Science.gov

Sample records for access control applications

  1. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  2. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  3. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  4. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  5. 33 CFR 165.9 - Geographic application of limited and controlled access areas and regulated navigation areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and controlled access areas and regulated navigation areas. 165.9 Section 165.9 Navigation and... controlled access areas and regulated navigation areas. (a) General. The geographic application of the limited and controlled access areas and regulated navigation areas in this part are determined based...

  6. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  7. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  8. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  9. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  10. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  11. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  12. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  13. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.

  14. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  15. Controllable quantized conductance for multilevel data storage applications using conductive bridge random access memory.

    PubMed

    Aga, Fekadu Gochole; Woo, Jiyong; Song, Jeonghwan; Park, Jaehyuk; Lim, Seokjae; Sung, Changhyuck; Hwang, Hyunsang

    2017-03-17

    In this paper, we investigate the quantized conduction behavior of conductive bridge random access memory (CBRAM) with varied materials and ramping rates. We report stable and reproducible quantized conductance states with integer multiples of fundamental conductance obtained by optimizing the voltage ramping rate and the Ti-diffusion barrier (DB) at the Cu/HfO2 interface. Owing to controlled diffusion of Cu ions by the Ti-DB and the optimized ramping rate, through which it was possible to control the time delay of Cu ion reduction, more than seven levels of discrete conductance states were clearly observed. Analytical modeling was performed to determine the rate-limiting step in filament growth based on an electrochemical redox reaction. Our understanding of the fundamental mechanisms of quantized conductance behaviors provide a promising future for the multi-bit CBRAM device.

  16. Controllable quantized conductance for multilevel data storage applications using conductive bridge random access memory

    NASA Astrophysics Data System (ADS)

    Gochole Aga, Fekadu; Woo, Jiyong; Song, Jeonghwan; Park, Jaehyuk; Lim, Seokjae; Sung, Changhyuck; Hwang, Hyunsang

    2017-03-01

    In this paper, we investigate the quantized conduction behavior of conductive bridge random access memory (CBRAM) with varied materials and ramping rates. We report stable and reproducible quantized conductance states with integer multiples of fundamental conductance obtained by optimizing the voltage ramping rate and the Ti-diffusion barrier (DB) at the Cu/HfO2 interface. Owing to controlled diffusion of Cu ions by the Ti-DB and the optimized ramping rate, through which it was possible to control the time delay of Cu ion reduction, more than seven levels of discrete conductance states were clearly observed. Analytical modeling was performed to determine the rate-limiting step in filament growth based on an electrochemical redox reaction. Our understanding of the fundamental mechanisms of quantized conductance behaviors provide a promising future for the multi-bit CBRAM device.

  17. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  18. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    NASA Astrophysics Data System (ADS)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  19. Bibliographic Access and Control System.

    ERIC Educational Resources Information Center

    Kelly, Betsy; And Others

    1982-01-01

    Presents a brief summary of the functions of the Bibliographic Access & Control System (BACS) implemented at the Washington University School of Medicine Library, and outlines the design, development, and uses of the system. Bibliographic control of books and serials and user access to the system are also discussed. (Author/JL)

  20. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications.

    PubMed

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e.

  1. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications

    PubMed Central

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  2. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  3. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  4. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  5. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  6. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  7. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  8. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  9. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  10. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... unauthorized entry when the personnel access barrier is locked. Activation of the intrusion alarm must alert...

  11. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... unauthorized entry when the personnel access barrier is locked. Activation of the intrusion alarm must alert...

  12. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... unauthorized entry when the personnel access barrier is locked. Activation of the intrusion alarm must alert...

  13. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... unauthorized entry when the personnel access barrier is locked. Activation of the intrusion alarm must alert...

  14. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... unauthorized entry when the personnel access barrier is locked. Activation of the intrusion alarm must alert...

  15. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  16. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  17. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  18. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  19. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  20. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  1. Dynamic Information Management and Exchange for Command and Control Applications, Modelling and Enforcing Category-Based Access Control via Term Rewriting

    DTIC Science & Technology

    2015-03-01

    AFRL-AFOSR-UK-TR-2015-0026 Dynamic Information Management and Exchange for Command and Control Applications Maribel...Report 3. DATES COVERED (From – To) 24 August 2010 – 28 February 2015 4. TITLE AND SUBTITLE Dynamic Information Management and Exchange for...specified by individual members of the federation). 15. SUBJECT TERMS EOARD, Information Management , Distributed

  2. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  3. Deaf mobile application accessibility requirements

    NASA Astrophysics Data System (ADS)

    Nathan, Shelena Soosay; Hussain, Azham; Hashim, Nor Laily

    2016-08-01

    Requirement for deaf mobile applications need to be analysed to ensure the disabilities need are instilled into the mobile applications developed for them. Universal design is understandable to comply every user needs, however specific disability is argued by the authors to have different need and requirements. These differences are among the reasons for these applications being developed to target for a specific group of people, however they are less usable and later abandoned. This study focuses on deriving requirements that are needed by the deaf in their mobile applications that are meant specifically for them. Studies on previous literature was conducted it can be concluded that graphic, text, multimedia and sign language interpreter are among mostly required features to be included in their mobile application to ensure the applications are usable for this community.

  4. The linked medical data access control framework.

    PubMed

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  5. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  6. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  7. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  8. Secondary retention of rubber dam: effective moisture control access considerations.

    PubMed

    Liebenberg, W H

    1995-04-01

    Primary rubber dam retention affects attachment of the latex sheet to the anchor teeth bordering the isolated working field. Secondary rubber dam retention is the provision of an effective seal at the dam-tooth junction, which is essential to the maintenance of adequate access and moisture control within the working field. Practical hints are offered to optimize access and moisture control through well-planned and properly executed secondary retention of classic rubber dam applications. In addition, innovative solutions to the limitations of general field isolation, which pertain mostly to secondary retention of the unrestrained buccal and lingual curtains of the slit dam, are introduced.

  9. Speed control system for an access gate

    DOEpatents

    Bzorgi, Fariborz M [Knoxville, TN

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  10. Social Network Privacy via Evolving Access Control

    NASA Astrophysics Data System (ADS)

    di Crescenzo, Giovanni; Lipton, Richard J.

    We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.

  11. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  12. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  13. NOAA Climate Data Records Access for Applications

    NASA Astrophysics Data System (ADS)

    Stachniewicz, J. S.; Cecil, D.; Hollingshead, A.; Newport, B. J.; Wunder, D.

    2015-12-01

    There are many potential uses of NOAA Climate Data Records (CDRs) for decision-making and catastrophic risk management assessment activities in the federal, state, and local government and private sectors, in addition to their traditional uses by the academic/scientific community. There is growing interest in using NOAA CDRs for such applications and straightforward access to the data is essential if these applications are to be successful. User engagement activities determine the types of data that users need, as well as the spatial and temporal subsets. This talk will present the access methods currently available and in development. Alternate representations and sources of some CDRs will also be discussed. Recent improvements include: 1. CDR information web page 2. Dataset types, sizes, growth, latency, grid/swath 3. Dataset discovery, data access, and sub-setting. 4. Knowing our users and their needs. 5. Known uses of some CDRs. 6. Migration to CLASS. 7. Other representations - GeoTIFF, Obs4MIPS 8. Cloud applications - Google, Microsoft

  14. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  15. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  16. Distributed reservation control protocols for random access broadcasting channels

    NASA Astrophysics Data System (ADS)

    Greene, E. P.; Ephremides, A.

    1981-05-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  17. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  18. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  19. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  20. Access to the Airways: Rationale and Applications.

    ERIC Educational Resources Information Center

    Hanks, William; Longini, Peter

    Current movements toward greater public access to the airways are discussed. Traditional practices have limited access to journalists employed by stations and to those who purchase time and have allowed only limited responses to station-initiated editorials. Legal arguments that support citizen demands for more access arise from the First…

  1. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  2. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  3. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  4. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  5. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  6. Permission to Speak: A Novel Formal Foundation for Access Control

    DTIC Science & Technology

    2016-06-21

    NAME(S) AND ADDRESS(ES) University of Pennsylvania,Computer and Information Science ,Philadelphia,PA,19104 8. PERFORMING ORGANIZATION REPORT NUMBER... science • Uniform treatment of access control and conformance – Access control is verification of permissions – Conformance is satisfaction of

  7. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... each MARSEC Level, including those points where TWIC access control provisions will be applied. Each... escorting them; (4) Procedures for identifying authorized and unauthorized persons at any MARSEC level; and... access controls, particularly if they are to be applied on a random or occasional basis. (f) MARSEC...

  8. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear...

  9. Everywhere Access: Remote Control Software for the Internet.

    ERIC Educational Resources Information Center

    Beckett, George

    1994-01-01

    Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)

  10. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed.

  11. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  12. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  13. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  14. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  15. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  16. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  17. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  18. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  19. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and... the launch site of safety rules and emergency and evacuation procedures prior to that person's...

  20. Virtualizing access to scientific applications with the Application Hosting Environment

    NASA Astrophysics Data System (ADS)

    Zasada, S. J.; Coveney, P. V.

    2009-12-01

    The growing power and number of high performance computing resources made available through computational grids present major opportunities as well as a number of challenges to the user. At issue is how these resources can be accessed and how their power can be effectively exploited. In this paper we first present our views on the usability of contemporary high-performance computational resources. We introduce the concept of grid application virtualization as a solution to some of the problems with grid-based HPC usability. We then describe a middleware tool that we have developed to realize the virtualization of grid applications, the Application Hosting Environment (AHE), and describe the features of the new release, AHE 2.0, which provides access to a common platform of federated computational grid resources in standard and non-standard ways. Finally, we describe a case study showing how AHE supports clinical use of whole brain blood flow modelling in a routine and automated fashion. Program summaryProgram title: Application Hosting Environment 2.0 Catalogue identifier: AEEJ_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEEJ_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU Public Licence, Version 2 No. of lines in distributed program, including test data, etc.: not applicable No. of bytes in distributed program, including test data, etc.: 1 685 603 766 Distribution format: tar.gz Programming language: Perl (server), Java (Client) Computer: x86 Operating system: Linux (Server), Linux/Windows/MacOS (Client) RAM: 134 217 728 (server), 67 108 864 (client) bytes Classification: 6.5 External routines: VirtualBox (server), Java (client) Nature of problem: The middleware that makes grid computing possible has been found by many users to be too unwieldy, and presents an obstacle to use rather than providing assistance [1,2]. Such problems are compounded when one attempts to harness the

  1. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  2. A Model for Trust-based Access Control and Delegation in Mobile Clouds (Post Print)

    DTIC Science & Technology

    2013-10-01

    Qing-Guo, Z., Rong, L.: An Access Control Model for Ubiquitous Computing Application. In: Proceedings of the 2nd International Conference on Mobile ... Technology , Applications and Systems, Guangzhou, China (November 2005) 22. Baracaldo, N., Joshi, J.B.D.: A Trust-and-Risk Aware RBAC Framework: Tackling

  3. 37 CFR 2.27 - Pending trademark application index; access to applications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Pending trademark application index; access to applications. 2.27 Section 2.27 Patents, Trademarks, and Copyrights UNITED STATES... Registration § 2.27 Pending trademark application index; access to applications. (a) An index of...

  4. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  5. RANDOM ACCESS CONTROL OF ELECTROLUMINESCENT ELEMENTS.

    DTIC Science & Technology

    Cadmium selenide (CdSe) switches were devised to control the luminous emittance of electroluminescent cells in a solid-state display. The technique...purpose of this contract was to establish the feasibility of utilizing the hysteretic effect in cadmium selenide to provide switching and storage to an...array of electroluminescent cells by investigating the cadmium selenide material, by studying panel structure, and by investigating the addressing of

  6. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  7. Control of carbon content in amorphous GeTe films deposited by plasma enhanced chemical vapor deposition (PE-MOCVD) for phase-change random access memory applications

    NASA Astrophysics Data System (ADS)

    Aoukar, M.; Szkutnik, P. D.; Jourde, D.; Pelissier, B.; Michallon, P.; Noé, P.; Vallée, C.

    2015-07-01

    Amorphous and smooth GeTe thin films are deposited on 200 mm silicon substrates by plasma enhanced—metal organic chemical vapor deposition (PE-MOCVD) using the commercial organometallic precursors TDMAGe and DIPTe as Ge and Te precursors, respectively. X-ray photoelectron spectroscopy (XPS) measurements show a stoichiometric composition of the deposited GeTe films but with high carbon contamination. Using information collected by Optical Emission Spectroscopy (OES) and XPS, the origin of carbon contamination is determined and the dissociation mechanisms of Ge and Te precursors in H2 + Ar plasma are proposed. As a result, carbon level is properly controlled by varying operating parameters such as plasma radio frequency power, pressure and H2 rate. Finally, GeTe films with carbon level as low as 5 at. % are obtained.

  8. Towards an Access-Control Framework for Countering Insider Threats

    NASA Astrophysics Data System (ADS)

    Crampton, Jason; Huth, Michael

    As insider threats pose very significant security risks to IT systems, we ask what policy-based approaches to access control can do for the detection, mitigation or countering of insider threats and insider attacks. Answering this question is difficult: little public data about insider-threat cases is available; there is not much consensus about what the insider problem actually is; and previous research in access control has by-and-large not dealt with this issue. We explore existing notions of insiderness in order to identify the relevant research issues. We then formulate a set of requirements for next-generation access-control systems, whose realization might form part of an overall strategy to address the insider problem.

  9. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  10. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  11. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  12. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  13. Application-Specific Fault Tolerance via Data Access Characterization

    SciTech Connect

    Ali, Nawab; Krishnamoorthy, Sriram; Govind, Niranjan; Kowalski, Karol; Sadayappan, Ponnuswamy

    2011-08-30

    Recent trends in semiconductor technology and supercomputer design predict an increasing probability of faults during an application's execution. Designing an application that is resilient to system failures requires careful evaluation of the impact of various approaches on preserving key application state. In this paper, we present our experiences in an ongoing effort to make a large computational chemistry application fault tolerant. We construct the data access signatures of key application modules to evaluate alternative fault tolerance approaches. We present the instrumentation methodology, characterization of the application modules, and evaluation of fault tolerance techniques using the information collected. The application signatures developed capture application characteristics not traditionally revealed by performance tools. We believe these can be used in the design and evaluation of runtimes beyond fault tolerance.

  14. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  15. Workshop AccessibleTV "Accessible User Interfaces for Future TV Applications"

    NASA Astrophysics Data System (ADS)

    Hahn, Volker; Hamisu, Pascal; Jung, Christopher; Heinrich, Gregor; Duarte, Carlos; Langdon, Pat

    Approximately half of the elderly people over 55 suffer from some type of typically mild visual, auditory, motor or cognitive impairment. For them interaction, especially with PCs and other complex devices is sometimes challenging, although accessible ICT applications could make much of a difference for their living quality. Basically they have the potential to enable or simplify participation and inclusion in their surrounding private and professional communities. However, the availability of accessible user interfaces being capable to adapt to the specific needs and requirements of users with individual impairments is very limited. Although there are a number of APIs [1, 2, 3, 4] available for various platforms that allow developers to provide accessibility features within their applications, today none of them provides features for the automatic adaptation of multimodal interfaces being capable to automatically fit the individual requirements of users with different kinds of impairments. Moreover, the provision of accessible user interfaces is still expensive and risky for application developers, as they need special experience and effort for user tests. Today many implementations simply neglect the needs of elderly people, thus locking out a large portion of their potential users. The workshop is organized as part of the dissemination activity for the European-funded project GUIDE "Gentle user interfaces for elderly people", which aims to address this situation with a comprehensive approach for the realization of multimodal user interfaces being capable to adapt to the needs of users with different kinds of mild impairments. As application platform, GUIDE will mainly target TVs and Set-Top Boxes, such as the emerging Connected-TV or WebTV platforms, as they have the potential to address the needs of the elderly users with applications such as for home automation, communication or continuing education.

  16. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  17. Access control and interlock system at the Advanced Photon Source

    SciTech Connect

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  18. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  19. Controls Over the Contractor Common Access Card Life Cycle

    DTIC Science & Technology

    2008-10-10

    Identification System SES Senior Executive Service SPOC Service Point of Contact TASM Trusted Agent Security Manager USD (AT&L) Under...the final report by October 31, 2008. 53 Finding D. Oversight of Common Access Card Sponsors DoD CVS Service Points of Contact ( SPOCs ...authorization to approve contractor CACs. Organization of CAC Application Sites Each Service agency has an SPOC who is responsible for coordinating with

  20. Accessing multimedia content from mobile applications using semantic web technologies

    NASA Astrophysics Data System (ADS)

    Kreutel, Jörn; Gerlach, Andrea; Klekamp, Stefanie; Schulz, Kristin

    2014-02-01

    We describe the ideas and results of an applied research project that aims at leveraging the expressive power of semantic web technologies as a server-side backend for mobile applications that provide access to location and multimedia data and allow for a rich user experience in mobile scenarios, ranging from city and museum guides to multimedia enhancements of any kind of narrative content, including e-book applications. In particular, we will outline a reusable software architecture for both server-side functionality and native mobile platforms that is aimed at significantly decreasing the effort required for developing particular applications of that kind.

  1. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  2. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... schedule. (c) Access control. Access within the blasting area shall be controlled to prevent presence of..., and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  3. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  4. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  5. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  6. BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks.

    PubMed

    Maw, Htoo; Xiao, Hannan; Christianson, Bruce; Malcolm, James

    2015-12-22

    Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. An emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, outfitting every patient with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and other caregivers to continuously monitor the state of their patients. In such a scenario, patients are expected to be treated in reasonable time, so, an access control model is needed which will provide both real-time access to comprehensive medical records and detect unauthorised access to sensitive data. In emergency situations, a doctor or nurse needs to access data immediately. The loss in data availability can result in further decline in the patient's condition or can even lead to death. Therefore, the availability of data is more important than any security concern in emergency situations. To address that research issue for medical data in WSNs, we propose the Break-The-Glass Access Control (BTG-AC) model that is a modified and redesigned version of the Break-The-Glass Role-Based Access Control (BTG-RBAC) model to address data availability issue and to detect the security policy violations from both authorised and unauthorised users. Several changes within the access control engine are made in BTG-RBAC in order to make the new BTG-AC to apply and fit in WSNs. This paper presents the detailed design and development of the BTG-AC model based on a healthcare scenario. The evaluation results show that the concepts of BTG, prevention and detection mechanism, and obligation provide more flexible access than other current access control models in WSNs. Additionally, we compare the BTG-AC model with an adaptive access control model (A2C) which has similar properties, for further evaluation. Alongside with the comparison, the advantages and disadvantages of BTGAC over

  7. A study of multiple access schemes in satellite control network

    NASA Astrophysics Data System (ADS)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  8. A low-complexity medium access control framework for body sensor networks.

    PubMed

    Wang, Bo; Wang, Lei; Huang, Bang-Yu; Wu, Dan; Lin, Shao-Jie; Gu, Jia; Zhang, Yuan-Ting; Chen, Wei

    2009-01-01

    This paper proposed a low-complexity medium access control (MAC) protocol tailored for body sensor networks (BSN) applications. The MAC protocol was designated to handle collision avoidance by reducing the numbers of the overhead packets for handshake control within the BSN. We also suggested a novel message recovery mechanism for getting back the lost physiological information. The adaptive synchronization scheme we have implemented exploited the features of multiple data-rate and adjustable precision design to support differentiated healthcare applications. The MAC protocol was fully implemented using our BSN development platform. The experimental results suggested the improved MAC design was compact and energy-efficient.

  9. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  10. Coded access optical sensor (CAOS) imager and applications

    NASA Astrophysics Data System (ADS)

    Riza, Nabeel A.

    2016-04-01

    Starting in 2001, we proposed and extensively demonstrated (using a DMD: Digital Micromirror Device) an agile pixel Spatial Light Modulator (SLM)-based optical imager based on single pixel photo-detection (also called a single pixel camera) that is suited for operations with both coherent and incoherent light across broad spectral bands. This imager design operates with the agile pixels programmed in a limited SNR operations starring time-multiplexed mode where acquisition of image irradiance (i.e., intensity) data is done one agile pixel at a time across the SLM plane where the incident image radiation is present. Motivated by modern day advances in RF wireless, optical wired communications and electronic signal processing technologies and using our prior-art SLM-based optical imager design, described using a surprisingly simple approach is a new imager design called Coded Access Optical Sensor (CAOS) that has the ability to alleviate some of the key prior imager fundamental limitations. The agile pixel in the CAOS imager can operate in different time-frequency coding modes like Frequency Division Multiple Access (FDMA), Code-Division Multiple Access (CDMA), and Time Division Multiple Access (TDMA). Data from a first CAOS camera demonstration is described along with novel designs of CAOS-based optical instruments for various applications.

  11. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-15

    ... AGENCY Access to Confidential Business Information by Science Applications International Corporation and...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of San Diego... determined to be Confidential Business Information (CBI). DATES: Access to the confidential data...

  12. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  13. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  14. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... notification required in § 817.64(a). (c) Access control. Access within the blasting areas shall be controlled..., and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator...

  15. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  16. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  17. Tracking controlled chaos: Theoretical foundations and applications.

    PubMed

    Schwartz, Ira B.; Carr, Thomas W.; Triandaf, Ioana

    1997-12-01

    Tracking controlled states over a large range of accessible parameters is a process which allows for the experimental continuation of unstable states in both chaotic and non-chaotic parameter regions of interest. In algorithmic form, tracking allows experimentalists to examine many of the unstable states responsible for much of the observed nonlinear dynamic phenomena. Here we present a theoretical foundation for tracking controlled states from both dynamical systems as well as control theoretic viewpoints. The theory is constructive and shows explicitly how to track a curve of unstable states as a parameter is changed. Applications of the theory to various forms of control currently used in dynamical system experiments are discussed. Examples from both numerical and physical experiments are given to illustrate the wide range of tracking applications. (c) 1997 American Institute of Physics.

  18. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  19. Accessibility

    EPA Pesticide Factsheets

    Federal laws, including Section 508 of the Rehabilitation Act, mandate that people with disabilities have access to the same information that someone without a disability would have. 508 standards cover electronic and information technology (EIT) products.

  20. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  1. BIOPACK: the ground controlled late access biological research facility.

    PubMed

    van Loon, Jack J W A

    2004-03-01

    Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.

  2. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  3. 10 CFR 25.17 - Approval for processing applicants for access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... current cost for the processing of each “Q” and “L” access authorization, or renewal request. Applicants... individuals having current Federal access authorizations may be processed more expeditiously and at less cost... cost of each background investigation conducted in support of an application for access...

  4. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  5. DIESEL NOX CONTROL APPLICATION

    EPA Science Inventory

    The paper gives results of a project to design, develop, and demonstrate a diesel engine nitrogen oxide (NOx) and particulate matter (PM) control package that will meet the U.S. Navy's emission control requirements. (NOTE: In 1994, EPA issued a Notice for Proposed Rule Making (NP...

  6. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment.

  7. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  8. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... CFR Part 240 Risk Management Controls for Brokers or Dealers With Market Access; Final Rule #0;#0... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... alternative trading system (``ATS''), including those providing sponsored or direct market access to...

  9. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... market access to customers or other persons, to implement risk management controls and supervisory... growing popularity of sponsored or direct market access arrangements where broker-dealers allow...

  10. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...: RTCA Special Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation... 224, Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access...

  11. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  12. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  13. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  14. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  15. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  16. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  17. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  18. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  19. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  20. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  1. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  2. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  3. Web Services Provide Access to SCEC Scientific Research Application Software

    NASA Astrophysics Data System (ADS)

    Gupta, N.; Gupta, V.; Okaya, D.; Kamb, L.; Maechling, P.

    2003-12-01

    Web services offer scientific communities a new paradigm for sharing research codes and communicating results. While there are formal technical definitions of what constitutes a web service, for a user community such as the Southern California Earthquake Center (SCEC), we may conceptually consider a web service to be functionality provided on-demand by an application which is run on a remote computer located elsewhere on the Internet. The value of a web service is that it can (1) run a scientific code without the user needing to install and learn the intricacies of running the code; (2) provide the technical framework which allows a user's computer to talk to the remote computer which performs the service; (3) provide the computational resources to run the code; and (4) bundle several analysis steps and provide the end results in digital or (post-processed) graphical form. Within an NSF-sponsored ITR project coordinated by SCEC, we are constructing web services using architectural protocols and programming languages (e.g., Java). However, because the SCEC community has a rich pool of scientific research software (written in traditional languages such as C and FORTRAN), we also emphasize making existing scientific codes available by constructing web service frameworks which wrap around and directly run these codes. In doing so we attempt to broaden community usage of these codes. Web service wrapping of a scientific code can be done using a "web servlet" construction or by using a SOAP/WSDL-based framework. This latter approach is widely adopted in IT circles although it is subject to rapid evolution. Our wrapping framework attempts to "honor" the original codes with as little modification as is possible. For versatility we identify three methods of user access: (A) a web-based GUI (written in HTML and/or Java applets); (B) a Linux/OSX/UNIX command line "initiator" utility (shell-scriptable); and (C) direct access from within any Java application (and with the

  4. Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation

    NASA Astrophysics Data System (ADS)

    Yamada, Akira; Kubota, Ayumu; Miyake, Yutaka; Hashimoto, Kazuo

    Using Web-based content management systems such as Blog, an end user can easily publish User Generated Content (UGC). Although publishing of UGCs is easy, controlling access to them is a difficult problem for end users. Currently, most of Blog sites offer no access control mechanism, and even when it is available to users, it is not sufficient to control users who do not have an account at the site, not to mention that it cannot control accesses to content hosted by other UGC sites. In this paper, we propose new access control architecture for UGC, in which third party entities can offer access control mechanism to users independently of UGC hosting sites. With this architecture, a user can control accesses to his content that might be spread over many different UGC sites, regardless of whether those sites have access control mechanism or not. The key idea to separate access control mechanism from UGC sites is to apply cryptographic access control and we implemented the idea in such a way that it requires no modification to UGC sites and Web browsers. Our prototype implementation shows that the proposed access control architecture can be easily deployed in the current Web-based communication environment and it works quite well with popular Blog sites.

  5. Multi-application controls: Robust nonlinear multivariable aerospace controls applications

    NASA Technical Reports Server (NTRS)

    Enns, Dale F.; Bugajski, Daniel J.; Carter, John; Antoniewicz, Bob

    1994-01-01

    This viewgraph presentation describes the general methodology used to apply Honywell's Multi-Application Control (MACH) and the specific application to the F-18 High Angle-of-Attack Research Vehicle (HARV) including piloted simulation handling qualities evaluation. The general steps include insertion of modeling data for geometry and mass properties, aerodynamics, propulsion data and assumptions, requirements and specifications, e.g. definition of control variables, handling qualities, stability margins and statements for bandwidth, control power, priorities, position and rate limits. The specific steps include choice of independent variables for least squares fits to aerodynamic and propulsion data, modifications to the management of the controls with regard to integrator windup and actuation limiting and priorities, e.g. pitch priority over roll, and command limiting to prevent departures and/or undesirable inertial coupling or inability to recover to a stable trim condition. The HARV control problem is characterized by significant nonlinearities and multivariable interactions in the low speed, high angle-of-attack, high angular rate flight regime. Systematic approaches to the control of vehicle motions modeled with coupled nonlinear equations of motion have been developed. This paper will discuss the dynamic inversion approach which explicity accounts for nonlinearities in the control design. Multiple control effectors (including aerodynamic control surfaces and thrust vectoring control) and sensors are used to control the motions of the vehicles in several degrees-of-freedom. Several maneuvers will be used to illustrate performance of MACH in the high angle-of-attack flight regime. Analytical methods for assessing the robust performance of the multivariable control system in the presence of math modeling uncertainty, disturbances, and commands have reached a high level of maturity. The structured singular value (mu) frequency response methodology is presented

  6. Data Access, Ownership, and Control: Toward Empirical Studies of Access Practices.

    ERIC Educational Resources Information Center

    Hilgartner, Stephen; Brandt-Rauf, Sherry I.

    1994-01-01

    Examines how the new sociology of science can approach data access issues. A perspective is developed based on an analysis of the process of scientific production, data streams, and intellectual policy issues. (Contains 55 references.) (JLB)

  7. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  8. Controllers, observers, and applications thereof

    NASA Technical Reports Server (NTRS)

    Gao, Zhiqiang (Inventor); Miklosovic, Robert (Inventor); Radke, Aaron (Inventor); Zhou, Wankun (Inventor); Zheng, Qing (Inventor)

    2011-01-01

    Controller scaling and parameterization are described. Techniques that can be improved by employing the scaling and parameterization include, but are not limited to, controller design, tuning and optimization. The scaling and parameterization methods described here apply to transfer function based controllers, including PID controllers. The parameterization methods also apply to state feedback and state observer based controllers, as well as linear active disturbance rejection (ADRC) controllers. Parameterization simplifies the use of ADRC. A discrete extended state observer (DESO) and a generalized extended state observer (GESO) are described. They improve the performance of the ESO and therefore ADRC. A tracking control algorithm is also described that improves the performance of the ADRC controller. A general algorithm is described for applying ADRC to multi-input multi-output systems. Several specific applications of the control systems and processes are disclosed.

  9. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) All persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must... screening or inspection; and (ii) Failure to consent or submit to screening or inspection will result...

  10. Performance analysis and overload control of an open service access (OSA) architecture

    NASA Astrophysics Data System (ADS)

    Andersson, Jens K.; Nyberg, Christian; Kihl, Maria

    2003-08-01

    The trend of the service architectures developed in telecommunications today is that they should be open in the sense that they can communicate over the borders of different networks. Instead of each network having their own service architecture with their own applications, all networks should be able to use the same applications. 3GPP, the organization developing specifications for the 3G networks has specified the standard Open Service Access (OSA), as a part of the 3G specification. OSA offers different Application Protocol Interfaces that enable an application that resides outside a network to use the capabilities of the network. This paper analyses the performance of an OSA gateway. It is examined how the overload control can be dealt with in a way to best satisfy the operators and the 3'rd parties. There are some guiding principles in the specifications, but a lot of decisions have to be made by the implementors of application servers and OSA gateways. Proposals of different requirements for an OSA architecture exist such as, minimum amount of accepted calls per second and time constraint for the maximal total delay for an application. Maximal and fair throughput have to be prioritized from the 3'rd parties view, but profit is the main interest from the operators point of view. Therefore this paper examines a priority based proposal of an overload control mechanism taking these aspects and requirements into account.

  11. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  12. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  13. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  14. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  15. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  16. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  17. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  18. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  19. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  20. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  1. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  2. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  3. A network access control framework for 6LoWPAN networks.

    PubMed

    Oliveira, Luís M L; Rodrigues, Joel J P C; de Sousa, Amaro F; Lloret, Jaime

    2013-01-18

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes.

  4. Conductive bridging random access memory—materials, devices and applications

    NASA Astrophysics Data System (ADS)

    Kozicki, Michael N.; Barnaby, Hugh J.

    2016-11-01

    We present a review and primer on the subject of conductive bridging random access memory (CBRAM), a metal ion-based resistive switching technology, in the context of current research and the near-term requirements of the electronics industry in ultra-low energy devices and new computing paradigms. We include extensive discussions of the materials involved, the underlying physics and electrochemistry, the critical roles of ion transport and electrode reactions in conducting filament formation and device switching, and the electrical characteristics of the devices. Two general cation material systems are given—a fast ion chacogenide electrolyte and a lower ion mobility oxide ion conductor, and numerical examples are offered to enhance understanding of the operation of devices based on these. The effect of device conditioning on the activation energy for ion transport and consequent switching speed is discussed, as well as the mechanisms involved in the removal of the conducting bridge. The morphology of the filament and how this could be influenced by the solid electrolyte structure is described, and the electrical characteristics of filaments with atomic-scale constrictions are discussed. Consideration is also given to the thermal and mechanical environments within the devices. Finite element and compact modelling illustrations are given and aspects of CBRAM storage elements in memory circuits and arrays are included. Considerable emphasis is placed on the effects of ionizing radiation on CBRAM since this is important in various high reliability applications, and the potential uses of the devices in reconfigurable logic and neuromorphic systems is also discussed.

  5. The Model and Control Methods of Access to Information and Technology Resources of Automated Control Systems in Water Supply Industry

    NASA Astrophysics Data System (ADS)

    Rytov, M. Yu; Spichyack, S. A.; Fedorov, V. P.; Petreshin, D. I.

    2017-01-01

    The paper describes a formalized control model of access to information and technological resources of automated control systems at water supply enterprises. The given model considers the availability of various communication links with information systems and technological equipment. There are also studied control methods of access to information and technological resources of automated control systems at water supply enterprises. On the basis of the formalized control model and appropriate methods there was developed a software-hardware complex for rapid access to information and technological resources of automated control systems, which contains an administrator’s automated workplace and ultimate users.

  6. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  7. 18 CFR 16.5 - Site access for a competing applicant.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Site access for a competing applicant. 16.5 Section 16.5 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... RELICENSING OF LICENSED PROJECTS General Provisions § 16.5 Site access for a competing applicant. (a)...

  8. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  9. Open access, readership, citations: a randomized controlled trial of scientific journal publishing.

    PubMed

    Davis, Philip M

    2011-07-01

    Does free access to journal articles result in greater diffusion of scientific knowledge? Using a randomized controlled trial of open access publishing, involving 36 participating journals in the sciences, social sciences, and humanities, we report on the effects of free access on article downloads and citations. Articles placed in the open access condition (n=712) received significantly more downloads and reached a broader audience within the first year, yet were cited no more frequently, nor earlier, than subscription-access control articles (n=2533) within 3 yr. These results may be explained by social stratification, a process that concentrates scientific authors at a small number of elite research universities with excellent access to the scientific literature. The real beneficiaries of open access publishing may not be the research community but communities of practice that consume, but rarely contribute to, the corpus of literature.

  10. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  11. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true What controls access to national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... controls access to national security-classified information? (a) The declassification of and public...

  12. 33 CFR 150.604 - Who controls access to medical monitoring and exposure records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Who controls access to medical monitoring and exposure records? 150.604 Section 150.604 Navigation and Navigable Waters COAST GUARD... Health Safety and Health (general) § 150.604 Who controls access to medical monitoring and...

  13. 33 CFR 150.604 - Who controls access to medical monitoring and exposure records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Who controls access to medical... Health Safety and Health (general) § 150.604 Who controls access to medical monitoring and exposure records? If medical monitoring is performed or exposure records are maintained by an employer, the...

  14. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): November 2, 2010 Welcome/Introductions/Administrative Remarks Agenda... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access...

  15. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  16. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  17. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  18. Analysis and Simulation of Traffic Control for Resource Management in DVB-Based Broadband Satellite Access Networks

    NASA Astrophysics Data System (ADS)

    Impemba, Ernesto; Inzerilli, Tiziano

    2003-07-01

    Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.

  19. Instrument Remote Control Application Framework

    NASA Technical Reports Server (NTRS)

    Ames, Troy; Hostetter, Carl F.

    2006-01-01

    The Instrument Remote Control (IRC) architecture is a flexible, platform-independent application framework that is well suited for the control and monitoring of remote devices and sensors. IRC enables significant savings in development costs by utilizing extensible Markup Language (XML) descriptions to configure the framework for a specific application. The Instrument Markup Language (IML) is used to describe the commands used by an instrument, the data streams produced, the rules for formatting commands and parsing the data, and the method of communication. Often no custom code is needed to communicate with a new instrument or device. An IRC instance can advertise and publish a description about a device or subscribe to another device's description on a network. This simple capability of dynamically publishing and subscribing to interfaces enables a very flexible, self-adapting architecture for monitoring and control of complex instruments in diverse environments.

  20. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  1. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  2. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  3. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  4. Computer Control of a Random Access Slide Projector.

    ERIC Educational Resources Information Center

    Barker, Philip G.

    1982-01-01

    A description of a simple interface to enable the interconnection of a random access slide projector and a microcomputer is provided, as well as summaries of the role of slide images as a means of implementing graphic communication and the new activity in graphics as an area of information processing. The microcomputer interface is then detailed,…

  5. Scalable Machine Learning Framework for Behavior-Based Access Control

    DTIC Science & Technology

    2013-08-01

    rules. Dynamic events, such as subversion of credentials (e.g., theft of a Smart Card [3] such as the Common Access Card [4]) or changes in actor... Smart card handbook. Wiley, 2010. [4] DoD ID Card Reference Center, 2013, http://www.cac.mil/ [5] Hearst, Marti A., et al. "Support vector machines

  6. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  7. Regulation of the nucleosome unwrapping rate controls DNA accessibility

    PubMed Central

    North, Justin A.; Shimko, John C.; Javaid, Sarah; Mooney, Alex M.; Shoffner, Matthew A.; Rose, Sean D.; Bundschuh, Ralf; Fishel, Richard; Ottesen, Jennifer J.; Poirier, Michael G.

    2012-01-01

    Eukaryotic genomes are repetitively wrapped into nucleosomes that then regulate access of transcription and DNA repair complexes to DNA. The mechanisms that regulate extrinsic protein interactions within nucleosomes are unresolved. We demonstrate that modulation of the nucleosome unwrapping rate regulates protein binding within nucleosomes. Histone H3 acetyl-lysine 56 [H3(K56ac)] and DNA sequence within the nucleosome entry-exit region additively influence nucleosomal DNA accessibility by increasing the unwrapping rate without impacting rewrapping. These combined epigenetic and genetic factors influence transcription factor (TF) occupancy within the nucleosome by at least one order of magnitude and enhance nucleosome disassembly by the DNA mismatch repair complex, hMSH2–hMSH6. Our results combined with the observation that ∼30% of Saccharomyces cerevisiae TF-binding sites reside in the nucleosome entry–exit region suggest that modulation of nucleosome unwrapping is a mechanism for regulating transcription and DNA repair. PMID:22965129

  8. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  9. Adaptive control with aerospace applications

    NASA Astrophysics Data System (ADS)

    Gadient, Ross

    Robust and adaptive control techniques have a rich history of theoretical development with successful application. Despite the accomplishments made, attempts to combine the best elements of each approach into robust adaptive systems has proven challenging, particularly in the area of application to real world aerospace systems. In this research, we investigate design methods for general classes of systems that may be applied to representative aerospace dynamics. By combining robust baseline control design with augmentation designs, our work aims to leverage the advantages of each approach. This research contributes the development of robust model-based control design for two classes of dynamics: 2nd order cascaded systems, and a more general MIMO framework. We present a theoretically justified method for state limiting via augmentation of a robust baseline control design. Through the development of adaptive augmentation designs, we are able to retain system performance in the presence of uncertainties. We include an extension that combines robust baseline design with both state limiting and adaptive augmentations. In addition we develop an adaptive augmentation design approach for a class of dynamic input uncertainties. We present formal stability proofs and analyses for all proposed designs in the research. Throughout the work, we present real world aerospace applications using relevant flight dynamics and flight test results. We derive robust baseline control designs with application to both piloted and unpiloted aerospace system. Using our developed methods, we add a flight envelope protecting state limiting augmentation for piloted aircraft applications and demonstrate the efficacy of our approach via both simulation and flight test. We illustrate our adaptive augmentation designs via application to relevant fixed-wing aircraft dynamics. Both a piloted example combining the state limiting and adaptive augmentation approaches, and an unpiloted example with

  10. Design and Performance of Overlap FFT Filter-Bank for Dynamic Spectrum Access Applications

    NASA Astrophysics Data System (ADS)

    Tanabe, Motohiro; Umehira, Masahiro

    An OFDMA-based (Orthogonal Frequency Division Multiple Access-based) channel access scheme for dynamic spectrum access has the drawbacks of large PAPR (Peak to Average Power Ratio) and large ACI (Adjacent Channel Interference). To solve these problems, a flexible channel access scheme using an overlap FFT filter-bank was proposed based on single carrier modulation for dynamic spectrum access. In order to apply the overlap FFT filter-bank for dynamic spectrum access, it is necessary to clarify the performance of the overlap FFT filter-bank according to the design parameters since its frequency characteristics are critical for dynamic spectrum access applications. This paper analyzes the overlap FFT filter-bank and evaluates its performance such as frequency characteristics and ACI performance according to the design parameters.

  11. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  12. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  13. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  14. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What controls access to national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70...

  15. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  16. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  17. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  18. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  19. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  20. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  1. Dcs Data Viewer, an Application that Accesses ATLAS DCS Historical Data

    NASA Astrophysics Data System (ADS)

    Tsarouchas, C.; Schlenker, S.; Dimitrov, G.; Jahn, G.

    2014-06-01

    The ATLAS experiment at CERN is one of the four Large Hadron Collider experiments. The Detector Control System (DCS) of ATLAS is responsible for the supervision of the detector equipment, the reading of operational parameters, the propagation of the alarms and the archiving of important operational data in a relational database (DB). DCS Data Viewer (DDV) is an application that provides access to the ATLAS DCS historical data through a web interface. Its design is structured using a client-server architecture. The pythonic server connects to the DB and fetches the data by using optimized SQL requests. It communicates with the outside world, by accepting HTTP requests and it can be used stand alone. The client is an AJAX (Asynchronous JavaScript and XML) interactive web application developed under the Google Web Toolkit (GWT) framework. Its web interface is user friendly, platform and browser independent. The selection of metadata is done via a column-tree view or with a powerful search engine. The final visualization of the data is done using java applets or java script applications as plugins. The default output is a value-over-time chart, but other types of outputs like tables, ascii or ROOT files are supported too. Excessive access or malicious use of the database is prevented by a dedicated protection mechanism, allowing the exposure of the tool to hundreds of inexperienced users. The current configuration of the client and of the outputs can be saved in an XML file. Protection against web security attacks is foreseen and authentication constrains have been taken into account, allowing the exposure of the tool to hundreds of users world wide. Due to its flexible interface and its generic and modular approach, DDV could be easily used for other experiment control systems.

  2. 76 FR 27633 - Notice of Funds Availability: Inviting Applications for Market Access Program, Foreign Market...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... Commodity Credit Corporation Notice of Funds Availability: Inviting Applications for Market Access Program, Foreign Market Development Cooperator Program, Emerging Markets Program, Technical Assistance for... Program (FMD), Emerging Markets Program (EMP), Technical Assistance for Specialty Crops Program...

  3. A remote data access architecture for home-monitoring health-care applications.

    PubMed

    Lin, Chao-Hung; Young, Shuenn-Tsong; Kuo, Te-Son

    2007-03-01

    With the aging of the population and the increasing patient preference for receiving care in their own homes, remote home care is one of the fastest growing areas of health care in Taiwan and many other countries. Many remote home-monitoring applications have been developed and implemented to enable both formal and informal caregivers to have remote access to patient data so that they can respond instantly to any abnormalities of in-home patients. The aim of this technology is to give both patients and relatives better control of the health care, reduce the burden on informal caregivers and reduce visits to hospitals and thus result in a better quality of life for both the patient and his/her family. To facilitate their widespread adoption, remote home-monitoring systems take advantage of the low-cost features and popularity of the Internet and PCs, but are inherently exposed to several security risks, such as virus and denial-of-service (DoS) attacks. These security threats exist as long as the in-home PC is directly accessible by remote-monitoring users over the Internet. The purpose of the study reported in this paper was to improve the security of such systems, with the proposed architecture aimed at increasing the system availability and confidentiality of patient information. A broker server is introduced between the remote-monitoring devices and the in-home PCs. This topology removes direct access to the in-home PC, and a firewall can be configured to deny all inbound connections while the remote home-monitoring application is operating. This architecture helps to transfer the security risks from the in-home PC to the managed broker server, on which more advanced security measures can be implemented. The pros and cons of this novel architecture design are also discussed and summarized.

  4. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  5. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... From the Federal Register Online via the Government Publishing Office ] INTERNATIONAL TRADE COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same; Determination Rescinding the Exclusion Order and Cease and Desist Orders...

  6. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... From the Federal Register Online via the Government Publishing Office LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final...

  7. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  8. Implementing the Victory Access Control Framework in a Military Ground Vehicle

    DTIC Science & Technology

    2015-08-01

    Attribute Markup Language (SAML) and eXtensible Access Control Markup Language (XACML). These technologies are typically used for securing an...interfaces. REFERENCES [1] OASIS, “Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0”, OASIS Standard...Online]. Available: http://docs.oasis- open.org/security/saml/v2.0/saml-core-2.0-os.pdf March 2005. [2] OASIS, “eXtensible Access Control Markup

  9. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  10. Springfield Processing Plant* (A Hypothetical Facility) SPP, Entry Control Point and Vehicle Gate Access Control Post Order

    SciTech Connect

    Baum, Gregory A.

    2014-06-01

    This hypothetical order provides the requirements and instructions for the Springfield Processing Plant (SPP) Vehicle Gate and Entry Control Point (ECP) in the perimeter access building. The purpose of this post is to prevent the theft, sabotage or diversion of nuclear material (NM), control access and exit at the protected area, and to respond to emergencies according the SPP Guard Force (GF) Contingency Plan and as directed by a Guard Force Supervisor.

  11. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  12. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  13. Increasing software testability with standard access and control interfaces

    NASA Technical Reports Server (NTRS)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  14. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures that... develop, test, and implement the relevant risk management controls and supervisory procedures...

  15. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  16. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  17. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  18. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  19. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  20. Manual control theory and applications. [physiological and neurological applications

    NASA Technical Reports Server (NTRS)

    Sadoff, M.; Repa, B.

    1974-01-01

    Control theory, including manual control theory, and a review of some previous physiological and neurological applications of control theory and associated engineering concepts are reported. The discussion includes a specially tailored battery of critical control tasks that are being developed to monitor astronaut performance in long term orbital flight. The application of these concepts and tasks to patients with various neurological disorders is considered.

  1. Application of Information and Communication Technology (ICT) in Health Information Access and Dissemination in Uganda

    ERIC Educational Resources Information Center

    Omona, Walter; Ikoja-Odongo, Robert

    2006-01-01

    This paper reports on a study which assessed the application of information and communication technologies (ICT) in health information access and dissemination in Uganda. The project focused not only on information obtainable through libraries for research, teaching, learning and practice, but also on ICT applications concerned with the…

  2. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  3. Modelling of Medium Access Control (MAC) Protocols for Mobile Ad-Hoc Networks

    DTIC Science & Technology

    2005-06-01

    Slot IP Internet Protocol LAN Local Area Network MAC Medium Access Control MACAW Medium Access Protocol for Wireless LANs MANET Mobile Ad-hoc...Unforced state – It waits after entering the state until it is invoked by another process or an interrupt. It is in dark grey on this report, and red ... green in OPNET. A MAC process model is built for general initialisations of the MAC module, and to invoke the selected MAC protocol process model

  4. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    NASA Astrophysics Data System (ADS)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  5. Materials Control for Aerospace Applications

    NASA Technical Reports Server (NTRS)

    Ferguson, Michael

    2005-01-01

    The distant future of mankind and the ultimate survivability of the human race, as it is known today, will depend on mans' ability to break earthly bonds and establish new territorial positions throughout the universe. Man must therefore be positioned to not only travel to, but also, to readily adapt to numerous and varying environments. For this mass migration across the galaxies nothing is as import to the human race as is NASA's future missions into Low Earth Orbit (LEO), to the moon, and/or Mars. These missions will form the building blocks to eternity for mankind. From these missions, NASA will develop the foundations for these building blocks based on sound engineering and scientific principles, both known and yet to be discovered. The integrity of the program will lead to development, tracking and control of the most basic elements of hardware production: That being development and control of applications of space flight materials. Choosing the right material for design purposes involves many considerations, such as governmental regulations associated with manufacturing operations, both safety of usage and of manufacturing, general material usage requirements, material longevity and performance requirements, material interfacing compatibility and material usage environments. Material performance is subject to environmental considerations in as much as a given material may perform exceptionally well at standard temperatures and pressures while performing poorly under non-standard conditions. These concerns may be found true for materials relative to the extreme temperatures and vacuum gradients of high altitude usage. The only way to assure that flight worthy materials are used in design is through testing. However, as with all testing, it requires both time on schedule and cost to the operation. One alternative to this high cost testing approach is to rely on a materials control system established by NASA. The NASA community relies on the MAPTIS materials

  6. Single-crystalline CuO nanowires for resistive random access memory applications

    SciTech Connect

    Hong, Yi-Siang; Chen, Jui-Yuan; Huang, Chun-Wei; Chiu, Chung-Hua; Huang, Yu-Ting; Huang, Ting Kai; He, Ruo Shiuan; Wu, Wen-Wei

    2015-04-27

    Recently, the mechanism of resistive random access memory (RRAM) has been partly clarified and determined to be controlled by the forming and erasing of conducting filaments (CF). However, the size of the CF may restrict the application and development as devices are scaled down. In this work, we synthesized CuO nanowires (NW) (∼150 nm in diameter) to fabricate a CuO NW RRAM nanodevice that was much smaller than the filament (∼2 μm) observed in a bulk CuO RRAM device in a previous study. HRTEM indicated that the Cu{sub 2}O phase was generated after operation, which demonstrated that the filament could be minimize to as small as 3.8 nm when the device is scaled down. In addition, energy dispersive spectroscopy (EDS) and electron energy loss spectroscopy (EELS) show the resistive switching of the dielectric layer resulted from the aggregated oxygen vacancies, which also match with the I-V fitting results. Those results not only verify the switching mechanism of CuO RRAM but also show RRAM has the potential to shrink in size, which will be beneficial to the practical application of RRAM devices.

  7. Lateral access to the holes of photonic crystal fibers - selective filling and sensing applications.

    PubMed

    Cordeiro, Cristiano M B; Dos Santos, Eliane M; Brito Cruz, C H; de Matos, Christiano J; Ferreiira, Daniel S

    2006-09-04

    A new, simple, technique is demonstrated to laterally access the cladding holes of solid-core photonic crystal fibers (PCFs) or the central hole of hollow-core PCFs by blowing a hole through the fiber wall (using a fusion splicer and the application of pressure). For both fiber types material was subsequently and successfully inserted into the holes. The proposed method compares favorably with other reported selective filling techniques in terms of simplicity and reproducibility. Also, since the holes are laterally filled, simultaneous optical access to the PCFs is possible, which can prove useful for practical sensing applications. As a proof-of-concept experiment, Rhodamine fluorescence measurements are shown.

  8. Virus spreading in wireless sensor networks with a medium access control mechanism

    NASA Astrophysics Data System (ADS)

    Wang, Ya-Qi; Yang, Xiao-Yuan

    2013-04-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations.

  9. Access, utilization, and interest in mHealth applications among veterans receiving outpatient care for PTSD.

    PubMed

    Erbes, Christopher R; Stinson, Rebecca; Kuhn, Eric; Polusny, Melissa; Urban, Jessica; Hoffman, Julia; Ruzek, Josef I; Stepnowsky, Carl; Thorp, Steven R

    2014-11-01

    Mobile health (mHealth) refers to the use of mobile technology (e.g., smartphones) and software (i.e., applications) to facilitate or enhance health care. Several mHealth programs act as either stand-alone aids for Veterans with post-traumatic stress disorder (PTSD) or adjuncts to conventional psychotherapy approaches. Veterans enrolled in a Veterans Affairs outpatient treatment program for PTSD (N = 188) completed anonymous questionnaires that assessed Veterans' access to mHealth-capable devices and their utilization of and interest in mHealth programs for PTSD. The majority of respondents (n = 142, 76%) reported having access to a cell phone or tablet capable of running applications, but only a small group (n = 18) reported use of existing mHealth programs for PTSD. Age significantly predicted ownership of mHealth devices, but not utilization or interest in mHealth applications among device owners. Around 56% to 76% of respondents with access indicated that they were interested in trying mHealth programs for such issues as anger management, sleep hygiene, and management of anxiety symptoms. Findings from this sample suggest that Veterans have adequate access to, and interest in, using mHealth applications to warrant continued development and evaluation of mobile applications for the treatment of PTSD and other mental health conditions.

  10. RiBAC: Role Interaction Based Access Control Model for Community Computing

    NASA Astrophysics Data System (ADS)

    Jung, Youna; Masoumzadeh, Amirreza; Joshi, James B. D.; Kim, Minkoo

    Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among agents. While agents cooperate, they interact with each other continuously to access data of other agents and/or to execute other agent’s actions. However, in cases of security-critical ubiquitous services such as medical or military services, an access control mechanism is necessary to prevent unauthorized access to critical data or action. In this paper, we propose a family of Role interaction Based Access Control (RiBAC) models for Community Computing, by extending the existing RBAC model to consider role interactions. As a basic model, we propose the core RiBAC model. For the convenience of management and to provide more fine-grained access control, we propose Hierarchical RiBAC (H-RiBAC), Constrained RiBAC (C-RiBAC), and Constrained Hierarchical RiBAC (CH-RiBAC) models. Finally, we extend the existing community computing framework to accommodate the specification and enforcement of RiBAC policies.

  11. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  12. An EMI-aware prioritized wireless access scheme for e-Health applications in hospital environments.

    PubMed

    Phunchongharn, Phond; Niyato, Dusit; Hossain, Ekram; Camorlinga, Sergio

    2010-09-01

    Wireless communications technologies can support efficient healthcare services in medical and patient-care environments. However, using wireless communications in a healthcare environment raises two crucial issues. First, the RF transmission can cause electromagnetic interference (EMI) to biomedical devices, which could critically malfunction. Second, the different types of electronic health (e-Health) applications require different quality of service (QoS). In this paper, we introduce an innovative wireless access scheme, called EMI-aware prioritized wireless access, to address these issues. First, the system architecture for the proposed scheme is introduced. Then, an EMI-aware handshaking protocol is proposed for e-Health applications in a hospital environment. This protocol provides safety to the biomedical devices from harmful interference by adapting transmit power of wireless devices based on the EMI constraints. A prioritized wireless access scheme is proposed for channel access by two different types of applications with different priorities. A Markov chain model is presented to study the queuing behavior of the proposed system. Then, this queuing model is used to optimize the performance of the system given the QoS requirements. Finally, the performance of the proposed wireless access scheme is evaluated through extensive simulations.

  13. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  14. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  15. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  16. Performance of a Frequency-Hopped Real-Time Remote Control System in a Multiple Access Scenario

    NASA Astrophysics Data System (ADS)

    Cervantes, Frank

    A recent trend is observed in the context of the radio-controlled aircrafts and automobiles within the hobby grade category and Unmanned Aerial Vehicles (UAV) applications moving to the well-known Industrial, Scientific and Medical (ISM) band. Based on this technological fact, the present thesis evaluates an individual user performance by featuring a multiple-user scenario where several point-to-point co-located real-time Remote Control (RC) applications operate using Frequency Hopping Spread Spectrum (FHSS) as a medium access technique in order to handle interference efficiently. Commercial-off-the-shelf wireless transceivers ready to operate in the ISM band are considered as the operational platform supporting the above-mentioned applications. The impact of channel impairments and of different critical system engineering issues, such as working with real clock oscillators and variable packet duty cycle, are considered. Based on the previous, simulation results allowed us to evaluate the range of variation for those parameters for an acceptable system performance under Multiple Access (MA) environments.

  17. Strategies employed by upper secondary students for overcoming or exploiting conditions affecting accessibility of applications tasks

    NASA Astrophysics Data System (ADS)

    Stillman, Gloria

    2004-02-01

    A cognitive/metacognitive framework is presented for analysing applications tasks and responses to these. Conditions facilitating or impeding access to such tasks at the upper secondary level were identified using qualitative data analysis techniques within this framework. Strategies employed in exploiting, or overcoming these conditions were identified. A well-developed repertoire of cognitive and metacognitive strategies together with a rich store of mathematical knowledge, real-world knowledge and experiences, and comprehension skills facilitated access. This was enhanced by metacognitive knowledge encouraging student engagement with the task and by students imagining they were in the task situation. Once moderate skill had been achieved in accessing these applications, coordination and integration of multiple representations, further cues, and mathematical processes and procedures became critical.

  18. Applications of robust control theory - Educational implications

    NASA Technical Reports Server (NTRS)

    Dorato, P.; Yedavalli, R. K.

    1992-01-01

    A survey is made of applications of robust control theory to problems of flight control, control of flexible space structures, and engine control which have appeared in recent conferences and journals. An analysis is made of which theoretical techniques are most commonly used and what implications this has for graduate and undergraduate education in aerospace engineering.

  19. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  20. Controlled Release Applications of Organometals.

    ERIC Educational Resources Information Center

    Thayer, John S.

    1981-01-01

    Reviews two classes of controlled release organometals: (1) distributional, to distribute bioactive materials to control a certain target organism; and (2) protective, to protect surface or interior of some structure from attach by organisms. Specific examples are given including a discussion of controlled release for schistosomiasis. (SK)

  1. 78 FR 23893 - Notice of Funds Availability: Inviting Applications for the Market Access Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-23

    ... goals. The FAS also considers the extent to which a proposed project targets markets with the greatest... Commodity Credit Corporation Notice of Funds Availability: Inviting Applications for the Market Access...: The Commodity Credit Corporation (CCC) announces that it is inviting proposals for the 2014...

  2. 77 FR 24169 - Notice of Funds Availability: Inviting Applications for the Market Access Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-23

    ... or country goals. The FAS also considers the extent to which a proposed project targets markets with... Commodity Credit Corporation Notice of Funds Availability: Inviting Applications for the Market Access... Commodity Credit Corporation (CCC) announces that it is inviting proposals for the 2013 Market...

  3. 75 FR 26194 - Notice of Funds Availability: Inviting Applications for the Market Access Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    .... The FAS also considers the extent to which a proposed project targets markets with the greatest growth... Commodity Credit Corporation Notice of Funds Availability: Inviting Applications for the Market Access... Commodity Credit Corporation (CCC) announces that it is inviting proposals for the 2011 Market...

  4. Desktop Cloud Visualization: the new technology to remote access 3D interactive applications in the Cloud.

    PubMed

    Torterolo, Livia; Ruffino, Francesco

    2012-01-01

    In the proposed demonstration we will present DCV (Desktop Cloud Visualization): a unique technology that allows users to remote access 2D and 3D interactive applications over a standard network. This allows geographically dispersed doctors work collaboratively and to acquire anatomical or pathological images and visualize them for further investigations.

  5. 47 CFR 76.1004 - Applicability of program access rules to common carriers and affiliates.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Cable Programming § 76.1004 Applicability of program access rules to common carriers and affiliates. (a... common carrier or its affiliate that provides video programming by any means directly to subscribers. Any such provision that applies to a satellite cable programming vendor in which a cable operator has...

  6. 47 CFR 76.1004 - Applicability of program access rules to common carriers and affiliates.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Cable Programming § 76.1004 Applicability of program access rules to common carriers and affiliates. (a... common carrier or its affiliate that provides video programming by any means directly to subscribers. Any such provision that applies to a satellite cable programming vendor in which a cable operator has...

  7. 47 CFR 76.1004 - Applicability of program access rules to common carriers and affiliates.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Cable Programming § 76.1004 Applicability of program access rules to common carriers and affiliates. (a... common carrier or its affiliate that provides video programming by any means directly to subscribers. Any such provision that applies to a satellite cable programming vendor in which a cable operator has...

  8. 47 CFR 76.1004 - Applicability of program access rules to common carriers and affiliates.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Cable Programming § 76.1004 Applicability of program access rules to common carriers and affiliates. (a... common carrier or its affiliate that provides video programming by any means directly to subscribers. Any such provision that applies to a satellite cable programming vendor in which a cable operator has...

  9. 47 CFR 76.1004 - Applicability of program access rules to common carriers and affiliates.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Cable Programming § 76.1004 Applicability of program access rules to common carriers and affiliates. (a... common carrier or its affiliate that provides video programming by any means directly to subscribers. Any such provision that applies to a satellite cable programming vendor in which a cable operator has...

  10. Process for selecting NEAMS applications for access to Idaho National Laboratory high performance computing resources

    SciTech Connect

    Michael Pernice

    2010-09-01

    INL has agreed to provide participants in the Nuclear Energy Advanced Mod- eling and Simulation (NEAMS) program with access to its high performance computing (HPC) resources under sponsorship of the Enabling Computational Technologies (ECT) program element. This report documents the process used to select applications and the software stack in place at INL.

  11. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  12. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  13. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  14. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  15. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  16. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  17. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  18. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  19. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  20. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  1. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  2. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  3. 76 FR 78866 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-20

    ... for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Notice of... submitted comments. The Office is taking this action, in part, to clarify the proposal to the best of the... formats; and (2) are legally obtained by blind or other persons with print disabilities (as such...

  4. Actively controlled shaft seals for aerospace applications

    NASA Technical Reports Server (NTRS)

    Salant, Richard F.

    1991-01-01

    The main objective is to determine the feasibility of utilizing controllable mechanical seals for aerospace applications. A potential application was selected as a demonstration case: the buffer gas seal in a LOX (liquid oxygen) turbopump. Currently, floating ring seals are used in this application. Their replacement with controllable mechanical seals would result in substantially reduced leakage rates. This would reduce the required amount of stored buffer gas, and therefore increase the vehicle payload. For such an application, a suitable controllable mechanical seal was designed and analyzed.

  5. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    PubMed Central

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  6. Joint power and multiple access control for wireless mesh network with Rose projection method.

    PubMed

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  7. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  8. Accessibility and Utilization of WSR-88D Radar Precipitation Data for Natural Resource Modeling Applications

    NASA Astrophysics Data System (ADS)

    Hardegree, S. P.

    2001-12-01

    The National Weather Service (NWS) operates approximately 160 WSR-88D radar-precipitation stations as part of a Next Generation Radar (NEXRAD) program that began implementation in 1992. Among other products, these radar sites provide spatial rainfall estimates, at approximately 4 km2 resolution (Stage 1, Level 3 data), with nominal coverage of 96% of the coterminous United States. Effective coverage is much less than this in a given radar domain depending upon storm type and topography. As the original intent of this network was to support operational objectives of the Departments of Defense, Transportation and Commerce, the production of these data have been optimized for detection and mitigation of severe weather events that might result in flooding, destruction of property and loss of life. The primary hydrologic application has been river and flood forecast modeling by 13 NWS River Forecast Centers (RFC). As each RFC is responsible for a large river drainage, data processing and quality control of these data are geared toward optimization over a relatively large spatial domain (>100,000 km2). Use of these data for other hydrologic and natural resource applications is hampered by a lack of tools for data access and manipulation. NWRC has modified decoding and geo-referencing programs to facilitate utilization of these data for other research and management applications. Stage 1, Level 3 Digital Precipitation Array (DPA) files were obtained for the Boise, Idaho radar location (CBX) for the period of January 1998 to December 2000. Nine rain-gauge locations in the Reynolds Creek Experimental Watershed and Snake River Birds of Prey National Conservation Area, south of Boise, were georeferenced relative to the CBX Hydrologic Rainfall Analysis Project (HRAP) grid. NEXRAD estimates of total cumulative rainfall at these sites averaged only 20% of that measured by the local gauge network. This underestimate was attributed in the most part to truncation of low intensity

  9. Super-linear modulator with extended bandwidth capability for broadband access applications

    NASA Astrophysics Data System (ADS)

    Prescod, Andru; Dingel, Benjamin B.; Madamopoulos, Nicholas

    2009-01-01

    Ultra-linear modulators are critical components for broadband access applications in analog fiber-optic communication links, such as Radio-over-Fiber (RoF), Radio-over-Free Space (RoFS) and ultra-dense (cable television) CATV. In our previous work, it was shown that an ultra-linear optical modulator - composed of a phase modulator and ring resonator in a Mach-Zehnder (MZ) configuration, exhibited SFDR values > 130 dB. In this paper, we introduce a new configuration based on a lumped electrode design, in which the phase modulator (PM) is on one arm of the MZ and the ring resonator (RR) is located on the other arm. We also carefully control and monitor the power split ratio of an RF input to both the PM and the RR, in addition to the RF phase bias between the RR and PM. We report its unique and superior features such as superior linearity (SFDR ~ 133 dB), modulation bandwidth extension (as much as 70%) over the ring resonator-assisted Mach Zehnder design and high link gain. Lastly, we discuss the merits of the design flexibility, practicality and ease of use of the new modulator.

  10. Stochastic MPC with applications to process control

    NASA Astrophysics Data System (ADS)

    Jurado, I.; Millán, P.; Quevedo, D.; Rubio, F. R.

    2015-04-01

    This paper presents a model predictive control formulation for Networked Control Systems subject to independent and identically distributed delays and packet dropouts. The design takes into account the presence of a communication network in the control loop, resorting to a buffer at the actuator side to store and consistently apply delayed control sequences when fresh control inputs are not available. The proposed approach uses a statistical description of transmissions to optimise the expected future control performance conditioned upon the current system state, previously calculated control packets and transmission acknowledgements. Experimental studies using a quadruple tank process illustrate the applicability of the method to process control.

  11. Future applications of simulators in process control

    SciTech Connect

    Ruppel, F.; Wysor, W.

    1997-03-21

    Future applications of simulators in process control will see activities with high return on investment in areas such as concurrent engineering, hardware-in-the-loop controller testing, process fault detection, and Internet-retrievable simulation models and tools. These applications are based on advancing technology in the field of simulation technology. In this paper, the advancing technology will be reviewed, and projections to future uses of simulators in process control will be made.

  12. Symmetric Data Objects and Remote Memory Access Communication for Fortran 95-Applications.

    SciTech Connect

    Nieplocha, Jarek; Baxter, Douglas J.; Tipparaju, Vinod; Rasmussen, Craig; Numrich, Robert W.

    2005-08-01

    Symmetric data objects have been introduced by Cray Inc. in context of SHMEM remote memory access communication on Cray T3D/E systems and later adopted by SGI for their Origin servers. Symmetric data objects greatly simplify parallel programming by allowing to reference remote instance of a data structure by specifying address of the local counterpart. The current paper describes how symmetric data objects and remote memory access communication could be implemented in Fortran-95 without requiring specialized hardware or compiler support. NAS Multi-Grid parallel benchmark was used as an application example and demonstrated competitive performance to the standard MPI implementation

  13. A signaling and decision scheme with application to multiple-access communication

    NASA Astrophysics Data System (ADS)

    Longwell, B. C.; Arozullah, M.; Black, B. A.

    A decision directed detection method using a quasi-orthogonal set of signaling waveforms for detection-signals in the presence of random access interference is presented. In this method the spectra of a number of users in a random access scheme are allowed to overlap and decision is made by sequential elimination of interference. This method can achieve a larger throughput than that of frequency division multiple access. Performance of this detection scheme is evaluated in terms of probability of error and error propagation. This proposed detector outperforms the optimal linear detector for the same signal set in terms of signal-to-noise ratio needed for a given probability of error and data rate per unit bandwidth. This scheme may have application wherever a number of users need to communicate over a common channel e.g., tactical military communication system.

  14. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    PubMed

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  15. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    PubMed Central

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  16. Transitioning Active Flow Control to Applications

    NASA Technical Reports Server (NTRS)

    Joslin, Ronald D.; Horta, Lucas G.; Chen, Fang-Jenq

    1999-01-01

    Active Flow Control Programs at NASA, the U.S. Air Force, and DARPA have been initiated with the goals of obtaining revolutionary advances in aerodynamic performance and maneuvering compared to conventional approaches. These programs envision the use of actuators, sensors, and controllers on applications such as aircraft wings/tails, engine nacelles, internal ducts, nozzles, projectiles, weapons bays, and hydrodynamic vehicles. Anticipated benefits of flow control include reduced weight, part count, and operating cost and reduced fuel burn (and emissions), noise and enhanced safety if the sensors serve a dual role of flow control and health monitoring. To get from the bench-top or laboratory test to adaptive distributed control systems on realistic applications, reliable validated design tools are needed in addition to sub- and large-scale wind-tunnel and flight experiments. This paper will focus on the development of tools for active flow control applications.

  17. Distributed joint power and access control algorithm for secondary spectrum sharing

    NASA Astrophysics Data System (ADS)

    Li, Hongyan; Chen, Enqing; Fu, Hongliang

    2010-08-01

    Based on interference temperature model, the problem of efficient secondary spectrum sharing is formulated as a power optimization problem with some constraints at physical layer. These constraints and optimization objective limit a feasible power vector set which leads to the need of access control besides power control. In this paper, we consider the decentralized cognitive radio network scenario where short-term data service is required, and the problem of distributed joint power and access control is studied to maximize the total secondary system throughput, subject to Quality of Service (QoS) constraints from individual secondary users and interference temperature limit (ITL) from primary system. Firstly, a pricing-based game model was used to solve distributed power allocation optimization problem in both high and low signal to interference noise ratio (SINR) scenarios. Secondly, when not all the secondary links can be supported with their QoS requirement and ITL, a distributed joint power and access control algorithm was introduced to find the allowable links which results in maximum network throughput with all the constraints satisfied, and the convergence performance is tested by simulations.

  18. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  19. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  20. Controlled Access Headings in EAD Finding Aids: Current Practices in Number of and Types of Headings Assigned

    ERIC Educational Resources Information Center

    Mascaro, Michelle

    2011-01-01

    This article presents the findings from a study of controlled access headings assigned to encoded archival description finding aids in the Ohio Library and Information Network Finding Aid Repository, focusing on the number of headings per finding aid and the category of terms assigned. Assigning multiple controlled access headings was widely…

  1. Practical considerations to guide development of access controls and decision support for genetic information in electronic medical records

    PubMed Central

    2011-01-01

    Background Genetic testing is increasingly used as a tool throughout the health care system. In 2011 the number of clinically available genetic tests is approaching 2,000, and wide variation exists between these tests in their sensitivity, specificity, and clinical implications, as well as the potential for discrimination based on the results. Discussion As health care systems increasingly implement electronic medical record systems (EMRs) they must carefully consider how to use information from this wide spectrum of genetic tests, with whom to share information, and how to provide decision support for clinicians to properly interpret the information. Although some characteristics of genetic tests overlap with other medical test results, there are reasons to make genetic test results widely available to health care providers and counterbalancing reasons to restrict access to these test results to honor patient preferences, and avoid distracting or confusing clinicians with irrelevant but complex information. Electronic medical records can facilitate and provide reasonable restrictions on access to genetic test results and deliver education and decision support tools to guide appropriate interpretation and use. Summary This paper will serve to review some of the key characteristics of genetic tests as they relate to design of access control and decision support of genetic test information in the EMR, emphasizing the clear need for health information technology (HIT) to be part of optimal implementation of genetic medicine, and the importance of understanding key characteristics of genetic tests when designing HIT applications. PMID:22047175

  2. Channel Access in Erlang

    SciTech Connect

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PV monitors.

  3. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  4. Sub-Network Access Control Technology Demonstrator: Software Design of the Network Management System

    DTIC Science & Technology

    2002-08-01

    validdes. En d’autres mots, ce projet est une 6tape suppldmentaire dans le dessein de migrer ces technologies radio vers la Flotte Op ~ rationnelle ...Defence Research and Recherche et ddveloppement Development Canada pour la defense Canada DEFENCE • I7 DEFENSE Sub-Network Access Control...dans l’optique qu’ils op ~rent sur des liens avec une large bande passantes dont la topologie 6volue Tentement. Les produites con-nerciaux de gestion de

  5. [Application of ultrasonography in central venous catheterization; access sites and procedure techniques].

    PubMed

    Czyzewska, Dorota; Ustymowicz, Andrzej; Klukowski, Mark

    2016-08-05

    Central venous catheterization is commonly performed in clinical practice. Traditional procedural technique is based on anatomical landmarks, but is associated with a high risk of failure and complications. To decrease their incidence European and American societies recommend application of ultrasonography. Preliminary ultrasonographic examination allows for assessment of local anatomical relations as well as vessel morphology (diameter, patency), while real-time ultrasonography increases chances of successful needle insertion. This paper presents the most common venous access sites and procedure techniques.

  6. The influence of patriarchal behavior on birth control access and use among recent Hispanic immigrants.

    PubMed

    Gonzalez, Eleazar U; Sable, Marjorie R; Campbell, James D; Dannerbeck, Anne

    2010-08-01

    It is commonly assumed that Hispanic immigrants in the United States subscribe to a patriarchal ideology that keeps women subordinated to men, often through violence and exploitative reproductive behaviors. If this assumption is true, we might expect to find that in the Hispanic culture patriarchal males control decision-making about access to and use of birth control. Structured interviews of 100 Hispanic men and 100 Hispanic women who were recent immigrants to a Midwest community were conducted to examine this assumption. Results did not support this assumption among this study population. We found no patriarchal ideology supporting women's subordination to men, violence as a mechanism of control, reproduction as a way of exploitation, or cultural influences discouraging access to and use of birth control in the Hispanic community. Rather, these immigrants revealed adequate knowledge of birth control use and positive perceptions of gender equality. Gaining a better understanding of the limited influence of patriarchal ideology on the use of birth control and family planning services among this Hispanic community may inform the development of family planning services tailored for new Hispanic immigrants.

  7. A human rights view on access to controlled substances for medical purposes under the international drug control framework.

    PubMed

    Gispen, Marie Elske C

    2013-11-05

    The world is confronted with a major public health deficit caused by poor access to controlled essential medicines under the international drug control framework. This is affecting millions of patients on a daily basis and resulting in numerous human rights violations. The present review contextualises this deficit from a human rights perspective. Drug control efforts are informed by a twofold objective stemming from the double nature of scheduled substances: free access for medical purposes should be ensured, though non-medical use of substances such as opium should be restricted. The international drug control framework is, in theory, based on this twofold notion, however at the level of interpretation, monitoring, and implementation, a one-sided emphasis is demonstrated. By tracing a parallel between the obligations of states under the international drug control framework and those that derive from human rights law, the review shows that the two systems seem incoherent and conflicting in nature and flags the importance of cross-disciplinary research into drug control and human rights.

  8. Applications in Robotics and Controls

    NASA Astrophysics Data System (ADS)

    Youcef-Toumi, Kamal

    2008-06-01

    Recent industry trends have set new standards in business dealings and trades. Issues such as time to market, shoter market wondows, product performance, rapid increase of product complexity, costly mistakes, costly late introductions, and customer expectations have changed significantly. These trends have also influenced to a great extend the academic world. Some of these trends will be illustrated through examples which include automated systems, robotics, biotechnollogy, and nanotechnology. The examples will include concepts and prototypes of engineering systems in the macro, micro and nanodomains. The presentation also amphasizes the merging of the traditionally segregated disciplines into one multidisciplinary modeling, design, optimization and control approach.

  9. Application of orthogonal eigenstructure control to flight control design

    NASA Astrophysics Data System (ADS)

    Rastgaar Aagaah, M. A.; Ahmadian, M.; Southward, S. C.

    2008-03-01

    Orthogonal eigenstructure control is used for designing a control law that decouples the dynamic modes of a flying vehicle. Orthogonal eigenstructure control is a feedback control method for linear time invariant multi-input multi-output systems. This method has been recently developed by authors. The advantage of this control method over eigenstructure assignment methods is that there is no need for defining the closed-loop poles or shaping the closed-loop eigenvectors. This method eliminates the error due to the difference between achievable and desirable eigenvectors, by finding vectors orthogonal to the open-loop eigenvectors within the achievable eigenvectors set and replacing the open-loop eigenvectors with them. This method is also applicable to the systems with non-collocated actuators and sensors. Application of this method for designing a flight control law for the lateral directional dynamics of an F-18 HARV is presented, and compared to the results of an eigenstructure assignment method. In this case study, the actuators and sensors are not collocated. It is shown that the application of the orthogonal eigenstructure control results in a more significant dynamic modes decoupling in comparison to the application of the eigenstructure assignment technique.

  10. Cancer control in developing countries: using health data and health services research to measure and improve access, quality and efficiency

    PubMed Central

    2010-01-01

    Background Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. Discussion This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) Process: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) Outcome: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. Summary There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international

  11. SiCOH-based resistive random access memory for backend of line compatible nonvolatile memory application

    NASA Astrophysics Data System (ADS)

    Zheng, Liang; Dai, Ya-Wei; Yu, Lin-Jie; Chen, Lin; Sun, Qing-Qing; Zhang, David Wei

    2017-04-01

    We investigated the resistive switching characteristics of a SiCOH low-k-material-based resistive random access memory (RRAM) in this study. This SiCOH-based RRAM is fully compatible with backend CMOS technology, which is extremely important for its applicability. The device demonstrated here had higher performance characteristics than a conventional SiO2-based RRAM, such as a higher ON/OFF ratio (around 102), and a higher cycling endurance in an ambient environment. Taken together, these characteristics make the device a promising candidate for next-generation nonvolatile applications.

  12. Vehicle dynamics applications of optimal control theory

    NASA Astrophysics Data System (ADS)

    Sharp, R. S.; Peng, Huei

    2011-07-01

    The aim of the paper is to survey the various forms of optimal-control theory which have been applied to automotive problems and to present illustrative examples of applications studies, with assessments of the state of the art and of the contributions made through the use of optimal-control ideas. After a short introduction to the topic mentioning several questions to which optimal-control theory has been addressed, brief reviews of automotive-applicable optimal-control theory are given. There are outlines of the Linear Quadratic Regulator, without and with state reconstruction and then with the addition of disturbance preview, the nonlinear regulator or state-dependent-Riccati equation method, general numerical optimal-control theory including indirect and direct methods, model predictive control and robust control. Applications of the theory to active and semi-active suspension design and performance, worst-case manoeuvring, minimum-time manoeuvring and high-quality driving are then discussed in detail. Application sections describe the problem, the theory that has been used, what has been discovered and what remains to be found. The record of optimal-control theory in aiding the understanding of the various issues, in helping with system designs and knowledge of what is possible, and in guiding future research is assessed. Some ideas about future work are included.

  13. Using the STOQS Web Application for Access to in situ Oceanographic Data

    NASA Astrophysics Data System (ADS)

    McCann, M. P.

    2012-12-01

    Using the STOQS Web Application for Access to in situ Oceanographic Data Mike McCann 7 August 2012 With increasing measurement and sampling capabilities of autonomous oceanographic platforms (e.g. Gliders, Autonomous Underwater Vehicles, Wavegliders), the need to efficiently access and visualize the data they collect is growing. The Monterey Bay Aquarium Research Institute has designed and built the Spatial Temporal Oceanographic Query System (STOQS) specifically to address this issue. The need for STOQS arises from inefficiencies discovered from using CF-NetCDF point observation conventions for these data. The problem is that access efficiency decreases with decreasing dimension of CF-NetCDF data. For example, the Trajectory Common Data Model feature type has only one coordinate dimension, usually Time - positions of the trajectory (Depth, Latitude, Longitude) are stored as non-indexed record variables within the NetCDF file. If client software needs to access data between two depth values or from a bounded geographic area, then the whole data set must be read and the selection made within the client software. This is very inefficient. What is needed is a way to easily select data of interest from an archive given any number of spatial, temporal, or other constraints. Geospatial relational database technology provides this capability. The full STOQS application consists of a Postgres/PostGIS database, Mapserver, and Python-Django running on a server and Web 2.0 technology (jQuery, OpenLayers, Twitter Bootstrap) running in a modern web browser. The web application provides faceted search capabilities allowing a user to quickly drill into the data of interest. Data selection can be constrained by spatial, temporal, and depth selections as well as by parameter value and platform name. The web application layer also provides a REST (Representational State Transfer) Application Programming Interface allowing tools such as the Matlab stoqstoolbox to retrieve data

  14. Hypertension Detection, Management, Control and Associated Factors Among Residents Accessing Community Health Services In Beijing

    PubMed Central

    JIANG, Bin; LIU, Hongmei; RU, Xiaojuan; ZHANG, Hui; WU, Shengping; WANG, Wenzhi

    2014-01-01

    The aim of this study was to analyse high blood pressure detection, management, control and associated factors among residents accessing community health services (CHSs) in Beijing. We screened for HBP in 9524 individuals aged 50 years or older who accessed care in four Beijing CHSs. Among the 9397 residents with questionnaire responses that qualified them for inclusion in the study, 5029 patients with HBP were identified, 1510 (i.e., 30% of the HBP patient group) of whom were newly identified cases. The rate of hypertension detection was 53.5%. Among the 5029 HBP patients, the rates of awareness, treatment and control of hypertension were 70.0%, 62.1% and 29.6%, respectively. In general, the rate of hypertension control was higher when the rates of hypertension awareness and treatment were higher in subgroups stratified by different sociodemographic and risk factors, except for the overweight and obesity subgroups. In conclusion, suboptimal HBP awareness, treatment, and control are still major problems confronting CHSs in Beijing. Control of hypertension in the population may be improved by increasing awareness and improving the treatment of hypertension in CHSs. PMID:24784167

  15. Hypertension detection, management, control and associated factors among residents accessing community health services in Beijing.

    PubMed

    Jiang, Bin; Liu, Hongmei; Ru, Xiaojuan; Zhang, Hui; Wu, Shengping; Wang, Wenzhi

    2014-05-02

    The aim of this study was to analyse high blood pressure detection, management, control and associated factors among residents accessing community health services (CHSs) in Beijing. We screened for HBP in 9524 individuals aged 50 years or older who accessed care in four Beijing CHSs. Among the 9397 residents with questionnaire responses that qualified them for inclusion in the study, 5029 patients with HBP were identified, 1510 (i.e., 30% of the HBP patient group) of whom were newly identified cases. The rate of hypertension detection was 53.5%. Among the 5029 HBP patients, the rates of awareness, treatment and control of hypertension were 70.0%, 62.1% and 29.6%, respectively. In general, the rate of hypertension control was higher when the rates of hypertension awareness and treatment were higher in subgroups stratified by different sociodemographic and risk factors, except for the overweight and obesity subgroups. In conclusion, suboptimal HBP awareness, treatment, and control are still major problems confronting CHSs in Beijing. Control of hypertension in the population may be improved by increasing awareness and improving the treatment of hypertension in CHSs.

  16. An interaction-based access control model (IBAC) for collaborative services

    SciTech Connect

    Altunay, Mine; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  17. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  18. Randomized controlled trials in central vascular access devices: A scoping review

    PubMed Central

    Keogh, Samantha; Rickard, Claire M.

    2017-01-01

    Background Randomized controlled trials evaluate the effectiveness of interventions for central venous access devices, however, high complication rates remain. Scoping reviews map the available evidence and demonstrate evidence deficiencies to focus ongoing research priorities. Method A scoping review (January 2006–December 2015) of randomized controlled trials evaluating the effectiveness of interventions to improve central venous access device outcomes; including peripherally inserted central catheters, non-tunneled, tunneled and totally implanted venous access catheters. MeSH terms were used to undertake a systematic search with data extracted by two independent researchers, using a standardized data extraction form. Results In total, 178 trials were included (78 non-tunneled [44%]; 40 peripherally inserted central catheters [22%]; 20 totally implanted [11%]; 12 tunneled [6%]; 6 non-specified [3%]; and 22 combined device trials [12%]). There were 119 trials (68%) involving adult participants only, with 18 (9%) pediatric and 20 (11%) neonatal trials. Insertion-related themes existed in 38% of trials (67 RCTs), 35 RCTs (20%) related to post-insertion patency, with fewer trials on infection prevention (15 RCTs, 8%), education (14RCTs, 8%), and dressing and securement (12 RCTs, 7%). There were 46 different study outcomes reported, with the most common being infection outcomes (161 outcomes; 37%), with divergent definitions used for catheter-related bloodstream and other infections. Conclusion More high quality randomized trials across central venous access device management are necessary, especially in dressing and securement and patency. These can be encouraged by having more studies with multidisciplinary team involvement and consumer engagement. Additionally, there were extensive gaps within population sub-groups, particularly in tunneled devices, and in pediatrics and neonates. Finally, outcome definitions need to be unified for results to be meaningful and

  19. Deep optical access on multi-core and multi-mode fiber for integrated wireless applications

    NASA Astrophysics Data System (ADS)

    Llorente, Roberto; Morant, Maria; Beltrán, Marta; Macho, Andrés.

    2015-01-01

    Deep integrated optical access networks target to provide great capillarity and multiple ONTs for cost- and energy-efficient pervasive connectivity seamless supporting integrated wireless. Several key optical technologies are herein reported supporting integrated deep optical access: Bundled radio-over-fiber transmission is proposed and demonstrated for the provision of quintuple-play services achieving 125 km SSMF optical reach. Bend-insensitive fiber in-building distribution is also proposed and demonstrated supporting joint legacy coaxial transmission. Multimode POF is also proposed and demonstrated suitable for joint in-building distribution of MATV and SMATV broadcasting signals. Optical comb technology us is also demonstrated suitable for mm-wave radio generation of multiband OFDM wireless signals. Finally, multicore fiber transmission is also proposed and demonstrated suitable for the transmission of LTE and WIMAX in wireless fronthaul applications in a minimized inter-core crosstalk penalty configuration.

  20. Actively controlled shaft seals for aerospace applications

    NASA Technical Reports Server (NTRS)

    Salant, Richard F.

    1991-01-01

    Actively controlled mechanical seals have recently been developed for industrial use. This study investigates the feasibility of using such seals for aerospace applications. In a noncontacting mechanical seal, the film thickness depends on the geometry of the seal interface. The amount of coning, which is a measure of the radial convergence or divergence of the seal interface, has a primary effect on the film thickness. Active control of the film thickness is established by controlling the coning with a piezoelectric material. A mathematical model has been formulated to predict the performance of an actively controlled mechanical seal.

  1. EPICS application source/release control

    SciTech Connect

    Zieman, B.; Anderson, J.; Kraimer, M

    1995-12-31

    This manual describes a set of Application Source/Release Control tools (appSR) that can be used to develop software for EPICS based control systems. The Application Source/Release Control System (appSR) has been unbundled from base EPICS and is now available as an EPICS extension. Due to this unbundling, two new directories must be added to a user`s path (see section ``Environment`` on page 3 for more information) and a new command getapp must be issued after the getrel command to get a specific version of appSR (see section ``Creating The Initial Application System Area`` on page 7 for more information). It is now required that GNU make version 3.71 or later be used for makes instead of SUN make. Users should now type gmake instead of make.

  2. Application accelerator system having bunch control

    DOEpatents

    Wang, D.; Krafft, G.A.

    1999-06-22

    An application accelerator system for monitoring the gain of a free electron laser is disclosed. Coherent Synchrotron Radiation (CSR) detection techniques are used with a bunch length monitor for ultra short, picosec to several tens of femtosec, electron bunches. The monitor employs an application accelerator, a coherent radiation production device, an optical or beam chopping device, an infrared radiation collection device, a narrow-banding filter, an infrared detection device, and a control. 1 fig.

  3. Application accelerator system having bunch control

    DOEpatents

    Wang, Dunxiong; Krafft, Geoffrey Arthur

    1999-01-01

    An application accelerator system for monitoring the gain of a free electron laser. Coherent Synchrotron Radiation (CSR) detection techniques are used with a bunch length monitor for ultra short, picosec to several tens of femtosec, electron bunches. The monitor employs an application accelerator, a coherent radiation production device, an optical or beam chopping device, an infrared radiation collection device, a narrow-banding filter, an infrared detection device, and a control.

  4. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  5. A stochastic control approach to Slotted-ALOHA random access protocol

    NASA Astrophysics Data System (ADS)

    Pietrabissa, Antonio

    2013-12-01

    ALOHA random access protocols are distributed protocols based on transmission probabilities, that is, each node decides upon packet transmissions according to a transmission probability value. In the literature, ALOHA protocols are analysed by giving necessary and sufficient conditions for the stability of the queues of the node buffers under a control vector (whose elements are the transmission probabilities assigned to the nodes), given an arrival rate vector (whose elements represent the rates of the packets arriving in the node buffers). The innovation of this work is that, given an arrival rate vector, it computes the optimal control vector by defining and solving a stochastic control problem aimed at maximising the overall transmission efficiency, while keeping a grade of fairness among the nodes. Furthermore, a more general case in which the arrival rate vector changes in time is considered. The increased efficiency of the proposed solution with respect to the standard ALOHA approach is evaluated by means of numerical simulations.

  6. Bilharziasis control by application of molluscicides

    PubMed Central

    Paulini, Ernest

    1958-01-01

    The author discusses various aspects of the control of bilharziasis by the application of molluscicides, including the chemicals to be used, the preparation of molluscicidal suspensions or emulsions, the rate, season, frequency and methods of application, tests for evaluating the results of treatment, factors affecting the efficacy of molluscicides and the repopulation of snails after treatment, and the cost of molluscicidal operations. In addition, he reviews briefly some of the encouraging results obtained in the field with three of the most effective molluscicides—sodium pentachlorophenate, dinitro-cyclohexylphenol and copper sulfate—and puts forward a number of suggestions as to future research on this method of snail control. PMID:13573121

  7. Advanced thermal control technology for commercial applications

    NASA Technical Reports Server (NTRS)

    Swanson, Theodore D.

    1991-01-01

    A number of the technologies previously developed for the thermal control of spacecraft have found their way into commercial application. Specialized coatings and heat pipes are but two examples. The thermal control of current and future spacecraft is becoming increasingly more demanding, and a variety of new technologies are being developed to meet these needs. Closed two-phase loops are perceived to be the answer to many of the new requirements. All of these technologies are discussed, and their spacecraft and current terrestrial applications are summarized.

  8. Development and process control of magnetic tunnel junctions for magnetic random access memory devices

    NASA Astrophysics Data System (ADS)

    Kula, Witold; Wolfman, Jerome; Ounadjela, Kamel; Chen, Eugene; Koutny, William

    2003-05-01

    We report on the development and process control of magnetic tunnel junctions (MTJs) for magnetic random access memory (MRAM) devices. It is demonstrated that MTJs with high magnetoresistance ˜40% at 300 mV, resistance-area product (RA) ˜1-3 kΩ μm2, low intrinsic interlayer coupling (Hin) ˜2-3 Oe, and excellent bit switching characteristics can be developed and fully integrated with complementary metal-oxide-semiconductor circuitry into MRAM devices. MTJ uniformity and repeatability level suitable for mass production has been demonstrated with the advanced processing and monitoring techniques.

  9. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  10. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  11. On Hamiltonian Magnetohydrodynamics: Lagrangian, Eulerian, and Dynamically Accessible Stability - Applications with Translation Symmetry

    NASA Astrophysics Data System (ADS)

    Morrison, P. J.; Andreussi, T.; Pegoraro, F.

    2016-10-01

    In a series of papers we have investigated general properties of equilibria and their stability in each of the Lagrangian, Eulerian, and Dynamically Accessible stability formulations of magnetohydrodynamics. In our latest work we compare and contrast stability results with these formulations for two applications: stratified convection and rotating pinch equilibrium configurations. The former example, emphasizes the role played entropy, while the later demonstrates the utility of a relabeling transformation that we introduced in our earlier work. Comparisons to classical works, in particular on interchange instability, are made. DOE DE-FG02-04ER-54742.

  12. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    NASA Astrophysics Data System (ADS)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  13. New capabilities in the HENP grand challenge storage access systemand its application at RHIC

    SciTech Connect

    Bernardo, L.; Gibbard, B.; Malon, D.; Nordberg, H.; Olson, D.; Porter, R.; Shoshani, A.; Sim, A.; Vaniachine, A.; Wenaus, T.; Wu, K.; Zimmerman, D.

    2000-04-25

    The High Energy and Nuclear Physics Data Access GrandChallenge project has developed an optimizing storage access softwaresystem that was prototyped at RHIC. It is currently undergoingintegration with the STAR experiment in preparation for data taking thatstarts in mid-2000. The behavior and lessons learned in the RHIC MockData Challenge exercises are described as well as the observedperformance under conditions designed to characterize scalability. Up to250 simultaneous queries were tested and up to 10 million events across 7event components were involved in these queries. The system coordinatesthe staging of "bundles" of files from the HPSS tape system, so that allthe needed components of each event are in disk cache when accessed bythe application software. The caching policy algorithm for thecoordinated bundle staging is described in the paper. The initialprototype implementation interfaced to the Objectivity/DB. In this latestversion, it evolved to work with arbitrary files and use CORBA interfacesto the tag database and file catalog services. The interface to the tagdatabase and the MySQL-based file catalog services used by STAR aredescribed along with the planned usage scenarios.

  14. Quadratic optimal cooperative control synthesis with flight control application

    NASA Technical Reports Server (NTRS)

    Schmidt, D. K.; Innocenti, M.

    1984-01-01

    An optimal control-law synthesis approach is presented that involves simultaneous solution for two cooperating controllers operating in parallel. One controller's structure includes stochastic state estimation and linear feedback of the state estimates, while the other controller involves direct linear feedback of selected system output measurements. This structure is shown to be optimal under the constraint of linear feedback of system outputs in one controller. Furthermore, it is appropriate for flight control synthesis where the full-state optimal stochastic controller can be adjusted to be representative of an optimal control model of the human pilot in a stochastic regulation task. The method is experimentally verified in the case of the selection of pitch-damper gain for optimum pitch tracking, where optimum implies the best subjective pilot rating in the task. Finally, results from application of the method to synthesize a controller for a multivariable fighter aircraft are presented, and implications of the results of this method regarding the optimal plant dynamics for tracking are discussed.

  15. Quantitative Robust Control Engineering: Theory and Applications

    DTIC Science & Technology

    2006-09-01

    1992). Discrete quantitative feedback technique, Capítulo 16 en el libro : Digital Control Systems: theory, hardware, software, 2ª edicion. McGraw...Rasmussen S.J., Garcia-Sanz, M. (2001, 2005), Software de diseño del libro Quantitative Feedback Theory: Fundamentals and Applications. Edición 2ª. CRCPress

  16. A Randomized Controlled Trial of a Mobile Clinical Decision Aid to Improve Access to Kidney Transplantation: iChoose Kidney

    PubMed Central

    Patzer, Rachel E.; Basu, Mohua; Mohan, Sumit; Smith, Kayla D.; Wolf, Michael; Ladner, Daniela; Friedewald, John J.; Chiles, Mariana; Russell, Allison; McPherson, Laura; Gander, Jennifer; Pastan, Stephen

    2016-01-01

    Kidney transplantation is the preferred treatment for patients with end-stage renal disease, as it substantially increases a patient's survival and is cost saving compared to a lifetime of dialysis. However, transplantation is not universally chosen by patients with renal failure, and limited knowledge about the survival benefit of transplantation vs. dialysis may play a role. We created a mobile application clinical decision aid called iChoose Kidney to improve access to individualized prognosis information comparing dialysis and transplantation outcomes. We describe the iChoose Kidney study, a randomized controlled trial designed to test the clinical efficacy of a mobile health decision aid among end-stage renal disease patients referred for kidney transplantation at three large, diverse transplant centers across the U.S. Approximately 450 patients will be randomized to receive either: (1) standard of care or “usual” transplantation education, or (2) standard of care plus iChoose Kidney. The primary outcome is change in knowledge about the survival benefit of kidney transplantation vs. dialysis from baseline to immediate follow-up; secondary outcomes include change in treatment preferences, improved decisional conflict, and increased access to kidney transplantation. Analyses are also planned to examine effectiveness across subgroups of race, socioeconomic status, health literacy and health numeracy. Engaging patients in health care choices can increase patient empowerment and improve knowledge and understanding of treatment choices. If the effectiveness of iChoose Kidney has a greater impact on patients with low health literacy, lower socioeconomic status, and minority race, this decision aid could help reduce disparities in access to kidney transplantation. PMID:27610423

  17. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  18. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  19. Heartbeat-driven medium-access control for body sensor networks.

    PubMed

    Li, Huaming; Tan, Jindong

    2010-01-01

    In this paper, a novel time division multiple access based MAC protocol designed for body sensor networks (BSNs) is presented. H-medium-access control (MAC) aims to improve BSNs energy efficiency by exploiting heartbeat rhythm information, instead of using periodic synchronization beacons, to perform time synchronization. Heartbeat rhythm is inherent in every human body and observable in various biosignals. Biosensors in a BSN can extract the heartbeat rhythm from their own sensory data by detecting waveform peaks. All rhythms represented by peak sequences are naturally synchronized since they are driven by the same source, i.e., the heartbeat. Following the rhythm, biosensors can achieve time synchronization without having to turn on their radio to receive periodic timing information from a central controller, so that energy cost for time synchronization can be completely eliminated and the lifetime of the network can be prolonged. An active synchronization recovery scheme is also developed, including two resynchronization approaches. The algorithms are simulated using the discrete event simulator OMNet + + with real-world data from the Massachusetts Institute of Technology-Boston's Beth Israel Hospital multiparameter database Multiparameter Intelligent Monitoring for Intensive Care. The results show that H-MAC can prolong the network life dramatically.

  20. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  1. Modular control of fusion power heating applications

    SciTech Connect

    Demers, D. R.

    2012-08-24

    This work is motivated by the growing demand for auxiliary heating on small and large machines worldwide. Numerous present and planned RF experiments (EBW, Lower Hybrid, ICRF, and ECH) are increasingly complex systems. The operational challenges are indicative of a need for components of real-time control that can be implemented with a moderate amount of effort in a time- and cost-effective fashion. Such a system will improve experimental efficiency, enhance experimental quality, and expedite technological advancements. The modular architecture of this control-suite serves multiple purposes. It facilitates construction on various scales from single to multiple controller systems. It enables expandability of control from basic to complex via the addition of modules with varying functionalities. It simplifies the control implementation process by reducing layers of software and electronic development. While conceived with fusion applications in mind, this suite has the potential to serve a broad range of scientific and industrial applications. During the Phase-I research effort we established the overall feasibility of this modular control-suite concept. We developed the fundamental modules needed to implement open-loop active-control and demonstrated their use on a microwave power deposition experiment.

  2. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  3. Preliminary assessment of Tongue Drive System in medium term usage for computer access and wheelchair control.

    PubMed

    Yousefi, Behnaz; Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless, wearable assistive technology that enables individuals with severe motor impairments access computers, drive wheelchairs, and control their environments using tongue motion. In this paper, we have evaluated the TDS performance as a computer input device using ISO9241-9 standard tasks for pointing and selecting, based on the well known Fitts' Law, and as a powered wheelchair controller through an obstacle course navigation task. Nine able-bodied subjects who already had tongue piercing participated in this trial over 5 sessions during 5 weeks, allowing us to study the TDS learning process and its current limiting factors. Subjects worn tongue rings made of titanium in the form of a barbell with a small rare earth magnetic tracer hermetically sealed inside the upper ball. Comparing the results between 1(st) and 5(th) sessions showed that subjects' performance improved in all the measures through 5 sessions, demonstrating the effects of learning.

  4. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  5. Improved prediction of accessible surface area results in efficient energy function application.

    PubMed

    Iqbal, Sumaiya; Mishra, Avdesh; Hoque, Md Tamjidul

    2015-09-07

    An accurate prediction of real value accessible surface area (ASA) from protein sequence alone has wide application in the field of bioinformatics and computational biology. ASA has been helpful in understanding the 3-dimensional structure and function of a protein, acting as high impact feature in secondary structure prediction, disorder prediction, binding region identification and fold recognition applications. To enhance and support broad applications of ASA, we have made an attempt to improve the prediction accuracy of absolute accessible surface area by developing a new predictor paradigm, namely REGAd(3)p, for real value prediction through classical Exact Regression with Regularization and polynomial kernel of degree 3 which was further optimized using Genetic Algorithm. ASA assisting effective energy function, motivated us to enhance the accuracy of predicted ASA for better energy function application. Our ASA prediction paradigm was trained and tested using a new benchmark dataset, proposed in this work, consisting of 1001 and 298 protein chains, respectively. We achieved maximum Pearson Correlation Coefficient (PCC) of 0.76 and 1.45% improved PCC when compared with existing top performing predictor, SPINE-X, in ASA prediction on independent test set. Furthermore, we modeled the error between actual and predicted ASA in terms of energy and combined this energy linearly with the energy function 3DIGARS which resulted in an effective energy function, namely 3DIGARS2.0, outperforming all the state-of-the-art energy functions. Based on Rosetta and Tasser decoy-sets 3DIGARS2.0 resulted 80.78%, 73.77%, 141.24%, 16.52%, and 32.32% improvement over DFIRE, RWplus, dDFIRE, GOAP and 3DIGARS respectively.

  6. Industrial application of fuzzy control in bioprocesses.

    PubMed

    Honda, Hiroyuki; Kobayashi, Takeshi

    2004-01-01

    In a bioprocess, for example a fermentation process, many biological reactions are always working in intracellular space and the control of such a process is very complicated. Bioprocesses have therefore been controlled by the judgment of the experts who are the skilled operators and have much experience in the control of such processes. Such experience is normally described in terms of linguistic IF-THEN rules. Fuzzy inference is a powerful tool for incorporating linguistic rules into computer control of such processes. Fuzzy control is divided into two types--direct fuzzy control of process variables, for example sugar feed rate and fermentation temperature, and indirect control via phase recognition. In bioprocess control the experts decide the value of controllable process variables such as sugar feed rate or temperature as output data from several state variables as input data. Fuzzy control is regarded as a computational algorithm in which the causal relationship between input and output data are incorporated. In Japan fuzzy control has already been applied to practical industrial processes such as production of pravastatin precursor and vitamin B2 and to the Japanese sake mashing process; these examples are reviewed. In addition, an advanced control tool developed from a study on fuzzy control, fuzzy neural networks (FNN), are introduced. FNN can involve complicated causality between input and output data in a network model. FNN have been proven to be applicable to a research in biomedicine, for example modeling of the complicated causality between electroencephalogram or gene expression profiling data and prognostic prediction. Successful results on this research will be also explained.

  7. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... that the DEA registration and State authorization(s) to practice and, where applicable, State... must be a DEA registrant. (d) A registrant's permission to indicate that controlled substances...) The individual practitioner's DEA registration expires, unless the registration has been renewed....

  8. Reinventing User Applications for Mission Control

    NASA Technical Reports Server (NTRS)

    Trimble, Jay Phillip; Crocker, Alan R.

    2010-01-01

    In 2006, NASA Ames Research Center's (ARC) Intelligent Systems Division, and NASA Johnson Space Centers (JSC) Mission Operations Directorate (MOD) began a collaboration to move user applications for JSC's mission control center to a new software architecture, intended to replace the existing user applications being used for the Space Shuttle and the International Space Station. It must also carry NASA/JSC mission operations forward to the future, meeting the needs for NASA's exploration programs beyond low Earth orbit. Key requirements for the new architecture, called Mission Control Technologies (MCT) are that end users must be able to compose and build their own software displays without the need for programming, or direct support and approval from a platform services organization. Developers must be able to build MCT components using industry standard languages and tools. Each component of MCT must be interoperable with other components, regardless of what organization develops them. For platform service providers and MOD management, MCT must be cost effective, maintainable and evolvable. MCT software is built from components that are presented to users as composable user objects. A user object is an entity that represents a domain object such as a telemetry point, a command, a timeline, an activity, or a step in a procedure. User objects may be composed and reused, for example a telemetry point may be used in a traditional monitoring display, and that same telemetry user object may be composed into a procedure step. In either display, that same telemetry point may be shown in different views, such as a plot, an alpha numeric, or a meta-data view and those views may be changed live and in place. MCT presents users with a single unified user environment that contains all the objects required to perform applicable flight controller tasks, thus users do not have to use multiple applications, the traditional boundaries that exist between multiple heterogeneous

  9. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  10. Contactless Magnetic Gear for Robot Control Application

    NASA Astrophysics Data System (ADS)

    Komiyama, Hiroki; Uchimura, Yutaka

    This paper describes the application of a magnetic gear to a robot by fulfilling the essential requirements for a robot control, which are velocity control, position control, and force control. A magnetic gear is a transmission device that realizes contactless torque transmission by applying a magnetic force. When using a magnetic gear, cogging torque and spring characteristics need to be considered. In this paper, we introduce an approximate model of cogging torque. This model is used for velocity control to attenuate the disturbance due to cogging torque. In the case of position control, the oscillations due to the spring effect of the magnetic attractive force become a problem. To reduce the adverse effect due to these oscillations, resonance ratio control is applied. We also propose to use a magnetic gear for realizing the force sensorless bilateral control of teleoperation. Thanks to the frictionless transmission of a magnetic gear, the force sensorless estimation of a reaction force can be realized using a reaction force observer.

  11. Quantitative trait loci controlling light and hormone response in two accessions of Arabidopsis thaliana.

    PubMed Central

    Borevitz, Justin O; Maloof, Julin N; Lutes, Jason; Dabi, Tsegaye; Redfern, Joanna L; Trainer, Gabriel T; Werner, Jonathan D; Asami, Tadao; Berry, Charles C; Weigel, Detlef; Chory, Joanne

    2002-01-01

    We have mapped quantitative trait loci (QTL) responsible for natural variation in light and hormone response between the Cape Verde Islands (Cvi) and Landsberg erecta (Ler) accessions of Arabidopsis thaliana using recombinant inbred lines (RILs). Hypocotyl length was measured in four light environments: white, blue, red, and far-red light and in the dark. In addition, white light plus gibberellin (GA) and dark plus the brassinosteroid biosynthesis inhibitor brassinazole (BRZ) were used to detect hormone effects. Twelve QTL were identified that map to loci not previously known to affect light response, as well as loci where candidate genes have been identified from known mutations. Some QTL act in all environments while others show genotype-by-environment interaction. A global threshold was established to identify a significant epistatic interaction between two loci that have few main effects of their own. LIGHT1, a major QTL, has been confirmed in a near isogenic line (NIL) and maps to a new locus with effects in all light environments. The erecta mutation can explain the effect of the HYP2 QTL in the blue, BRZ, and dark environments, but not in far-red. LIGHT2, also confirmed in an NIL, has effects in white and red light and shows interaction with GA. The phenotype and map position of LIGHT2 suggest the photoreceptor PHYB as a candidate gene. Natural variation in light and hormone response thus defines both new genes and known genes that control light response in wild accessions. PMID:11861571

  12. Controlled functionalization of nanoparticles & practical applications

    NASA Astrophysics Data System (ADS)

    Rashwan, Khaled

    With the increasing use of nanoparticles in both science and industry, their chemical modification became a significant part of nanotechnology. Unfortunately, most commonly used procedures provide just randomly functionalized materials. The long-term objective of our work is site- and stoichiometrically-controlled functionalization of nanoparticles with the utilization of solid supports and other nanostructures. On the examples of silica nanoparticles and titanium dioxide nanorods, we have obtained results on the solid-phase chemistry, method development, and modeling, which advanced us toward this goal. At the same time, we explored several applications of nanoparticles that will benefit from the controlled functionalization: imaging of titanium-dioxide-based photocatalysts, bioimaging by fluorescent nanoparticles, drug delivery, assembling of bone implants, and dental compositions. Titanium dioxide-based catalysts are known for their catalytic activity and their application in solar energy utilization such as photosplitting of water. Functionalization of titanium dioxide is essential for enhancing bone-titanium dioxide nanotube adhesion, and, therefore, for its application as an interface between titanium implants and bones. Controlled functionalization of nanoparticles should enhance sensitivity and selectivity of nanoassemblies for imaging and drug delivery applications. Along those lines, we studied the relationship between morphology and surface chemistry of nanoparticles, and their affinity to organic molecules (salicylic and caffeic acid) using Langmuir adsorption isotherms, and toward material surfaces using SEM- and TEM-imaging. We focused on commercial samples of titanium dioxide, titanium dioxide nanorods with and without oleic acid ligands, and differently functionalized silica nanoparticles. My work included synthesis, functionalization, and characterization of several types of nanoparticles, exploring their application in imaging, dentistry, and bone

  13. Investigation of Power Factor Controller Applications.

    DTIC Science & Technology

    1984-07-01

    16 V’. Auburn Report 16 Pacific Gas and Electric Study 25 San Diego Gas and Electric Study 34 Northern Natural Gas Study 42 6...application. San Diego Gas and Electric Study SDG&E’s testing was primarily to determine the effect the NASA PFC has on power consumption and power...Magdaluyo, and J. D. Huey, Three Phase Power Factor Controller Test (Internal Correspondence)(San Diego Gas and Electric Com- • .’-," pany, December 1981

  14. Applications of Neural Networks to Adaptive Control

    DTIC Science & Technology

    1989-12-01

    DTIC ;- E py 00 NAVAL POSTGRADUATE SCHOOL Monterey, California I.$ RDTIC IELECTE fl THESIS BEG7V°U APPLICATIONS OF NEURAL NETWORKS TO ADAPTIVE CONTROL...Second keader E . Robert Wood, Chairman, Department of Aeronautics and Astronautics Gordoii E . Schacher, Dean of Faculty and Graduate Education ii ABSTRACT...23: Network Dynamic Stability for q(t) . ............................. 55 ix Figure 24: Network Dynamic Stability for e (t

  15. [Assessment of exposure to cancerogenic aromatic hydrocarbon during controlled-access highways management activities].

    PubMed

    Martinotti, I; Cirla, A M; Cottica, D; Cirla, P E

    2011-01-01

    The purpose of this study was an integrated assessment of exposure to benzene and Polycyclic Aromatic Hydrocarbons (PAH) in 29 workers employed to manage a controlled-access highways. A campaign was performed in summertime by environmental monitoring (active and passive airborne personal sampler), as well as by biological monitoring (urine samples of the beginning and of the end of daily shift, baseline after two days of vacation). The measured environmental levels did not differ from background environmental concentrations found in a metropolitan area (i.e. benzo[a]pyrene < 1 ng/m3; benzene < 5 mcg/m3), and the results of biological monitoring were in agreement and were compatible with extra-professional habits of the investigated subjects (1-hydroxipyrene 50-990 ng/g creatinine; unmetabolized benzene 15-2010 ng/I; t-t muconic acid < 4-222 mcg/g creatinine).

  16. A time tree medium access control for energy efficiency and collision avoidance in wireless sensor networks.

    PubMed

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme.

  17. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  18. Study protocol for a cluster-randomised controlled trial of an NCD access to medicines initiative: evaluation of Novartis Access in Kenya

    PubMed Central

    Rockers, Peter C; Wirtz, Veronika J; Vian, Taryn; Onyango, Monica A; Ashigbie, Paul G; Laing, Richard

    2016-01-01

    Introduction Novartis recently launched Novartis Access, an initiative to provide a basket of reduced price medicines for non-communicable diseases (NCDs) to be sold through the public and private non-profit sectors in programme countries. This study will evaluate the impact of Novartis Access on the availability and price of NCD medicines at health facilities and households in Kenya, the first country to receive the programme. Methods and analysis This study will be a cluster-randomised controlled trial. 8 counties in Kenya will be randomly assigned to the intervention or control group using a covariate constrained randomisation method to maximise balance on demographic and health characteristics. In intervention counties, public and private non-profit health facilities will be able to order Novartis Access NCD medicines from the Mission for Essential Drugs and Supplies (MEDS). Data will be collected from a random sample of 384 health facilities and 800 households at baseline, midline after 1-year of intervention, and end-line after 2 years. Quarterly surveillance data will also be collected from health facilities and a subsample of households through phone-based interviews. Households will be eligible if at least one resident has been previously diagnosed and prescribed a medicine for an NCD addressed by Novartis Access, including hypertension and diabetes. The primary outcomes will be availability and price of NCD medicines at health facilities, and availability, price, and expenditures on NCD medicines at households. Impacts will be estimated using intention-to-treat analysis. Ethics and dissemination This protocol was approved by the Institutional Review Boards at Strathmore University and at Boston University. Informed consent will be obtained from all participants at the start of the trial. The findings of the trial will be disseminated through peer-reviewed journals, international conferences, and meetings and events organised with local stakeholders

  19. Self-assembled tin dioxide for forming-free resistive random-access memory application

    NASA Astrophysics Data System (ADS)

    Hong, Ying-Jhan; Wang, Tsang-Hsuan; Wei, Shih-Yuan; Chang, Pin; Yew, Tri-Rung

    2016-06-01

    A novel resistive switching structure, tin-doped indium oxide (ITO)/SnO2- x (defined as SnO2 with oxygen vacancies)/SnS was demonstrated with a set voltage of 0.38 V, a reset voltage of -0.15 V, a ratio of high resistance to low resistance of 544, and forming-free and nonlinear current-voltage (I-V) characteristics. The interface of the ITO and the self-assembled SnO2- x contributed to the resistive switching behavior. This device showed great potential for resistive random access memory (RRAM) application and solving the sneak path problem in cross-bar memory arrays. Furthermore, a nanostructured resistive switching device was demonstrated successfully.

  20. Resonant mode controllers for launch vehicle applications

    NASA Technical Reports Server (NTRS)

    Schreiner, Ken E.; Roth, Mary Ellen

    1992-01-01

    Electro-mechanical actuator (EMA) systems are currently being investigated for the National Launch System (NLS) as a replacement for hydraulic actuators due to the large amount of manpower and support hardware required to maintain the hydraulic systems. EMA systems in weight sensitive applications, such as launch vehicles, have been limited to around 5 hp due to system size, controller efficiency, thermal management, and battery size. Presented here are design and test data for an EMA system that competes favorably in weight and is superior in maintainability to the hydraulic system. An EMA system uses dc power provided by a high energy density bipolar lithium thionyl chloride battery, with power conversion performed by low loss resonant topologies, and a high efficiency induction motor controlled with a high performance field oriented controller to drive a linear actuator.

  1. Resonant mode controllers for launch vehicle applications

    NASA Astrophysics Data System (ADS)

    Schreiner, Ken E.; Roth, Mary Ellen

    Electro-mechanical actuator (EMA) systems are currently being investigated for the National Launch System (NLS) as a replacement for hydraulic actuators due to the large amount of manpower and support hardware required to maintain the hydraulic systems. EMA systems in weight sensitive applications, such as launch vehicles, have been limited to around 5 hp due to system size, controller efficiency, thermal management, and battery size. Presented here are design and test data for an EMA system that competes favorably in weight and is superior in maintainability to the hydraulic system. An EMA system uses dc power provided by a high energy density bipolar lithium thionyl chloride battery, with power conversion performed by low loss resonant topologies, and a high efficiency induction motor controlled with a high performance field oriented controller to drive a linear actuator.

  2. Actively controlled shaft seals for aerospace applications

    NASA Technical Reports Server (NTRS)

    Salant, Richard F.

    1994-01-01

    This study experimentally investigates an actively controlled mechanical seal for aerospace applications. The seal of interest is a gas seal, which is considerably more compact than previous actively controlled mechanical seals that were developed for industrial use. In a mechanical seal, the radial convergence of the seal interface has a primary effect on the film thickness. Active control of the film thickness is established by controlling the radial convergence of the seal interface with piezoelectric actuator. An actively controlled mechanical seal was initially designed and evaluated using a mathematical model. Based on these results, a seal was fabricated and tested under laboratory conditions. The seal was tested with both helium and air, at rotational speeds up to 3770 rad/sec, and at sealed pressures as high as 1.48 x 10(exp 6) Pa. The seal was operated with both manual control and with a closed-loop control system that used either the leakage rate or face temperature as the feedback. The output of the controller was the voltage applied to the piezoelectric actuator. The seal operated successfully for both short term tests (less than one hour) and for longer term tests (four hours) with a closed-loop control system. The leakage rates were typically 5-15 slm (standard liters per minute), and the face temperatures were generally maintained below 100 C. When leakage rate was used as the feedback signal, the setpoint leakage rate was typically maintained within 1 slm. However, larger deviations occurred during sudden changes in sealed pressure. When face temperature was used as the feedback signal, the setpoint face temperature was generally maintained within 3 C, with larger deviations occurring when the sealed pressure changed suddenly.

  3. Unified Desktop for Monitoring & Control Applications - The Open Navigator Framework Applied for Control Centre and EGSE Applications

    NASA Astrophysics Data System (ADS)

    Brauer, U.

    2007-08-01

    The Open Navigator Framework (ONF) was developed to provide a unified and scalable platform for user interface integration. The main objective for the framework was to raise usability of monitoring and control consoles and to provide a reuse of software components in different application areas. ONF is currently applied for the Columbus onboard crew interface, the commanding application for the Columbus Control Centre, the Columbus user facilities specialized user interfaces, the Mission Execution Crew Assistant (MECA) study and EADS Astrium internal R&D projects. ONF provides a well documented and proven middleware for GUI components (Java plugin interface, simplified concept similar to Eclipse). The overall application configuration is performed within a graphical user interface for layout and component selection. The end-user does not have to work in the underlying XML configuration files. ONF was optimized to provide harmonized user interfaces for monitoring and command consoles. It provides many convenience functions designed together with flight controllers and onboard crew: user defined workspaces, incl. support for multi screens efficient communication mechanism between the components integrated web browsing and documentation search &viewing consistent and integrated menus and shortcuts common logging and application configuration (properties) supervision interface for remote plugin GUI access (web based) A large number of operationally proven ONF components have been developed: Command Stack & History: Release of commands and follow up the command acknowledges System Message Panel: Browse, filter and search system messages/events Unified Synoptic System: Generic synoptic display system Situational Awareness : Show overall subsystem status based on monitoring of key parameters System Model Browser: Browse mission database defintions (measurements, commands, events) Flight Procedure Executor: Execute checklist and logical flow interactive procedures Web

  4. Controlling multidrug-resistant tuberculosis and access to expensive drugs: a rational framework.

    PubMed Central

    Pablos-Mendez, Ariel; Gowda, Deepthiman K.; Frieden, Thomas R.

    2002-01-01

    The emergence and spread of multidrug-resistant tuberculosis (MDR-TB), i.e. involving resistance to at least isoniazid and rifampicin, could threaten the control of TB globally. Controversy has emerged about the best way of confronting MDR-TB in settings with very limited resources. In 1999, the World Health Organization (WHO) created a working group on DOTS-Plus, an initiative exploring the programmatic feasibility and cost-effectiveness of treating MDR-TB in low-income and middle-income countries, in order to consider the management of MDR-TB under programme conditions. The challenges of implementation have proved more daunting than those of access to second-line drugs, the prices of which are dropping. Using data from the WHO/International Union Against Tuberculosis and Lung Disease surveillance project, we have grouped countries according to the proportion of TB patients completing treatment successfully and the level of MDR-TB among previously untreated patients. The resulting matrix provides a reasonable framework for deciding whether to use second-line drugs in a national programme. Countries in which the treatment success rate, i.e. the proportion of new patients who complete the scheduled treatment, irrespective of whether bacteriological cure is documented, is below 70% should give the highest priority to introducing or improving DOTS, the five-point TB control strategy recommended by WHO and the International Union Against Tuberculosis and Lung Disease. A poorly functioning programme can create MDR-TB much faster than it can be treated, even if unlimited resources are available. There is no single prescription for controlling MDR-TB but the various tools available should be applied wisely. Firstly, good DOTS and infection control; then appropriate use of second-line drug treatment. The interval between the two depends on the local context and resources. As funds are allocated to treat MDR-TB, human and financial resources should be increased to expand

  5. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  6. Examination of new environmental control applications.

    PubMed

    Vincent, Claude; Drouin, Gilbert; Routhier, François

    2002-01-01

    The aim of this study was to examine the application of new Environmental Control Systems (ECSs) in the homes of users and caregivers. The research questions were: (1) Can new ECS applications improve the activities of daily living (ADL) of people with significant functional limitations who require personal assistance? (2) Can new ECS applications replace home services and lessen caregiver burden? To answer these questions, user satisfaction regarding ECS applications, impact on ADL, technical performance, and caregiver burden were examined. This collaborative investigation involving a local community health care center, a telephone monitoring service, an industrial partner, and a university research team used a case study approach. Five users with moderate cognitive problems or significant functional limitations who required personal assistance were chosen, along with their caregivers, for a 3-month in-home trial to test new ECS alternatives. The ECS in the study featured remote control functions (e.g., door lock release, outside intercom), specific verbal reminders (e.g., reminders to turn off stove elements), and automatic functions (e.g., night-lights in the bathroom and hallway). Information was collected in the users' homes with three standardized questionnaires and a company-designed questionnaire. The overall technical performance of the ECS was found to be in most cases moderately efficient. Participant satisfaction revealed that ECS alternatives needed improvement with respect to the service aspects such as follow-up services and repair/servicing. Caregiver burden was lessened for psychological aspects but not for physical tasks. Users seemed to have a positive perception of the impact of the ECS on many of their ADL. We learned six lessons from this 15-month case study, namely: (1) the use of remote control by people with moderate cognitive impairments was difficult; (2) verbal reminders were greatly appreciated; (3) the automatic ECS applications needed

  7. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  8. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  9. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  10. Actively Controlled Shaft Seals for Aerospace Applications

    NASA Technical Reports Server (NTRS)

    Salant, Richard F.; Wolff, Paul

    1995-01-01

    This study experimentally investigates an actively controlled mechanical seal for aerospace applications. The seal of interest is a gas seal, which is considerably more compact than previous actively controlled mechanical seals that were developed for industrial use. In a mechanical seal, the radial convergence of the seal interface has a primary effect on the film thickness. Active control of the film thickness is established by controlling the radial convergence of the seal interface with a piezoelectric actuator. An actively controlled mechanical seal was initially designed and evaluated using a mathematical model. Based on these results, a seal was fabricated and tested under laboratory conditions. The seal was tested with both helium and air, at rotational speeds up to 3770 rad/sec, and at sealed pressures as high as 1.48 x 10(exp 6) Pa. The seal was operated with both manual control and with a closed-loop control system that used either the leakage rate or face temperature as the feedback. The output of the controller was the voltage applied to the piezoelectric actuator. The seal operated successfully for both short term tests (less than one hour) and for longer term tests (four hours) with a closed-loop control system. The leakage rates were typically 5-15 slm (standard liters per minute), and the face temperatures were generally maintained below 100C. When leakage rate was used as the feedback signal, the setpoint leakage rate was typically maintained within 1 slm. However, larger deviations occurred during sudden changes in sealed pressure. When face temperature was used as the feedback signal, the setpoint face temperature was generally maintained within 3 C, with larger deviations occurring when the sealed pressure changes suddenly. the experimental results were compared to the predictions from the mathematical model. The model was successful in predicting the trends in leakage rate that occurred as the balance ratio and sealed pressure changed

  11. Actively controlled shaft seals for aerospace applications

    NASA Astrophysics Data System (ADS)

    Salant, Richard F.

    1995-07-01

    This study experimentally investigates an actively controlled mechanical seal for aerospace applications. The seal of interest is a gas seal, which is considerably more compact than previous actively controlled mechanical seals that were developed for industrial use. In a mechanical seal, the radial convergence of the seal interface has a primary effect on the film thickness. Active control of the film thickness is established by controlling the radial convergence of the seal interface with a piezoelectric actuator. An actively controlled mechanical seal was initially designed and evaluated using a mathematical model. Based on these results, a seal was fabricated and tested under laboratory conditions. The seal was tested with both helium and air, at rotational speeds up to 3770 rad/sec, and at sealed pressures as high as 1.48 x 10(exp 6) Pa. The seal was operated with both manual control and with a closed-loop control system that used either the leakage rate or face temperature as the feedback. The output of the controller was the voltage applied to the piezoelectric actuator. The seal operated successfully for both short term tests (less than one hour) and for longer term tests (four hours) with a closed-loop control system. The leakage rates were typically 5-15 slm (standard liters per minute), and the face temperatures were generally maintained below 100C. When leakage rate was used as the feedback signal, the setpoint leakage rate was typically maintained within 1 slm. However, larger deviations occurred during sudden changes in sealed pressure. When face temperature was used as the feedback signal, the setpoint face temperature was generally maintained within 3 C, with larger deviations occurring when the sealed pressure changes suddenly. the experimental results were compared to the predictions from the mathematical model. The model was successful in predicting the trends in leakage rate that occurred as the balance ratio and sealed pressure changed

  12. ProtSA: a web application for calculating sequence specific protein solvent accessibilities in the unfolded ensemble

    PubMed Central

    Estrada, Jorge; Bernadó, Pau; Blackledge, Martin; Sancho, Javier

    2009-01-01

    Background The stability of proteins is governed by the heat capacity, enthalpy and entropy changes of folding, which are strongly correlated to the change in solvent accessible surface area experienced by the polypeptide. While the surface exposed in the folded state can be easily determined, accessibilities for the unfolded state at the atomic level cannot be obtained experimentally and are typically estimated using simplistic models of the unfolded ensemble. A web application providing realistic accessibilities of the unfolded ensemble of a given protein at the atomic level will prove useful. Results ProtSA, a web application that calculates sequence-specific solvent accessibilities of the unfolded state ensembles of proteins has been developed and made freely available to the scientific community. The input is the amino acid sequence of the protein of interest. ProtSA follows a previously published calculation protocol which uses the Flexible-Meccano algorithm to generate unfolded conformations representative of the unfolded ensemble of the protein, and uses the exact analytical software ALPHASURF to calculate atom solvent accessibilities, which are averaged on the ensemble. Conclusion ProtSA is a novel tool for the researcher investigating protein folding energetics. The sequence specific atom accessibilities provided by ProtSA will allow obtaining better estimates of the contribution of the hydrophobic effect to the free energy of folding, will help to refine existing parameterizations of protein folding energetics, and will be useful to understand the influence of point mutations on protein stability. PMID:19356231

  13. Application of SQL database to the control system of MOIRCS

    NASA Astrophysics Data System (ADS)

    Yoshikawa, Tomohiro; Omata, Koji; Konishi, Masahiro; Ichikawa, Takashi; Suzuki, Ryuji; Tokoku, Chihiro; Uchimoto, Yuka Katsuno; Nishimura, Tetsuo

    2006-06-01

    MOIRCS (Multi-Object Infrared Camera and Spectrograph) is a new instrument for the Subaru telescope. In order to perform observations of near-infrared imaging and spectroscopy with cold slit mask, MOIRCS contains many device components, which are distributed on an Ethernet LAN. Two PCs wired to the focal plane array electronics operate two HAWAII2 detectors, respectively, and other two PCs are used for integrated control and quick data reduction, respectively. Though most of the devices (e.g., filter and grism turrets, slit exchange mechanism for spectroscopy) are controlled via RS232C interface, they are accessible from TCP/IP connection using TCP/IP to RS232C converters. Moreover, other devices are also connected to the Ethernet LAN. This network distributed structure provides flexibility of hardware configuration. We have constructed an integrated control system for such network distributed hardwares, named T-LECS (Tohoku University - Layered Electronic Control System). T-LECS has also network distributed software design, applying TCP/IP socket communication to interprocess communication. In order to help the communication between the device interfaces and the user interfaces, we defined three layers in T-LECS; an external layer for user interface applications, an internal layer for device interface applications, and a communication layer, which connects two layers above. In the communication layer, we store the data of the system to an SQL database server; they are status data, FITS header data, and also meta data such as device configuration data and FITS configuration data. We present our software system design and the database schema to manage observations of MOIRCS with Subaru.

  14. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    NASA Astrophysics Data System (ADS)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  15. Solartrak{trademark} controller developments for today`s applications

    SciTech Connect

    Maish, A.B.; O`Neill, M.; West, R.; Shugar, D.S.

    1995-12-31

    The SolarTrak{trademark} array tracking controller, originally developed and licensed by Sandia National Laboratories as a low-cost, high-accuracy, reliable controller for photovoltaic (PV) concentrator arrays, has undergone significant development to make tracking accessible to a much broader segment of the PV market. Hardware and software improvements (1) reduce power consumption for PV/battery- powered applications, (2) enable the controller to connect directly with low-cost, off-the-shelf, television satellite dish actuators, (3) enable on-site setup without an additional input board, (4) increase clock accuracy by providing daily and weekly adjustments to the on board clock, and (5) include a low-cost wind stow sensor. The result is a stand-alone tracking system sufficiently low cost and reliable to make 1-kW tracking systems practical for flat plate and concentrating arrays. Results of a year of testing are presented showing clock accuracy better than a minute per year can be maintained.

  16. Rocket-Based Combined-Cycle Propulsion Technology for Access-to-Space Applications

    NASA Technical Reports Server (NTRS)

    Hueter, Uwe

    1999-01-01

    NASA's Office of Aero-Space Technology (OAST) established three major goals, referred to as, "The Three Pillars for Success". The Advanced Space Transportation Program Office (ASTP) at the NASA's Marshall Space Flight Center (MSFC) in Huntsville, Ala. focuses on future space transportation technologies under the "Access to Space" pillar. One of the main activities over the past three years has been on advancing the hydrogen fueled rocket-based combined cycle (RBCC) technologies. The RBCC effort that was completed early this year was the initial step leading to flight demonstrations of the technology for space launch vehicle propulsion. Aerojet and Boeing-Rocketdyne designed, built and ground tested their RBCC engine concepts. In addition, ASTROX, Georgia Institute of Technology, McKinney Associates, Pennsylvania State University (PSU), and University of Alabama in Huntsville conducted supporting activities. The RBCC activity included ground testing of components (e.g., injectors, thrusters, ejectors and inlets) and integrated flowpaths. Inlet testing was performed at the Lewis Research Center's 1 x 1 wind tunnel. All direct connect and free-jet engine testing were conducted at the GASL facilities on Long Island, New York. Testing spanned the Mach range from sea level static to Mach 8. Testing of the rocket-only mode, simulating the final phase of the ascent mission profile, was also performed. The originally planned work on these contracts was completed in 1999. Follow-on activities have been initiated for both hydrogen and hydrocarbon fueled RBCC concepts. Studies to better understand system level issues with the integration of RBCC propulsion with earth-to-orbit vehicles have also been conducted. This paper describes the status, progress and future plans of the RBCC activities funded by NASA/MSFC with a major focus on the benefits of utilizing air-breathing combined-cycle propulsion in access-to-space applications.

  17. Rapid access to information resources in clinical biochemistry: medical applications of Personal Digital Assistants (PDA).

    PubMed

    Serdar, Muhittin A; Turan, Mustafa; Cihan, Murat

    2008-06-01

    Laboratory specialists currently need to access scientific-based information at anytime and anywhere. A considerable period of time and too much effort are required to access this information through existing accumulated data. Personal digital assistants (PDA) are supposed to provide an effective solution with commercial software for this problem. In this study, 11 commercial software products (UpToDate, ePocrates, Inforetrive, Pepid, eMedicine, FIRST Consult, and 5 laboratory e-books released by Skyscape and/or Isilo) were selected and the benefits of their use were evaluated by seven laboratory specialists. The assessment of the software was performed based on the number of the tests included, the software content of detailed information for each test-like process, method, interpretation of results, reference ranges, critical values, interferences, equations, pathophysiology, supplementary technical details such as sample collection principles, and additional information such as linked references, evidence-based data, test cost, etc. In terms of technique, the following items are considered: the amount of memory required to run the software, the graphical user interface, which is a user-friendly instrument, and the frequency of new and/or up-date releases. There is still no perfect program, as we have anticipated. Interpretation of laboratory results may require software with an integrated program. However, methodological data are mostly not included in the software evaluated. It seems that these shortcomings will be fixed in the near future, and PDAs and relevant medical applications will also become indispensable for all physicians including laboratory specialists in the field of training/education and in patient care.

  18. Giving High School Students a Research Grade Radio Telescope to Control; Motivational Results from Access to Real Scientific Tools

    NASA Astrophysics Data System (ADS)

    Kohrs, Russell; Langston, G.; Heatherly, S.

    2013-01-01

    Have you ever wondered what it might be like to place control of a six-story building in the hands of eager high school students? This past summer, the USNO 20m telescope at the National Radio Astronomy Observatory, Green Bank, WV was brought back online for just such a purpose. This telescope is equipped with an X-band receiver, capable of observing center frequencies from 8-10 GHz and is the first radio telescope accessible by students and observers through the SKYNET telescope network. Operated remotely with a queue-based system, students can now collect real radio data for any range of projects. This past summer, five lessons were written that were tailor-made for student exploration of radio astronomy. Each lesson explores various radio objects in the context of an action-packed sci-fi adventure. Some of the work required to bring the 20m online for student use will be discussed here, but the main focus of this presentation will be how this work has been received by the author’s own students in its first classroom application. Topics that are normally difficult to discuss with students in an inquiry-based classroom setting, such as HII regions, synchrotron radiation, lunar temperature profiles, and galactic supermassive black holes were addressed in the classroom using the lessons developed by the author for the 20m as well as data collected by students using the telescope via SKYNET.

  19. Motor control theories and their applications.

    PubMed

    Latash, Mark L; Levin, Mindy F; Scholz, John P; Schöner, Gregor

    2010-01-01

    We describe several influential hypotheses in the field of motor control including the equilibrium-point (referent configuration) hypothesis, the uncontrolled manifold hypothesis, and the idea of synergies based on the principle of motor abundance. The equilibrium-point hypothesis is based on the idea of control with thresholds for activation of neuronal pools; it provides a framework for analysis of both voluntary and involuntary movements. In particular, control of a single muscle can be adequately described with changes in the threshold of motor unit recruitment during slow muscle stretch (threshold of the tonic stretch reflex). Unlike the ideas of internal models, the equilibrium-point hypothesis does not assume neural computations of mechanical variables. The uncontrolled manifold hypothesis is based on the dynamic system approach to movements; it offers a toolbox to analyze synergic changes within redundant sets of elements related to stabilization of potentially important performance variables. The referent configuration hypothesis and the principle of abundance can be naturally combined into a single coherent scheme of control of multi-element systems. A body of experimental data on healthy persons and patients with movement disorders are reviewed in support of the mentioned hypotheses. In particular, movement disorders associated with spasticity are considered as consequences of an impaired ability to shift threshold of the tonic stretch reflex within the whole normal range. Technical details and applications of the mentioned hypo-theses to studies of motor learning are described. We view the mentioned hypotheses as the most promising ones in the field of motor control, based on a solid physical and neurophysiological foundation.

  20. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon.

    PubMed

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S

    2015-06-15

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome-Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S-RQC and 80S-Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome-translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel.

  1. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon

    PubMed Central

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S.

    2015-01-01

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome–Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S–RQC and 80S–Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome–translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel. PMID:25877867

  2. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  3. Controlling the taste receptor accessible structure of rebaudioside A via binding to bovine serum albumin.

    PubMed

    Mudgal, Samriddh; Keresztes, Ivan; Feigenson, Gerald W; Rizvi, S S H

    2016-04-15

    We illustrate a method that uses bovine serum albumin (BSA) to control the receptor-accessible part of rebaudioside A (Reb A). The critical micelle concentration (CMC) of Reb A was found to be 4.5 mM and 5 mM at pH 3 and 6.7 respectively. NMR studies show that below its CMC, Reb A binds weakly to BSA to generate a Reb A-protein complex ("RPC"), which is only modestly stable under varying conditions of pH (3.0-6.7) and temperature (4-40°C) with its binding affinities determined to be in the range of 5-280 mM. Furthermore, saturation transfer difference (STD) NMR experiments confirm that the RPC has fast exchange of the bitterness-instigating diterpene of Reb A into the binding sites of BSA. Our method can be used to alter the strength of Reb A-receptor interaction, as a result of binding of Reb A to BSA, which may ultimately lead to moderation of its taste.

  4. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  5. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  6. 50 CFR 622.372 - Limited access system for king mackerel gillnet permits applicable in the southern Florida west...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false Limited access system for king mackerel gillnet permits applicable in the southern Florida west coast subzone. 622.372 Section 622.372 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF...

  7. 50 CFR 622.372 - Limited access system for king mackerel gillnet permits applicable in the southern Florida west...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Limited access system for king mackerel gillnet permits applicable in the southern Florida west coast subzone. 622.372 Section 622.372 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF...

  8. 36 CFR 13.1142 - Can I appeal denial of my commercial fishing lifetime access permit application?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 1 2014-07-01 2014-07-01 false Can I appeal denial of my commercial fishing lifetime access permit application? 13.1142 Section 13.1142 Parks, Forests, and Public... Regulations-Glacier Bay National Park and Preserve Commercial Fishing § 13.1142 Can I appeal denial of...

  9. 36 CFR 13.1142 - Can I appeal denial of my commercial fishing lifetime access permit application?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Can I appeal denial of my commercial fishing lifetime access permit application? 13.1142 Section 13.1142 Parks, Forests, and Public... Regulations-Glacier Bay National Park and Preserve Commercial Fishing § 13.1142 Can I appeal denial of...

  10. 36 CFR 13.1142 - Can I appeal denial of my commercial fishing lifetime access permit application?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 1 2013-07-01 2013-07-01 false Can I appeal denial of my commercial fishing lifetime access permit application? 13.1142 Section 13.1142 Parks, Forests, and Public... Regulations-Glacier Bay National Park and Preserve Commercial Fishing § 13.1142 Can I appeal denial of...

  11. 36 CFR 13.1142 - Can I appeal denial of my commercial fishing lifetime access permit application?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 1 2011-07-01 2011-07-01 false Can I appeal denial of my commercial fishing lifetime access permit application? 13.1142 Section 13.1142 Parks, Forests, and Public... Regulations-Glacier Bay National Park and Preserve Commercial Fishing § 13.1142 Can I appeal denial of...

  12. 36 CFR 13.1142 - Can I appeal denial of my commercial fishing lifetime access permit application?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 1 2012-07-01 2012-07-01 false Can I appeal denial of my commercial fishing lifetime access permit application? 13.1142 Section 13.1142 Parks, Forests, and Public... Regulations-Glacier Bay National Park and Preserve Commercial Fishing § 13.1142 Can I appeal denial of...

  13. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  14. Chromhome: A rich internet application for accessing comparative chromosome homology maps

    PubMed Central

    Nagarajan, Sridevi; Rens, Willem; Stalker, James; Cox, Tony; Ferguson-Smith, Malcolm A

    2008-01-01

    Background Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. Results The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Conclusion Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to map entire genomes and helps focus only on relevant

  15. Exploration of perpendicular magnetic anisotropy material system for application in spin transfer torque - Random access memory

    NASA Astrophysics Data System (ADS)

    Natarajarathinam, Anusha

    Perpendicular magnetic anisotropy (PMA) materials have unique advantages when used in magnetic tunnel junctions (MTJ) which are the most critical part of spin-torque transfer random access memory devices (STT-RAMs) that are being researched intensively as future non-volatile memory technology. They have high magnetoresistance which improves their sensitivity. The STT-RAM has several advantages over competing technologies, for instance, low power consumption, non-volatility, ultra-fast read and write speed and high endurance. In personal computers, it can replace SRAM for high-speed applications, Flash for non-volatility, and PSRAM and DRAM for high-speed program execution. The main aim of this research is to identify and optimize the best perpendicular magnetic anisotropy (PMA) material system for application to STT-RAM technology. Preliminary search for perpendicular magnetic anisotropy (PMA) materials for pinned layer for MTJs started with the exploration and optimization of crystalline alloys such as Co50Pd50 alloy, Mn50Al50 and amorphous alloys such as Tb21Fe72Co7 and are first presented in this work. Further optimization includes the study of Co/[Pd/Pt]x multilayers (ML), and the development of perpendicular synthetic antiferromagnets (SAF) utilizing these multilayers. Focused work on capping and seed layers to evaluate interfacial perpendicular anisotropy in free layers for pMTJs is then discussed. Optimization of the full perpendicular magnetic tunnel junction (pMTJ) includes the CoFeB/MgO/CoFeB trilayer coupled to a pinned/pinning layer with perpendicular Co/[Pd/Pt]x SAF and a thin Ta seeded CoFeB free layer. Magnetometry, simulations, annealing studies, transport measurements and TEM analysis on these samples will then be presented.

  16. Low temperature pyrotechnic smokes: A potential low cost alternative to nonpyrotechnic smoke for access delay applications

    SciTech Connect

    Greenholt, C.J.

    1995-07-01

    Smokes are frequently used as visual obscurants in access delay applications. A new generation of low temperature pyrotechnic smokes is being developed. Terephthalic Acid (TPA) smoke was developed by the U.S. Army and Sebacic Acid (SA) smoke is being developed by Thiokol Corp. The advantages these smokes offer over traditional pyrotechnic smokes include; low generation temperature (approximately 450{degree}C), lower toxicity, and lower corrosivity. The low generation temperature reduces smoke layering effects and allows the addition of sensory irritants, such as o-Chlorobenzylidene Malononitrile (CS), to the formulation. Some advantages low temperature pyrotechnic smokes offer over nonpyrotechnic smokes include; low cost, simplicity, compactness, light weight, long storage life, and orientation insensitive operation. Low cost permits distribution of multiple units for reduced vulnerability and refill flexibility. Some disadvantages may include the combustibility of the smoke particulate; however, the published lower explosive limit of the mentioned materials is approximately ten times greater than the concentration required for effective obscuration. The TPA smoke cloud contains small quantities of benzene, formaldehyde, and carbon monoxide; no benzene or formaldehyde was identified during preliminary SA smoke analyses performed by Thiokol Corp. Sandia performed tests and analyses on TPA smoke to determine the smoke cloud composition, the quantity of particulate produced per canister, and the relationship between airborne particulate concentration and measured optical density values. Current activities include characterization of SA smoke.

  17. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    EPA Pesticide Factsheets

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  18. Application of control theory to dynamic systems simulation

    NASA Technical Reports Server (NTRS)

    Auslander, D. M.; Spear, R. C.; Young, G. E.

    1982-01-01

    The application of control theory is applied to dynamic systems simulation. Theory and methodology applicable to controlled ecological life support systems are considered. Spatial effects on system stability, design of control systems with uncertain parameters, and an interactive computing language (PARASOL-II) designed for dynamic system simulation, report quality graphics, data acquisition, and simple real time control are discussed.

  19. Supercomputer optimizations for stochastic optimal control applications

    NASA Technical Reports Server (NTRS)

    Chung, Siu-Leung; Hanson, Floyd B.; Xu, Huihuang

    1991-01-01

    Supercomputer optimizations for a computational method of solving stochastic, multibody, dynamic programming problems are presented. The computational method is valid for a general class of optimal control problems that are nonlinear, multibody dynamical systems, perturbed by general Markov noise in continuous time, i.e., nonsmooth Gaussian as well as jump Poisson random white noise. Optimization techniques for vector multiprocessors or vectorizing supercomputers include advanced data structures, loop restructuring, loop collapsing, blocking, and compiler directives. These advanced computing techniques and superconducting hardware help alleviate Bellman's curse of dimensionality in dynamic programming computations, by permitting the solution of large multibody problems. Possible applications include lumped flight dynamics models for uncertain environments, such as large scale and background random aerospace fluctuations.

  20. Various applications of Active Field Control (AFC)

    NASA Astrophysics Data System (ADS)

    Watanabe, Takayuki; Miyazaki, Hideo; Kishinaga, Shinji; Kawakami, Fukushi

    2003-10-01

    AFC is an electro-acoustic enhancement system, which has been under development at Yamaha Corporation. In this paper, several types of various AFC applications are discussed, while referring to representative projects for each application in Japan. (1) Realization of acoustics in a huge hall to classical music program, e.g., Tokyo International Forum. This venue is a multipurpose hall with approximately 5000 seats. AFC achieves loudness and reverberance equivalent to those of a hall with 2500 seats or fewer. (2) Optimization of acoustics for a variety of programs, e.g., Arkas Sasebo. AFC is used to create the optimum acoustics for each program, such as reverberance for classical concerts, acoustical support for opera singers, uniformity throughout the hall from the stage to under-balcony area, etc. (3) Control of room shape acoustical effect, e.g., Osaka Central Public Hall: In this renovation project, preservation of historically important architecture in the original form is required. AFC is installed to vary only the acoustical environment without architectural changes. (4) Assistance with crowd enthusiasm for sports entertainment, e.g., Tokyo Metropolitan Gymnasium. In this venue, which is designed as a very absorptive space for speech intelligibility, AFC is installed to enhance the atmosphere of live sports entertainment.

  1. [Genetic control of efficient leaf rust resistance in collection accessions of barley Hordeum vulgare L].

    PubMed

    Tyryshkin, L G

    2009-03-01

    Leaf rust resistance was studied in barley accessions from the worldwide collection of the All-Russia Institute of Plant Industry. Most accessions described as highly resistant in the literature proved susceptible. High resistance at the juvenile stage was observed only for the cultivars Henry, Cebada Capa, Forrajera Klein, and Scarlet. Hybrid analysis and phytopathological tests showed that the cultivar Scarlet had one dominant resistance gene, Rph7. Adult resistance was demonstrated for accession NB-3002 from Nepal, which proved to have one dominant gene on evidence of hybrid analysis.

  2. IDCDACS: IDC's Distributed Application Control System

    NASA Astrophysics Data System (ADS)

    Ertl, Martin; Boresch, Alexander; Kianička, Ján; Sudakov, Alexander; Tomuta, Elena

    2015-04-01

    The Preparatory Commission for the CTBTO is an international organization based in Vienna, Austria. Its mission is to establish a global verification regime to monitor compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT), which bans all nuclear explosions. For this purpose time series data from a global network of seismic, hydro-acoustic and infrasound (SHI) sensors are transmitted to the International Data Centre (IDC) in Vienna in near-real-time, where it is processed to locate events that may be nuclear explosions. We newly designed the distributed application control system that glues together the various components of the automatic waveform data processing system at the IDC (IDCDACS). Our highly-scalable solution preserves the existing architecture of the IDC processing system that proved successful over many years of operational use, but replaces proprietary components with open-source solutions and custom developed software. Existing code was refactored and extended to obtain a reusable software framework that is flexibly adaptable to different types of processing workflows. Automatic data processing is organized in series of self-contained processing steps, each series being referred to as a processing pipeline. Pipelines process data by time intervals, i.e. the time-series data received from monitoring stations is organized in segments based on the time when the data was recorded. So-called data monitor applications queue the data for processing in each pipeline based on specific conditions, e.g. data availability, elapsed time or completion states of preceding processing pipelines. IDCDACS consists of a configurable number of distributed monitoring and controlling processes, a message broker and a relational database. All processes communicate through message queues hosted on the message broker. Persistent state information is stored in the database. A configurable processing controller instantiates and monitors all data processing

  3. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  4. Mobile Access to Libraries: Librarians and Users Experience for "I-Mode" Applications in Libraries.

    ERIC Educational Resources Information Center

    Negishi, Masamitsu

    Recent penetration of the Internet in every aspect of society is remarkable. Along with various types of access methods being developed, information contents and services provided through them have also become available in a broad variety. The mobile phone systems capable of accessing the Internet have become very popular in Japan in the past…

  5. Controls upon microbial accessibility to soil organic matter following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, C. A.; Boutton, T. W.; Filley, T. R.

    2009-12-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic matter (SOM) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and soil hydrology. To elucidate the controls upon microbial accessibility to SOM, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas A&M Agricultural Experimental Station La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, plant biopolymer chemistry in SOM, and microbial community structure were tracked. Respiration rates declined steadily over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total carbon was mineralized to CO2 throughout the incubation. After day 84 a significantly (p < 0.05) greater portion of carbon was mineralized from soils of older woody clusters (34-86 years) than from soils of younger clusters (14-23 years) and the native grassland. Approximately 80% of patterns seen in cumulative CO2 loss could be explained by the proportions of macro- and micro-aggregates within each soil, suggesting soil structure is a major controlling factor of respiration rates. Despite documented carbon accrual within La Copita soils due to WPE, we observed no evidence of enhanced carbon stabilization in these respiration experiments. In fact, a greater proportion of total carbon was lost from the soil of mature woody stands than from young stands, suggesting carbon accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. A cluster approximately 34 years in age represents a transition point in WPE where respiration dynamics become distinct between grassland and wooded elements. By day 84 of the incubation CO2 respired from all soils was depleted with respect to bulk SOM (1.5 to 5‰) and this

  6. Atomic Layer Deposited Oxide-Based Nanocomposite Structures with Embedded CoPtx Nanocrystals for Resistive Random Access Memory Applications.

    PubMed

    Wang, Lai-Guo; Cao, Zheng-Yi; Qian, Xu; Zhu, Lin; Cui, Da-Peng; Li, Ai-Dong; Wu, Di

    2017-02-22

    Al2O3- or HfO2-based nanocomposite structures with embedded CoPtx nanocrystals (NCs) on TiN-coated Si substrates have been prepared by combination of thermal atomic layer deposition (ALD) and plasma-enhanced ALD for resistive random access memory (RRAM) applications. The impact of CoPtx NCs and their average size/density on the resistive switching properties has been explored. Compared to the control sample without CoPtx NCs, ALD-derived Pt/oxide/100 cycle-CoPtx NCs/TiN/SiO2/Si exhibits a typical bipolar, reliable, and reproducible resistive switching behavior, such as sharp distribution of RRAM parameters, smaller set/reset voltages, stable resistance ratio (≥10(2)) of OFF/ON states, better switching endurance up to 10(4) cycles, and longer data retention over 10(5) s. The possible resistive switching mechanism based on nanocomposite structures of oxide/CoPtx NCs has been proposed. The dominant conduction mechanisms in low- and high-resistance states of oxide-based device units with embedded CoPtx NCs are Ohmic behavior and space-charge-limited current, respectively. The insertion of CoPtx NCs can effectively improve the formation of conducting filaments due to the CoPtx NC-enhanced electric field intensity. Besides excellent resistive switching performances, the nanocomposite structures also simultaneously present ferromagnetic property. This work provides a flexible pathway by combining PEALD and TALD compatible with state-of-the-art Si-based technology for multifunctional electronic devices applications containing RRAM.

  7. Global Location-Based Access to Web Applications Using Atom-Based Automatic Update

    NASA Astrophysics Data System (ADS)

    Singh, Kulwinder; Park, Dong-Won

    We propose an architecture which enables people to enquire about information available in directory services by voice using regular phones. We implement a Virtual User Agent (VUA) which mediates between the human user and a business directory service. The system enables the user to search for the nearest clinic, gas station by price, motel by price, food / coffee, banks/ATM etc. and fix an appointment, or automatically establish a call between the user and the business party if the user prefers. The user also has an option to receive appointment confirmation by phone, SMS, or e-mail. The VUA is accessible by a toll free DID (Direct Inward Dialing) number using a phone by anyone, anywhere, anytime. We use the Euclidean formula for distance measurement. Since, shorter geodesic distances (on the Earth’s surface) correspond to shorter Euclidean distances (measured by a straight line through the Earth). Our proposed architecture uses Atom XML syndication format protocol for data integration, VoiceXML for creating the voice user interface (VUI) and CCXML for controlling the call components. We also provide an efficient algorithm for parsing Atom feeds which provide data to the system. Moreover, we describe a cost-effective way for providing global access to the VUA based on Asterisk (an open source IP-PBX). We also provide some information on how our system can be integrated with GPS for locating the user coordinates and therefore efficiently and spontaneously enhancing the system response. Additionally, the system has a mechanism for validating the phone numbers in its database, and it updates the number and other information such as daily price of gas, motel etc. automatically using an Atom-based feed. Currently, the commercial directory services (Example 411) do not have facilities to update the listing in the database automatically, so that why callers most of the times get out-of-date phone numbers or other information. Our system can be integrated very easily

  8. 21 CFR 892.5700 - Remote controlled radionuclide applicator system.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Remote controlled radionuclide applicator system. 892.5700 Section 892.5700 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... radionuclide applicator system. (a) Identification. A remote controlled radionuclide applicator system is...

  9. 21 CFR 892.5700 - Remote controlled radionuclide applicator system.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Remote controlled radionuclide applicator system. 892.5700 Section 892.5700 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... radionuclide applicator system. (a) Identification. A remote controlled radionuclide applicator system is...

  10. 21 CFR 892.5700 - Remote controlled radionuclide applicator system.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Remote controlled radionuclide applicator system. 892.5700 Section 892.5700 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... radionuclide applicator system. (a) Identification. A remote controlled radionuclide applicator system is...

  11. 21 CFR 892.5700 - Remote controlled radionuclide applicator system.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Remote controlled radionuclide applicator system. 892.5700 Section 892.5700 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... radionuclide applicator system. (a) Identification. A remote controlled radionuclide applicator system is...

  12. Some Programs Should Not Run on Laptops - Providing Programmatic Access to Applications Via Web Services

    NASA Astrophysics Data System (ADS)

    Gupta, V.; Gupta, N.; Gupta, S.; Field, E.; Maechling, P.

    2003-12-01

    Modern laptop computers, and personal computers, can provide capabilities that are, in many ways, comparable to workstations or departmental servers. However, this doesn't mean we should run all computations on our local computers. We have identified several situations in which it preferable to implement our seismological application programs in a distributed, server-based, computing model. In this model, application programs on the user's laptop, or local computer, invoke programs that run on an organizational server, and the results are returned to the invoking system. Situations in which a server-based architecture may be preferred include: (a) a program is written in a language, or written for an operating environment, that is unsupported on the local computer, (b) software libraries or utilities required to execute a program are not available on the users computer, (c) a computational program is physically too large, or computationally too expensive, to run on a users computer, (d) a user community wants to enforce a consistent method of performing a computation by standardizing on a single implementation of a program, and (e) the computational program may require current information, that is not available to all client computers. Until recently, distributed, server-based, computational capabilities were implemented using client/server architectures. In these architectures, client programs were often written in the same language, and they executed in the same computing environment, as the servers. Recently, a new distributed computational model, called Web Services, has been developed. Web Services are based on Internet standards such as XML, SOAP, WDSL, and UDDI. Web Services offer the promise of platform, and language, independent distributed computing. To investigate this new computational model, and to provide useful services to the SCEC Community, we have implemented several computational and utility programs using a Web Service architecture. We have

  13. Magnetic force control technique in industrial application

    NASA Astrophysics Data System (ADS)

    Nishijima, S.

    2010-11-01

    Techniques of the magnetic force control have been examined for industrial application. The problems and the technique are different in dispersion medium of gas and that of liquid. In addition, the method is different depending on the magnetic characteristic of the target objects. In case of the liquid, the dispersion medium having different viscosity was examined. The separation speed is decided with the magnitude of the magnetic force because a drag force increases with the viscosity. When the water is the dispersion medium, magnetic seeding is possible and hence the nonmagnetic materials can be separated and even the dissolved material could be separated. The separation technique has been used for purifying the waste water form paper mill or wash water of drum. On the other hand when the water is not dispersion medium, mainly the ferromagnetism particle becomes the target object because the magnetic seeding becomes difficult. The iron fragments have been separated from the slurry of slicing machine of solar battery. It has been clarified high gradient magnetic separation (HGMS) can be applied for the viscous fluid of which viscosity was as high as 10 Pa s. When the dispersion medium is gaseous material, the air is important. The drag force from air depends greatly on Reynolds number. When speed of the air is small, the Reynolds number is small, and the drag force is calculated by the Stokes' law of resistance. The study with gaseous dispersion medium is not carried out much. The magnetic separation will discuss the possibility of the industrial application of this technique.

  14. Role-Based Access Control for Loosely Coupled Distributed Database Management Systems

    DTIC Science & Technology

    2002-03-01

    UDERSTANDING THE RBAC POLICY OF THE APPLICATION......41 C. MAPPING THE APPLICATION POLICY ...............................................42 D. STORAGE OF THE...functionality and implementation options that the Hypersonic database provides. B. UDERSTANDING THE RBAC POLICY OF THE APPLICATION To fully

  15. Development of GUS for control applications at the Advanced Photon Source

    SciTech Connect

    Chung, Y.; Barr, D.; Borland, M.; Kirchman, J.; Decker, G.; Kim, K.

    1994-08-01

    A script-based interpretive shell GUS (General Purpose Data Acquisition for Unix Shell) has been developed for application to the Advanced Photon Source (APS) control. The primary design objective of GUS is to provide a mechanism for efficient data flow among modularized objects called Data Access Modules (DAMs). GUS consists of four major components: user interface, kernel, built-in command module, and DAMS. It also incorporates the Unix shell to make use of the existing utility programs for file manipulation and data analysis. At this time, DAMs have been written for device access through EPICS (Experimental Physics and Industrial Control System), data I/O for SDDS (Self-Describing Data Set) files, matrix manipulation, graphics display, digital signal processing, and beam position feedback system control. The modular and object-oriented construction of GUS will facilitate addition of more DAMs with other functions in the future.

  16. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... applicable, individual practitioner's DEA registration expires, unless the registration has been renewed. (3) The institutional practitioner's or, where applicable, individual practitioner's DEA registration...

  17. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... applicable, individual practitioner's DEA registration expires, unless the registration has been renewed. (3) The institutional practitioner's or, where applicable, individual practitioner's DEA registration...

  18. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... applicable, individual practitioner's DEA registration expires, unless the registration has been renewed. (3) The institutional practitioner's or, where applicable, individual practitioner's DEA registration...

  19. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... applicable, individual practitioner's DEA registration expires, unless the registration has been renewed. (3) The institutional practitioner's or, where applicable, individual practitioner's DEA registration...

  20. State preemption of local tobacco control policies restricting smoking, advertising, and youth access--United States, 2000-2010.

    PubMed

    2011-08-26

    Preemptive state tobacco control legislation prohibits localities from enacting tobacco control laws that are more stringent than state law. State preemption provisions can preclude any type of local tobacco control policy. The three broad types of state preemption tracked by CDC include preemption of local policies that restrict 1) smoking in workplaces and public places, 2) tobacco advertising, and 3) youth access to tobacco products. A Healthy People 2020 objective (TU-16) calls for eliminating state laws that preempt any type of local tobacco control law. A previous study reported that the number of states that preempt local smoking restrictions in one or more of three settings (government worksites, private-sector worksites, and restaurants) has decreased substantially in recent years. To measure progress toward achieving Healthy People 2020 objectives, this study expands on the previous analysis to track changes in state laws that preempt local advertising and youth access restrictions and to examine policy changes from December 31, 2000, to December 31, 2010. This new analysis found that, in contrast with the substantial progress achieved during the past decade in reducing the number of states that preempt local smoking restrictions, no progress has been made in reducing the number of states that preempt local advertising restrictions and youth access restrictions. Increased progress in removing state preemption provisions will be needed to achieve the relevant Healthy People 2020 objective.

  1. Lawn and Turf Pest Control: A Guide for Commercial Applicators.

    ERIC Educational Resources Information Center

    Khan, M. S.

    This manual is designed for use in training commercial pesticide applicators. It gives identification and control information for common lawn and turf diseases, insects, nematodes, weeds, and vertebrate pests. It also discusses phytotoxicity, environmental concerns, and application methods. (BB)

  2. An efficient key-management scheme for hierarchical access control in e-medicine system.

    PubMed

    Wu, Shuhua; Chen, Kefei

    2012-08-01

    In e-medicine system, the sharing of patients' medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.'s scheme proposed most recently, the time complexity and the required storage space is reduced significantly. Moreover, it provides provable security, and is easy to implement. Therefore, our scheme is more suitable for e-medicine system.

  3. 17 CFR 239.63 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Index Key (CIK) code, to request the following access codes to permit filing on EDGAR: (a) Central Index...: For Federal Register citations affecting Form ID, see the List of CFR Sections Affected, which...

  4. 17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Index Key (CIK) code, to request the following access codes to permit filing on EDGAR: (a) Central Index...: For Federal Register citations affecting Form ID, see the List of CFR Sections Affected, which...

  5. Revealing controllable nanowire transformation through cationic exchange for RRAM application.

    PubMed

    Huang, Chun-Wei; Chen, Jui-Yuan; Chiu, Chung-Hua; Wu, Wen-Wei

    2014-05-14

    One dimensional metal oxide nanostructures have attracted much attention owing to their fascinating functional properties. Among them, piezoelectricity and photocatalysts along with their related materials have stirred significant interests and widespread studies in recent years. In this work, we successfully transformed piezoelectric ZnO into photocatalytic TiO2 and formed TiO2/ZnO axial heterostructure nanowires with flat interfaces by solid to solid cationic exchange reactions in high vacuum (approximately 10(-8) Torr) transmission electron microscope (TEM). Kinetic behavior of the single crystalline TiO2 was systematically analyzed. The nanoscale growth rate of TiO2 has been measured using in situ TEM videos. On the basis of the rate, we can control the dimensions of the axial-nanoheterostructure. In addition, the unique Pt/ ZnO / TiO2/ ZnO /Pt heterostructures with complementary resistive switching (CRS) characteristics were designed to solve the important issue of sneak-peak current. The resistive switching behavior was attributed to the migration of oxygen and TiO2 layer served as reservoir, which was confirmed by energy dispersive spectrometry (EDS) analysis. This study not only supplied a distinct method to explore the transformation mechanisms but also exhibited the potential application of ZnO/TiO2 heterostructure in nanoscale crossbar array resistive random-access memory (RRAM).

  6. Applicator Training Manual for: Aquatic Weed Control.

    ERIC Educational Resources Information Center

    Herron, James W.

    The aquatic weeds discussed in this manual include algae, floating weeds, emersed weeds, and submerged weeds. Specific requirements for pesticide application are given for static water, limited flow, and moving water situations. Secondary effects of improper application rates and faulty application are described. Finally, techniques of limited…

  7. [Optimization of an acute destructive cholecystitis treatment using application of mini-laparotomy access, laser irradiation and regional lymphotropic therapy].

    PubMed

    Mamedov, R A; Mamedov, K M; Iusubov, M O; Gasymov, É M; Dadashev, A I; Agaeva, N I

    2012-12-01

    Comparative analysis of the treatment results in 120 patients, suffering destructive form of biliary calculous disease (DFBCD) was performed. Depending on operative access and postoperative conservative therapy applied the patients were divided into two groups. In the main group in 58 patients, suffering DFBCD, a minilaparotomy access was applied, using "mini-assistant" apparatus named after M. I. Prudkov and postoperatively--low-intensive laser irradiation and regional lymphotropic therapy. In a comparison group in 62 patients various laparotomic accesses were used, and a standard postoperative therapy was performed. Normalization of clinical, laboratory and immune indices in the main group were observed in twice earlier than in a control one, and economical together with moral-psychological effect was measured in reduction of the medicines quantity used as well as the patients stationary stay.

  8. The choice of disease control strategies to secure international market access for aquaculture products.

    PubMed

    Chinabut, S; Puttinaowarat, S

    2005-01-01

    Since production from capture fisheries cannot meet the demands of exports, aquaculture has subsequently played a major role in securing the raw materials for the world's food industries. Aquaculture has rapidly developed from extensive systems to semi-intensive, intensive and super-intensive systems. This has introduced the use of chemicals and drugs into the systems, which cause residual problems in the products. In the developed world, food safety has become a major issue of concern. The world market now demands healthy aquaculture products from farm to table. To achieve these requirements and to keep their markets, countries involved in aquaculture have implemented control measures such as farm licensing, code of conduct for sustainable aquaculture, hazard analysis and critical control point (HACCP) and good aquaculture practice. However, infectious diseases in aquaculture are of major concern to the industry and are typically controlled by eradication of the pathogen, treatment with antibiotic or chemotherapeutics, and/or by preventative measures such as the use of probiotics or vaccines. To limit the use of chemicals and antibiotics, good farm management is highly recommended. In terms of treatment, chemicals and antibiotics should be evaluated to establish recommended doses and withdrawal periods, otherwise alternative treatments should be developed. Environmentally-friendly probiotics have been introduced to aquaculture practice in the last decade to replace pathogenic bacteria with beneficial bacteria transient in the gut. Micro-organisms have also been prepared for the purpose of biocontrol and bioremediation. The application of probiotic, biocontrol and bioremediation seem promising; however considerable efforts of further research in terms of food and environmental safety are needed. Vaccination has proved highly effective in controlling diseases in the salmon industry mainly in Europe, America and Japan. In other Asian countries, this practice seem to

  9. DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military Installations (REDACTED)

    DTIC Science & Technology

    2016-04-01

    have the actual signature of the authorizing official for your organization. We cannot accept the /Signed/ symbol in place of the actual signature...Introduction DODIG-2016-072 │ 1 Introduction Objective Our audit objective was to determine whether DoD had adequate security controls in place for the... working with installations without a direct connection to NCIC via a state terminal to provide access through OpenFox. In addition, procedures for

  10. Fluorination Enables a Ligand-Controlled Regiodivergent Palladium-Catalyzed Decarboxylative Allylation Reaction to Access α,α-Difluoroketones

    PubMed Central

    Yang, Ming–Hsiu; Orsi, Douglas L.

    2015-01-01

    α,α-Difluoroketones possess unique physicochemical properties that are useful for developing therapeutics and probes for chemical biology. In order to access the α-allyl-α,α-difluoroketone substructure, complementary Pd-catalyzed decarboxylative allylation reactions were developed to provide linear and branched α-allyl-α,α-difluoroketones. For these orthogonal processes, the regioselectivity was uniquely controlled by fluorination of the substrate and the structure of ligand. PMID:25581845

  11. Multi-component access to a commercially available weight loss program: A randomized controlled trial

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This study examined weight loss between a community-based, intensive behavioral counseling program (Weight Watchers PointsPlus that included three treatment access modes and a self-help condition. A total of 292 participants were randomized to a Weight Watchers (WW; n=147) or a self-help condition (...

  12. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... audible blast warning and all-clear signals that are in use, and which explain the marking of blasting... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  13. The Use of a Computer-Controlled Random Access Slide Projector for Rapid Information Display.

    ERIC Educational Resources Information Center

    Muller, Mark T.

    A 35mm random access slide projector operated in conjunction with a computer terminal was adapted to meet the need for a more rapid and complex graphic display mechanism than is currently available with teletypewriter terminals. The model projector can be operated manually to provide for a maintenance checkout of the electromechanical system.…

  14. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...(a)(2), a vessel issued a limited access NE multispecies permit may not fish for, possess, or land.... (ii) A vessel may not fish for, possess, or land regulated species from March 1 through March 20 of... DAS may be used in the NE multispecies fishery to harvest and land stocks of regulated species...

  15. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...(a)(2), a vessel issued a limited access NE multispecies permit may not fish for, possess, or land.... (ii) A vessel may not fish for, possess, or land regulated species from March 1 through March 20 of... DAS may be used in the NE multispecies fishery to harvest and land stocks of regulated species...

  16. Fuzzy Logic Controller for Low Temperature Application

    NASA Technical Reports Server (NTRS)

    Hahn, Inseob; Gonzalez, A.; Barmatz, M.

    1996-01-01

    The most common temperature controller used in low temperature experiments is the proportional-integral-derivative (PID) controller due to its simplicity and robustness. However, the performance of temperature regulation using the PID controller depends on initial parameter setup, which often requires operator's expert knowledge on the system. In this paper, we present a computer-assisted temperature controller based on the well known.

  17. AN APPLICATION OF OPTIMAL CONTROL THEORY.

    DTIC Science & Technology

    The purpose of this article is to show that optimal control theory can be used to develop a control strategy for a practical system, namely a distillation column. The approach will be to model the complex system with a simple model, use optimal control theory to determine a control strategy for the simple model, and then apply the results to the original system. (Author)

  18. 76 FR 62449 - Manufacturer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances; Notice of Application Pursuant to Sec. 1301... a bulk manufacturer of Diphenoxylate (9170), a basic class of controlled substance listed...

  19. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    PubMed

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services.

  20. Aileron controls for wind turbine applications

    NASA Technical Reports Server (NTRS)

    Miller, D. R.; Puthoff, R. L.

    1984-01-01

    Horizontal axis wind turbines which utilize partial or full variable blade pitch to regulate rotor speed were examined. The weight and costs of these systems indicated a need for alternate methods of rotor control. Aileron control is an alternative which has potential to meet this need. Aileron control rotors were tested on the Mod-O wind turbine to determine their power regulation and shutdown characteristics. Test results for a 20 and 38 percent chord aileron control rotor are presented. Test is shown that aileron control is a viable method for safety for safely controlling rotor speed, following a loss of general load.

  1. Aileron controls for wind turbine applications

    NASA Technical Reports Server (NTRS)

    Miller, D. R.; Putoff, R. L.

    1984-01-01

    Horizontal axis wind turbines which utilize partial or full variable blade pitch to regulate rotor speed were examined. The weight and costs of these systems indicated a need for alternate methods of rotor control. Aileron control is an alternative which has potential to meet this need. Aileron control rotors were tested on the Mod-O wind turbine to determine their power regulation and shutdown characteristics. Test results for a 20 and 38% chord aileron control rotor are presented. Test is shown that aileron control is a viable method for safety for safely controlling rotor speed, following a loss of general load.

  2. 78 FR 30330 - Importer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... Enforcement Administration Importer of Controlled Substances; Notice of Application Pursuant to Title 21, Code... class of controlled substance listed in schedule II. The facility intends to import the above listed controlled substance for legitimate use. Supplies of this particular controlled substance are inadequate...

  3. Controls on microbial accessibility to soil organic carbon following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, Courtney; Boutton, Thomas; Olk, Dan; Filley, Timothy

    2010-05-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic carbon (SOC) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and hydrology. To elucidate the controls on microbial accessibility to SOC, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas Agrilife La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, and plant biopolymer chemistry in SOC were tracked. Respiration rates declined exponentially over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total SOC was mineralized to CO2 throughout the incubation. After day 84 a significantly (p<0.05) greater portion of SOC was mineralized from soils of older woody clusters (34-86 years) than from soils of younger woody clusters (14-23 years) and the native grassland. Invading woody stands of ≃≥35 years of age represent a transition point in WPE where respiration dynamics become distinct in wooded elements compared to grasslands; this distinction has been previously observed through changes in belowground SOC accrual, C input chemistry, and mycorrhizal productivity. Despite documented SOC accrual following WPE at La Copita, we observed no evidence of enhanced SOC stabilization in these respiration experiments. In fact, a greater proportion of total SOC was lost from the soil of mature woody stands than from young stands, suggesting SOC accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. Compound-specific analyses indicated there was a significant (p<0.05) loss of C from carbohydrates, amino acids, and amino sugars during the incubation. Amino nitrogen tended to become more concentrated during the incubation, although the trend was not significant. Relatively

  4. Apparatus, method and system to control accessibility of platform resources based on an integrity level

    DOEpatents

    Jenkins, Chris; Pierson, Lyndon G.

    2016-10-25

    Techniques and mechanism to selectively provide resource access to a functional domain of a platform. In an embodiment, the platform includes both a report domain to monitor the functional domain and a policy domain to identify, based on such monitoring, a transition of the functional domain from a first integrity level to a second integrity level. In response to a change in integrity level, the policy domain may configure the enforcement domain to enforce against the functional domain one or more resource accessibility rules corresponding to the second integrity level. In another embodiment, the policy domain automatically initiates operations in aid of transitioning the platform from the second integrity level to a higher integrity level.

  5. Oversight Review: Quality Control Review of Naval Audit Service’s Special Access Program Audits

    DTIC Science & Technology

    2005-09-02

    undergo an external peer review at least once every 3 years by reviewers independent of the audit organization being reviewed. As the organization that...has audit policy and oversight responsibilities for audits in the Department of Defense, we conducted this external peer review of the NAVAUDSVC audits...requiring special access in conjunction with the Army Audit Agency’s external peer review of NAVAUDSVC non-SAP audits.

  6. Composable Distributed Access Control and Integrity Policies for Query-Based Wireless Sensor Networks

    DTIC Science & Technology

    2008-03-01

    multiple WSN policies. The construction, hybridization, and composition of well–known models is demonstrated to preserve security, sustaining...confidentiality in Bell–LaPadula’s model , integrity in Biba’s strict integrity model , and conflict of interest avoidance in the Chinese Wall. Using WASL, a multi...as defined by the security model . It is also be more flexible in that a policy file update is all that is required to modify the accesses permitted

  7. Scalable Authorization in Role-Based Access Control Using Negative Permissions and Remote Authorization

    DTIC Science & Technology

    2003-01-01

    and Hongjie Xin for making this a rewarding team experience. Thanks to Mr. Michael Warres from Sun Microsystems for being prompt and meticulous in our...Windows NT), and security policies based on the Chinese wall model for separation of duties [8]. RBAC simplifies the administration of access...connection check is sort of a first wall of defense against illegitimate users, while the JavaSpace action is more specific to a particular object, known as

  8. Dual adaptive control: Design principles and applications

    NASA Technical Reports Server (NTRS)

    Mookerjee, Purusottam

    1988-01-01

    The design of an actively adaptive dual controller based on an approximation of the stochastic dynamic programming equation for a multi-step horizon is presented. A dual controller that can enhance identification of the system while controlling it at the same time is derived for multi-dimensional problems. This dual controller uses sensitivity functions of the expected future cost with respect to the parameter uncertainties. A passively adaptive cautious controller and the actively adaptive dual controller are examined. In many instances, the cautious controller is seen to turn off while the latter avoids the turn-off of the control and the slow convergence of the parameter estimates, characteristic of the cautious controller. The algorithms have been applied to a multi-variable static model which represents a simplified linear version of the relationship between the vibration output and the higher harmonic control input for a helicopter. Monte Carlo comparisons based on parametric and nonparametric statistical analysis indicate the superiority of the dual controller over the baseline controller.

  9. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks.

    Scope of Contributions

    This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to:
    • Optical access network architectures and protocols
    • Passive optical networks (BPON, EPON, GPON, etc.)
    • Active optical networks
    • Multiple access control
    • Multiservices and QoS provisioning
    • Network survivability
    • Field trials and standards
    • Performance modeling and analysis

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  10. Analysis of the Reconfigurable Control Capabilities of a Space Access Vehicle (Preprint)

    DTIC Science & Technology

    2006-12-01

    based on dynamic inversion with a non-linear control allocator, is used to linearize the vehicle dynamics over its flight envelope and assign control ...backstepping method. Assessment of the vehicle’s ability to recover from control failures is conducted in this work for a nominal re-entry flight . 15...on dynamic inversion with a non-linear control allocator, is used to linearize the vehicle dynamics over its flight envelope and assign control tasks

  11. Microgravity Vibration Control and Civil Applications

    NASA Technical Reports Server (NTRS)

    Whorton, Mark Stephen; Alhorn, Dean Carl

    1998-01-01

    Controlling vibration of structures is essential for both space structures as well as terrestrial structures. Due to the ambient acceleration levels anticipated for the International Space Station, active vibration isolation is required to provide a quiescent acceleration environment for many science experiments. An overview is given of systems developed and flight tested in orbit for microgravity vibration isolation. Technology developed for vibration control of flexible space structures may also be applied to control of terrestrial structures such as buildings and bridges subject to wind loading or earthquake excitation. Recent developments in modern robust control for flexible space structures are shown to provide good structural vibration control while maintaining robustness to model uncertainties. Results of a mixed H-2/H-infinity control design are provided for a benchmark problem in structural control for earthquake resistant buildings.

  12. The application of intelligent process control to space based systems

    NASA Technical Reports Server (NTRS)

    Wakefield, G. Steve

    1990-01-01

    The application of Artificial Intelligence to electronic and process control can help attain the autonomy and safety requirements of manned space systems. An overview of documented applications within various industries is presented. The development process is discussed along with associated issues for implementing an intelligence process control system.

  13. 75 FR 14189 - Manufacturer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-24

    ... Enforcement Administration Manufacturer of Controlled Substances; Notice of Application Pursuant to Sec. 1301... the Drug Enforcement Administration (DEA) as a bulk manufacturer of the basic classes of controlled... sale to dosage form manufacturers. Any other such applicant, and any person who is presently...

  14. Control of depth of anesthesia using MUSMAR--exploring electromyography and the analgesic dose as accessible disturbances.

    PubMed

    Nunes, Catarina S; Mendonça, Teresa; Lemos, João M; Amorim, Pedro

    2007-01-01

    The problem of controlling the level of depth of anesthesia measured by the Bispectral Index (BIS) of the electroencephalogram of patients under general anesthesia, is considered. It is assumed that the manipulated variable is the infusion rate of the hypnotic drug propofol, while the drug remifentanil is also administered for analgesia. Since these two drugs interact, the administration rate of remifentanil is considered as an accessible disturbance in combination with the level of electromyography (EMG) that also interferes with the BIS signal. In order to tackle the high uncertainty present on the system, the predictive adaptive controller MUSMAR is used. The performance of the controller is illustrated by means of simulation with 45 patient individual adjusted models, which incorporate the effect of the drugs interaction on BIS. This controller structure proved to be robust to the EMG and remifentanil disturbances, patient variability, changing reference values and noise.

  15. Application Of A Control Algorithm To Vertical-Up Welding

    NASA Technical Reports Server (NTRS)

    Fernandez, Kenneth R.; Cook, George E.; Andersen, Kristinn; Barnett, Robert J.; Zein-Sabattou, Saleh

    1993-01-01

    Report describes application of generalized control algorithm for automatic robotic arc welding in vertical-up configuration. Applicable to variety of welding processes, previously applied to welding in downhand configuration. Generalized algorithm and application to downhand welding described in "Method for Automatic Downhand Welding" (MFS-27209).

  16. 17 CFR 259.602 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Commission previously has not assigned a Central Index Key (CIK) code, to request the following access codes to permit filing on EDGAR: (a) Central Index Key (CIK)—uniquely identifies each filer, filing agent... agent to change its Password. Editorial Note: For Federal Register citations affecting Form ID, see...

  17. 17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., third party filers, or their agents, to whom the Commission previously has not assigned a Central Index Key (CIK) code, to request the following access codes to permit filing on EDGAR: (a) Central Index Key... Federal Register citations affecting Form ID, see the List of CFR Sections Affected, which appears in...

  18. 17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... previously has not assigned a Central Index Key (CIK) code, to request the following access codes to permit filing on EDGAR: (a) Central Index Key (CIK)—uniquely identifies each filer, filing agent, and training... its Password. Editorial Note: For Federal Register citations affecting Form ID, see the List of...

  19. Application of the AMPLATZER Vascular Plug in Endovascular Occlusion of Dialysis Accesses

    SciTech Connect

    Ozyer, Umut Harman, Ali; Aytekin, Cuneyt; Boyvat, Fatih; Karakayali, Feza

    2009-09-15

    The purpose of this study was to share our initial experience with the AMPLATZER Vascular Plug (AVP) in occluding dialysis accesses. Between January 2007 and October 2008, five patients with autogenous and one patient with prosthetic accesses were referred for endovascular occlusion owing to central venous obstruction (n = 4) and dialysis-associated steal syndrome (n = 2) leading to disabling complications. We used a single AVP in two patients, double AVPs in two patients, and double AVPs and n-butyl 2-cyanoacrylate in one patient with an autogenous access. Two coils were deployed between two AVPs to occlude the prosthetic graft. Immediate success was achieved in all patients, with no complications. Mean follow-up time was 13 months (range, 1-21 months) and none of the patients had experienced symptom recurrence as of the time of writing. The AVP allows simple, precise, and reliable dialysis access occlusion without significant complications when surgical ligation is not preferred. It can be used with other embolizing agents to provide occlusion in the case of failure.

  20. 78 FR 62657 - Proposed Information Collection; The Interagency Access Pass and Senior Pass Application Processes

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    ... National Park Service Proposed Information Collection; The Interagency Access Pass and Senior Pass... Parks and Federal Recreation Lands Pass Program covers recreation opportunities on public lands managed... U.S. Forest Service. The passes provide U.S. citizens and visitors an affordable and convenient...

  1. 78 FR 31530 - Applications for New Awards; Child Care Access Means Parents in School Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Parents in School Program AGENCY: Office of Postsecondary Education, Department of Education. ACTION: Notice. Overview Information: Child Care Access Means Parents in School (CCAMPIS) Program Notice inviting... parents in postsecondary education through provision of campus-based child care services. Priorities:...

  2. Application of Computer Simulation to Teach ATM Access to Individuals with Intellectual Disabilities

    ERIC Educational Resources Information Center

    Davies, Daniel K.; Stock, Steven E.; Wehmeyer, Michael L.

    2003-01-01

    This study investigates use of computer simulation for teaching ATM use to adults with intellectual disabilities. ATM-SIM is a computer-based trainer used for teaching individuals with intellectual disabilities how to use an automated teller machine (ATM) to access their personal bank accounts. In the pilot evaluation, a prototype system was…

  3. Intelligent Control Approaches for Aircraft Applications

    NASA Technical Reports Server (NTRS)

    Gundy-Burlet, Karen; KrishnaKumar, K.; Soloway, Don; Kaneshige, John; Clancy, Daniel (Technical Monitor)

    2001-01-01

    This paper presents an overview of various intelligent control technologies currently being developed and studied under the Intelligent Flight Control (IFC) program at the NASA Ames Research Center. The main objective of the intelligent flight control program is to develop the next generation of flight controllers for the purpose of automatically compensating for a broad spectrum of damaged or malfunctioning aircraft components and to reduce control law development cost and time. The approaches being examined include: (a) direct adaptive dynamic inverse controller and (b) an adaptive critic-based dynamic inverse controller. These approaches can utilize, but do not require, fault detection and isolation information. Piloted simulation studies are performed to examine if the intelligent flight control techniques adequately: 1) Match flying qualities of modern fly-by-wire flight controllers under nominal conditions; 2) Improve performance under failure conditions when sufficient control authority is available; and 3) Achieve consistent handling qualities across the flight envelope and for different aircraft configurations. Results obtained so far demonstrate the potential for improving handling qualities and significantly increasing survivability rates under various simulated failure conditions.

  4. Integrated identification, modeling and control with applications

    NASA Astrophysics Data System (ADS)

    Shi, Guojun

    This thesis deals with the integration of system design, identification, modeling and control. In particular, six interdisciplinary engineering problems are addressed and investigated. Theoretical results are established and applied to structural vibration reduction and engine control problems. First, the data-based LQG control problem is formulated and solved. It is shown that a state space model is not necessary to solve this problem; rather a finite sequence from the impulse response is the only model data required to synthesize an optimal controller. The new theory avoids unnecessary reliance on a model, required in the conventional design procedure. The infinite horizon model predictive control problem is addressed for multivariable systems. The basic properties of the receding horizon implementation strategy is investigated and the complete framework for solving the problem is established. The new theory allows the accommodation of hard input constraints and time delays. The developed control algorithms guarantee the closed loop stability. A closed loop identification and infinite horizon model predictive control design procedure is established for engine speed regulation. The developed algorithms are tested on the Cummins Engine Simulator and desired results are obtained. A finite signal-to-noise ratio model is considered for noise signals. An information quality index is introduced which measures the essential information precision required for stabilization. The problems of minimum variance control and covariance control are formulated and investigated. Convergent algorithms are developed for solving the problems of interest. The problem of the integrated passive and active control design is addressed in order to improve the overall system performance. A design algorithm is developed, which simultaneously finds: (i) the optimal values of the stiffness and damping ratios for the structure, and (ii) an optimal output variance constrained stabilizing

  5. Fuzzy multinomial control chart and its application

    NASA Astrophysics Data System (ADS)

    Wibawati, Mashuri, Muhammad; Purhadi, Irhamah

    2016-03-01

    Control chart is a technique that has been used widely in industry and services. P chart is the simplest control chart. In this chart, item is classified into two categories as either conforming and non conforming. This chart based on binomial distribution. In practice, each item can classify in more than two categories such as very bad, bad, good and very good. Then to monitor the process we used multinomial p control chart. However, if the classification is an element of vagueness, the fuzzy multinomial control chart (FM) is more appropriately used. Control limit of FM chart obtained multinomial distribution and the degree of membership using fuzzy trianguler are 0, 0.25. 0.5 and 1. This chart will be applied to the data glass and will compare with multinomial p control chart.

  6. Clinical utility of far-infrared therapy for improvement of vascular access blood flow and pain control in hemodialysis patients

    PubMed Central

    Choi, Soo Jeong; Cho, Eun Hee; Jo, Hye Min; Min, Changwook; Ji, Young Sok; Park, Moo Yong; Kim, Jin Kuk; Hwang, Seung Duk

    2015-01-01

    Background Maintenance of a well-functioning vascular access and minimal needling pain are important goals for achieving adequate dialysis and improving the quality of life in hemodialysis (HD) patients. Far-infrared (FIR) therapy may improve endothelial function and increase access blood flow (Qa) and patency in HD patients. The aim of this study was to evaluate effects of FIR therapy on Qa and patency, and needling pain in HD patients. Methods This prospective clinical trial enrolled 25 outpatients who maintained HD with arteriovenous fistula. The other 25 patients were matched as control with age, sex, and diabetes. FIR therapy was administered for 40 minutes during HD 3 times/wk and continued for 12 months. The Qa was measured by the ultrasound dilution method, whereas pain was measured by a numeric rating scale at baseline, then once per month. Results One patient was transferred to another facility, and 7 patients stopped FIR therapy because of an increased body temperature and discomfort. FIR therapy improved the needling pain score from 4 to 2 after 1 year. FIR therapy increased the Qa by 3 months and maintained this change until 1 year, whereas control patients showed the decrease in Qa. The 1-year unassisted patency with FIR therapy was not significantly different from control. Conclusion FIR therapy improved needling pain. Although FIR therapy improved Qa, the unassisted patency was not different compared with the control. A larger and multicenter study is needed to evaluate the effect of FIR therapy. PMID:27069856

  7. Advanced thermal control for spacecraft applications

    NASA Astrophysics Data System (ADS)

    Hardesty, Robert; Parker, Kelsey

    2015-09-01

    In optical systems just like any other space borne system, thermal control plays an important role. In fact, most advanced designs are plagued with volume constraints that further complicate the thermal control challenges for even the most experienced systems engineers. Peregrine will present advances in satellite thermal control based upon passive heat transfer technologies to dissipate large thermal loads. This will address the use of 700 W/m K and higher conducting products that are five times better than aluminum on a specific basis providing enabling thermal control while maintaining structural support.

  8. Mercury: Reusable software application for Metadata Management, Data Discovery and Access

    NASA Astrophysics Data System (ADS)

    Devarakonda, Ranjeet; Palanisamy, Giri; Green, James; Wilson, Bruce E.

    2009-12-01

    Mercury is a federated metadata harvesting, data discovery and access tool based on both open source packages and custom developed software. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. Mercury is itself a reusable toolset for metadata, with current use in 12 different projects. Mercury also supports the reuse of metadata by enabling searching across a range of metadata specification and standards including XML, Z39.50, FGDC, Dublin-Core, Darwin-Core, EML, and ISO-19115. Mercury provides a single portal to information contained in distributed data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. One of the major goals of the recent redesign of Mercury was to improve the software reusability across the projects which currently fund the continuing development of Mercury. These projects span a range of land, atmosphere, and ocean ecological communities and have a number of common needs for metadata searches, but they also have a number of needs specific to one or a few projects To balance these common and project-specific needs, Mercury’s architecture includes three major reusable components; a harvester engine, an indexing system and a user interface component. The harvester engine is responsible for harvesting metadata records from various distributed servers around the USA and around the world. The harvester software was packaged in such a way that all the Mercury projects will use the same harvester scripts but each project will be driven by a set of configuration files. The harvested files are then passed to the Indexing system, where each of the fields in these structured metadata records are indexed properly, so that the query engine can perform

  9. Wireless Sensor/Actuator Network Design for Mobile Control Applications

    PubMed Central

    Xia, Feng; Tian, Yu-Chu; Li, Yanjun; Sun, Youxian

    2007-01-01

    Wireless sensor/actuator networks (WSANs) are emerging as a new generation of sensor networks. Serving as the backbone of control applications, WSANs will enable an unprecedented degree of distributed and mobile control. However, the unreliability of wireless communications and the real-time requirements of control applications raise great challenges for WSAN design. With emphasis on the reliability issue, this paper presents an application-level design methodology for WSANs in mobile control applications. The solution is generic in that it is independent of the underlying platforms, environment, control system models, and controller design. To capture the link quality characteristics in terms of packet loss rate, experiments are conducted on a real WSAN system. From the experimental observations, a simple yet efficient method is proposed to deal with unpredictable packet loss on actuator nodes. Trace-based simulations give promising results, which demonstrate the effectiveness of the proposed approach.

  10. Quality Control Review of Air Force Audit Agency’s Special Access Program Audits

    DTIC Science & Technology

    2014-12-09

    external quality control review of the AFAA SAP audits in conjunction with the Army Audit Agency’s review of the AFAA non- SAP audits. We conducted this...provide reasonable assurance of meeting the objectives of quality control. We tested the AFAA SAP system of quality control for audits to the extent...control for the audit function of AFAA SAP in effect for the period ended September 30, 2013, was designed in accordance with quality standards

  11. One electron-controlled multiple-valued dynamic random-access-memory

    NASA Astrophysics Data System (ADS)

    Kye, H. W.; Song, B. N.; Lee, S. E.; Kim, J. S.; Shin, S. J.; Choi, J. B.; Yu, Y.-S.; Takahashi, Y.

    2016-02-01

    We propose a new architecture for a dynamic random-access-memory (DRAM) capable of storing multiple values by using a single-electron transistor (SET). The gate of a SET is designed to be connected to a plurality of DRAM unit cells that are arrayed at intersections of word lines and bitlines. In this SET-DRAM hybrid scheme, the multiple switching characteristics of SET enables multiple value data stored in a DRAM unit cell, and this increases the storage functionality of the device. Moreover, since refreshing data requires only a small amount of SET driving current, this enables device operating with low standby power consumption.

  12. Accessibility Is the Mother of Invention: When It Comes to an Innovative Hand Control System

    ERIC Educational Resources Information Center

    Exceptional Parent, 2007

    2007-01-01

    This article features Sure Grip hand control, an innovative hand control system created by Keith Howell, the President and founder of Howell Ventures LTD. Howell was in his early teens when he experienced an accident that resulted in his quadriplegia. From that point on, Howell set about to manufacture a set of controls that would emulate the…

  13. Internal Administrative Control: Its Applicability to the Marine Corps.

    DTIC Science & Technology

    1984-06-01

    ADMINISTRATIVE CONTROL : Master’s Thesis ITS APPLICABILITY TO THE MARINE CORPS June 1984 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR(e) 4. CONTRACT OR GRANT Nr...NUMBERS Naval Postgraduate School Monterey, California 93943 It. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE Naval Postgraduate School jUne 1984 13...Continu. on fevers# side It nec esary and Identify by. block number) internal Control Internal Administrative Control Administrative Control 0

  14. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  15. Development of a generic system for real-time data access and remote control of multiple in-situ water quality monitoring instruments

    NASA Astrophysics Data System (ADS)

    Wright, S. A.; Bennett, G. E.; Andrews, T.; Melis, T. S.; Topping, D. J.

    2005-05-01

    Currently, in-situ monitoring of water quality parameters (e.g. water temperature, conductivity, turbidity) in the Colorado River ecosystem typically consists of deploying instruments in the river, retrieving them at a later date, downloading the datalogger, then examining the data; an arduous process in the remote settings of Grand Canyon. Under this protocol, data is not available real-time and there is no way to detect problems with the instrumentation until after retrieval. The next obvious stage in the development of in-situ monitoring in Grand Canyon was the advent of one-way telemetry, i.e. streaming data in real-time from the instrument to the office and/or the world-wide-web. This protocol allows for real-time access to data and the identification of instrumentation problems, but still requires a site visit to address instrument malfunctions, i.e. the user does not have the ability to remotely control the instrument. At some field sites, such as the Colorado River in Grand Canyon, site visitation is restricted by remoteness and lack of traditional access routes (i.e. roads). Even at less remote sites, it may still be desirable to have two-way communication with instruments in order to, for example, diagnose and potentially fix instrumentation problems, change sampling parameters to save battery power, etc., without having to visit the site. To this end, the U.S. Geological Survey, Grand Canyon Monitoring and Research Center, is currently developing and testing a high-speed, two-way communication system that allows for real-time data access and remote control of instrumentation. The approach tested relies on internet access and may be especially useful in areas where land-line or cellular connections are unavailable. The system is composed of off-the-shelf products, uses a commercial broadband satellite service, and is designed in a generic way such that any instrument that communicates through RS-232 communication (i.e. a serial port) is compatible with

  16. Application of Fiber-Optical Techniques in the Access Transmission and Backbone Transport of Mobile Networks

    NASA Astrophysics Data System (ADS)

    Hilt, Attila; Pozsonyi, László

    2012-09-01

    Fixed access networks widely employ fiber-optical techniques due to the extremely wide bandwidth offered to subscribers. In the last decade, there has also been an enormous increase of user data visible in mobile systems. The importance of fiber-optical techniques within the fixed transmission/transport networks of mobile systems is therefore inevitably increasing. This article summarizes a few reasons and gives examples why and how fiber-optic techniques are employed efficiently in second-generation networks.

  17. Feedback linearization application for LLRF control system

    SciTech Connect

    Kwon, S.; Regan, A.; Wang, Y.M.; Rohlev, T.

    1998-12-31

    The Low Energy Demonstration Accelerator (LEDA) being constructed at Los Alamos National Laboratory will serve as the prototype for the low energy section of Acceleration Production of Tritium (APT) accelerator. This paper addresses the problem of the LLRF control system for LEDA. The authors propose a control law which is based on exact feedback linearization coupled with gain scheduling which reduces the effect of the deterministic klystron cathode voltage ripple that is due to harmonics of the high voltage power supply and achieves tracking of desired set points. Also, they propose an estimator of the ripple and its time derivative and the estimates based feedback linearization controller.

  18. Electromechanical actuation for thrust vector control applications

    NASA Technical Reports Server (NTRS)

    Roth, Mary Ellen

    1990-01-01

    At present, actuation systems for the Thrust Vector Control (TVC) for launch vehicles are hydraulic systems. The Advanced Launch System (ALS), a joint initiative between NASA and the Air Force, is a launch vehicle that is designed to be cost effective, highly reliable and operationally efficient with a goal of reducing the cost per pound to orbit. As part of this initiative, an electromechanical actuation system is being developed as an attractive alternative to the hydraulic systems used today. NASA-Lewis is developing and demonstrating an Induction Motor Controller Actuation System with a 40 hp peak rating. The controller will integrate 20 kHz resonant link Power Management and Distribution (PMAD) technology and Pulse Population Modulation (PPM) techniques to implement Field Oriented Vector Control (FOVC) of a new advanced induction motor. Through PPM, multiphase variable frequency, variable voltage waveforms can be synthesized from the 20 kHz source. FOVC shows that varying both the voltage and frequency and their ratio (V/F), permits independent control of both torque and speed while operating at maximum efficiency at any point on the torque-speed curve. The driver and the FOVC will be microprocessor controlled. For increased system reliability, a Built-in Test (BITE) capability will be included. This involves introducing testability into the design of a system such that testing is calibrated and exercised during the design, manufacturing, maintenance and prelaunch activities. An actuator will be integrated with the motor controller for performance testing of the EMA TVC system. The design and fabrication of the motor controller is being done by General Dynamics Space Systems Division. The University of Wisconsin-Madison will assist in the design of the advanced induction motor and in the implementation of the FOVC theory. A 75 hp electronically controlled dynamometer will be used to test the motor controller in all four quadrants of operation using flight type

  19. PC-Based Applications Programming on the SRS Control System.

    NASA Astrophysics Data System (ADS)

    Martlew, Brian; Owen, Hywel; Pugh, Martin; Rawlinson, Bill; Smith, Susan

    1997-05-01

    The CERN PC-based ISOLDE control system has been installed at the SRS electron storage ring at Daresbury Laboratory. The use of Windows NT for the control consoles together with PC and VME front-end computers running under several operating systems has resulted in a flexible and reliable system for accelerator control. The implementation and philosophy of control application programs, based around a suite of Microsoft Visual Basic and Excel programs, is described. In particular, the use of Excel to provide adaptable programs online allows rapid generation of new control functions; orbit correction and servoing at the application level are described as examples of this.

  20. Preliminary application of a single-port access technique for laparoscopic ovariohysterectomy in dogs

    PubMed Central

    Sánchez-Margallo, F. M.; Tapia-Araya, A.; Díaz-Güemes, I.

    2015-01-01

    Laparoscopic ovariohysterectomy using single-portal access was performed in nine selected owned dogs admitted for elective ovariohysterectomy and the surgical technique and outcomes were detailed. A multiport device (SILS Port, Covidien, USA) was placed at the umbilical area through a single 3 cm incision. Three cannulae were introduced in the multiport device through the access channels and laparoscopic ovariohysterectomy was performed using a 5-mm sealing device, a 5-mm articulating grasper and a 5-mm 30° laparoscope. The mean total operative time was 52.66±15.20 minutes and the mean skin incision during surgery was 3.09±0.20 cm. Of the nine cases examined, in the one with an ovarian tumour, the technique was converted to multiport laparoscopy introducing an additional 5-mm trocar. No surgical complications were encountered and intraoperative blood loss was minimum in all animals. Clashing of the instruments and reduced triangulation were the main limitations of this technique. The combination of articulated and straight instruments facilitated triangulation towards the surgical field and dissection capability. One month after surgery a complete wound healing was observed in all animals. The present data showed that ovariohysterectomy performed with a single-port access is technically feasible in dogs. The unique abdominal incision minimises the abdominal trauma with good cosmetic results. PMID:26568831

  1. 78 FR 30329 - Importer of Controlled Substances, Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... Enforcement Administration Importer of Controlled Substances, Notice of Application Pursuant to 21 U.S.C. 958... manufacturer of a controlled substance in schedule I or II, and prior to issuing a regulation under 21 U.S.C... controlled substance listed in schedule I. The company plans to manufacture the above listed...

  2. NOAA Operational Model Archive Distribution System (NOMADS): High Availability Applications for Reliable Real Time Access to Operational Model Data

    NASA Astrophysics Data System (ADS)

    Alpert, J. C.; Wang, J.

    2009-12-01

    To reduce the impact of natural hazards and environmental changes, the National Centers for Environmental Prediction (NCEP) provide first alert and a preferred partner for environmental prediction services, and represents a critical national resource to operational and research communities affected by climate, weather and water. NOMADS is now delivering high availability services as part of NOAA’s official real time data dissemination at its Web Operations Center (WOC) server. The WOC is a web service used by organizational units in and outside NOAA, and acts as a data repository where public information can be posted to a secure and scalable content server. A goal is to foster collaborations among the research and education communities, value added retailers, and public access for science and development efforts aimed at advancing modeling and GEO-related tasks. The user (client) executes what is efficient to execute on the client and the server efficiently provides format independent access services. Client applications can execute on the server, if it is desired, but the same program can be executed on the client side with no loss of efficiency. In this way this paradigm lends itself to aggregation servers that act as servers of servers listing, searching catalogs of holdings, data mining, and updating information from the metadata descriptions that enable collections of data in disparate places to be simultaneously accessed, with results processed on servers and clients to produce a needed answer. The services used to access the operational model data output are the Open-source Project for a Network Data Access Protocol (OPeNDAP), implemented with the Grid Analysis and Display System (GrADS) Data Server (GDS), and applications for slicing, dicing and area sub-setting the large matrix of real time model data holdings. This approach insures an efficient use of computer resources because users transmit/receive only the data necessary for their tasks including

  3. Simplified microprocessor design for VLSI control applications

    NASA Technical Reports Server (NTRS)

    Cameron, K.

    1991-01-01

    A design technique for microprocessors combining the simplicity of reduced instruction set computers (RISC's) with the richer instruction sets of complex instruction set computers (CISC's) is presented. They utilize the pipelined instruction decode and datapaths common to RISC's. Instruction invariant data processing sequences which transparently support complex addressing modes permit the formulation of simple control circuitry. Compact implementations are possible since neither complicated controllers nor large register sets are required.

  4. Flow Control for Supersonic Inlet Applications

    DTIC Science & Technology

    2014-06-10

    N., Babinsky, H., “ Shock wave/boundary-layer interaction control using a combination of vortex generators and bleed”, AIAA J., Vol.51, No.5, pp...Vol.51, No.9, pp. 2208-2217, September 2013 4. Titchener, N., Babinsky, H., “ Control of a Shock -Wave/Boundary-Layer Interaction and Subsequent...Approved for public release; distribution is unlimited. 1. Ogawa, H., Babinsky, H., “Wind- Tunnel Setup for Investigations of Normal Shock Wave

  5. Theory, Methods, and Applications of Nonlinear Control

    DTIC Science & Technology

    2012-08-29

    help capture hybrid settings where the system switches between different modes of operation by moving between different regions of the state space... Lyapunov -Krasovskii functionals. The UAV work can be applied when there are rate constraints on the controls (which are constant bounds on the rate of... Lyapunov Functions, Communications and Control Engineering Series, Springer-Verlag London Ltd., London, UK, 2009. [MMZ11] Malisoff, M., F. Mazenc, and

  6. Applicator Training Manual for: Forest Pest Control.

    ERIC Educational Resources Information Center

    Newman, Jim

    Described in this manual is the use of insecticides, fungicides, and herbicides in forestry. Both diseases and insects found in hardwoods and conifers are covered. Detailed information is given on methods of herbicide application. Finally, five important environmental considerations are given. (BB)

  7. Application of genetic algorithms to tuning fuzzy control systems

    NASA Technical Reports Server (NTRS)

    Espy, Todd; Vombrack, Endre; Aldridge, Jack

    1993-01-01

    Real number genetic algorithms (GA) were applied for tuning fuzzy membership functions of three controller applications. The first application is our 'Fuzzy Pong' demonstration, a controller that controls a very responsive system. The performance of the automatically tuned membership functions exceeded that of manually tuned membership functions both when the algorithm started with randomly generated functions and with the best manually-tuned functions. The second GA tunes input membership functions to achieve a specified control surface. The third application is a practical one, a motor controller for a printed circuit manufacturing system. The GA alters the positions and overlaps of the membership functions to accomplish the tuning. The applications, the real number GA approach, the fitness function and population parameters, and the performance improvements achieved are discussed. Directions for further research in tuning input and output membership functions and in tuning fuzzy rules are described.

  8. Aerial applications dispersal systems control requirements study. [agriculture

    NASA Technical Reports Server (NTRS)

    Bauchspies, J. S.; Cleary, W. L.; Rogers, W. F.; Simpson, W.; Sanders, G. S.

    1980-01-01

    Performance deficiencies in aerial liquid and dry dispersal systems are identified. Five control system concepts are explored: (1) end of field on/off control; (2) manual control of particle size and application rate from the aircraft; (3) manual control of deposit rate on the field; (4) automatic alarm and shut-off control; and (5) fully automatic control. Operational aspects of the concepts and specifications for improved control configurations are discussed in detail. A research plan to provide the technology needed to develop the proposed improvements is presented along with a flight program to verify the benefits achieved.

  9. Effective Simulation and Control Approaches for Alleviating the Access to High-Cost Manipulators

    ERIC Educational Resources Information Center

    Mihali, Raul; Sobh, Tarek

    2005-01-01

    A problem that becomes increasingly obvious over time derives from purchasing and working with large scale, industrial type of manipulators. Primarily affected are higher level educational institutions, where manipulators are likely to be exposed to student projects that demand diversity in control strategies and various controlling software and…

  10. An Open-Access Educational Tool for Teaching Motion Dynamics in Multi-Axis Servomotor Control

    ERIC Educational Resources Information Center

    Rivera-Guillen, J. R.; de Jesus Rangel-Magdaleno, J.; de Jesus Romero-Troncoso, R.; Osornio-Rios, R. A.; Guevara-Gonzalez, R. G.

    2012-01-01

    Servomotors are widely used in computerized numerically controlled (CNC) machines, hence motion control is a major topic covered in undergraduate/graduate engineering courses. Despite the fact that several syllabi include the motion dynamics topic in their courses, there are neither suitable tools available for designing and simulating multi-axis…

  11. Electromechanical actuation for thrust vector control applications

    NASA Technical Reports Server (NTRS)

    Roth, Mary Ellen

    1990-01-01

    The advanced launch system (ALS), is a launch vehicle that is designed to be cost-effective, highly reliable, and operationally efficient with a goal of reducing the cost per pound to orbit. An electromechanical actuation (EMA) system is being developed as an attractive alternative to the hydraulic systems. The controller will integrate 20 kHz resonant link power management and distribution (PMAD) technology and pulse population modulation (PPM) techniques to implement field-oriented vector control (FOVC) of a new advanced induction motor. The driver and the FOVC will be microprocessor controlled. For increased system reliability, a built-in test (BITE) capability will be included. This involves introducing testability into the design of a system such that testing is calibrated and exercised during the design, manufacturing, maintenance, and prelaunch activities. An actuator will be integrated with the motor controller for performance testing of the EMA thrust vector control (TVC) system. The EMA system and work proposed for the future are discussed.

  12. Inline feedback control for deep drawing applications

    NASA Astrophysics Data System (ADS)

    Fischer, P.; Harsch, D.; Heingärtner, J.; Renkci, Y.; Hora, P.

    2016-11-01

    In series production of deep drawing products the quality of the parts is significantly influenced by material scatter. To guarantee a robust manufacturing the processes are designed to have a large process window. As the different material properties can lead to a drift in the process, the press settings have to be adjusted to keep the quality. In the scope of the work a feedback control system is proposed to keep the operation point inside the process window. The blank draw-in measured in predefined points is used as the primary indicator of the expected part quality. A simulation based meta model is then used to design the control algorithm with the blank holder forces as control variable. As the draw-in measurements are carried out punctually, their positioning within the tool becomes of critical importance. A simulation based study is therefore presented for the identification of sensor positions with the highest significance in relation to the process outcome. The baseline calibration of the controller is also based on the meta model. The validation of the proposed control system is illustrated based on experiments in a production line.

  13. Actively controlled shaft seals for aerospace applications

    NASA Technical Reports Server (NTRS)

    Salant, Richard F.

    1993-01-01

    An electronically controlled mechanical seal for use as the purge gas seal in a liquid oxygen turbo pump has been fabricated and tested under transient operating conditions. The thickness of the lubricating film is controlled by adjusting the coning of the carbon face. This is accomplished by applying a voltage to a piezoelectric actuator to which the carbon face is bonded. The seal has been operated with a closed-loop control system that utilizes either the leakage rate or the seal face temperature as the feedback. Both speed and pressure transients have been imposed on the seal. The transient tests have demonstrated that the seal is capable of maintaining low leakage rates while limiting the face temperatures.

  14. Designing Control System Application Software for Change

    NASA Technical Reports Server (NTRS)

    Boulanger, Richard

    2001-01-01

    The Unified Modeling Language (UML) was used to design the Environmental Systems Test Stand (ESTS) control system software. The UML was chosen for its ability to facilitate a clear dialog between software designer and customer, from which requirements are discovered and documented in a manner which transposes directly to program objects. Applying the UML to control system software design has resulted in a baseline set of documents from which change and effort of that change can be accurately measured. As the Environmental Systems Test Stand evolves, accurate estimates of the time and effort required to change the control system software will be made. Accurate quantification of the cost of software change can be before implementation, improving schedule and budget accuracy.

  15. The dbGaP data browser: a new tool for browsing dbGaP controlled-access genomic data

    PubMed Central

    Wong, Kira M.; Langlais, Kristofor; Tobias, Geoffrey S.; Fletcher-Hoppe, Colette; Krasnewich, Donna; Leeds, Hilary S.; Rodriguez, Laura Lyman; Godynskiy, Georgy; Schneider, Valerie A.; Ramos, Erin M.; Sherry, Stephen T.

    2017-01-01

    The database of Genotypes and Phenotypes (dbGaP) Data Browser (https://www.ncbi.nlm.nih.gov/gap/ddb/) was developed in response to requests from the scientific community for a resource that enable view-only access to summary-level information and individual-level genotype and sequence data associated with phenotypic features maintained in the controlled-access tier of dbGaP. Until now, the dbGaP controlled-access environment required investigators to submit a data access request, wait for Data Access Committee review, download each data set and locally examine them for potentially relevant information. Existing unrestricted-access genomic data browsing resources (e.g. http://evs.gs.washington.edu/EVS/, http://exac.broadinstitute.org/) provide only summary statistics or aggregate allele frequencies. The dbGaP Data Browser serves as a third solution, providing researchers with view-only access to a compilation of individual-level data from general research use (GRU) studies through a simplified controlled-access process. The National Institutes of Health (NIH) will continue to improve the Browser in response to user feedback and believes that this tool may decrease unnecessary download requests, while still facilitating responsible genomic data-sharing. PMID:27899644

  16. GPR application to historical buildings structural control

    NASA Astrophysics Data System (ADS)

    Pettinelli, E.; Barone, P. M.; Mattei, E.; Di Matteo, A.

    2009-04-01

    Preservation of historical buildings requires particular care, as any intervention must conducted in a way which does not alter or damage the style, structure or contents of the edifice. In order to properly plan the restoration of a building, non-destructive techniques can be extensively used to detect structural elements and weaknesses. Ground Penetrating Radar is particularly well adapted to this type of work, as the method is non-invasive, rapid, and provides high resolution images of contrasting subsurface materials. In the present work we show three case-histories on three historical buildings - different in age, structure and geometry - in which GPR technique has been successfully used. To obtain 2D time slices of the investigated area, high frequency bistatic GPR (900 MHz and 1GHz antennas) was applied in each site, acquiring data along several parallel profiles. The first case presented here, is the GPR detection of the fractures and the internal lesions in the architrave of the Porticus Octaviae, a Roman building partially restored, located downtown Rome. The second case shows the application of the GPR to detect the internal structure of the floors above the vaulted ceilings that houses a series of 16th century frescos in the important Zuccari Palace, also located in Rome. Finally, the third case illustrates the application of GPR to reconstruct the geometry and the reinforcement structures of the floors and the inside walls of the Provincial Palace of Pescara, dated back to the Fascist age. These three examples show that GPR technique is a valid support which, in exhaustive way, can highlight the state of conservation of historical buildings. In particular, this technique can produce fundamental information for the restorers, in terms of location, dimension, and geometry of the internal lesions in the structure, helping them in developing the best possible protection plan for an historical building. REFERENCES Annan A.P.; 2004: Ground Penetrating Radar

  17. Locus of Control and Performance: Widening Applicabilities

    ERIC Educational Resources Information Center

    Manichander, T.

    2014-01-01

    In an attempt to explain the evidence which indicates that internal perception of control is positively related to academic achievement, this paper suggests that mediating motivational and cognitive reactions, which differentiate internals from externals, may account for this relationship. Furthermore, on the basis of data which suggest that the…

  18. Neural networks applications to control and computations

    NASA Technical Reports Server (NTRS)

    Luxemburg, Leon A.

    1994-01-01

    Several interrelated problems in the area of neural network computations are described. First an interpolation problem is considered, then a control problem is reduced to a problem of interpolation by a neural network via Lyapunov function approach, and finally a new, faster method of learning as compared with the gradient descent method, was introduced.

  19. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... documentation or state registration papers. For vessels over 20 ft (6.1 m) in length overall, the measurement of... owner's name, vessel name, permit number, official number or state registration number, current vessel... document the vessel's current specifications, and the signature of the vessel owner. (B) Applicability...

  20. Controlling upconversion nanocrystals for emerging applications

    NASA Astrophysics Data System (ADS)

    Zhou, Bo; Shi, Bingyang; Jin, Dayong; Liu, Xiaogang

    2015-11-01

    Lanthanide-doped upconversion nanocrystals enable anti-Stokes emission with pump intensities several orders of magnitude lower than required by conventional nonlinear optical techniques. Their exceptional properties, namely large anti-Stokes shifts, sharp emission spectra and long excited-state lifetimes, have led to a diversity of applications. Here, we review upconversion nanocrystals from the perspective of fundamental concepts and examine the technical challenges in relation to emission colour tuning and luminescence enhancement. In particular, we highlight the advances in functionalization strategies that enable the broad utility of upconversion nanocrystals for multimodal imaging, cancer therapy, volumetric displays and photonics.

  1. Controlling upconversion nanocrystals for emerging applications.

    PubMed

    Zhou, Bo; Shi, Bingyang; Jin, Dayong; Liu, Xiaogang

    2015-11-01

    Lanthanide-doped upconversion nanocrystals enable anti-Stokes emission with pump intensities several orders of magnitude lower than required by conventional nonlinear optical techniques. Their exceptional properties, namely large anti-Stokes shifts, sharp emission spectra and long excited-state lifetimes, have led to a diversity of applications. Here, we review upconversion nanocrystals from the perspective of fundamental concepts and examine the technical challenges in relation to emission colour tuning and luminescence enhancement. In particular, we highlight the advances in functionalization strategies that enable the broad utility of upconversion nanocrystals for multimodal imaging, cancer therapy, volumetric displays and photonics.

  2. SAHBNET, an Accessible Surface-Based Elastic Network: An Application to Membrane Protein

    PubMed Central

    Dony, Nicolas; Crowet, Jean Marc; Joris, Bernard; Brasseur, Robert; Lins, Laurence

    2013-01-01

    Molecular Dynamics is a method of choice for membrane simulations and the rising of coarse-grained forcefields has opened the way to longer simulations with reduced calculations times. Here, we present an elastic network, SAHBNET (Surface Accessibility Hydrogen-Bonds elastic NETwork), that will maintain the structure of soluble or membrane proteins based on the hydrogen bonds present in the atomistic structure and the proximity between buried residues. This network is applied on the coarse-grained beads defined by the MARTINI model, and was designed to be more physics-based than a simple elastic network. The SAHBNET model is evaluated against atomistic simulations, and compared with ELNEDYN models. The SAHBNET is then used to simulate two membrane proteins inserted in complex lipid bilayers. These bilayers are formed by self-assembly and the use of a modified version of the GROMACS tool genbox (which is accessible through the gcgs.gembloux.ulg.ac.be website). The results show that SAHBNET keeps the structure close to the atomistic one and is successfully used for the simulation of membrane proteins. PMID:23722660

  3. 76 FR 23627 - Manufacturer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-27

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances; Notice of Application Pursuant to Sec. 1301... the Drug Enforcement Administration (DEA) to be registered as a bulk manufacturer of...

  4. 76 FR 35239 - Importer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ...), comments and requests for hearings on applications to import narcotic raw material are not appropriate. As... following basic classes of controlled substances: Drug Schedule Coca Leaves (9040) II Raw Opium (9600)...

  5. 76 FR 25374 - Importer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... hearings on applications to import narcotic raw material are not appropriate. As noted in a previous notice... following basic classes of controlled substances in schedule II: Drug Schedule Raw Opium (9600)...

  6. Aerial Application of Malathion: Information for Mosquito Control Professionals

    EPA Pesticide Factsheets

    EPA recently completed the malathion draft human health risk assessment for all uses. This letter to mosquito control professionals provides modifications to application directions that can reduce malathion deposition while maintaining effectiveness.

  7. 75 FR 14190 - Manufacturer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-24

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances; Notice of Application Pursuant to Sec. 1301... Drug Enforcement Administration (DEA) to be registered as a bulk manufacturer of Gamma...

  8. 75 FR 14189 - Manufacturer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-24

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances; Notice of Application Pursuant to Sec. 1301... Drug Enforcement Administration (DEA) as a bulk manufacturer of the basic classes of...

  9. 76 FR 21916 - Manufacturer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-19

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances; Notice of Application Pursuant to Sec. 1301... Enforcement Administration (DEA) to be registered as a bulk manufacturer of 4-...

  10. 76 FR 14690 - Manufacturer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances; Notice of Application Pursuant to Sec. 1301... Drug Enforcement Administration (DEA) to be registered as a bulk manufacturer of...

  11. 75 FR 75497 - Manufacturer of Controlled Substances; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances; Notice of Application Pursuant to Sec. 1301... the Drug Enforcement Administration (DEA) to be registered as a bulk manufacturer of...

  12. Applicator Training Manual for: Public Health Pest Control.

    ERIC Educational Resources Information Center

    Moore, E. E.

    This manual gives the life cycle and habitats, public health importance, methods of non-chemical control, and pesticides and methods of application for mosquitoes, flies, bedbugs, fleas, lice, cockroaches, venomous anthropods, ticks and chiggers, and rodents. (BB)

  13. Healthcare chains - enabling application and data privacy controls for healthcare information systems.

    PubMed

    Omran, Esraa; Grandison, Tyrone; Abu Almaati, Shereef

    2010-01-01

    Healthcare applications that have access control, disclosure management and or privacy enforcement requirements may implement the respective solutions to these issues at the application level or at the database level or in both. Unfortunately, there are technical and non-technical factors that influence what can be done. In this paper we present a flexible, simple and novel approach to seamlessly imbuing current healthcare applications and their supporting infrastructure with security and privacy functionality, while being cognizant of these factors. This approach is called the Chain method. This paper will highlight the smaller design footprint, the increased ease of implementation and use of the Chain method, while demonstrating that it is as powerful and effective as traditional methods.

  14. Heat conduction controlled combustion for scramjet applications

    NASA Technical Reports Server (NTRS)

    Ferri, A.; Agnone, A. M.

    1974-01-01

    The use of heat conduction flame generated in a premixed supersonic stream is discussed. It is shown that the flame is controlled initially by heat conduction and then by chemical reaction. Such a flame is shorter than the diffusion type of flame and therefore it requires a much shorter burner. The mixing is obtained by injecting the hydrogen in the inlet. Then the inlet can be cooled by film cooling.

  15. History and applications in controlled environments

    NASA Technical Reports Server (NTRS)

    Downs, R. J.

    1994-01-01

    The widespread application of electric (often called artificial) light in greenhouses, growing rooms, and plant growth chambers would presuppose that the role of phytochrome would be considered in the selection and use of such lighting systems. Unfortunately this is not usually the case. Part of the problem is that many students, and indeed an unfortunate number of senior scientists, seem to regard phytochrome as a laboratory phenomenon without much application in the real world. They simply have not grasped the concept that phytochrome is functioning through all stages of plant development, wherever plants are grown. It is certainly true, as Meijer (1971) stated, that one cannot compare experimental results obtained under very strict laboratory conditions with plant irradiation in glasshouses and in growth rooms. When Karl Norris developed the first practical portable spectroradiometer about 1962, some of the first measurements were to determine the red/far-red ratios under tree canopies. These measurements showed clearly the predominance of far-red in the understory and suggested that far-red was contributing to the elongation exhibited by many species growing in the shade, and possibly was a factor in the induction of light requirements in seeds. Subsequently we used Catalpa leaves as far-red filters to make light-insensitive lettuce seed light requiring. Much more detailed work has since been done on phytochrome effects in the natural environment, and it is encouraging to note that efforts are bring made to apply phytochrome research to horticulture.

  16. An application of the edge effect in measuring accessibility to multiple food retailer types in Southwestern Ontario, Canada

    PubMed Central

    2011-01-01

    Background Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS) to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores), both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Results Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. Conclusion By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the actual distance necessary to

  17. Access, Relevance, and Control in the Research Process: Lessons From Indian Country

    PubMed Central

    MANSON, SPERO M.; GARROUTTE, EVA; GOINS, R. TURNER; HENDERSON, PATRICIA NEZ

    2017-01-01

    Objective To illustrate successful strategies in working with American Indian (AI) and Alaska Native (AN) communities in aging and health research by emphasizing access, local relevance, and decision-making processes. Methods Case examples of health studies involving older AIs (≥50 years) among Eastern Band Cherokee Indians, a federally recognized reservation; the Cherokee Nation, a rural, nonreservation, tribal jurisdictional service area; and Lakota tribal members living in Rapid City, South Dakota. Results Local review and decision making reflect the unique legal and historical factors underpinning AI sovereignty. Although specific approval procedures vary, there are common expectations across these communities that can be anticipated in conceptualizing, designing, and implementing health research among native elders. Conclusions Most investigators are unprepared to address the demands of health research in AI communities. Community-based participatory research in this setting conflicts with investigators’ desire for academic freedom and scientific independence. Successful collaboration promises to enhance research efficiencies and move findings more quickly to clinical practice. PMID:15448287

  18. Application-based control of an autonomous mobile robot

    SciTech Connect

    Fisher, J.J.

    1988-01-01

    Industry response to new technology is governed, almost without exception, by the systems available to meet real world needs, not tools which prove the feasibility of the technology. To this end, SRL is developing robust control strategies and tools for potential autonomous vehicle applications on site. This document describes the work packages developed to perform remote tasks and a integrated control environment which allows rapid vehicle applications development and diagnostic capabilities. 5 refs., 7 figs.

  19. Future applications of artificial intelligence to Mission Control Centers

    NASA Technical Reports Server (NTRS)

    Friedland, Peter

    1991-01-01

    Future applications of artificial intelligence to Mission Control Centers are presented in the form of the viewgraphs. The following subject areas are covered: basic objectives of the NASA-wide AI program; inhouse research program; constraint-based scheduling; learning and performance improvement for scheduling; GEMPLAN multi-agent planner; planning, scheduling, and control; Bayesian learning; efficient learning algorithms; ICARUS (an integrated architecture for learning); design knowledge acquisition and retention; computer-integrated documentation; and some speculation on future applications.

  20. Control of chaos: methods and applications in mechanics.

    PubMed

    Fradkov, Alexander L; Evans, Robin J; Andrievsky, Boris R

    2006-09-15

    A survey of the field related to control of chaotic systems is presented. Several major branches of research that are discussed are feed-forward ('non-feedback') control (based on periodic excitation of the system), the 'Ott-Grebogi-Yorke method' (based on the linearization of the Poincaré map), the 'Pyragas method' (based on a time-delayed feedback), traditional for control-engineering methods including linear, nonlinear and adaptive control. Other areas of research such as control of distributed (spatio-temporal and delayed) systems, chaotic mixing are outlined. Applications to control of chaotic mechanical systems are discussed.