also superior but the importance of premature termination of the trial in such cases has to be balanced against the inevitable reduction of information that the trial can provide. PMID:12630981

  3. Network, cluster and risk factor analyses for porcine reproductive and respiratory syndrome using data from swine sites participating in a disease control program.

    PubMed

    Arruda, A G; Friendship, R; Carpenter, J; Hand, K; Poljak, Z

    2016-06-01

    The objectives of this study were to describe networks of Ontario swine sites and their service providers (including trucking, feed, semen, gilt and boar companies); to categorize swine sites into clusters based on site-level centrality measures, and to investigate risk factors for porcine reproductive and respiratory syndrome (PRRS) using information gathered from the above-mentioned analyses. All 816 sites included in the current study were enrolled in the PRRS area regional control and elimination projects in Ontario. Demographics, biosecurity and network data were collected using a standardized questionnaire and PRRS status was determined on the basis of available diagnostic tests and assessment by site veterinarians. Two-mode networks were transformed into one-mode dichotomized networks. Cluster and risk factor analyses were conducted separately for breeding and growing pig sites. In addition to the clusters obtained from cluster analyses, other explanatory variables of interest included: production type, type of animal flow, use of a shower facility, and number of neighboring swine sites within 3km. Unadjusted univariable analyses were followed by two types of adjusted models (adjusted for production systems): a generalizing estimation equation model (GEE) and a generalized linear mixed model (GLMM). Results showed that the gilt network was the most fragmented network, followed by the boar and truck networks. Considering all networks simultaneously, approximately 94% of all swine sites were indirectly connected. Unadjusted risk factor analyses showed significant associations between almost all predictors of interest and PRRS positivity, but these disappeared once production system was taken into consideration. Finally, the vast majority of the variation on PRRS status was explained by production system according to GLMM, which shows the highly correlated nature of the data, and raises the point that interventions at this level could potentially have high

  4. Generalized environmental control and life support system computer program (G189A) configuration control. [computer subroutine libraries for shuttle orbiter analyses

    NASA Technical Reports Server (NTRS)

    Blakely, R. L.

    1973-01-01

    A G189A simulation of the shuttle orbiter EC/lSS was prepared and used to study payload support capabilities. Two master program libraries of the G189A computer program were prepared for the NASA/JSC computer system. Several new component subroutines were added to the G189A program library and many existing subroutines were revised to improve their capabilities. A number of special analyses were performed in support of a NASA/JSC shuttle orbiter EC/LSS payload support capability study.

  5. Parametric Analyses of Alternative Flow Models at Yucca Mountain, Nevada Calibrations and Controls - State of Nevada-Funded Research

    SciTech Connect

    Lehman, L.; Brown, T. P.

    2002-02-26

    The controls on the potentiometric surface and temperature distribution at Yucca Mountain have long been thought to be related to major fault zones. The exact way the faults influence these distributions has been somewhat elusive. The parametric studies discussed in this paper show that the fault zone x, y and z permeability tensors, as well as the alignment of the fault zone in relation to the flow field (1), are major contributing factors in the pressure and temperature distributions. A series of runs were conducted for the State of Nevada with a 3-dimensional model utilizing the AT2VOC version of the A-TOUGH code (2),(3). The runs were conducted under steady state conditions and utilized fully coupled heat and flow conditions. The model setup and boundary conditions are fully described. Comparisons were done with varying degrees of anisotropic permeability ratios in the fault zones. The resulting temperature and pressure profiles are compared. The model, while simple, allowed us to examine the relationship of the head and temperature distributions to the position and permeability of major fault zones. It is our conclusion that the major faults included in this model do significantly affect the observed head and temperature distributions. Performance Assessments currently may not reflect actual doses at the Compliance boundary due to the potential for radionuclide flow to be captured in the Ghost Dance Fault and be transported primarily south with little dilution and dispersion.

  6. Systems Level Analyses Reveal Multiple Regulatory Activities of CodY Controlling Metabolism, Motility and Virulence in Listeria monocytogenes.

    PubMed

    Lobel, Lior; Herskovits, Anat A

    2016-02-01

    Bacteria sense and respond to many environmental cues, rewiring their regulatory network to facilitate adaptation to new conditions/niches. Global transcription factors that co-regulate multiple pathways simultaneously are essential to this regulatory rewiring. CodY is one such global regulator, controlling expression of both metabolic and virulence genes in Gram-positive bacteria. Branch chained amino acids (BCAAs) serve as a ligand for CodY and modulate its activity. Classically, CodY was considered to function primarily as a repressor under rich growth conditions. However, our previous studies of the bacterial pathogen Listeria monocytogenes revealed that CodY is active also when the bacteria are starved for BCAAs. Under these conditions, CodY loses the ability to repress genes (e.g., metabolic genes) and functions as a direct activator of the master virulence regulator gene, prfA. This observation raised the possibility that CodY possesses multiple functions that allow it to coordinate gene expression across a wide spectrum of metabolic growth conditions, and thus better adapt bacteria to the mammalian niche. To gain a deeper understanding of CodY's regulatory repertoire and identify direct target genes, we performed a genome wide analysis of the CodY regulon and DNA binding under both rich and minimal growth conditions, using RNA-Seq and ChIP-Seq techniques. We demonstrate here that CodY is indeed active (i.e., binds DNA) under both conditions, serving as a repressor and activator of different genes. Further, we identified new genes and pathways that are directly regulated by CodY (e.g., sigB, arg, his, actA, glpF, gadG, gdhA, poxB, glnR and fla genes), integrating metabolism, stress responses, motility and virulence in L. monocytogenes. This study establishes CodY as a multifaceted factor regulating L. monocytogenes physiology in a highly versatile manner. PMID:26895237

  7. Systems Level Analyses Reveal Multiple Regulatory Activities of CodY Controlling Metabolism, Motility and Virulence in Listeria monocytogenes

    PubMed Central

    Lobel, Lior; Herskovits, Anat A.

    2016-01-01

    Bacteria sense and respond to many environmental cues, rewiring their regulatory network to facilitate adaptation to new conditions/niches. Global transcription factors that co-regulate multiple pathways simultaneously are essential to this regulatory rewiring. CodY is one such global regulator, controlling expression of both metabolic and virulence genes in Gram-positive bacteria. Branch chained amino acids (BCAAs) serve as a ligand for CodY and modulate its activity. Classically, CodY was considered to function primarily as a repressor under rich growth conditions. However, our previous studies of the bacterial pathogen Listeria monocytogenes revealed that CodY is active also when the bacteria are starved for BCAAs. Under these conditions, CodY loses the ability to repress genes (e.g., metabolic genes) and functions as a direct activator of the master virulence regulator gene, prfA. This observation raised the possibility that CodY possesses multiple functions that allow it to coordinate gene expression across a wide spectrum of metabolic growth conditions, and thus better adapt bacteria to the mammalian niche. To gain a deeper understanding of CodY’s regulatory repertoire and identify direct target genes, we performed a genome wide analysis of the CodY regulon and DNA binding under both rich and minimal growth conditions, using RNA-Seq and ChIP-Seq techniques. We demonstrate here that CodY is indeed active (i.e., binds DNA) under both conditions, serving as a repressor and activator of different genes. Further, we identified new genes and pathways that are directly regulated by CodY (e.g., sigB, arg, his, actA, glpF, gadG, gdhA, poxB, glnR and fla genes), integrating metabolism, stress responses, motility and virulence in L. monocytogenes. This study establishes CodY as a multifaceted factor regulating L. monocytogenes physiology in a highly versatile manner. PMID:26895237

  8. Self management, joint protection and exercises in hand osteoarthritis: a randomised controlled trial with cost effectiveness analyses

    PubMed Central

    2011-01-01

    Background There is limited evidence for the clinical and cost effectiveness of occupational therapy (OT) approaches in the management of hand osteoarthritis (OA). Joint protection and hand exercises have been proposed by European guidelines, however the clinical and cost effectiveness of each intervention is unknown. This multicentre two-by-two factorial randomised controlled trial aims to address the following questions: • Is joint protection delivered by an OT more effective in reducing hand pain and disability than no joint protection in people with hand OA in primary care? • Are hand exercises delivered by an OT more effective in reducing hand pain and disability than no hand exercises in people with hand OA in primary care? • Which of the four management approaches explored within the study (leaflet and advice, joint protection, hand exercise, or joint protection and hand exercise combined) provides the most cost-effective use of health care resources Methods/Design Participants aged 50 years and over registered at three general practices in North Staffordshire and Cheshire will be mailed a health survey questionnaire (estimated mailing sample n = 9,500). Those fulfilling the eligibility criteria on the health survey questionnaire will be invited to attend a clinical assessment to assess for the presence of hand or thumb base OA using the ACR criteria. Eligible participants will be randomised to one of four groups: leaflet and advice; joint protection (looking after your joints); hand exercises; or joint protection and hand exercises combined (estimated n = 252). The primary outcome measure will be the OARSI/OMERACT responder criteria combining hand pain and disability (measured using the AUSCAN) and global improvement, 6 months post-randomisation. Secondary outcomes will also be collected for example pain, functional limitation and quality of life. Outcomes will be collected at baseline and 3, 6 and 12 months post-randomisation. The main analysis will

  9. Web Accessibility and Accessibility Instruction

    ERIC Educational Resources Information Center

    Green, Ravonne A.; Huprich, Julia

    2009-01-01

    Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

  10. Impact of Community-based Health Insurance on Access and Financial Protection: Evidence from Three Randomized Control Trials in Rural India.

    PubMed

    Raza, Wameq A; van de Poel, Ellen; Bedi, Arjun; Rutten, Frans

    2016-06-01

    Since the 1990s, community-based health insurance (CBHI) schemes have been proposed to reduce the financial consequences of illness and enhance access to healthcare in developing countries. Convincing evidence on the ability of such schemes to meet their objectives is scarce. This paper uses randomized control trials conducted in rural Uttar Pradesh and Bihar (India) to evaluate the effects of three CBHI schemes on healthcare utilization and expenditure. We find that the schemes have no effect on these outcomes. The results suggest that CBHI schemes of the type examined in this paper are unlikely to have a substantial impact on access and financial protection in developing countries. Copyright © 2015 John Wiley & Sons, Ltd. PMID:26708298

  11. Explaining Variability in High School Students' Access to and Enrollment in Career Academies and Career Theme Clusters in Florida: Multi-Level Analyses of Student and School Factors

    ERIC Educational Resources Information Center

    Evan, Aimee J.; Burden, Frances F.; Gheen, Margaret H.; Smerdon, Becky A.

    2013-01-01

    Career academies have been effective in reducing the high school dropout rates and increasing academic course taking and course credit accumulation among students (Kemple & Willner, 2008; Kemple & Snipes, 2000). However, not all students have access to career academy programs as they are not universally implemented across the state of…

  12. Demystifying Open Access

    SciTech Connect

    Mele, Salvatore

    2007-05-14

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  13. Demystifying Open Access

    SciTech Connect

    Mele, Salvatore

    2007-05-14

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a "fair share" scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  14. Tuning resistance states by thickness control in an electroforming-free nanometallic complementary resistance random access memory

    NASA Astrophysics Data System (ADS)

    Yang, Xiang; Lu, Yang; Lee, Jongho; Chen, I.-Wei

    2016-01-01

    Tuning low resistance state is crucial for resistance random access memory (RRAM) that aims to achieve optimal read margin and design flexibility. By back-to-back stacking two nanometallic bipolar RRAMs with different thickness into a complementary structure, we have found that its low resistance can be reliably tuned over several orders of magnitude. Such high tunability originates from the exponential thickness dependence of the high resistance state of nanometallic RRAM, in which electron wave localization in a random network gives rise to the unique scaling behavior. The complementary nanometallic RRAM provides electroforming-free, multi-resistance-state, sub-100 ns switching capability with advantageous characteristics for memory arrays.

  15. Cu-catalyzed silylation of alkynes: a traceless 2-pyridylsulfonyl controller allows access to either regioisomer on demand.

    PubMed

    García-Rubia, Alfonso; Romero-Revilla, Jose A; Mauleón, Pablo; Gómez Arrayás, Ramón; Carretero, Juan C

    2015-06-01

    The Cu-catalyzed silylation of terminal and internal alkynes bearing a 2-pyridyl sulfonyl group (SO2Py) at the propargylic position affords a breadth of vinyl silanes in good yields and with excellent regio- and stereocontrol under mild conditions. The directing SO2Py group is essential in terms of reaction efficiency and chemoselectivity. Importantly, this group also provides the ability to reverse the regiochemical outcome of the reaction, opening the access to either regioisomer without modification of the starting substrate by virtue of an in situ base-promoted alkyne to allene equilibration which takes place prior to the silylcupration process. Furthermore, removal of the directing SO2Py allows for further elaboration of the silylation products. In particular, a one-pot tandem alkyne silylation/allylic substitution sequence, in which both steps are catalyzed by the same Cu species, opens up a new approach for the access to either formal hydrosilylation regioisomer of unsymmetrical aliphatic-substituted internal alkynes from propargyl sulfones. PMID:25955333

  16. Usage and Effectiveness of a Fully Automated, Open-Access, Spanish Web-Based Smoking Cessation Program: Randomized Controlled Trial

    PubMed Central

    2014-01-01

    Background The Internet is an optimal setting to provide massive access to tobacco treatments. To evaluate open-access Web-based smoking cessation programs in a real-world setting, adherence and retention data should be taken into account as much as abstinence rate. Objective The objective was to analyze the usage and effectiveness of a fully automated, open-access, Web-based smoking cessation program by comparing interactive versus noninteractive versions. Methods Participants were randomly assigned either to the interactive or noninteractive version of the program, both with identical content divided into 4 interdependent modules. At baseline, we collected demographic, psychological, and smoking characteristics of the smokers self-enrolled in the Web-based program of Universidad Nacional de Educación a Distancia (National Distance Education University; UNED) in Madrid, Spain. The following questionnaires were administered: the anxiety and depression subscales from the Symptom Checklist-90-Revised, the 4-item Perceived Stress Scale, and the Heaviness of Smoking Index. At 3 months, we analyzed dropout rates, module completion, user satisfaction, follow-up response rate, and self-assessed smoking abstinence. Results A total of 23,213 smokers were registered, 50.06% (11,620/23,213) women and 49.94% (11,593/23,213) men, with a mean age of 39.5 years (SD 10.3). Of these, 46.10% (10,701/23,213) were married and 34.43% (7992/23,213) were single, 46.03% (10,686/23,213) had university education, and 78.73% (18,275/23,213) were employed. Participants smoked an average of 19.4 cigarettes per day (SD 10.3). Of the 11,861 smokers randomly assigned to the interactive version, 2720 (22.93%) completed the first module, 1052 (8.87%) the second, 624 (5.26%) the third, and 355 (2.99%) the fourth. Completion data was not available for the noninteractive version (no way to record it automatically). The 3-month follow-up questionnaire was completed by 1085 of 23,213 enrolled smokers

  17. 10 CFR 1017.19 - Access limitations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION Access to Unclassified Controlled Nuclear Information § 1017.19 Access limitations. A person may only have access to UCNI if he or she has been granted routine access by an Authorized Individual (see... 10 Energy 4 2010-01-01 2010-01-01 false Access limitations. 1017.19 Section 1017.19...

  18. 10 CFR 1017.21 - Limited access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION Access to Unclassified Controlled Nuclear Information § 1017.21 Limited access. (a) A person who is not eligible for routine access to specific UCNI under § 1017.20 may request limited access to... 10 Energy 4 2010-01-01 2010-01-01 false Limited access. 1017.21 Section 1017.21 Energy...

  19. 10 CFR 1017.21 - Limited access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION Access to Unclassified Controlled Nuclear Information § 1017.21 Limited access. (a) A person who is not eligible for routine access to specific UCNI under § 1017.20 may request limited access to... 10 Energy 4 2011-01-01 2011-01-01 false Limited access. 1017.21 Section 1017.21 Energy...

  20. 10 CFR 1017.19 - Access limitations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION Access to Unclassified Controlled Nuclear Information § 1017.19 Access limitations. A person may only have access to UCNI if he or she has been granted routine access by an Authorized Individual (see... 10 Energy 4 2011-01-01 2011-01-01 false Access limitations. 1017.19 Section 1017.19...

  1. Open Access

    ERIC Educational Resources Information Center

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  2. Access to Base Adducts of Low-Valent Organotin-Hydride Compounds by Controlled, Stepwise Hydrogen Abstraction from a Tetravalent Organotin Trihydride.

    PubMed

    Sindlinger, Christian P; Grahneis, Wiebke; Aicher, Frederik S W; Wesemann, Lars

    2016-05-23

    Hydrogen can be selectively removed from organotin trihydrides to generate the corresponding organohydrostannylene intermediates. Depending on the size of the substituent and the mode of generation, the intermediates undergo further reactions. Herein, we report on the formation of a variety of organotin hydrides with tin in the oxidation states Sn(II) , Sn(I) -Sn(III) and Sn(III) -Sn(III) , all accessed by the controlled removal of hydrogen from the tetravalent Ar'Sn(IV) trihydride (Ar'=2,6-dimesitylphenyl, mesityl=2,4,6-trimethylphenyl). PMID:27113089

  3. Systematic Review and Pooled Analyses of Recent Neurointerventional Randomized Controlled Trials: Setting a New Standard of Care for Acute Ischemic Stroke Treatment after 20 Years

    PubMed Central

    Hussain, Mohammed; Moussavi, Mohammad; Korya, Daniel; Mehta, Siddhart; Brar, Jaskiran; Chahal, Harina; Qureshi, Ihtesham; Mehta, Tapan; Ahmad, Javaad; Zaidat, Osama O.; Kirmani, Jawad F.

    2016-01-01

    Background Recent advances in the treatment of ischemic stroke have focused on revascularization and led to better clinical and functional outcomes. A systematic review and pooled analyses of 6 recent multicentered prospective randomized controlled trials (MPRCT) were performed to compare intravenous tissue plasminogen activator (IV tPA) and endovascular therapy (intervention) with IV tPA alone (control) for anterior circulation ischemic stroke (AIS) secondary to large vessel occlusion (LVO). Objectives Six MPRCTs (MR CLEAN, ESCAPE, EXTEND IA, SWIFT PRIME, REVASCAT and THERAPY) incorporating image-based LVO AIS were selected for assessing the following: (1) prespecified primary clinical outcomes of AIS patients in intervention and control arms: good outcomes were defined by a modified Rankin Scale score of 0-2 at 90 days; (2) secondary clinical outcomes were: (a) revascularization rates [favorable outcomes defined as modified Thrombolysis in Cerebral Infarction scale (mTICI) score of 2b/3]; (b) symptomatic intracranial hemorrhage (sICH) rates and mortality; (c) derivation of number needed to harm (NNH), number needed to treat (NNT), and relative percent difference (RPD) between intervention and control groups, and (d) random effects model to determine overall significance (forest and funnel plots). Results A total of 1,386 patients were included. Good outcomes at 90 days were seen in 46% of patients in the intervention (p < 0.00001) and in 27% of patients in the control groups (p < 0.00002). An mTICI score of 2b/3 was achieved in 70.2% of patients in the intervention arm. The sICH and mortality in the intervention arm compared with the control arm were 4.7 and 14.3% versus 7.9 and 17.8%, respectively. The NNT and NNH in the intervention and control groups were 5.3 and 9.1, respectively. Patients in the intervention arm had a 50.1% (RPD) better chance of achieving a good 90-day outcome as compared to controls. Conclusions Endovascular therapy combined with IV t

  4. Improving Post-Hospitalization Transition Outcomes through Accessible Health Information Technology and Caregiver Support: Protocol for a Randomized Controlled Trial

    PubMed Central

    Piette, John D; Striplin, Dana; Marinec, Nicolle; Chen, Jenny; Gregory, Lynn A; Sumerlin, Denise L; DeSantis, Angela M; Gibson, Carolyn; Crause, Ingrid; Rouse, Marylena; Aikens, James E

    2015-01-01

    Objective The goal of this trial is to evaluate a novel intervention designed to improve post-hospitalization support for older adults with chronic conditions via: (a) direct tailored communication to patients using regular automated calls post discharge, (b) support for informal caregivers outside of the patient’s household via structured automated feedback about the patient’s status plus advice about how caregivers can help, and (c) support for care management including a web-based disease management tool and alerts about potential problems. Methods 846 older adults with common chronic conditions are being identified upon hospital admission. Patients are asked to identify a “CarePartner” (CP) living outside their household, i.e., an adult child or other social network member willing to play an active role in their post-discharge transition support. Patient-CP pairs are randomized to the intervention or usual care. Intervention patients receive automated assessment and behavior change calls, and their CPs receives structured feedback and advice via email and automated calls following each assessment. Clinical teams have access to assessment results via the web and receive automated reports about urgent health problems. Patients complete surveys at baseline, 30 days, and 90 days post discharge; utilization data is obtained from hospital records. CPs, other caregivers, and clinicians are interviewed to evaluate intervention effects on processes of self-care support, caregiver stress and communication, and the intervention’s potential for broader implementation. The primary outcome is 30-day readmission rates; other outcomes measured at 30 days and 90 days include functional status, self-care behaviors, and mortality risk. Conclusion This trial uses accessible health technologies and coordinated communication among informal caregivers and clinicians to fill the growing gap between what discharged patients need and available resources. A unique feature of

  5. A Review of Existing Studies Reporting the Negative Effects of Alcohol Access and Positive Effects of Alcohol Control Policies on Interpersonal Violence

    PubMed Central

    Fitterer, Jessica L.; Nelson, Trisalyn A.; Stockwell, Timothy

    2015-01-01

    Alcohol consumption often leads to elevated rates of violence yet alcohol access policies continue to relax across the globe. Our review establishes the extent alcohol policy can moderate violent crime through alcohol availability restrictions. Results were informed from comprehensive selection of peer-reviewed journals from 1950 to October 2015. Our search identified 87 relevant studies on alcohol access and violence conducted across 12 countries. Seventeen studies included quasi-control design, and 23 conducted intervention analysis. Seventy-one (82%) reported a significant relationship between alcohol access and violent offenses. Alcohol outlet studies reported the greatest percentage of significant results (93%), with trading hours (63%), and alcohol price following (58%). Results from baseline studies indicated the effectiveness of increasing the price of commonly consumed alcohol, restricting the hours of alcohol trading, and limiting the number of alcohol outlets per region to prevent violent offenses. Unclear are the effects of tax reductions, restriction of on-premises re-entry, and different outlet types on violent crime. Further, the generalization of statistics over broad areas and the low number of control/intervention studies poses some concern for confounding or correlated effects on study results, and amount of information for local-level prevention of interpersonal violence. Future studies should focus on gathering longitudinal data, validating models, limiting crime data to peak drinking days and times, and wherever possible collecting the joint distribution between violent crime, intoxication, and place. A greater uptake of local-level analysis will benefit studies comparing the influence of multiple alcohol establishment types by relating the location of a crime to establishment proximity. Despite, some uncertainties particular studies showed that even modest policy changes, such as 1% increases in alcohol price, 1 h changes to closing times

  6. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  7. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  8. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  9. UK publicly funded Clinical Trials Units supported a controlled access approach to share individual participant data but highlighted concerns

    PubMed Central

    Hopkins, Carolyn; Sydes, Matthew; Murray, Gordon; Woolfall, Kerry; Clarke, Mike; Williamson, Paula; Tudur Smith, Catrin

    2016-01-01

    Objectives Evaluate current data sharing activities of UK publicly funded Clinical Trial Units (CTUs) and identify good practices and barriers. Study Design and Setting Web-based survey of Directors of 45 UK Clinical Research Collaboration (UKCRC)–registered CTUs. Results Twenty-three (51%) CTUs responded: Five (22%) of these had an established data sharing policy and eight (35%) specifically requested consent to use patient data beyond the scope of the original trial. Fifteen (65%) CTUs had received requests for data, and seven (30%) had made external requests for data in the previous 12 months. CTUs supported the need for increased data sharing activities although concerns were raised about patient identification, misuse of data, and financial burden. Custodianship of clinical trial data and requirements for a CTU to align its policy to their parent institutes were also raised. No CTUs supported the use of an open access model for data sharing. Conclusion There is support within the publicly funded UKCRC-registered CTUs for data sharing, but many perceived barriers remain. CTUs are currently using a variety of approaches and procedures for sharing data. This survey has informed further work, including development of guidance for publicly funded CTUs, to promote good practice and facilitate data sharing. PMID:26169841

  10. Cytosolic Access of Mycobacterium tuberculosis: Critical Impact of Phagosomal Acidification Control and Demonstration of Occurrence In Vivo

    PubMed Central

    Simeone, Roxane; Sayes, Fadel; Song, Okryul; Gröschel, Matthias I.; Brodin, Priscille; Brosch, Roland; Majlessi, Laleh

    2015-01-01

    Mycobacterium tuberculosis (Mtb) uses efficient strategies to evade the eradication by professional phagocytes, involving—as recently confirmed—escape from phagosomal confinement. While Mtb determinants, such as the ESX-1 type VII secretion system, that contribute to this phenomenon are known, the host cell factors governing this important biological process are yet unexplored. Using a newly developed flow-cytometric approach for Mtb, we show that macrophages expressing the phagosomal bivalent cation transporter Nramp-1, are much less susceptible to phagosomal rupture. Together with results from the use of the phagosome acidification inhibitor bafilomycin, we demonstrate that restriction of phagosomal acidification is a prerequisite for mycobacterial phagosomal rupture and cytosolic contact. Using different in vivo approaches including an enrichment and screen for tracking rare infected phagocytes carrying the CD45.1 hematopoietic allelic marker, we here provide first and unique evidence of M. tuberculosis-mediated phagosomal rupture in mouse spleen and lungs and in numerous phagocyte types. Our results, linking the ability of restriction of phagosome acidification to cytosolic access, provide an important conceptual advance for our knowledge on host processes targeted by Mtb evasion strategies. PMID:25658322

  11. aPKC Inhibition by Par3 CR3 Flanking Regions Controls Substrate Access and Underpins Apical-Junctional Polarization.

    PubMed

    Soriano, Erika V; Ivanova, Marina E; Fletcher, Georgina; Riou, Philippe; Knowles, Philip P; Barnouin, Karin; Purkiss, Andrew; Kostelecky, Brenda; Saiu, Peter; Linch, Mark; Elbediwy, Ahmed; Kjær, Svend; O'Reilly, Nicola; Snijders, Ambrosius P; Parker, Peter J; Thompson, Barry J; McDonald, Neil Q

    2016-08-22

    Atypical protein kinase C (aPKC) is a key apical-basal polarity determinant and Par complex component. It is recruited by Par3/Baz (Bazooka in Drosophila) into epithelial apical domains through high-affinity interaction. Paradoxically, aPKC also phosphorylates Par3/Baz, provoking its relocalization to adherens junctions (AJs). We show that Par3 conserved region 3 (CR3) forms a tight inhibitory complex with a primed aPKC kinase domain, blocking substrate access. A CR3 motif flanking its PKC consensus site disrupts the aPKC kinase N lobe, separating P-loop/αB/αC contacts. A second CR3 motif provides a high-affinity anchor. Mutation of either motif switches CR3 to an efficient in vitro substrate by exposing its phospho-acceptor site. In vivo, mutation of either CR3 motif alters Par3/Baz localization from apical to AJs. Our results reveal how Par3/Baz CR3 can antagonize aPKC in stable apical Par complexes and suggests that modulation of CR3 inhibitory arms or opposing aPKC pockets would perturb the interaction, promoting Par3/Baz phosphorylation. PMID:27554858

  12. Mortality, cardiovascular risk, and androgen deprivation therapy for prostate cancer: A systematic review with direct and network meta-analyses of randomized controlled trials and observational studies

    PubMed Central

    Scailteux, Lucie-Marie; Naudet, Florian; Alimi, Quentin; Vincendeau, Sébastien; Oger, Emmanuel

    2016-01-01

    Abstract Androgen deprivation therapy (ADT) is a cornerstone therapy for advanced prostate cancer (PCa). We hypothesized that cardiovascular (CV) risk is different across the various ADT modalities to compare their effects on CV morbidity and mortality, and all-cause mortality in patients with PCa. To investigate more in depth potential CV risk heterogeneity focusing on coronary (main outcome) and cerebrovascular risk, CV, and overall mortality. We performed a Medline and Embase query, without language restriction, since 1950 up to July 2014. We included randomized controlled trials (RCTs) and observational studies providing that they compared at least 1 ADT modality to another one or to placebo and they gave data on CV event or all-cause mortality. Sixty-eight studies out of 3419 met our eligibility criteria. Eleven observational studies were analyzed. Direct meta-analyses showed that antiandrogen was associated with a 30% decrease risk for myocardial infarction (MI) compared to GnRH agonists (RR, 0.70 [0.54–0.91]); combined androgen blockade (CAB) was associated with a 10% increase risk for stroke when compared to antiandrogen (RR, 1.10 [1.02–1.19]). With regard to RCTs, 57 were included: direct meta-analyses suggested that CAB was associated with a 10% decrease of all-cause mortality when compared to GnRH agonist (RR, 0.90 [0.82–1.00]). Network analysis could only be performed for all-cause mortality and it remains difficult to disentangle benefit (positive impact on cancer survival) and risk (including CV risk). The impact of the ADT modalities on CV morbidity remains difficult to quantify and more detailed prospective collection is required. Registration: PROSPERO, CRD42014010598. PMID:27310974

  13. Comparison of mitochondrial DNA control region sequence and microsatellite DNA analyses in estimating population structure and gene flow rates in Atlantic sturgeon Acipenser oxyrinchus

    USGS Publications Warehouse

    Wirgin, I.; Waldman, J.; Stabile, J.; Lubinski, B.; King, T.

    2002-01-01

    Atlantic sturgeon Acipenser oxyrinchus is large, long-lived, and anadromous with subspecies distributed along the Atlantic (A. oxyrinchus oxyrinchus) and Gulf of Mexico (A. o. desotoi) coasts of North America. Although it is not certain if extirpation of some population units has occurred, because of anthropogenic influences abundances of all populations are low compared with historical levels. Informed management of A. oxyrinchus demands a detailed knowledge of its population structure, levels of genetic diversity, and likelihood to home to natal rivers. We compared the use of mitochondrial DNA (mtDNA) control region sequence and microsatellite nuclear DNA (nDNA) analyses in identifying the stock structure and homing fidelity of Atlantic and Gulf coast populations of A. oxyrinchus. The approaches were concordant in that they revealed moderate to high levels of genetic diversity and suggested that populations of Atlantic sturgeon are highly structured. At least six genetically distinct management units were detected using the two approaches among the rivers surveyed. Mitochondrial DNA sequences revealed a significant cline in haplotype diversity along the Atlantic coast with monomorphism observed in Canadian populations. High levels of nDNA diversity were also observed among populations along the Atlantic coast, including the two Canadian populations, probably resulting from the more rapid rate of mutational and evolutionary change at microsatellite loci. Estimates of gene flow among populations were similar between both approaches with the exception that because of mtDNA monomorphism in Canadian populations, gene flow estimates between them were unobtainable. Analyses of both genomes provided high resolution and confidence in characterizing the population structure of Atlantic sturgeon. Microsatellite analysis was particularly informative in delineating population structure in rivers that were recently glaciated and may prove diagnostic in rivers that are

  14. Application of Probabilistic Multiple-Bias Analyses to a Cohort- and a Case-Control Study on the Association between Pandemrix™and Narcolepsy

    PubMed Central

    Bollaerts, Kaatje; Shinde, Vivek; Dos Santos, Gaël; Ferreira, Germano; Bauchau, Vincent; Cohet, Catherine; Verstraeten, Thomas

    2016-01-01

    Background An increase in narcolepsy cases was observed in Finland and Sweden towards the end of the 2009 H1N1 influenza pandemic. Preliminary observational studies suggested a temporal link with the pandemic influenza vaccine Pandemrix™, leading to a number of additional studies across Europe. Given the public health urgency, these studies used readily available retrospective data from various sources. The potential for bias in such settings was generally acknowledged. Although generally advocated by key opinion leaders and international health authorities, no systematic quantitative assessment of the potential joint impact of biases was undertaken in any of these studies. Methods We applied bias-level multiple-bias analyses to two of the published narcolepsy studies: a pediatric cohort study from Finland and a case-control study from France. In particular, we developed Monte Carlo simulation models to evaluate a potential cascade of biases, including confounding by age, by indication and by natural H1N1 infection, selection bias, disease- and exposure misclassification. All bias parameters were evidence-based to the extent possible. Results Given the assumptions used for confounding, selection bias and misclassification, the Finnish rate ratio of 13.78 (95% CI: 5.72–28.11) reduced to a median value of 6.06 (2.5th- 97.5th percentile: 2.49–15.1) and the French odds ratio of 5.43 (95% CI: 2.6–10.08) to 1.85 (2.5th—97.5th percentile: 0.85–4.08). Conclusion We illustrate multiple-bias analyses using two studies on the Pandemrix™-narcolepsy association and advocate their use to better understand the robustness of study findings. Based on our multiple-bias models, the observed Pandemrix™-narcolepsy association consistently persists in the Finnish study. For the French study, the results of our multiple-bias models were inconclusive. PMID:26901063

  15. Spacelab Charcoal Analyses

    NASA Technical Reports Server (NTRS)

    Slivon, L. E.; Hernon-Kenny, L. A.; Katona, V. R.; Dejarme, L. E.

    1995-01-01

    This report describes analytical methods and results obtained from chemical analysis of 31 charcoal samples in five sets. Each set was obtained from a single scrubber used to filter ambient air on board a Spacelab mission. Analysis of the charcoal samples was conducted by thermal desorption followed by gas chromatography/mass spectrometry (GC/MS). All samples were analyzed using identical methods. The method used for these analyses was able to detect compounds independent of their polarity or volatility. In addition to the charcoal samples, analyses of three Environmental Control and Life Support System (ECLSS) water samples were conducted specifically for trimethylamine.

  16. Transcriptome analyses of inhibitor-treated schistosome females provide evidence for cooperating Src-kinase and TGFβ receptor pathways controlling mitosis and eggshell formation.

    PubMed

    Buro, Christin; Oliveira, Katia C; Lu, Zhigang; Leutner, Silke; Beckmann, Svenja; Dissous, Colette; Cailliau, Katia; Verjovski-Almeida, Sergio; Grevelding, Christoph G

    2013-01-01

    Schistosome parasites cause schistosomiasis, one of the most prevalent parasitemias worldwide affecting humans and animals. Constant pairing of schistosomes is essential for female sexual maturation and egg production, which causes pathogenesis. Female maturation involves signaling pathways controlling mitosis and differentiation within the gonads. In vitro studies had shown before that a Src-specific inhibitor, Herbimycin A (Herb A), and a TGFβ receptor (TβR) inhibitor (TRIKI) have physiological effects such as suppressed mitoses and egg production in paired females. As one Herb A target, the gonad-specifically expressed Src kinase SmTK3 was identified. Here, we comparatively analyzed the transcriptome profiles of Herb A- and TRIKI-treated females identifying transcriptional targets of Src-kinase and TβRI pathways. After demonstrating that TRIKI inhibits the schistosome TGFβreceptor SmTβRI by kinase assays in Xenopus oocytes, couples were treated with Herb A, TRIKI, or both inhibitors simultaneously in vitro. RNA was isolated from females for microarray hybridizations and transcription analyses. The obtained data were evaluated by Gene Ontology (GO) and Ingenuity Pathway Analysis (IPA), but also by manual classification and intersection analyses. Finally, extensive qPCR experiments were done to verify differential transcription of candidate genes under inhibitor influence but also to functionally reinforce specific physiological effects. A number of genes found to be differentially regulated are associated with mitosis and differentiation. Among these were calcium-associated genes and eggshell-forming genes. In situ hybridization confirmed transcription of genes coding for the calcium sensor hippocalcin, the calcium transporter ORAI-1, and the calcium-binding protein calmodulin-4 in the reproductive system pointing to a role of calcium in parasite reproduction. Functional qPCR results confirmed an inhibitor-influenced, varying dependence of the

  17. Information system and geographic information system tools in the data analyses of the control program for visceral leishmaniases from 2006 to 2010 in the sanitary district of venda nova, belo horizonte, minas gerais, Brazil.

    PubMed

    Saraiva, Lara; Leite, Camila Gonçalves; de Carvalho, Luiz Otávio Alves; Andrade Filho, José Dilermando; de Menezes, Fernanda Carvalho; Fiúza, Vanessa de Oliveira Pires

    2012-01-01

    The aim of this paper is to report a brief history of control actions for Visceral Leishmaniasis (VL) from 2006 to 2010 in the Sanitary District (DS) of Venda Nova, Belo Horizonte, Minas Gerais, Brazil, focusing on the use of information systems and Geographic Information System (GIS) tools. The analyses showed that the use of an automated database allied with geoprocessing tools may favor control measures of VL, especially with regard to the evaluation of control actions carried out. Descriptive analyses of control measures allowed to evaluating that the information system and GIS tools promoted greater efficiency in making decisions and planning activities. These analyses also pointed to the necessity of new approaches to the control of VL in large urban centers. PMID:22518168

  18. Information System and Geographic Information System Tools in the Data Analyses of the Control Program for Visceral Leishmaniases from 2006 to 2010 in the Sanitary District of Venda Nova, Belo Horizonte, Minas Gerais, Brazil

    PubMed Central

    Saraiva, Lara; Leite, Camila Gonçalves; de Carvalho, Luiz Otávio Alves; Andrade Filho, José Dilermando; de Menezes, Fernanda Carvalho; Fiúza, Vanessa de Oliveira Pires

    2012-01-01

    The aim of this paper is to report a brief history of control actions for Visceral Leishmaniasis (VL) from 2006 to 2010 in the Sanitary District (DS) of Venda Nova, Belo Horizonte, Minas Gerais, Brazil, focusing on the use of information systems and Geographic Information System (GIS) tools. The analyses showed that the use of an automated database allied with geoprocessing tools may favor control measures of VL, especially with regard to the evaluation of control actions carried out. Descriptive analyses of control measures allowed to evaluating that the information system and GIS tools promoted greater efficiency in making decisions and planning activities. These analyses also pointed to the necessity of new approaches to the control of VL in large urban centers. PMID:22518168

  19. The Quik Fix study: a randomised controlled trial of brief interventions for young people with alcohol-related injuries and illnesses accessing emergency department and crisis support care

    PubMed Central

    2014-01-01

    Background Alcohol is a major preventable cause of injury, disability and death in young people. Large numbers of young people with alcohol-related injuries and medical conditions present to hospital emergency departments (EDs). Access to brief, efficacious, accessible and cost effective treatment is an international health priority within this age group. While there is growing evidence for the efficacy of brief motivational interviewing (MI) for reducing alcohol use in young people, there is significant scope to increase its impact, and determine if it is the most efficacious and cost effective type of brief intervention available. The efficacy of personality-targeted interventions (PIs) for alcohol misuse delivered individually to young people is yet to be determined or compared to MI, despite growing evidence for school-based PIs. This study protocol describes a randomized controlled trial comparing the efficacy and cost-effectiveness of telephone-delivered MI, PI and an Assessment Feedback/Information (AF/I) only control for reducing alcohol use and related harm in young people. Methods/design Participants will be 390 young people aged 16 to 25 years presenting to a crisis support service or ED with alcohol-related injuries and illnesses (including severe alcohol intoxication). This single blinded superiority trial randomized young people to (i) 2 sessions of MI; (ii) 2 sessions of a new PI or (iii) a 1 session AF/I only control. Participants are reassessed at 1, 3, 6 and 12 months on the primary outcomes of alcohol use and related problems and secondary outcomes of mental health symptoms, functioning, severity of problematic alcohol use, alcohol injuries, alcohol-related knowledge, coping self-efficacy to resist using alcohol, and cost effectiveness. Discussion This study will identify the most efficacious and cost-effective telephone-delivered brief intervention for reducing alcohol misuse and related problems in young people presenting to crisis support

  20. Local anaesthetic infiltration for peri-operative pain control in total hip and knee replacement: systematic review and meta-analyses of short- and long-term effectiveness

    PubMed Central

    2014-01-01

    Background Surgical pain is managed with multi-modal anaesthesia in total hip replacement (THR) and total knee replacement (TKR). It is unclear whether including local anaesthetic infiltration before wound closure provides additional pain control. Methods We performed a systematic review of randomised controlled trials of local anaesthetic infiltration in patients receiving THR or TKR. We searched MEDLINE, Embase and Cochrane CENTRAL to December 2012. Two reviewers screened abstracts, extracted data, and contacted authors for unpublished outcomes and data. Outcomes collected were post-operative pain at rest and during activity after 24 and 48 hours, opioid requirement, mobilisation, hospital stay and complications. When feasible, we estimated pooled treatment effects using random effects meta-analyses. Results In 13 studies including 909 patients undergoing THR, patients receiving local anaesthetic infiltration experienced a greater reduction in pain at 24 hours at rest by standardised mean difference (SMD) -0.61 (95% CI -1.05, -0.16; p = 0.008) and by SMD -0.43 (95% CI -0.78 -0.09; p = 0.014) at 48 hours during activity. In TKR, diverse multi-modal regimens were reported. In 23 studies including 1439 patients undergoing TKR, local anaesthetic infiltration reduced pain on average by SMD -0.40 (95% CI -0.58, -0.22; p < 0.001) at 24 hours at rest and by SMD -0.27 (95% CI -0.50, -0.05; p = 0.018) at 48 hours during activity, compared with patients receiving no infiltration or placebo. There was evidence of a larger reduction in studies delivering additional local anaesthetic after wound closure. There was no evidence of pain control additional to that provided by femoral nerve block. Patients receiving local anaesthetic infiltration spent on average an estimated 0.83 (95% CI 1.54, 0.12; p = 0.022) and 0.87 (95% CI 1.62, 0.11; p = 0.025) fewer days in hospital after THR and TKR respectively, had reduced opioid consumption, earlier