Science.gov

Sample records for access control decisions

  1. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  2. A Randomized Controlled Trial of a Mobile Clinical Decision Aid to Improve Access to Kidney Transplantation: iChoose Kidney

    PubMed Central

    Patzer, Rachel E.; Basu, Mohua; Mohan, Sumit; Smith, Kayla D.; Wolf, Michael; Ladner, Daniela; Friedewald, John J.; Chiles, Mariana; Russell, Allison; McPherson, Laura; Gander, Jennifer; Pastan, Stephen

    2016-01-01

    Kidney transplantation is the preferred treatment for patients with end-stage renal disease, as it substantially increases a patient's survival and is cost saving compared to a lifetime of dialysis. However, transplantation is not universally chosen by patients with renal failure, and limited knowledge about the survival benefit of transplantation vs. dialysis may play a role. We created a mobile application clinical decision aid called iChoose Kidney to improve access to individualized prognosis information comparing dialysis and transplantation outcomes. We describe the iChoose Kidney study, a randomized controlled trial designed to test the clinical efficacy of a mobile health decision aid among end-stage renal disease patients referred for kidney transplantation at three large, diverse transplant centers across the U.S. Approximately 450 patients will be randomized to receive either: (1) standard of care or “usual” transplantation education, or (2) standard of care plus iChoose Kidney. The primary outcome is change in knowledge about the survival benefit of kidney transplantation vs. dialysis from baseline to immediate follow-up; secondary outcomes include change in treatment preferences, improved decisional conflict, and increased access to kidney transplantation. Analyses are also planned to examine effectiveness across subgroups of race, socioeconomic status, health literacy and health numeracy. Engaging patients in health care choices can increase patient empowerment and improve knowledge and understanding of treatment choices. If the effectiveness of iChoose Kidney has a greater impact on patients with low health literacy, lower socioeconomic status, and minority race, this decision aid could help reduce disparities in access to kidney transplantation. PMID:27610423

  3. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  4. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  5. Decision Analysis of Dynamic Spectrum Access Rules

    SciTech Connect

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  6. The Equal Access Act: Recent Court Decisions.

    ERIC Educational Resources Information Center

    Bjorklun, Eugene C.

    1989-01-01

    Examines court decisions which led to the passage of the Equal Access Act of 1984. Although the act was designed to clarify the issue over the legality of permitting religious clubs to meet on school property, it may have created more confusion. Concludes that the Supreme Court may have to decide the issue. (SLM)

  7. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  8. Controlling Access to Suicide Means

    PubMed Central

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  9. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  10. ClinicalAccess: a clinical decision support tool.

    PubMed

    Crowell, Karen; Vardell, Emily

    2015-01-01

    ClinicalAccess is a new clinical decision support tool that uses a question-and-answer format to mirror clinical decision-making strategies. The unique format of ClinicalAccess delivers concise, authoritative answers to more than 120,000 clinical questions. This column presents a review of the product, a sample search, and a comparison with other point-of-care search engines.

  11. Access control mechanisms for distributed healthcare environments.

    PubMed

    Sergl-Pommerening, Marita

    2004-01-01

    Today's IT-infrastructure provides more and more possibilities to share electronic patient data across several healthcare organizations and hospital departments. A strong requirement is sufficient data protection and security measures complying with the medical confidentiality and the data protection laws of each state or country like the European directive on data protection or the U.S. HIPAA privacy rule. In essence, the access control mechanisms and authorization structures of information systems must be able to realize the Need-To-Access principle. This principle can be understood as a set of context-sensitive access rules, regarding the patient's path across the organizations. The access control mechanisms of today's health information systems do not sufficiently satisfy this requirement, because information about participation of persons or organizations is not available within each system in a distributed environment. This problem could be solved by appropriate security services. The CORBA healthcare domain standard contains such a service for obtaining authorization decisions and administrating access decision policies (RAD). At the university hospital of Mainz we have developed an access control system (MACS), which includes the main functionality of the RAD specification and the access control logic that is needed for such a service. The basic design principles of our approach are role-based authorization, user rights with static and dynamic authorization data, context rules and the separation of three cooperating servers that provide up-to-date knowledge about users, roles and responsibilities. This paper introduces the design principles and the system design and critically evaluates the concepts based on practical experience.

  12. Context-Based E-Health System Access Control Mechanism

    NASA Astrophysics Data System (ADS)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  13. Decisions about access to health care and accountability for reasonableness.

    PubMed

    Daniels, N

    1999-06-01

    Insurers make decisions that directly limit access to care (e.g., when deciding about coverage for new technologies or formulary design) and that indirectly limit access (e.g., by adopting incentives to induce physicians to provide fewer or different services). These decisions raise questions about legitimacy and fairness. By holding health plans accountable for the reasonableness of their decisions, it is possible to address these questions. Accountability for reasonableness involves providing publicly accessible rationales for decisions and limiting rationales to those that all "fair-minded" persons can agree are relevant to meeting patient needs fairly under resource constraints. This form of accountability is illustrated by examining its implications for the three examples of direct and indirect limit setting noted here. PMID:10924028

  14. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  15. Vascular access choice in incident hemodialysis patients: a decision analysis.

    PubMed

    Drew, David A; Lok, Charmaine E; Cohen, Joshua T; Wagner, Martin; Tangri, Navdeep; Weiner, Daniel E

    2015-01-01

    Hemodialysis vascular access recommendations promote arteriovenous (AV) fistulas first; however, it may not be the best approach for all hemodialysis patients, because likelihood of successful fistula placement, procedure-related and subsequent costs, and patient survival modify the optimal access choice. We performed a decision analysis evaluating AV fistula, AV graft, and central venous catheter (CVC) strategies for patients initiating hemodialysis with a CVC, a scenario occurring in over 70% of United States dialysis patients. A decision tree model was constructed to reflect progression from hemodialysis initiation. Patients were classified into one of three vascular access choices: maintain CVC, attempt fistula, or attempt graft. We explicitly modeled probabilities of primary and secondary patency for each access type, with success modified by age, sex, and diabetes. Access-specific mortality was incorporated using preexisting cohort data, including terms for age, sex, and diabetes. Costs were ascertained from the 2010 USRDS report and Medicare for procedure costs. An AV fistula attempt strategy was found to be superior to AV grafts and CVCs in regard to mortality and cost for the majority of patient characteristic combinations, especially younger men without diabetes. Women with diabetes and elderly men with diabetes had similar outcomes, regardless of access type. Overall, the advantages of an AV fistula attempt strategy lessened considerably among older patients, particularly women with diabetes, reflecting the effect of lower AV fistula success rates and lower life expectancy. These results suggest that vascular access-related outcomes may be optimized by considering individual patient characteristics.

  16. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  17. ACCESS: Detector Control and Performance

    NASA Astrophysics Data System (ADS)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  18. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  19. 36 CFR 1008.15 - Requests for access to records: Initial decision.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...: Initial decision. 1008.15 Section 1008.15 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.15 Requests for access to records: Initial decision. (a) Decisions on... system of records which has been excepted from the access provisions of the Privacy Act by rulemaking....

  20. 36 CFR 1008.15 - Requests for access to records: Initial decision.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... records: Initial decision. 1008.15 Section 1008.15 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.15 Requests for access to records: Initial decision. (a) Decisions on... system of records which has been excepted from the access provisions of the Privacy Act by rulemaking....

  1. 36 CFR 1008.15 - Requests for access to records: Initial decision.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... records: Initial decision. 1008.15 Section 1008.15 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.15 Requests for access to records: Initial decision. (a) Decisions on... system of records which has been excepted from the access provisions of the Privacy Act by rulemaking....

  2. 36 CFR 1008.15 - Requests for access to records: Initial decision.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... records: Initial decision. 1008.15 Section 1008.15 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.15 Requests for access to records: Initial decision. (a) Decisions on... system of records which has been excepted from the access provisions of the Privacy Act by rulemaking....

  3. 36 CFR 1008.15 - Requests for access to records: Initial decision.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... records: Initial decision. 1008.15 Section 1008.15 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.15 Requests for access to records: Initial decision. (a) Decisions on... system of records which has been excepted from the access provisions of the Privacy Act by rulemaking....

  4. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  5. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  6. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  7. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  8. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  9. Formal Description of Trust-based Access Control

    NASA Astrophysics Data System (ADS)

    Xiaoning, Ma

    Different from traditional access control technologies, such as discretionary access control, mandatory access control, role-based access control, trust-based access control can solve the problem of uncertainty, risk and vulnerability coming from authorization. In this paper, strict definition and formal description of trust-based access control is defined.

  10. Evaluating Michigan's community hospital access: spatial methods for decision support

    PubMed Central

    Messina, Joseph P; Shortridge, Ashton M; Groop, Richard E; Varnakovida, Pariwate; Finn, Mark J

    2006-01-01

    Background Community hospital placement is dictated by a diverse set of geographical factors and historical contingency. In the summer of 2004, a multi-organizational committee headed by the State of Michigan's Department of Community Health approached the authors of this paper with questions about how spatial analyses might be employed to develop a revised community hospital approval procedure. Three objectives were set. First, the committee needed visualizations of both the spatial pattern of Michigan's population and its 139 community hospitals. Second, the committee required a clear, defensible assessment methodology to quantify access to existing hospitals statewide, taking into account factors such as distance to nearest hospital and road network density to estimate travel time. Third, the committee wanted to contrast the spatial distribution of existing community hospitals with a theoretical configuration that best met statewide demand. This paper presents our efforts to first describe the distribution of Michigan's current community hospital pattern and its people, and second, develop two models, access-based and demand-based, to identify areas with inadequate access to existing hospitals. Results Using the product from the access-based model and contiguity and population criteria, two areas were identified as being "under-served." The lower area, located north/northeast of Detroit, contained the greater total land area and population of the two areas. The upper area was centered north of Grand Rapids. A demand-based model was applied to evaluate the existing facility arrangement by allocating daily bed demand in each ZIP code to the closest facility. We found 1,887 beds per day were demanded by ZIP centroids more than 16.1 kilometers from the nearest existing hospital. This represented 12.7% of the average statewide daily bed demand. If a 32.3 kilometer radius was employed, unmet demand dropped to 160 beds per day (1.1%). Conclusion Both modeling

  11. Access to Resources Shapes Maternal Decision Making: Evidence from a Factorial Vignette Experiment

    PubMed Central

    Kushnick, Geoff

    2013-01-01

    The central assumption of behavioral ecology is that natural selection has shaped individuals with the capacity to make decisions that balance the fitness costs and benefits of behavior. A number of factors shape the fitness costs and benefits of maternal care, but we lack a clear understanding how they, taken together, play a role in the decision-making process. In animal studies, the use of experimental methods has allowed for the tight control of these factors. Standard experimentation is inappropriate in human behavioral ecology, but vignette experiments may solve the problem. I used a confounded factorial vignette experiment to gather 640 third-party judgments about the maternal care decisions of hypothetical women and their children from 40 female karo Batak respondents in rural Indonesia. This allowed me to test hypotheses derived from parental investment theory about the relative importance of five binary factors in shaping maternal care decisions with regard to two distinct scenarios. As predicted, access to resources—measured as the ability of a woman to provide food for her children—led to increased care. A handful of other factors conformed to prediction, but they were inconsistent across scenarios. The results suggest that mothers may use simple heuristics, rather than a full accounting for costs and benefits, to make decisions about maternal care. Vignettes have become a standard tool for studying decision making, but have made only modest inroads to evolutionarily informed studies of human behavior. PMID:24069427

  12. Waste Transfer Leaks Control Decision Record

    SciTech Connect

    RYAN, G.W.

    2000-06-27

    Control decision meetings for Waste Transfer Leaks were held on April 24,25,26, and 27, 2000. The agenda for the control decision meetings is included in Appendix A, and attendee lists are included in Appendix B. The purpose of the control decision meetings was to review and revise previously selected controls for the prevention or mitigation of waste transfer leak accidents. Re-evaluation of the controls is warranted due to revisions in the hazard and accident analysis for these Tank Farm events. In particular, calculated radiological consequences are significantly reduced from those currently reported in the Final Safety Analysis Report (FSAR). Revised hazard and accident analysis and a revised control recommendation will be reflected in an Authorization Basis Amendment to be submitted at the Department of Energy, Office of River Protection's (ORP's) request by June 30, 2000 to satisfy ORP Performance Incentive (PI) 2.1.1, Revision 1, ''Authorization Basis Management Process Efficiency Improvement''. The scope of the control decision meetings was to address all waste transfer leak-related hazardous conditions identified in the Tank Farm hazard analysis database, excluding those associated with the use of the Replacement Cross-Site Transfer System (RCSTS) slurry line and sluicing of Tank 241-C-106, which is addressed in FSAR Addendum 1. The scope of this control decision process does include future waste feed delivery waste transfer operations.

  13. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  14. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  15. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  16. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  17. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  18. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  19. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  20. The linked medical data access control framework.

    PubMed

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  1. Deciding as Intentional Action: Control over Decisions

    PubMed Central

    Shepherd, Joshua

    2015-01-01

    Common-sense folk psychology and mainstream philosophy of action agree about decisions: these are under an agent's direct control, and are thus intentional actions for which agents can be held responsible. I begin this paper by presenting a problem for this view. In short, since the content of the motivational attitudes that drive deliberation and decision remains open-ended until the moment of decision, it is unclear how agents can be thought to exercise control over what they decide at the moment of deciding. I note that this problem might motivate a non-actional view of deciding—a view that decisions are not actions, but are instead passive events of intention acquisition. For without an understanding of how an agent might exercise control over what is decided at the moment of deciding, we lack a good reason for maintaining commitment to an actional view of deciding. However, I then offer the required account of how agents exercise control over decisions at the moment of deciding. Crucial to this account is an understanding of the relation of practical deliberation to deciding, an understanding of skilled deliberative activity, and the role of attention in the mental action of deciding. PMID:26321765

  2. 36 CFR 1256.26 - When can I appeal decisions about access to Federal archival records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... CFR part 1250, subpart D, Appeals. (b) For information on filing appeals for requests made under... about access to Federal archival records? 1256.26 Section 1256.26 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Federal Archival Records § 1256.26 When can I appeal decisions about access...

  3. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  4. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  5. Government Information Access: A decisive Factor for E-Government

    NASA Astrophysics Data System (ADS)

    Xia, Yikun; Huang, Cui

    In recent years we are witnessing enormous development of e-government, which has brought about great changes in our society. This study examines the relationship between the levels of e-government and the quality of government information access, pointing out that e-government principles are based on the assumption that government information should be accessed among all kinds of organizations. In contrast to government webs' rapid growth, the low quality of government information access has been a dilemma which impacts the usability and efficiency of e-government. This paper also analyzes blocking factors about information access in China, draw a conclusion that on-line government information access should be the key factor of e-government which steps should be taken to enhance accessibility to government information.

  6. Using the decision ladder to understand road user decision making at actively controlled rail level crossings.

    PubMed

    Mulvihill, Christine M; Salmon, Paul M; Beanland, Vanessa; Lenné, Michael G; Read, Gemma J M; Walker, Guy H; Stanton, Neville A

    2016-09-01

    Rail level crossings (RLXs) represent a key strategic risk for railways worldwide. Despite enforcement and engineering countermeasures, user behaviour at RLXs can often confound expectations and erode safety. Research in this area is limited by a relative absence of insights into actual decision making processes and a focus on only a subset of road user types. One-hundred and sixty-six road users (drivers, motorcyclists, cyclists and pedestrians) completed a diary entry for each of 457 naturalistic encounters with RLXs when a train was approaching. The final eligible sample comprised 94 participants and 248 encounters at actively controlled crossings where a violation of the active warnings was possible. The diary incorporated Critical Decision Method probe questions, which enabled user responses to be mapped onto Rasmussen's decision ladder. Twelve percent of crossing events were non-compliant. The underlying decision making was compared to compliant events and a reference decision model to reveal important differences in the structure and type of decision making within and between road user groups. The findings show that engineering countermeasures intended to improve decision making (e.g. flashing lights), may have the opposite effect for some users because the system permits a high level of flexibility for circumvention. Non-motorised users were more likely to access information outside of the warning signals because of their ability to achieve greater proximity to the train tracks and the train itself. The major conundrum in resolving these issues is whether to restrict the amount of time and information available to users so that it cannot be used for circumventing the system or provide more information to help users make safe decisions. PMID:27184305

  7. Using the decision ladder to understand road user decision making at actively controlled rail level crossings.

    PubMed

    Mulvihill, Christine M; Salmon, Paul M; Beanland, Vanessa; Lenné, Michael G; Read, Gemma J M; Walker, Guy H; Stanton, Neville A

    2016-09-01

    Rail level crossings (RLXs) represent a key strategic risk for railways worldwide. Despite enforcement and engineering countermeasures, user behaviour at RLXs can often confound expectations and erode safety. Research in this area is limited by a relative absence of insights into actual decision making processes and a focus on only a subset of road user types. One-hundred and sixty-six road users (drivers, motorcyclists, cyclists and pedestrians) completed a diary entry for each of 457 naturalistic encounters with RLXs when a train was approaching. The final eligible sample comprised 94 participants and 248 encounters at actively controlled crossings where a violation of the active warnings was possible. The diary incorporated Critical Decision Method probe questions, which enabled user responses to be mapped onto Rasmussen's decision ladder. Twelve percent of crossing events were non-compliant. The underlying decision making was compared to compliant events and a reference decision model to reveal important differences in the structure and type of decision making within and between road user groups. The findings show that engineering countermeasures intended to improve decision making (e.g. flashing lights), may have the opposite effect for some users because the system permits a high level of flexibility for circumvention. Non-motorised users were more likely to access information outside of the warning signals because of their ability to achieve greater proximity to the train tracks and the train itself. The major conundrum in resolving these issues is whether to restrict the amount of time and information available to users so that it cannot be used for circumventing the system or provide more information to help users make safe decisions.

  8. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  9. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  10. A Quality of Context-Aware Approach to Access Control in Pervasive Environments

    NASA Astrophysics Data System (ADS)

    Toninelli, Alessandra; Corradi, Antonio; Montanari, Rebecca

    The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users to share resources anywhere and anytime, but makes access control a crucial issue. User/device mobility and heterogeneity, together with network topology and conditions variability, complicate access control and call for novel solutions to dynamically adapt access decisions to the different operating conditions. Several research efforts have emerged in recent years that propose to exploit context-awareness to control access to resources based on context visibility and changes. Context-based access control requires, however, to take into account the quality of context information used to drive access decisions (QoC). Quality of context has in fact a profound impact on the correct behavior of any context-aware access control framework. Using context information with insufficient quality might increase the risk of incorrect access control decisions, thus leading to dangerous security breaches in resource sharing. In this paper we propose a QoC-aware approach to access control for anywhere, anytime resource sharing. The paper describes the design, implementation and evaluation of the Proteus policy framework, which combines two design guidelines to enable dynamic adaptation of policies depending on context changes: context-awareness with QoC guarantees and semantic technologies to allow high-level description of context/policy specification and reasoning about context/policies.

  11. Decision support system for nursing management control

    SciTech Connect

    Ernst, C.J.

    1983-01-01

    A knowledge representation approach for expert systems supporting decision processes in business is proposed. A description of a knowledge representation schema using a logic programming metalanguage is described, then the role of such a schema in a management expert system is demonstrated through the problem of nursing management control in hospitals. 18 references.

  12. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  13. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  14. Rational decision-making in inhibitory control.

    PubMed

    Shenoy, Pradeep; Yu, Angela J

    2011-01-01

    An important aspect of cognitive flexibility is inhibitory control, the ability to dynamically modify or cancel planned actions in response to changes in the sensory environment or task demands. We formulate a probabilistic, rational decision-making framework for inhibitory control in the stop signal paradigm. Our model posits that subjects maintain a Bayes-optimal, continually updated representation of sensory inputs, and repeatedly assess the relative value of stopping and going on a fine temporal scale, in order to make an optimal decision on when and whether to go on each trial. We further posit that they implement this continual evaluation with respect to a global objective function capturing the various reward and penalties associated with different behavioral outcomes, such as speed and accuracy, or the relative costs of stop errors and go errors. We demonstrate that our rational decision-making model naturally gives rise to basic behavioral characteristics consistently observed for this paradigm, as well as more subtle effects due to contextual factors such as reward contingencies or motivational factors. Furthermore, we show that the classical race model can be seen as a computationally simpler, perhaps neurally plausible, approximation to optimal decision-making. This conceptual link allows us to predict how the parameters of the race model, such as the stopping latency, should change with task parameters and individual experiences/ability.

  15. Speed control system for an access gate

    SciTech Connect

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  16. 36 CFR 1256.36 - When can I appeal decisions about access to donated historical materials?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true When can I appeal decisions about access to donated historical materials? 1256.36 Section 1256.36 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS...

  17. 36 CFR 1256.36 - When can I appeal decisions about access to donated historical materials?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false When can I appeal decisions about access to donated historical materials? 1256.36 Section 1256.36 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS...

  18. 36 CFR 1256.36 - When can I appeal decisions about access to donated historical materials?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false When can I appeal decisions about access to donated historical materials? 1256.36 Section 1256.36 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS...

  19. 36 CFR 1256.36 - When can I appeal decisions about access to donated historical materials?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false When can I appeal decisions about access to donated historical materials? 1256.36 Section 1256.36 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS...

  20. 36 CFR 1256.36 - When can I appeal decisions about access to donated historical materials?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false When can I appeal decisions about access to donated historical materials? 1256.36 Section 1256.36 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS...

  1. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  2. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  3. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  4. Metacognitive Control of Categorial Neurobehavioral Decision Systems.

    PubMed

    Foxall, Gordon R

    2016-01-01

    The competing neuro-behavioral decision systems (CNDS) model proposes that the degree to which an individual discounts the future is a function of the relative hyperactivity of an impulsive system based on the limbic and paralimbic brain regions and the relative hypoactivity of an executive system based in prefrontal cortex (PFC). The model depicts the relationship between these categorial systems in terms of the antipodal neurophysiological, behavioral, and decision (cognitive) functions that engender normal and addictive responding. However, a case may be made for construing several components of the impulsive and executive systems depicted in the model as categories (elements) of additional systems that are concerned with the metacognitive control of behavior. Hence, this paper proposes a category-based structure for understanding the effects on behavior of CNDS, which includes not only the impulsive and executive systems of the basic model but a superordinate level of reflective or rational decision-making. Following recent developments in the modeling of cognitive control which contrasts Type 1 (rapid, autonomous, parallel) processing with Type 2 (slower, computationally demanding, sequential) processing, the proposed model incorporates an arena in which the potentially conflicting imperatives of impulsive and executive systems are examined and from which a more appropriate behavioral response than impulsive choice emerges. This configuration suggests a forum in which the interaction of picoeconomic interests, which provide a cognitive dimension for CNDS, can be conceptualized. This proposition is examined in light of the resolution of conflict by means of bundling. PMID:26925004

  5. Metacognitive Control of Categorial Neurobehavioral Decision Systems.

    PubMed

    Foxall, Gordon R

    2016-01-01

    The competing neuro-behavioral decision systems (CNDS) model proposes that the degree to which an individual discounts the future is a function of the relative hyperactivity of an impulsive system based on the limbic and paralimbic brain regions and the relative hypoactivity of an executive system based in prefrontal cortex (PFC). The model depicts the relationship between these categorial systems in terms of the antipodal neurophysiological, behavioral, and decision (cognitive) functions that engender normal and addictive responding. However, a case may be made for construing several components of the impulsive and executive systems depicted in the model as categories (elements) of additional systems that are concerned with the metacognitive control of behavior. Hence, this paper proposes a category-based structure for understanding the effects on behavior of CNDS, which includes not only the impulsive and executive systems of the basic model but a superordinate level of reflective or rational decision-making. Following recent developments in the modeling of cognitive control which contrasts Type 1 (rapid, autonomous, parallel) processing with Type 2 (slower, computationally demanding, sequential) processing, the proposed model incorporates an arena in which the potentially conflicting imperatives of impulsive and executive systems are examined and from which a more appropriate behavioral response than impulsive choice emerges. This configuration suggests a forum in which the interaction of picoeconomic interests, which provide a cognitive dimension for CNDS, can be conceptualized. This proposition is examined in light of the resolution of conflict by means of bundling.

  6. Metacognitive Control of Categorial Neurobehavioral Decision Systems

    PubMed Central

    Foxall, Gordon R.

    2016-01-01

    The competing neuro-behavioral decision systems (CNDS) model proposes that the degree to which an individual discounts the future is a function of the relative hyperactivity of an impulsive system based on the limbic and paralimbic brain regions and the relative hypoactivity of an executive system based in prefrontal cortex (PFC). The model depicts the relationship between these categorial systems in terms of the antipodal neurophysiological, behavioral, and decision (cognitive) functions that engender normal and addictive responding. However, a case may be made for construing several components of the impulsive and executive systems depicted in the model as categories (elements) of additional systems that are concerned with the metacognitive control of behavior. Hence, this paper proposes a category-based structure for understanding the effects on behavior of CNDS, which includes not only the impulsive and executive systems of the basic model but a superordinate level of reflective or rational decision-making. Following recent developments in the modeling of cognitive control which contrasts Type 1 (rapid, autonomous, parallel) processing with Type 2 (slower, computationally demanding, sequential) processing, the proposed model incorporates an arena in which the potentially conflicting imperatives of impulsive and executive systems are examined and from which a more appropriate behavioral response than impulsive choice emerges. This configuration suggests a forum in which the interaction of picoeconomic interests, which provide a cognitive dimension for CNDS, can be conceptualized. This proposition is examined in light of the resolution of conflict by means of bundling. PMID:26925004

  7. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  8. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Control of public access. 420.53 Section....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and unauthorized, unescorted access to explosive hazard facilities or other hazard areas not otherwise...

  9. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  10. Situation-Based Access Control: privacy management via modeling of patient data access scenarios.

    PubMed

    Peleg, Mor; Beimel, Dizza; Dori, Dov; Denekamp, Yaron

    2008-12-01

    Access control is a central problem in privacy management. A common practice in controlling access to sensitive data, such as electronic health records (EHRs), is Role-Based Access Control (RBAC). RBAC is limited as it does not account for the circumstances under which access to sensitive data is requested. Following a qualitative study that elicited access scenarios, we used Object-Process Methodology to structure the scenarios and conceive a Situation-Based Access Control (SitBAC) model. SitBAC is a conceptual model, which defines scenarios where patient's data access is permitted or denied. The main concept underlying this model is the Situation Schema, which is a pattern consisting of the entities Data-Requestor, Patient, EHR, Access Task, Legal-Authorization, and Response, along with their properties and relations. The various data access scenarios are expressed via Situation Instances. While we focus on the medical domain, the model is generic and can be adapted to other domains.

  11. A control-theory model for human decision-making

    NASA Technical Reports Server (NTRS)

    Levison, W. H.; Tanner, R. B.

    1971-01-01

    A model for human decision making is an adaptation of an optimal control model for pilot/vehicle systems. The models for decision and control both contain concepts of time delay, observation noise, optimal prediction, and optimal estimation. The decision making model was intended for situations in which the human bases his decision on his estimate of the state of a linear plant. Experiments are described for the following task situations: (a) single decision tasks, (b) two-decision tasks, and (c) simultaneous manual control and decision making. Using fixed values for model parameters, single-task and two-task decision performance can be predicted to within an accuracy of 10 percent. Agreement is less good for the simultaneous decision and control situation.

  12. Concurrency and Time in Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Chiang, Chia-Chu; Bayrak, Coskun

    Role-based access control (RBAC) has been proposed as an alternative solution for expressing access control policies. The generalized temporal RBAC (GTRBAC) extends RBAC by adding time in order to support timed based access control policies. However, GTRBAC does not address certain issues of concurrency such as, synchronization. We propose an approach to the expressions of time and concurrency in RBAC based on timed Petri nets. A formal verification method for access control policies is also proposed.

  13. Application-Defined Decentralized Access Control.

    PubMed

    Xu, Yuanzhong; Dunn, Alan M; Hofmann, Owen S; Lee, Michael Z; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%-9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications' security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes.

  14. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  15. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  16. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site,...

  17. Medical versus nonmedical mental health referral: clinical decision-making by telephone access center staff.

    PubMed

    Pulier, Myron L; Ciccone, Donald S; Castellano, Cherie; Marcus, Karen; Schleifer, Steven J

    2003-01-01

    A database review investigated decisions of clinicians staffing a university-based telephone access center in referring new adult patients to nonpsychiatrists versus psychiatrists for initial ambulatory behavioral health care appointments. Systematically collected demographic and clinical data in a computer log of calls to highly trained care managers at the access center had limited predictive value with respect to their referral decisions. Furthermore, while 28% of the 610 study patients were initially referred to psychiatrists, billing data revealed that in-person therapists soon cross-referred at least 20% more to a psychiatrist. Care managers sent 56% of callers already taking psychotropic medications to nonpsychiatrists, 51% of whom were then cross-referred to psychiatrists. Predictive algorithms showed no potential to enhance efficiency of decisions about referral to a psychiatrist versus a nonpsychiatrist. Efforts to enhance such efficiency may not be cost-effective. It may be more fiscally efficient to assign less-experienced personnel as telephone care managers.

  18. Emergency access for online personally controlled health records system.

    PubMed

    Zhang, Yuan; Dhileepan, Sunethra; Schmidt, Matthew; Zhong, Sheng

    2012-09-01

    A personally controlled health records (PCHR) system allows a patient user to share his/her health records with trusted physicians by manually granting them the access privilege to his/her online records. However, it presents the problem of emergency access in situations where the user is physically unable to grant the access and the access is required by an Emergency Room (ER) physician who does not have the privilege at that moment. To deal with such a problem, we introduce an online polling system to provide the emergency access control to PCHR systems. For each emergency access request, the access privilege is controlled according to the combined opinions of the patient's preset emergency contacts and other online registered physicians. Because our system is based on the demographic number of the physician community nationwide, it provides a stable emergency access control at all times.

  19. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  20. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    NASA Astrophysics Data System (ADS)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  1. Control of Access to Memory: The Use of Task Interference as a Behavioral Probe

    ERIC Educational Resources Information Center

    Loft, Shayne; Humphreys, Michael S.; Whitney, Susannah J.

    2008-01-01

    Directed forgetting and prospective memory methods were combined to examine differences in the control of memory access. Between studying two lists of target words, participants were either instructed to forget the first list, or to continue remembering the first list. After study participants performed a lexical decision task with an additional…

  2. Cryptographic Enforcement of Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Crampton, Jason

    Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, using role-based access control policies rather than information flow policies. In this paper, we provide an alternative formulation of role-based access control that enables us to apply existing cryptographic schemes to core and hierarchical role-based access control policies. We then show that special cases of our cryptographic enforcement schemes for role-based access control are equivalent to cryptographic enforcement schemes for temporal access control and to ciphertext-policy and key-policy attribute-based encryption schemes. Finally, we describe how these special cases can be extended to support richer forms of temporal access control and attribute-based encryption.

  3. Health information system access control redesign - rationale and method.

    PubMed

    Moselle, Kenneth A

    2011-01-01

    This paper addresses the question of why a health service system might find it necessary to re-engineer the access control model that mediates the interaction of clinicians with health information systems. Factors that lead to increasingly complexity of the access control models are delineated, and consequences of that complexity are identified. Strategies are presented to address these factors, and a stepwise procedure is suggested to structure the access control model re-engineering process.

  4. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  5. Decision tables in process control: a powerful development tool.

    PubMed

    Nixon, J S; McMullen, W L

    1986-01-01

    An automation and control systems development methodology based on the use of decision tables and its major analysis, design, and documentation technique will be discussed. Decision tables are a powerful facility for expressing complex procedures, programs, and control strategies to be implemented in computer-based systems. Their characteristics and advantages will be discussed, and examples of their use will be compared to other traditional tools. Two industrial plant automation projects employing decision tables will be cited.

  6. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  7. Status of dual control theory. [stochastic decision making

    NASA Technical Reports Server (NTRS)

    Tse, E.

    1975-01-01

    Theoretical studies of decision making and stochastic processes are discussed. Several approaches are described for an improved performing control method. It is shown that control performance is highly dependent on the knowledge of the unknown parameters in the system.

  8. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  9. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  10. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  11. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  12. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  13. The Comparative Analysis of Main Access Control Technologies

    NASA Astrophysics Data System (ADS)

    Zhang, Su; Niu, Li; Chen, Jing

    Effective access control security design is an important precondition for the stable running of an information system. So it's necessary to establish a well-designed security mechanism to ensure the security of the system. This paper analysis and compares the main access control theories.

  14. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  15. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  16. Working memory capacity as controlled attention in tactical decision making.

    PubMed

    Furley, Philip A; Memmert, Daniel

    2012-06-01

    The controlled attention theory of working memory capacity (WMC, Engle 2002) suggests that WMC represents a domain free limitation in the ability to control attention and is predictive of an individual's capability of staying focused, avoiding distraction and impulsive errors. In the present paper we test the predictive power of WMC in computer-based sport decision-making tasks. Experiment 1 demonstrated that high-WMC athletes were better able at focusing their attention on tactical decision making while blocking out irrelevant auditory distraction. Experiment 2 showed that high-WMC athletes were more successful at adapting their tactical decision making according to the situation instead of relying on prepotent inappropriate decisions. The present results provide additional but also unique support for the controlled attention theory of WMC by demonstrating that WMC is predictive of controlling attention in complex settings among different modalities and highlight the importance of working memory in tactical decision making.

  17. Decision-Theoretic Control of Planetary Rovers

    NASA Technical Reports Server (NTRS)

    Zilberstein, Shlomo; Washington, Richard; Bernstein, Daniel S.; Mouaddib, Abdel-Illah; Morris, Robert (Technical Monitor)

    2003-01-01

    Planetary rovers are small unmanned vehicles equipped with cameras and a variety of sensors used for scientific experiments. They must operate under tight constraints over such resources as operation time, power, storage capacity, and communication bandwidth. Moreover, the limited computational resources of the rover limit the complexity of on-line planning and scheduling. We describe two decision-theoretic approaches to maximize the productivity of planetary rovers: one based on adaptive planning and the other on hierarchical reinforcement learning. Both approaches map the problem into a Markov decision problem and attempt to solve a large part of the problem off-line, exploiting the structure of the plan and independence between plan components. We examine the advantages and limitations of these techniques and their scalability.

  18. [From library to clinical decision support systems: access of general practitioner to quality information].

    PubMed

    Fauquert, B

    2012-09-01

    Since 2003, the following tools have been implemented in Belgium for improving the access of general practioners to the EBM literature: the Digital Library for Health and the evidence-linker of the CEBAM, the portal EBMPracticeNet.be and the multidimensional electronic clinical decision support EBMeDS. The aim of this article is to show the progress achieved in the information dissemination toward the belgian general practioners, particularly the access from the electronic health record. From the literature published these last years, the opportunities cited by the users are for using EBM and the strong willingness for using these literature access in the future; the limits are the medical data coding, the irrelevance of the search results, the alerts fatigue induced by EBMeDS. The achievements done and planned for the new EBMPracticeNet guidelines portal and the EBMeDS system are explained in the aim of informing belgian healthcare professionals. These projects are claiming for lauching a participatory process in the production and dissemination of EBM information. The discussion is focused on the belgian healthcare system advantages, the solutions for a reasonable implementation of these projects and for increasing the place of an evidence-based information in the healthcare decision process. Finally the input of these projects to the continuing medical education and to the healthcare quality are discussed, in a context of multifactorial interaction healthcare design (complexity design).

  19. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  20. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  1. Healthcare professionals' experiences with EHR-system access control mechanisms.

    PubMed

    Faxvaag, Arild; Johansen, Trond S; Heimly, Vigdis; Melby, Line; Grimsmo, Anders

    2011-01-01

    Access control mechanisms might influence on the information seeking and documentation behavior of clinicians. In this study, we have surveyed healthcare professionals in nursing homes and hospitals on their attitudes to, and experiences with using access control mechanisms. In some situations, the access control mechanisms of the EHR system made clinicians postpone documentation work. Their practice of reading what others have documented was also influenced. Not all clinicians logged out of the system when they left a workstation, and some clinicians reported to do some of their documentation work in the name of others. The reported practices might have implications for the safety of the patient.

  2. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  3. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  4. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  5. Role-based access control model for GIS

    NASA Astrophysics Data System (ADS)

    Pan, Yuqing; Sheng, Yehua; Zhou, Jieyu

    2007-06-01

    Access control of Geographical Information System (GIS) has more complex spatial constraints than the general MIS system, it makes the classic role-based access control model(RBAC) can't be used in GIS. To achieve an effective Access Control Model for GIS, an extension model of the RBAC is presented in the paper. Firstly, this paper introduce the three kinds spatial constraints that included layer constraints, region constraints and spatial object constraints; Then the paper expanded the basic RBAC model, added regional class, layers class and so on; Finally, the paper has given the system RABC control model as well as the realization method in view of GIS. An extension model of the RBAC is applicable to mobile computing, wireless access and system about location is concluded by analyzing.

  6. Automatic sleep staging using state machine-controlled decision trees.

    PubMed

    Imtiaz, Syed Anas; Rodriguez-Villegas, Esther

    2015-01-01

    Automatic sleep staging from a reduced number of channels is desirable to save time, reduce costs and make sleep monitoring more accessible by providing home-based polysomnography. This paper introduces a novel algorithm for automatic scoring of sleep stages using a combination of small decision trees driven by a state machine. The algorithm uses two channels of EEG for feature extraction and has a state machine that selects a suitable decision tree for classification based on the prevailing sleep stage. Its performance has been evaluated using the complete dataset of 61 recordings from PhysioNet Sleep EDF Expanded database achieving an overall accuracy of 82% and 79% on training and test sets respectively. The algorithm has been developed with a very small number of decision tree nodes that are active at any given time making it suitable for use in resource-constrained wearable systems. PMID:26736278

  7. Automatic sleep staging using state machine-controlled decision trees.

    PubMed

    Imtiaz, Syed Anas; Rodriguez-Villegas, Esther

    2015-01-01

    Automatic sleep staging from a reduced number of channels is desirable to save time, reduce costs and make sleep monitoring more accessible by providing home-based polysomnography. This paper introduces a novel algorithm for automatic scoring of sleep stages using a combination of small decision trees driven by a state machine. The algorithm uses two channels of EEG for feature extraction and has a state machine that selects a suitable decision tree for classification based on the prevailing sleep stage. Its performance has been evaluated using the complete dataset of 61 recordings from PhysioNet Sleep EDF Expanded database achieving an overall accuracy of 82% and 79% on training and test sets respectively. The algorithm has been developed with a very small number of decision tree nodes that are active at any given time making it suitable for use in resource-constrained wearable systems.

  8. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  9. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  10. Classes of Multiple Decision Functions Strongly Controlling FWER and FDR

    PubMed Central

    Peña, Edsel A.; Habiger, Joshua D.; Wu, Wensong

    2014-01-01

    Two general classes of multiple decision functions, where each member of the first class strongly controls the family-wise error rate (FWER), while each member of the second class strongly controls the false discovery rate (FDR), are described. These classes offer the possibility that optimal multiple decision functions with respect to a pre-specified Type II error criterion, such as the missed discovery rate (MDR), could be found which control the FWER or FDR Type I error rates. The gain in MDR of the associated FDR-controlling procedure relative to the well-known Benjamini-Hochberg (BH) procedure is demonstrated via a modest simulation study with gamma-distributed component data. Such multiple decision functions may have the potential of being utilized in multiple testing, specifically in the analysis of high-dimensional data sets. PMID:26166847

  11. Facts and fiction of learning systems. [decision making intelligent control

    NASA Technical Reports Server (NTRS)

    Saridis, G. N.

    1975-01-01

    The methodology that will provide the updated precision for the hardware control and the advanced decision making and planning in the software control is called learning systems and intelligent control. It was developed theoretically as an alternative for the nonsystematic heuristic approaches of artificial intelligence experiments and the inflexible formulation of modern optimal control methods. Its basic concepts are discussed and some feasibility studies of some practical applications are presented.

  12. Accessible Gaming through Mainstreaming Kinetic Controller

    NASA Astrophysics Data System (ADS)

    Garrido, Yolanda; Marco, Álvaro; Segura, Joaquín; Blanco, Teresa; Casas, Roberto

    Leisure is a very important aspect in our everyday life; and gaming is one of the main ways to it. Depending on the particular situation of each person, the way of playing could be very different. Motivation, preferences, skills, knowledge are some of the factors that influences this experience. When the person has a disability, additional agents come to scene such as cognitive level and mobility. Besides the design of the game, these factors clearly affect how the person interacts with the game; its user interface. In this paper we present a tool that allows people with disabilities to play games with a normalized user interface. This tool a) manages several wireless kinetic remote controllers, e.g. the Wiimotes; b) can be configured to capture any voluntary movements users could do and c) convert them into the specific inputs required by existing adapted games. As a result, users with disabilities can experience and enjoy games that were previously inaccessible to them.

  13. An environmental decision framework applied to marine engine control technologies.

    PubMed

    Corbett, James J; Chapman, David

    2006-06-01

    This paper develops a decision framework for considering emission control technologies on marine engines, informed by standard decision theory, with an open structure that may be adapted by operators with specific vessel and technology attributes different from those provided here. Attributes relate objectives important to choosing control technologies with specific alternatives that may meet several of the objectives differently. The transparent framework enables multiple stakeholders to understand how different subjective judgments and varying attribute properties may result in different technology choices. Standard scoring techniques ensure that attributes are not biased by subjective scoring and that weights are the primary quantitative input where subjective preferences are exercised. An expected value decision structure is adopted that considers probabilities (likelihood) that a given alternative can meet its claims; alternative decision criteria are discussed. Capital and annual costs are combined using a net present value approach. An iterative approach is advocated that allows for screening and disqualifying alternatives that do not meet minimum conditions for acceptance, such as engine warranty or U.S. Coast Guard requirements. This decision framework assists vessel operators in considering explicitly important attributes and in representing choices clearly to other stakeholders concerned about reducing air pollution from vessels. This general decision structure may also be applied similarly to other environmental controls in marine applications.

  14. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  15. Implementing context and team based access control in healthcare intranets.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users.

  16. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  17. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  18. Secondary retention of rubber dam: effective moisture control access considerations.

    PubMed

    Liebenberg, W H

    1995-04-01

    Primary rubber dam retention affects attachment of the latex sheet to the anchor teeth bordering the isolated working field. Secondary rubber dam retention is the provision of an effective seal at the dam-tooth junction, which is essential to the maintenance of adequate access and moisture control within the working field. Practical hints are offered to optimize access and moisture control through well-planned and properly executed secondary retention of classic rubber dam applications. In addition, innovative solutions to the limitations of general field isolation, which pertain mostly to secondary retention of the unrestrained buccal and lingual curtains of the slit dam, are introduced.

  19. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  20. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  1. Controlling user access to electronic resources without password

    SciTech Connect

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  2. Enhancing Access to NASA Data via Seamless Integration Into Decision Support Systems: two Examples

    NASA Astrophysics Data System (ADS)

    Teng, W.; Rui, H.; Rishe, N.; Tetrault, R.

    2005-12-01

    The amount and variety of information that can be extracted from NASA satellite data form a rich resource that is largely untapped by the applications user community. In part, this is because of the complexity and cost of using such data. Many approaches, such as subsetting, have been taken to ameliorate this situation. Mostly, however, they have not sufficiently addressed the core needs of the applications community. The latter is generally not interested in the data per se (e.g., how they are processed), but rather in the specific measurements (e.g., surface rain) from the data, which can be infused in some decision support system. These measurements should ideally be seamlessly accessible. To rapidly bridge the gap between NASA information systems and services and the practical needs of the applications (and research) community, the Goddard Earth Sciences Data and Information Services Center (GES DISC) has collaborated with the Florida International University High Performance Database Research Center (FIU HPDRC) and the U.S. Department of Agriculture Foreign Agricultural Service (USDA FAS) to demonstrate the feasibility of making NASA data more easily and seamlessly accessible via the Web, from within the FIU's TerraFly and the FAS' Crop Explorer environments, respectively. TerraFly currently serves a broad segment of the research and applications community (some 10,000 unique users per day), by facilitating the access to various textual, remotely sensed, and vector data. Crop Explorer is the primary decision support tool used by the FAS analysts to monitor the production, supply, and demand of agricultural commodities worldwide. The key NASA information system providing the data integrated into TerraFly and Crop Explorer is the GES DISC Interactive Online Visualization and Analysis Infrastructure (Giovanni), which enables users to easily and quickly obtain science information from the data, without having to download and handle large amounts of data. The

  3. Decentralizing Data through Decision-Support Systems: The Impact of Increased Access to Data on Decision Making

    ERIC Educational Resources Information Center

    Petrides, Lisa A.; McClelland, Sara I.

    2007-01-01

    This study examines the impact of a new Decision-Support System (DSS) on decision making in a community college in California. It looks at how attitudes and behaviors about data and their use were impacted by the implementation of a new DSS. The study found that the decentralization of data, through the DSS, produced a shift in terms of an…

  4. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  5. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  6. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection. PMID:26262204

  7. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  8. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  9. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  10. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  11. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  12. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  13. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  14. National malaria vector control policy: an analysis of the decision to scale-up larviciding in Nigeria

    PubMed Central

    Tesfazghi, Kemi; Hill, Jenny; Jones, Caroline; Ranson, Hilary; Worrall, Eve

    2016-01-01

    Background: New vector control tools are needed to combat insecticide resistance and reduce malaria transmission. The World Health Organization (WHO) endorses larviciding as a supplementary vector control intervention using larvicides recommended by the WHO Pesticides Evaluation Scheme (WHOPES). The decision to scale-up larviciding in Nigeria provided an opportunity to investigate the factors influencing policy adoption and assess the role that actors and evidence play in the policymaking process, in order to draw lessons that help accelerate the uptake of new methods for vector control. Methods: A retrospective policy analysis was carried out using in-depth interviews with national level policy stakeholders to establish normative national vector control policy or strategy decision-making processes and compare these with the process that led to the decision to scale-up larviciding. The interviews were transcribed, then coded and analyzed using NVivo10. Data were coded according to pre-defined themes from an analytical policy framework developed a priori. Results: Stakeholders reported that the larviciding decision-making process deviated from the normative vector control decision-making process. National malaria policy is normally strongly influenced by WHO recommendations, but the potential of larviciding to contribute to national economic development objectives through larvicide production in Nigeria was cited as a key factor shaping the decision. The larviciding decision involved a restricted range of policy actors, and notably excluded actors that usually play advisory, consultative and evidence generation roles. Powerful actors limited the access of some actors to the policy processes and content. This may have limited the influence of scientific evidence in this policy decision. Conclusions: This study demonstrates that national vector control policy change can be facilitated by linking malaria control objectives to wider socioeconomic considerations and

  15. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  16. Emergent collective decision-making: Control, model and behavior

    NASA Astrophysics Data System (ADS)

    Shen, Tian

    In this dissertation we study emergent collective decision-making in social groups with time-varying interactions and heterogeneously informed individuals. First we analyze a nonlinear dynamical systems model motivated by animal collective motion with heterogeneously informed subpopulations, to examine the role of uninformed individuals. We find through formal analysis that adding uninformed individuals in a group increases the likelihood of a collective decision. Secondly, we propose a model for human shared decision-making with continuous-time feedback and where individuals have little information about the true preferences of other group members. We study model equilibria using bifurcation analysis to understand how the model predicts decisions based on the critical threshold parameters that represent an individual's tradeoff between social and environmental influences. Thirdly, we analyze continuous-time data of pairs of human subjects performing an experimental shared tracking task using our second proposed model in order to understand transient behavior and the decision-making process. We fit the model to data and show that it reproduces a wide range of human behaviors surprisingly well, suggesting that the model may have captured the mechanisms of observed behaviors. Finally, we study human behavior from a game-theoretic perspective by modeling the aforementioned tracking task as a repeated game with incomplete information. We show that the majority of the players are able to converge to playing Nash equilibrium strategies. We then suggest with simulations that the mean field evolution of strategies in the population resemble replicator dynamics, indicating that the individual strategies may be myopic. Decisions form the basis of control and problems involving deciding collectively between alternatives are ubiquitous in nature and in engineering. Understanding how multi-agent systems make decisions among alternatives also provides insight for designing

  17. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  18. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  19. The Decision to Access Patient Information from a Social Media Site: What Would You Do?

    PubMed Central

    Jent, Jason F.; Eaton, Cyd K.; Merrick, Melissa T.; Englebert, Nicole E.; Dandes, Susan K.; Chapman, Ana V.; Hershorin, Eugene R.

    2011-01-01

    Purpose The current study examined the prevalence with which healthcare providers use a social media site account (e.g., Facebook), the extent to which they utilize social media sites in clinical practice, and their decision-making process after accessing patient information from a social media site. Methods Pediatric faculty and trainees from a medical school campus were provided a social media site history form and seven fictional social media site adolescent profile vignettes that depicted concerning information. Participants were instructed to rate their personal use and beliefs about social media sites and to report how they would respond if they obtained concerning information about an adolescent patient from their public social media site profile. Results Healthcare providers generally believed it not to be an invasion of privacy to conduct an Internet/social media site search of someone they know. A small percentage of trainees reported a personal history of conducting an Internet search (18%) or a social media site search (14%) for a patient. However, no faculty endorsed a history of conducting searches for patients. Faculty and trainees also differed in how they would respond to concerning social media site adolescent profile information. Conclusions The findings that trainees are conducting Internet/social media site searches of patients and that faculty and trainees differ in how they would respond to concerning profile information suggest the need for specific guidelines regarding the role of social media sites in clinical practice. Practice, policy, and training implications are discussed. PMID:21939873

  20. Combined monitoring, decision and control model for the human operator in a command and control desk

    NASA Technical Reports Server (NTRS)

    Muralidharan, R.; Baron, S.

    1978-01-01

    A report is given on the ongoing efforts to mode the human operator in the context of the task during the enroute/return phases in the ground based control of multiple flights of remotely piloted vehicles (RPV). The approach employed here uses models that have their analytical bases in control theory and in statistical estimation and decision theory. In particular, it draws heavily on the modes and the concepts of the optimal control model (OCM) of the human operator. The OCM is being extended into a combined monitoring, decision, and control model (DEMON) of the human operator by infusing decision theoretic notions that make it suitable for application to problems in which human control actions are infrequent and in which monitoring and decision-making are the operator's main activities. Some results obtained with a specialized version of DEMON for the RPV control problem are included.

  1. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  2. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  3. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  4. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  5. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  6. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  7. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  8. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  9. Global Access-controlled Transfer e-frame (GATe)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, asmore » well as provides reporting capabilities.« less

  10. Evolutionary game dynamics of controlled and automatic decision-making

    NASA Astrophysics Data System (ADS)

    Toupo, Danielle F. P.; Strogatz, Steven H.; Cohen, Jonathan D.; Rand, David G.

    2015-07-01

    We integrate dual-process theories of human cognition with evolutionary game theory to study the evolution of automatic and controlled decision-making processes. We introduce a model in which agents who make decisions using either automatic or controlled processing compete with each other for survival. Agents using automatic processing act quickly and so are more likely to acquire resources, but agents using controlled processing are better planners and so make more effective use of the resources they have. Using the replicator equation, we characterize the conditions under which automatic or controlled agents dominate, when coexistence is possible and when bistability occurs. We then extend the replicator equation to consider feedback between the state of the population and the environment. Under conditions in which having a greater proportion of controlled agents either enriches the environment or enhances the competitive advantage of automatic agents, we find that limit cycles can occur, leading to persistent oscillations in the population dynamics. Critically, however, these limit cycles only emerge when feedback occurs on a sufficiently long time scale. Our results shed light on the connection between evolution and human cognition and suggest necessary conditions for the rise and fall of rationality.

  11. Evolutionary game dynamics of controlled and automatic decision-making.

    PubMed

    Toupo, Danielle F P; Strogatz, Steven H; Cohen, Jonathan D; Rand, David G

    2015-07-01

    We integrate dual-process theories of human cognition with evolutionary game theory to study the evolution of automatic and controlled decision-making processes. We introduce a model in which agents who make decisions using either automatic or controlled processing compete with each other for survival. Agents using automatic processing act quickly and so are more likely to acquire resources, but agents using controlled processing are better planners and so make more effective use of the resources they have. Using the replicator equation, we characterize the conditions under which automatic or controlled agents dominate, when coexistence is possible and when bistability occurs. We then extend the replicator equation to consider feedback between the state of the population and the environment. Under conditions in which having a greater proportion of controlled agents either enriches the environment or enhances the competitive advantage of automatic agents, we find that limit cycles can occur, leading to persistent oscillations in the population dynamics. Critically, however, these limit cycles only emerge when feedback occurs on a sufficiently long time scale. Our results shed light on the connection between evolution and human cognition and suggest necessary conditions for the rise and fall of rationality. PMID:26232971

  12. Applications of fuzzy logic to control and decision making

    NASA Technical Reports Server (NTRS)

    Lea, Robert N.; Jani, Yashvant

    1991-01-01

    Long range space missions will require high operational efficiency as well as autonomy to enhance the effectivity of performance. Fuzzy logic technology has been shown to be powerful and robust in interpreting imprecise measurements and generating appropriate control decisions for many space operations. Several applications are underway, studying the fuzzy logic approach to solving control and decision making problems. Fuzzy logic algorithms for relative motion and attitude control have been developed and demonstrated for proximity operations. Based on this experience, motion control algorithms that include obstacle avoidance were developed for a Mars Rover prototype for maneuvering during the sample collection process. A concept of an intelligent sensor system that can identify objects and track them continuously and learn from its environment is under development to support traffic management and proximity operations around the Space Station Freedom. For safe and reliable operation of Lunar/Mars based crew quarters, high speed controllers with ability to combine imprecise measurements from several sensors is required. A fuzzy logic approach that uses high speed fuzzy hardware chips is being studied.

  13. Striatal prediction errors support dynamic control of declarative memory decisions

    PubMed Central

    Scimeca, Jason M.; Katzman, Perri L.; Badre, David

    2016-01-01

    Adaptive memory requires context-dependent control over how information is retrieved, evaluated and used to guide action, yet the signals that drive adjustments to memory decisions remain unknown. Here we show that prediction errors (PEs) coded by the striatum support control over memory decisions. Human participants completed a recognition memory test that incorporated biased feedback to influence participants' recognition criterion. Using model-based fMRI, we find that PEs—the deviation between the outcome and expected value of a memory decision—correlate with striatal activity and predict individuals' final criterion. Importantly, the striatal PEs are scaled relative to memory strength rather than the expected trial outcome. Follow-up experiments show that the learned recognition criterion transfers to free recall, and targeting biased feedback to experimentally manipulate the magnitude of PEs influences criterion consistent with PEs scaled relative to memory strength. This provides convergent evidence that declarative memory decisions can be regulated via striatally mediated reinforcement learning signals. PMID:27713407

  14. A study of multiple access schemes in satellite control network

    NASA Astrophysics Data System (ADS)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  15. [Making Decisions on the Resources for Cancer Control

    PubMed

    Gróf, Agnes

    2000-12-01

    We aim at modelling the strategic decision making process in case of devoting resources to a governmental cancer control program. We use a model based on the theory of Analytic Hierarchy Process. In this article we describe the characteristic features of such a decision making process and reveal the complexity of the problem underlying the decisions. A second article will present and discuss the results from the application of the AHP model. Interventions which are capable of decreasing the burden of cancer in a society need strategic approach. Decisions on interventions seem inevitable to be based on and balance between the priorities and the available resources. There is not much doubt about it that the reason for setting the priorities arises on the one hand from the scarcity of resources. On the other hand, priorities evolve on other bases, and are supposed to "guide" health policy makers devoting the scarce resources. In general, a strategic mode of thought has been based on assumptions, which, in case of cancer control enhance the necessity to assess information on cancer and cancer patients, and to understand the factors contributing towards better health. The capabilities of the NCCP achieving its aims by preventing the development of cancer diseases (primary prevention), by making use of the means of early detection and appropriate therapy (secondary prevention), and by providing modern (comprehensive) tertiary prevention are inevitably affected by the priorities. Health policy should assume a responsibility for enforcing certain priorities and should be aware of the long-term interest of the population. To solve the problem we restrict the model to a simple three level one, representing the goals, the criteria, and the alternatives of the resource allocation. We determine "decreasing the burden of cancer" as the overall goal. "Distributive justice" "cost-effectiveness", "human rights", "evidences", and "standpoints of a community" serve as criteria, while

  16. SLUDGE TREATMENT PROJECT KOP CONCEPTUAL DESIGN CONTROL DECISION REPORT

    SciTech Connect

    CARRO CA

    2010-03-09

    This control decision addresses the Knock-Out Pot (KOP) Disposition KOP Processing System (KPS) conceptual design. The KPS functions to (1) retrieve KOP material from canisters, (2) remove particles less than 600 {micro}m in size and low density materials from the KOP material, (3) load the KOP material into Multi-Canister Overpack (MCO) baskets, and (4) stage the MCO baskets for subsequent loading into MCOs. Hazard and accident analyses of the KPS conceptual design have been performed to incorporate safety into the design process. The hazard analysis is documented in PRC-STP-00098, Knock-Out Pot Disposition Project Conceptual Design Hazard Analysis. The accident analysis is documented in PRC-STP-CN-N-00167, Knock-Out Pot Disposition Sub-Project Canister Over Lift Accident Analysis. Based on the results of these analyses, and analyses performed in support of MCO transportation and MCO processing and storage activities at the Cold Vacuum Drying Facility (CVDF) and Canister Storage Building (CSB), control decision meetings were held to determine the controls required to protect onsite and offsite receptors and facility workers. At the conceptual design stage, these controls are primarily defined by their safety functions. Safety significant structures, systems, and components (SSCs) that could provide the identified safety functions have been selected for the conceptual design. It is anticipated that some safety SSCs identified herein will be reclassified based on hazard and accident analyses performed in support of preliminary and detailed design.

  17. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  18. The influence of patriarchal behavior on birth control access and use among recent Hispanic immigrants.

    PubMed

    Gonzalez, Eleazar U; Sable, Marjorie R; Campbell, James D; Dannerbeck, Anne

    2010-08-01

    It is commonly assumed that Hispanic immigrants in the United States subscribe to a patriarchal ideology that keeps women subordinated to men, often through violence and exploitative reproductive behaviors. If this assumption is true, we might expect to find that in the Hispanic culture patriarchal males control decision-making about access to and use of birth control. Structured interviews of 100 Hispanic men and 100 Hispanic women who were recent immigrants to a Midwest community were conducted to examine this assumption. Results did not support this assumption among this study population. We found no patriarchal ideology supporting women's subordination to men, violence as a mechanism of control, reproduction as a way of exploitation, or cultural influences discouraging access to and use of birth control in the Hispanic community. Rather, these immigrants revealed adequate knowledge of birth control use and positive perceptions of gender equality. Gaining a better understanding of the limited influence of patriarchal ideology on the use of birth control and family planning services among this Hispanic community may inform the development of family planning services tailored for new Hispanic immigrants.

  19. Decision-theoretic control of EUVE telescope scheduling

    NASA Technical Reports Server (NTRS)

    Hansson, Othar; Mayer, Andrew

    1993-01-01

    This paper describes a decision theoretic scheduler (DTS) designed to employ state-of-the-art probabilistic inference technology to speed the search for efficient solutions to constraint-satisfaction problems. Our approach involves assessing the performance of heuristic control strategies that are normally hard-coded into scheduling systems and using probabilistic inference to aggregate this information in light of the features of a given problem. The Bayesian Problem-Solver (BPS) introduced a similar approach to solving single agent and adversarial graph search patterns yielding orders-of-magnitude improvement over traditional techniques. Initial efforts suggest that similar improvements will be realizable when applied to typical constraint-satisfaction scheduling problems.

  20. Modeling human decision making behavior in supervisory control

    NASA Technical Reports Server (NTRS)

    Tulga, M. K.; Sheridan, T. B.

    1977-01-01

    An optimal decision control model was developed, which is based primarily on a dynamic programming algorithm which looks at all the available task possibilities, charts an optimal trajectory, and commits itself to do the first step (i.e., follow the optimal trajectory during the next time period), and then iterates the calculation. A Bayesian estimator was included which estimates the tasks which might occur in the immediate future and provides this information to the dynamic programming routine. Preliminary trials comparing the human subject's performance to that of the optimal model show a great similarity, but indicate that the human skips certain movements which require quick change in strategy.

  1. Access Control of Cloud Service Based on UCON

    NASA Astrophysics Data System (ADS)

    Danwei, Chen; Xiuli, Huang; Xunyi, Ren

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. This paper introduces cloud computing and cloud service firstly, and then gives cloud services access control model based on UCON and negotiation technologies, and also designs the negotiation module.

  2. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  3. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  4. The role of consciousness in cognitive control and decision making

    PubMed Central

    van Gaal, Simon; de Lange, Floris P.; Cohen, Michael X

    2012-01-01

    Here we review studies on the complexity and strength of unconscious information processing. We focus on empirical evidence that relates awareness of information to cognitive control processes (e.g., response inhibition, conflict resolution, and task-switching), the life-time of information maintenance (e.g., working memory) and the possibility to integrate multiple pieces of information across space and time. Overall, the results that we review paint a picture of local and specific effects of unconscious information on various (high-level) brain regions, including areas in the prefrontal cortex. Although this neural activation does not elicit any conscious experience, it is functional and capable of influencing many perceptual, cognitive (control) and decision-related processes, sometimes even for relatively long periods of time. However, recent evidence also points out interesting dissociations between conscious and unconscious information processing when it comes to the duration, flexibility and the strategic use of that information for complex operations and decision-making. Based on the available evidence, we conclude that the role of task-relevance of subliminal information and meta-cognitive factors in unconscious cognition need more attention in future work. PMID:22586386

  5. Memory-Based Decision-Making with Heuristics: Evidence for a Controlled Activation of Memory Representations

    ERIC Educational Resources Information Center

    Khader, Patrick H.; Pachur, Thorsten; Meier, Stefanie; Bien, Siegfried; Jost, Kerstin; Rosler, Frank

    2011-01-01

    Many of our daily decisions are memory based, that is, the attribute information about the decision alternatives has to be recalled. Behavioral studies suggest that for such decisions we often use simple strategies (heuristics) that rely on controlled and limited information search. It is assumed that these heuristics simplify decision-making by…

  6. Extending a Role Graph for Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Asakura, Yoshiharu; Nakamoto, Yukikazu

    Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.

  7. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal...

  8. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  9. BIOPACK: the ground controlled late access biological research facility.

    PubMed

    van Loon, Jack J W A

    2004-03-01

    Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.

  10. Evolving capacity and decision-making in practice: adolescents' access to legal abortion services in Mexico City.

    PubMed

    Clyde, Jessie; Bain, Jennifer; Castagnaro, Kelly; Rueda, Marcela; Tatum, Carrie; Watson, Katherine

    2013-05-01

    The rights of adolescents and young people in international law and agreements have evolved significantly from a focus on protection to a recognition of "evolving capacities" and decision-making ability. Unclear policies and regulations and variations in actual practice may leave providers with little clarity on how to support adolescent decision-making and instead create unintended barriers. This study in Mexico City in 2009 explored whether regulations and clinical attitudes and practice were supporting or hindering the access of adolescent girls aged 12-17 to information regarding abortion and to abortion services. We surveyed abortion clinic directors and staff, and adolescents arranging or just having had an abortion, and sent mystery clients to clinics to ask for information. While providers were generally positive about adolescents' ability to decide on abortion, they had different understandings about the need for adult accompaniment and who that adult should be, and mystery clients seeking information were more likely to receive complete information if accompanied by an adult. Clarification of consent and accompaniment requirements is needed, and providers need to be made aware of them; adolescents should have access to information and counselling without accompaniment; and improvements in privacy and confidentiality in public sector clinics are also needed. These all support complementary concepts of protection and autonomy in adolescent decision-making on abortion. PMID:23684199

  11. Controlled Access under Review: Improving the Governance of Genomic Data Access

    PubMed Central

    Shabani, Mahsa; Dyke, Stephanie O. M.; Joly, Yann; Borry, Pascal

    2015-01-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  12. Healthy eating decisions require efficient dietary self-control in children: A mouse-tracking food decision study.

    PubMed

    Ha, Oh-Ryeong; Bruce, Amanda S; Pruitt, Stephen W; Cherry, J Bradley C; Smith, T Ryan; Burkart, Dominic; Bruce, Jared M; Lim, Seung-Lark

    2016-10-01

    Learning how to make healthy eating decisions, (i.e., resisting unhealthy foods and consuming healthy foods), enhances physical development and reduces health risks in children. Although healthy eating decisions are known to be challenging for children, the mechanisms of children's food choice processes are not fully understood. The present study recorded mouse movement trajectories while eighteen children aged 8-13 years were choosing between eating and rejecting foods. Children were inclined to choose to eat rather than to reject foods, and preferred unhealthy foods over healthy foods, implying that rejecting unhealthy foods could be a demanding choice. When children rejected unhealthy foods, mouse trajectories were characterized by large curvature toward an eating choice in the beginning, late decision shifting time toward a rejecting choice, and slowed response times. These results suggested that children exercised greater cognitive efforts with longer decision times to resist unhealthy foods, providing evidence that children require dietary self-control to make healthy eating-decisions by resisting the temptation of unhealthy foods. Developmentally, older children attempted to exercise greater cognitive efforts for consuming healthy foods than younger children, suggesting that development of dietary self-control contributes to healthy eating-decisions. The study also documents that healthy weight children with higher BMIs were more likely to choose to reject healthy foods. Overall, findings have important implications for how children make healthy eating choices and the role of dietary self-control in eating decisions. PMID:27349708

  13. Healthy eating decisions require efficient dietary self-control in children: A mouse-tracking food decision study.

    PubMed

    Ha, Oh-Ryeong; Bruce, Amanda S; Pruitt, Stephen W; Cherry, J Bradley C; Smith, T Ryan; Burkart, Dominic; Bruce, Jared M; Lim, Seung-Lark

    2016-10-01

    Learning how to make healthy eating decisions, (i.e., resisting unhealthy foods and consuming healthy foods), enhances physical development and reduces health risks in children. Although healthy eating decisions are known to be challenging for children, the mechanisms of children's food choice processes are not fully understood. The present study recorded mouse movement trajectories while eighteen children aged 8-13 years were choosing between eating and rejecting foods. Children were inclined to choose to eat rather than to reject foods, and preferred unhealthy foods over healthy foods, implying that rejecting unhealthy foods could be a demanding choice. When children rejected unhealthy foods, mouse trajectories were characterized by large curvature toward an eating choice in the beginning, late decision shifting time toward a rejecting choice, and slowed response times. These results suggested that children exercised greater cognitive efforts with longer decision times to resist unhealthy foods, providing evidence that children require dietary self-control to make healthy eating-decisions by resisting the temptation of unhealthy foods. Developmentally, older children attempted to exercise greater cognitive efforts for consuming healthy foods than younger children, suggesting that development of dietary self-control contributes to healthy eating-decisions. The study also documents that healthy weight children with higher BMIs were more likely to choose to reject healthy foods. Overall, findings have important implications for how children make healthy eating choices and the role of dietary self-control in eating decisions.

  14. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  15. Safety systems and access control in the National Ignition Facility.

    PubMed

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  16. Measuring Land Uses Accessibility by Using Fuzzy Majority Gis-Based Multicriteria Decision Analysis Case Study: Malayer City

    NASA Astrophysics Data System (ADS)

    Taravat, A.; Yari, A.; Rajaei, M.; Mousavian, R.

    2014-10-01

    Public spaces accessibility has become one of the important factors in urban planning. Therefore, considerable attention has been given to measure accessibility to public spaces on the UK, US and Canada, but there are few studies outside the anglophone world especially in developing countries such as Iran. In this study an attempt has been made to measure objective accessibility to public spaces (parks, school, library and administrative) using fuzzy majority GIS-based multicriteria decision analysis. This method is for defining the priority for distribution of urban facilities and utilities as the first step towards elimination of social justice. In order to test and demonstrate the presented model, the comprehensive plan of Malayer city has been considered for ranking in three objectives and properties in view of index per capital (Green space, sport facilities and major cultural centers like library and access index). The results can be used to inform the local planning process and the GIS approach can be expanded into other local authority domains. The results shows that the distribution of facilities in Malayer city has followed on the base of cost benefit law and the human aspect of resource allocation programming of facilities (from centre to suburbs of the city).

  17. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  18. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  19. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  20. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  1. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  2. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  3. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  4. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  5. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  6. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  7. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  8. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  9. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  10. Migratory decisions in birds: Extent of genetic versus environmental control

    USGS Publications Warehouse

    Ogonowski, M.S.; Conway, C.J.

    2009-01-01

    Migration is one of the most spectacular of animal behaviors and is prevalent across a broad array of taxa. In birds, we know much about the physiological basis of how birds migrate, but less about the relative contribution of genetic versus environmental factors in controlling migratory tendency. To evaluate the extent to which migratory decisions are genetically determined, we examined whether individual western burrowing owls (Athene cunicularia hypugaea) change their migratory tendency from one year to the next at two sites in southern Arizona. We also evaluated the heritability of migratory decisions by using logistic regression to examine the association between the migratory tendency of burrowing owl parents and their offspring. The probability of migrating decreased with age in both sexes and adult males were less migratory than females. Individual owls sometimes changed their migratory tendency from one year to the next, but changes were one-directional: adults that were residents during winter 2004-2005 remained residents the following winter, but 47% of adults that were migrants in winter 2004-2005 became residents the following winter. We found no evidence for an association between the migratory tendency of hatch-year owls and their male or female parents. Migratory tendency of hatch-year owls did not differ between years, study sites or sexes or vary by hatching date. Experimental provision of supplemental food did not affect these relationships. All of our results suggest that heritability of migratory tendency in burrowing owls is low, and that intraspecific variation in migratory tendency is likely due to: (1) environmental factors, or (2) a combination of environmental factors and non-additive genetic variation. The fact that an individual's migratory tendency can change across years implies that widespread anthropogenic changes (i.e., climate change or changes in land use) could potentially cause widespread changes in the migratory tendency of

  11. Migratory decisions in birds: extent of genetic versus environmental control.

    PubMed

    Ogonowski, Mark S; Conway, Courtney J

    2009-08-01

    Migration is one of the most spectacular of animal behaviors and is prevalent across a broad array of taxa. In birds, we know much about the physiological basis of how birds migrate, but less about the relative contribution of genetic versus environmental factors in controlling migratory tendency. To evaluate the extent to which migratory decisions are genetically determined, we examined whether individual western burrowing owls (Athene cunicularia hypugaea) change their migratory tendency from one year to the next at two sites in southern Arizona. We also evaluated the heritability of migratory decisions by using logistic regression to examine the association between the migratory tendency of burrowing owl parents and their offspring. The probability of migrating decreased with age in both sexes and adult males were less migratory than females. Individual owls sometimes changed their migratory tendency from one year to the next, but changes were one-directional: adults that were residents during winter 2004-2005 remained residents the following winter, but 47% of adults that were migrants in winter 2004-2005 became residents the following winter. We found no evidence for an association between the migratory tendency of hatch-year owls and their male or female parents. Migratory tendency of hatch-year owls did not differ between years, study sites or sexes or vary by hatching date. Experimental provision of supplemental food did not affect these relationships. All of our results suggest that heritability of migratory tendency in burrowing owls is low, and that intraspecific variation in migratory tendency is likely due to: (1) environmental factors, or (2) a combination of environmental factors and non-additive genetic variation. The fact that an individual's migratory tendency can change across years implies that widespread anthropogenic changes (i.e., climate change or changes in land use) could potentially cause widespread changes in the migratory tendency of

  12. Migratory decisions in birds: extent of genetic versus environmental control.

    PubMed

    Ogonowski, Mark S; Conway, Courtney J

    2009-08-01

    Migration is one of the most spectacular of animal behaviors and is prevalent across a broad array of taxa. In birds, we know much about the physiological basis of how birds migrate, but less about the relative contribution of genetic versus environmental factors in controlling migratory tendency. To evaluate the extent to which migratory decisions are genetically determined, we examined whether individual western burrowing owls (Athene cunicularia hypugaea) change their migratory tendency from one year to the next at two sites in southern Arizona. We also evaluated the heritability of migratory decisions by using logistic regression to examine the association between the migratory tendency of burrowing owl parents and their offspring. The probability of migrating decreased with age in both sexes and adult males were less migratory than females. Individual owls sometimes changed their migratory tendency from one year to the next, but changes were one-directional: adults that were residents during winter 2004-2005 remained residents the following winter, but 47% of adults that were migrants in winter 2004-2005 became residents the following winter. We found no evidence for an association between the migratory tendency of hatch-year owls and their male or female parents. Migratory tendency of hatch-year owls did not differ between years, study sites or sexes or vary by hatching date. Experimental provision of supplemental food did not affect these relationships. All of our results suggest that heritability of migratory tendency in burrowing owls is low, and that intraspecific variation in migratory tendency is likely due to: (1) environmental factors, or (2) a combination of environmental factors and non-additive genetic variation. The fact that an individual's migratory tendency can change across years implies that widespread anthropogenic changes (i.e., climate change or changes in land use) could potentially cause widespread changes in the migratory tendency of

  13. Air Traffic Control Decision Support Tools for Noise Mitigation

    NASA Technical Reports Server (NTRS)

    Tobias, Leonard

    2001-01-01

    NASA has initiated a new five year program this year, the Quiet Aircraft Technology (QAT) Program, a program which will investigate airframe and engine system noise reduction. QAT will also address community noise impact. As part of this community noise impact component, NASA will investigate air traffic management (ATM) challenges in reducing noise. In particular, controller advisory automation aids will be developed to aid the air traffic controller in addressing noise concerns as he/she manages traffic in busy terminal areas. NASA has developed controller automation tools to address capacity concerns and the QAT strategy for ATM Low Noise Operations is to build upon this tool set to create added advisories for noise mitigation. The tools developed for capacity will be briefly reviewed, followed by the QAT plans to address ATM noise concerns. A major NASA goal in global civil aviation is to triple the aviation system throughput in all-weather conditions while maintaining safety. A centerpiece of this activity is the Center/TRACON Automation System (CTAS), an evolving suite of air traffic controller decision support tools (DSTs) to enhance capacity of arrivals and departures in both the enroute center and the TRACON. Two of these DSTs, the Traffic Management Advisor (TMA) and the passive Final approach Spacing Tool (pFAST), are in daily use at the Fort Worth Center and the Dallas/Fort Worth (DFW) TRACON, respectively, where capacity gains of 5-13% have been reported in recent NASA evaluations. Under the Federal Aviation Administration's (FAA) Free Flight Phase One Program, TMA and pFAST are each being implemented at six to eight additional sites. In addition, other DSTs are being developed by NASA under the umbrella of CTAS. This means that new software will be built upon CTAS, and the paradigm of real-time simulation evaluation followed by field site development and evaluation will be the pathway for the new tools. Additional information is included in the

  14. Future Tense and Economic Decisions: Controlling for Cultural Evolution

    PubMed Central

    Roberts, Seán G.; Winters, James; Chen, Keith

    2015-01-01

    A previous study by Chen demonstrates a correlation between languages that grammatically mark future events and their speakers' propensity to save, even after controlling for numerous economic and demographic factors. The implication is that languages which grammatically distinguish the present and the future may bias their speakers to distinguish them psychologically, leading to less future-oriented decision making. However, Chen's original analysis assumed languages are independent. This neglects the fact that languages are related, causing correlations to appear stronger than is warranted (Galton's problem). In this paper, we test the robustness of Chen's correlations to corrections for the geographic and historical relatedness of languages. While the question seems simple, the answer is complex. In general, the statistical correlation between the two variables is weaker when controlling for relatedness. When applying the strictest tests for relatedness, and when data is not aggregated across individuals, the correlation is not significant. However, the correlation did remain reasonably robust under a number of tests. We argue that any claims of synchronic patterns between cultural variables should be tested for spurious correlations, with the kinds of approaches used in this paper. However, experiments or case-studies would be more fruitful avenues for future research on this specific topic, rather than further large-scale cross-cultural correlational studies. PMID:26186527

  15. Attention control learning in the decision space using state estimation

    NASA Astrophysics Data System (ADS)

    Gharaee, Zahra; Fatehi, Alireza; Mirian, Maryam S.; Nili Ahmadabadi, Majid

    2016-05-01

    The main goal of this paper is modelling attention while using it in efficient path planning of mobile robots. The key challenge in concurrently aiming these two goals is how to make an optimal, or near-optimal, decision in spite of time and processing power limitations, which inherently exist in a typical multi-sensor real-world robotic application. To efficiently recognise the environment under these two limitations, attention of an intelligent agent is controlled by employing the reinforcement learning framework. We propose an estimation method using estimated mixture-of-experts task and attention learning in perceptual space. An agent learns how to employ its sensory resources, and when to stop observing, by estimating its perceptual space. In this paper, static estimation of the state space in a learning task problem, which is examined in the WebotsTM simulator, is performed. Simulation results show that a robot learns how to achieve an optimal policy with a controlled cost by estimating the state space instead of continually updating sensory information.

  16. Factors Associated with Iowa Rural Hospitals' Decision to Convert to Critical Access Hospital Status

    ERIC Educational Resources Information Center

    Li, Pengxiang; Ward, Marcia M.; Schneider, John E.

    2009-01-01

    Context: The Balanced Budget Act (BBA) of 1997 allowed some rural hospitals meeting certain requirements to convert to Critical Access Hospitals (CAHs) and changed their Medicare reimbursement from prospective to cost-based. Some subsequent CAH-related laws reduced restrictions and increased payments, and the number of CAHs grew rapidly. Purpose:…

  17. TRIPS, the Doha declaration and paragraph 6 decision: what are the remaining steps for protecting access to medicines?

    PubMed Central

    Kerry, Vanessa Bradford; Lee, Kelley

    2007-01-01

    Background The World Trade Organisation's Declaration on the TRIPS Agreement and Public Health (known as the Doha Declaration) of 2001, and subsequent Decision on the Interpretation of Paragraph 6 reached in 2003, affirmed the flexibilities available under the Agreement on Trade Related Property Rights (TRIPS) to member states seeking to protect public health. Despite these important clarifications, the actual implementation of these measures to improve access to medicines remains uncertain. There are also concerns that so-called TRIPS-plus measures within many regional and bilateral trade agreements are further undermining the capacity of the poor to access affordable medicines. Methods The paper reviews policy debates among governments, nongovernmental organisations and international organisations from 1995, and notably since 2003, surrounding access to medicines and trade agreements. The provisions for protecting public health provided by the Doha Declaration and Paragraph 6 Decision are reviewed in terms of challenges for implementation, along with measures to protect intellectual property rights (IPRs) under selected regional and bilateral trade agreements. Results While provisions, in principle, were affirmed for member states under the TRIPS agreement to protect public health, numerous challenges remain. Implementation of the flexibilities has been hindered by lack of capacity in many LMICs. More intransigent have been stark inequalities in power and influence among trading nations, leaving LMICs vulnerable to pressures to permit the globalization of IPRs in order to protect broader trade and economic interests. Such inequalities are apparent in proposals or adopted TRIPS-plus measures which re-establish the primacy of trade over public health goals. Conclusion Despite being hailed as a "watershed in international trade", the Doha Declaration and Paragraph 6 decision have not resolved the problem of access to affordable medicines. The way forward must begin

  18. Vista goes online: Decision-analytic systems for real-time decision-making in mission control

    NASA Technical Reports Server (NTRS)

    Barry, Matthew; Horvitz, Eric; Ruokangas, Corinne; Srinivas, Sampath

    1994-01-01

    The Vista project has centered on the use of decision-theoretic approaches for managing the display of critical information relevant to real-time operations decisions. The Vista-I project originally developed a prototype of these approaches for managing flight control displays in the Space Shuttle Mission Control Center (MCC). The follow-on Vista-II project integrated these approaches in a workstation program which currently is being certified for use in the MCC. To our knowledge, this will be the first application of automated decision-theoretic reasoning techniques for real-time spacecraft operations. We shall describe the development and capabilities of the Vista-II system, and provide an overview of the use of decision-theoretic reasoning techniques to the problems of managing the complexity of flight controller displays. We discuss the relevance of the Vista techniques within the MCC decision-making environment, focusing on the problems of detecting and diagnosing spacecraft electromechanical subsystems component failures with limited information, and the problem of determining what control actions should be taken in high-stakes, time-critical situations in response to a diagnosis performed under uncertainty. Finally, we shall outline our current research directions for follow-on projects.

  19. Towards a controlled sensitivity analysis of model development decisions

    NASA Astrophysics Data System (ADS)

    Clark, Martyn; Nijssen, Bart

    2016-04-01

    The current generation of hydrologic models have followed a myriad of different development paths, making it difficult for the community to test underlying hypotheses and identify a clear path to model improvement. Model comparison studies have been undertaken to explore model differences, but these studies have not been able to meaningfully attribute inter-model differences in predictive ability to individual model components because there are often too many structural and implementation differences among the models considered. As a consequence, model comparison studies to date have provided limited insight into the causes of differences in model behavior, and model development has often relied on the inspiration and experience of individual modelers rather than a systematic analysis of model shortcomings. This presentation will discuss a unified approach to process-based hydrologic modeling to enable controlled and systematic analysis of multiple model representations (hypotheses) of hydrologic processes and scaling behavior. Our approach, which we term the Structure for Unifying Multiple Modeling Alternatives (SUMMA), formulates a general set of conservation equations, providing the flexibility to experiment with different spatial representations, different flux parameterizations, different model parameter values, and different time stepping schemes. We will discuss the use of SUMMA to systematically analyze different model development decisions, focusing on both analysis of simulations for intensively instrumented research watersheds as well as simulations across a global dataset of FLUXNET sites. The intent of the presentation is to demonstrate how the systematic analysis of model shortcomings can help identify model weaknesses and inform future model development priorities.

  20. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  1. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  2. Phonological decoding or direct access? Regularity effects in lexical decisions of Grade 3 and 4 children.

    PubMed

    Schmalz, Xenia; Marinus, Eva; Castles, Anne

    2013-01-01

    Learning to read fluently involves moving from an effortful phonological decoding strategy to automatic recognition of familiar words. However, little is known about the timing of this transition, or the extent to which children continue to be influenced by phonological factors when recognizing words even as they progress in reading. We explored this question by examining regularity effects in a lexical decision task, as opposed to the more traditionally used reading-aloud task. Children in Grades 3 and 4 made go/no-go lexical decisions on high- and low-frequency regular and irregular words that had been matched for consistency. The children showed regularity effects in their accuracy for low-frequency words, indicating that they were using phonological decoding strategies to recognize unfamiliar words. The size of this effect was correlated with measures of reading ability. However, we found no regularity effects on accuracy for high-frequency words or on response times for either word type, suggesting that even 8-year-old children are already relying predominantly on a direct lexical strategy in their silent reading of familiar words.

  3. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  4. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  5. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  6. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  7. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  8. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  9. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  10. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  11. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  13. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  14. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  15. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  16. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access... Prescriptions § 1311.125 Requirements for establishing logical access control—Individual practitioner. (a) At... his two-factor authentication credential to satisfy the logical access controls. The second...

  17. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  18. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  19. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority.

  20. Attitudes of health care trainees about genetics and disability: issues of access, health care communication, and decision making.

    PubMed

    Ormond, Kelly E; Gill, Carol J; Semik, Patrick; Kirschner, Kristi L

    2003-08-01

    Prior studies suggest that knowledge and attitudes of health care professionals influence patient communication and medical decision-making. To study this dynamic in the context of genetic disability, we developed a survey on health professionals' attitudes regarding disability and genetic screening and pilot-tested it on a sample of medical students, residents, and genetic counseling students (N=85). Despite minimal experience with disability or genetics, most respondents reported feeling comfortable dealing with genetics (59%) and disability (75%). The majority felt that disability caused significant suffering for both the person (51%) and family (64%), and that research should be directed toward preventing genetic disability (62%). Similar to prior literature, perceived "Quality of Life" was most often based on degrees of physical and cognitive functioning, pain, and social support. However, differences were found between genetic counseling trainees and other medical trainees in their relative emphasis of social versus medical issues in questions of disability and genetic testing, and these response patterns were associated with differences in the groups' priorities for offering information about social resources. Respondents agreed that access to genetic testing and information is personal and that testing should be available upon request for oneself (68%) and to a lesser degree for one's fetus (55%) or child (41%). However, the same individuals frequently stated that society should regulate access to such technologies. Although most felt that the patient and professional should jointly make such decisions on a case-by-case basis, it was also seen as appropriate for the health care professional to occasionally decline genetic testing. It seems appropriate that training and experience influence knowledge and attitudes. Therefore, it is critical to document knowledge and attitudes of various health care providers and trainees, including differences between

  1. Disciplined Decision Making in an Interdisciplinary Environment: Some Implications for Clinical Applications of Statistical Process Control.

    ERIC Educational Resources Information Center

    Hantula, Donald A.

    1995-01-01

    Clinical applications of statistical process control (SPC) in human service organizations are considered. SPC is seen as providing a standard set of criteria that serves as a common interface for data-based decision making, which may bring decision making under the control of established contingencies rather than the immediate contingencies of…

  2. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  3. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  4. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  5. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  6. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  7. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  8. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  9. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  10. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  11. Achieving fertility control through woman’s autonomy and access to maternal healthcare: Are we on track? In-depth analysis of PDHS-2012-13

    PubMed Central

    Hassan, Sehar-un-Nisa; Siddiqui, Salma; Mahmood, Ayeshah

    2015-01-01

    Background and Objective: Fertility control preferences and maternal healthcare have recently become a major concern for developing nations with evidence suggesting that low fertility control rates and poor maternal healthcare are among major obstructions in ensuring health and social status for women. Our objective was toanalyze the factors that influence women’s autonomy, access to maternal healthcare, and fertility control preferences in Pakistan. Methods: Data consisted of 11,761 ever-married women of ages 15-49 years from PDHS, 2012-13. Variables included socio-demographics, women’s autonomy, fertility control preferences and access to maternal healthcare. Results: Findings from multivariate analysis showed that women’s younger age, having less than three number of children and independent or joint decision-making (indicators of high autonomy) remained the most significant predictors for access to better quality maternal healthcare and better fertility control preferences when other variables were controlled. Conclusion: Women’s access to good quality maternal health care and fertility control preferences are directly and indirectly influenced by their demographic characteristics and decision-making patterns in domestic affairs. PMID:26870096

  12. Spillover Effects of Loss of Control on Risky Decision-Making.

    PubMed

    Beisswingert, Birgit M; Zhang, Keshun; Goetz, Thomas; Fischbacher, Urs

    2016-01-01

    Decision making in risky situations is frequently required in our everyday lives and has been shown to be influenced by various factors, some of which are independent of the risk context. Based on previous findings and theories about the central role of perceptions of control and their impact on subsequent settings, spillover effects of subjective loss of control on risky decision-making are assumed. After developing an innovative experimental paradigm for inducing loss of control, its hypothesized effects on risky decision-making are investigated. Partially supporting the hypotheses, results demonstrated no increased levels of risk perceptions but decreased risk-taking behavior following experiences of loss of control. Thus, this study makes a methodological contribution by proposing a newly developed experimental paradigm facilitating further research on the effects of subjective loss of control, and additionally provides partial evidence for the spillover effects of loss of control experiences on risky decision-making. PMID:26930066

  13. Spillover Effects of Loss of Control on Risky Decision-Making.

    PubMed

    Beisswingert, Birgit M; Zhang, Keshun; Goetz, Thomas; Fischbacher, Urs

    2016-01-01

    Decision making in risky situations is frequently required in our everyday lives and has been shown to be influenced by various factors, some of which are independent of the risk context. Based on previous findings and theories about the central role of perceptions of control and their impact on subsequent settings, spillover effects of subjective loss of control on risky decision-making are assumed. After developing an innovative experimental paradigm for inducing loss of control, its hypothesized effects on risky decision-making are investigated. Partially supporting the hypotheses, results demonstrated no increased levels of risk perceptions but decreased risk-taking behavior following experiences of loss of control. Thus, this study makes a methodological contribution by proposing a newly developed experimental paradigm facilitating further research on the effects of subjective loss of control, and additionally provides partial evidence for the spillover effects of loss of control experiences on risky decision-making.

  14. Spillover Effects of Loss of Control on Risky Decision-Making

    PubMed Central

    Beisswingert, Birgit M.; Zhang, Keshun; Goetz, Thomas; Fischbacher, Urs

    2016-01-01

    Decision making in risky situations is frequently required in our everyday lives and has been shown to be influenced by various factors, some of which are independent of the risk context. Based on previous findings and theories about the central role of perceptions of control and their impact on subsequent settings, spillover effects of subjective loss of control on risky decision-making are assumed. After developing an innovative experimental paradigm for inducing loss of control, its hypothesized effects on risky decision-making are investigated. Partially supporting the hypotheses, results demonstrated no increased levels of risk perceptions but decreased risk-taking behavior following experiences of loss of control. Thus, this study makes a methodological contribution by proposing a newly developed experimental paradigm facilitating further research on the effects of subjective loss of control, and additionally provides partial evidence for the spillover effects of loss of control experiences on risky decision-making. PMID:26930066

  15. Just-in-Time Information Improved Decision-Making in Primary Care: A Randomized Controlled Trial

    PubMed Central

    McGowan, Jessie; Hogg, William; Campbell, Craig; Rowan, Margo

    2008-01-01

    Background The “Just-in-time Information” (JIT) librarian consultation service was designed to provide rapid information to answer primary care clinical questions during patient hours. This study evaluated whether information provided by librarians to answer clinical questions positively impacted time, decision-making, cost savings and satisfaction. Methods and Finding A randomized controlled trial (RCT) was conducted between October 2005 and April 2006. A total of 1,889 questions were sent to the service by 88 participants. The object of the randomization was a clinical question. Each participant had clinical questions randomly allocated to both intervention (librarian information) and control (no librarian information) groups. Participants were trained to send clinical questions via a hand-held device. The impact of the information provided by the service (or not provided by the service), additional resources and time required for both groups was assessed using a survey sent 24 hours after a question was submitted. The average time for JIT librarians to respond to all questions was 13.68 minutes/question (95% CI, 13.38 to 13.98). The average time for participants to respond their control questions was 20.29 minutes/question (95% CI, 18.72 to 21.86). Using an impact assessment scale rating cognitive impact, participants rated 62.9% of information provided to intervention group questions as having a highly positive cognitive impact. They rated 14.8% of their own answers to control question as having a highly positive cognitive impact, 44.9% has having a negative cognitive impact, and 24.8% with no cognitive impact at all. In an exit survey measuring satisfaction, 86% (62/72 responses) of participants scored the service as having a positive impact on care and 72% (52/72) indicated that they would use the service frequently if it were continued. Conclusions In this study, providing timely information to clinical questions had a highly positive impact on decision

  16. The politics behind the implementation of the WTO Paragraph 6 Decision in Canada to increase global drug access

    PubMed Central

    2012-01-01

    Background The reform of pharmaceutical policy can often involve trade-offs between competing social and commercial goals. Canada's Access to Medicines Regime (CAMR), a legislative amendment that permits compulsory licensing for the production and export of medicines to developing countries, aimed to reconcile these goals. Since it was passed in 2004, only two orders of antiretroviral drugs, enough for 21,000 HIV/AIDS patients in Rwanda have been exported. Future use of the regime appears unlikely. This research aimed to examine the politics of CAMR. Methods Parliamentary Committee hearing transcripts from CAMR's legislative development (2004) and legislative review (2007) were analysed using a content analysis technique to identify how stakeholders who participated in the debates framed the issues. These findings were subsequently analysed using a framework of framing, institutions and interests to determine how these three dimensions shaped CAMR. Results In 2004, policy debates in Canada were dominated by two themes: intellectual property rights and the TRIPS Agreement. The right to medicines as a basic human right and CAMR's potential impact on innovation were hardly discussed. With the Departments of Industry Canada and International Trade as the lead institutions, the goals of protecting intellectual property and ensuring good trade relations with the United States appear to have taken priority over encouraging generic competition to achieve drug affordability. The result was a more limited interpretation of patent flexibilities under the WTO Paragraph 6 Decision. The most striking finding is the minimal discussion over the potential barriers developing country beneficiaries might face when attempting to use compulsory licensing, including their reluctance to use TRIPS flexibilities, their desire to pursue technological development and the constraints inherent in the WTO Paragraph 6 Decision. Instead, these issues were raised in 2007, which can be partly

  17. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  18. Decision Making Regarding Access to Training and Development in Medium-Sized Enterprises: An Exploratory Study Using the Critical Incident Technique

    ERIC Educational Resources Information Center

    Coetzer, Alan; Redmond, Janice; Sharafizad, Jalleh

    2012-01-01

    Purpose: The purpose of this paper is to develop an understanding of factors that impinge on managerial decision-making processes regarding employee access to structured training and development (T&D) opportunities that are at least partially funded by the firm. Design/methodology/approach: Semi-structured interviews incorporating the Critical…

  19. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  20. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  1. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  2. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  3. Effects of Airport Tower Controller Decision Support Tool on Controllers Head-Up Time

    NASA Technical Reports Server (NTRS)

    Hayashi, Miwa; Cruz Lopez, Jose M.

    2013-01-01

    Despite that aircraft positions and movements can be easily monitored on the radar displays at major airports nowadays, it is still important for the air traffic control tower (ATCT) controllers to look outside the window as much as possible to assure safe operations of traffic management. The present paper investigates whether an introduction of the NASA's proposed Spot and Runway Departure Advisor (SARDA), a decision support tool for the ATCT controller, would increase or decrease the controllers' head-up time. SARDA provides the controller departure-release schedule advisories, i.e., when to release each departure aircraft in order to minimize individual aircraft's fuel consumption on taxiways and simultaneously maximize the overall runway throughput. The SARDA advisories were presented on electronic flight strips (EFS). To investigate effects on the head-up time, a human-in-the-loop simulation experiment with two retired ATCT controller participants was conducted in a high-fidelity ATCT cab simulator with 360-degree computer-generated out-the-window view. Each controller participant wore a wearable video camera on a side of their head with the camera facing forward. The video data were later used to calculate their line of sight at each moment and eventually identify their head-up times. Four sessions were run with the SARDA advisories, and four sessions were run without (baseline). Traffic-load levels were varied in each session. The same set of user interface - EFS and the radar displays - were used in both the advisory and baseline sessions to make them directly comparable. The paper reports the findings and discusses their implications.

  4. Can access limits on sales representatives to physicians affect clinical prescription decisions? A study of recent events with diabetes and lipid drugs.

    PubMed

    Chressanthis, George A; Khedkar, Pratap; Jain, Nitin; Poddar, Prashant; Seiders, Michael G

    2012-07-01

    The authors explored to what extent important medical decisions by practitioners can be influenced by pharmaceutical representatives and, in particular, whether restricting such access could delay appropriate changes in clinical practice. Medical practices were divided into four categories based on the degree of sales representative access to clinicians: very low, low, medium, and high from a database compiled by ZS Associates called AccessMonitor (Evanston, IL) used extensively by many pharmaceutical companies. Clinical decisions of 58,647 to 72,114 physicians were statistically analyzed using prescription data from IMS Health (Danbury, CT) in three critical areas: an innovative drug for type 2 diabetes (sitagliptin), an older diabetes drug with a new Food and Drug Administration-required black box warning for cardiovascular safety (rosiglitazone), and a combination lipid therapy that had reported negative outcomes in a clinical trial (simvastatin+ezetimbe). For the uptake of the new diabetes agent, the authors found that physicians with very low access to representatives had the lowest adoption of this new therapy and took 1.4 and 4.6 times longer to adopt than physicians in the low- and medium-access restriction categories, respectively. In responding to the black box warning for rosiglitazone, the authors found that physicians with very low access were 4.0 times slower to reduce their use of this treatment than those with low access. Likewise, there was significantly less response in terms of changing prescribing to the negative news with the lipid therapy for physicians in more access-restricted offices. Overall, cardiologists were the most responsive to information changes relative to primary care physicians. These findings emphasize that limiting access to pharmaceutical representatives can have the unintended effect of reducing appropriate responses to negative information about drugs just as much as responses to positive information about innovative

  5. Can access limits on sales representatives to physicians affect clinical prescription decisions? A study of recent events with diabetes and lipid drugs.

    PubMed

    Chressanthis, George A; Khedkar, Pratap; Jain, Nitin; Poddar, Prashant; Seiders, Michael G

    2012-07-01

    The authors explored to what extent important medical decisions by practitioners can be influenced by pharmaceutical representatives and, in particular, whether restricting such access could delay appropriate changes in clinical practice. Medical practices were divided into four categories based on the degree of sales representative access to clinicians: very low, low, medium, and high from a database compiled by ZS Associates called AccessMonitor (Evanston, IL) used extensively by many pharmaceutical companies. Clinical decisions of 58,647 to 72,114 physicians were statistically analyzed using prescription data from IMS Health (Danbury, CT) in three critical areas: an innovative drug for type 2 diabetes (sitagliptin), an older diabetes drug with a new Food and Drug Administration-required black box warning for cardiovascular safety (rosiglitazone), and a combination lipid therapy that had reported negative outcomes in a clinical trial (simvastatin+ezetimbe). For the uptake of the new diabetes agent, the authors found that physicians with very low access to representatives had the lowest adoption of this new therapy and took 1.4 and 4.6 times longer to adopt than physicians in the low- and medium-access restriction categories, respectively. In responding to the black box warning for rosiglitazone, the authors found that physicians with very low access were 4.0 times slower to reduce their use of this treatment than those with low access. Likewise, there was significantly less response in terms of changing prescribing to the negative news with the lipid therapy for physicians in more access-restricted offices. Overall, cardiologists were the most responsive to information changes relative to primary care physicians. These findings emphasize that limiting access to pharmaceutical representatives can have the unintended effect of reducing appropriate responses to negative information about drugs just as much as responses to positive information about innovative

  6. Investigating the Decision Heuristics of Candidate Teachers Who Are Different in Their Responsibility Controls

    ERIC Educational Resources Information Center

    Özen, Yener

    2016-01-01

    In this study, decision heuristics used by individuals with different responsibility controls were investigated. In the research, 370 final grade university students studying at Erzincan University Faculty of Education were included. In order to collect data, Internally Controlled Responsibility-Externally Controlled Responsibility Scale of Özen…

  7. The Minimal Control Principle Predicts Strategy Shifts in the Abstract Decision Making Task

    ERIC Educational Resources Information Center

    Taatgen, Niels A.

    2011-01-01

    The minimal control principle (Taatgen, 2007) predicts that people strive for problem-solving strategies that require as few internal control states as possible. In an experiment with the Abstract Decision Making task (ADM task; Joslyn & Hunt, 1998) the reward structure was manipulated to make either a low-control strategy or a high-strategy…

  8. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  9. Assessing the structure of non-routine decision processes in Airline Operations Control.

    PubMed

    Richters, Floor; Schraagen, Jan Maarten; Heerkens, Hans

    2016-03-01

    Unfamiliar severe disruptions challenge Airline Operations Control professionals most, as their expertise is stretched to its limits. This study has elicited the structure of Airline Operations Control professionals' decision process during unfamiliar disruptions by mapping three macrocognitive activities on the decision ladder: sensemaking, option evaluation and action planning. The relationship between this structure and decision quality was measured. A simulated task was staged, based on which think-aloud protocols were obtained. Results show that the general decision process structure resembles the structure of experts working under routine conditions, in terms of the general structure of the macrocognitive activities, and the rule-based approach used to identify options and actions. Surprisingly, high quality of decision outcomes was found to relate to the use of rule-based strategies. This implies that successful professionals are capable of dealing with unfamiliar problems by reframing them into familiar ones, rather than to engage in knowledge-based processing. Practitioner Summary: We examined the macrocognitive structure of Airline Operations Control professionals' decision process during a simulated unfamiliar disruption in relation to decision quality. Results suggest that successful professionals are capable of dealing with unfamiliar problems by reframing them into familiar ones, rather than to engage in knowledge-based processing.

  10. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  11. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... Exchange Commission 17 CFR Part 240 Risk Management Controls for Brokers or Dealers With Market Access... Regulations#0;#0; ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls.... The required financial risk management controls and supervisory procedures must be reasonably...

  12. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures that... develop, test, and implement the relevant risk management controls and supervisory procedures...

  13. Randomized, Controlled Trial of an Interactive Videodisc Decision Aid for Patients with Ischemic Heart Disease

    PubMed Central

    Morgan, Matthew W; Deber, Raisa B; Llewellyn-Thomas, Hilary A; Gladstone, Peter; Cusimano, RJ; O'rourke, Keith; Tomlinson, George; Detsky, Allan S

    2000-01-01

    OBJECTIVE To determine the effect of the Ischemic Heart Disease Shared Decision-Making Program (IHD SDP) an interactive videodisc designed to assist patients in the decision-making process involving treatment choices for ischemic heart disease, on patient decision-making. DESIGN Randomized, controlled trial. SETTING The Toronto Hospital, University of Toronto, Toronto, Ontario, Canada. PARTICIPANTS Two hundred forty ambulatory patients with ischemic heart disease amenable to elective revascularization and ongoing medical therapy. MEASUREMENTS AND MAIN RESULTS The primary outcome was patient satisfaction with the decision-making process. This was measured using the 12-item Decision-Making Process Questionnaire that was developed and validated in a randomized trial of the benign prostatic hyperplasia SDP. Secondary outcomes included patient knowledge (measured using 20 questions about knowledge deemed necessary for an informed treatment decision), treatment decision, patient-angiographer agreement on decision, and general health scores. Outcomes were measured at the time of treatment decision and/or at 6 months follow-up. Shared decision-making program scores were similar for the intervention and control group (71% and 70%, respectively; 95% confidence interval [CI] for 1% difference, −3% to 7%). The intervention group had higher knowledge scores (75% vs 62%; 95% CI for 13% difference, 8% to 18%). The intervention group chose to pursue revascularization less often (58% vs 75% for the controls; 95% CI for 17% difference, 4% to 31%). At 6 months, 52% of the intervention group and 66% of the controls had undergone revascularization (95% CI for 14% difference, 0% to 28%). General health and angina scores were not different between the groups at 6 months. Exposure to the IHD SDP resulted in more patient-angiographer disagreement about treatment decisions. CONCLUSIONS There was no significant difference in satisfaction with decision-making process scores between the IHD

  14. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  15. Neural Signatures of Controlled and Automatic Retrieval Processes in Memory-based Decision-making.

    PubMed

    Khader, Patrick H; Pachur, Thorsten; Weber, Lilian A E; Jost, Kerstin

    2016-01-01

    Decision-making often requires retrieval from memory. Drawing on the neural ACT-R theory [Anderson, J. R., Fincham, J. M., Qin, Y., & Stocco, A. A central circuit of the mind. Trends in Cognitive Sciences, 12, 136-143, 2008] and other neural models of memory, we delineated the neural signatures of two fundamental retrieval aspects during decision-making: automatic and controlled activation of memory representations. To disentangle these processes, we combined a paradigm developed to examine neural correlates of selective and sequential memory retrieval in decision-making with a manipulation of associative fan (i.e., the decision options were associated with one, two, or three attributes). The results show that both the automatic activation of all attributes associated with a decision option and the controlled sequential retrieval of specific attributes can be traced in material-specific brain areas. Moreover, the two facets of memory retrieval were associated with distinct activation patterns within the frontoparietal network: The dorsolateral prefrontal cortex was found to reflect increasing retrieval effort during both automatic and controlled activation of attributes. In contrast, the superior parietal cortex only responded to controlled retrieval, arguably reflecting the sequential updating of attribute information in working memory. This dissociation in activation pattern is consistent with ACT-R and constitutes an important step toward a neural model of the retrieval dynamics involved in memory-based decision-making.

  16. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  17. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  18. Generalized access control strategies for integrated services token passing systems

    NASA Astrophysics Data System (ADS)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  19. Disciplined decision making in an interdisciplinary environment: some implications for clinical applications of statistical process control.

    PubMed Central

    Hantula, D A

    1995-01-01

    This paper explores some of the implications the statistical process control (SPC) methodology described by Pfadt and Wheeler (1995) may have for analyzing more complex performances and contingencies in human services or health care environments at an organizational level. Service delivery usually occurs in an organizational system that is characterized by functional structures, high levels of professionalism, subunit optimization, and organizational suboptimization. By providing a standard set of criteria and decision rules, SPC may provide a common interface for data-based decision making, may bring decision making under the control of the contigencies that are established by these rules rather than the immediate contingencies of data fluctuation, and may attenuate escalation of failing treatments. SPC is culturally consistent with behavior analysis, sharing an emphasis on data-based decisions, measurement over time, and graphic analysis of data, as well as a systemic view of organizations. PMID:7592155

  20. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  1. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  2. Randomized Controlled Trial of a Video Decision Support Tool for Cardiopulmonary Resuscitation Decision Making in Advanced Cancer

    PubMed Central

    Volandes, Angelo E.; Paasche-Orlow, Michael K.; Mitchell, Susan L.; El-Jawahri, Areej; Davis, Aretha Delight; Barry, Michael J.; Hartshorn, Kevan L.; Jackson, Vicki Ann; Gillick, Muriel R.; Walker-Corkery, Elizabeth S.; Chang, Yuchiao; López, Lenny; Kemeny, Margaret; Bulone, Linda; Mann, Eileen; Misra, Sumi; Peachey, Matt; Abbo, Elmer D.; Eichler, April F.; Epstein, Andrew S.; Noy, Ariela; Levin, Tomer T.; Temel, Jennifer S.

    2013-01-01

    Purpose Decision making regarding cardiopulmonary resuscitation (CPR) is challenging. This study examined the effect of a video decision support tool on CPR preferences among patients with advanced cancer. Patients and Methods We performed a randomized controlled trial of 150 patients with advanced cancer from four oncology centers. Participants in the control arm (n = 80) listened to a verbal narrative describing CPR and the likelihood of successful resuscitation. Participants in the intervention arm (n = 70) listened to the identical narrative and viewed a 3-minute video depicting a patient on a ventilator and CPR being performed on a simulated patient. The primary outcome was participants' preference for or against CPR measured immediately after exposure to either modality. Secondary outcomes were participants' knowledge of CPR (score range of 0 to 4, with higher score indicating more knowledge) and comfort with video. Results The mean age of participants was 62 years (standard deviation, 11 years); 49% were women, 44% were African American or Latino, and 47% had lung or colon cancer. After the verbal narrative, in the control arm, 38 participants (48%) wanted CPR, 41 (51%) wanted no CPR, and one (1%) was uncertain. In contrast, in the intervention arm, 14 participants (20%) wanted CPR, 55 (79%) wanted no CPR, and 1 (1%) was uncertain (unadjusted odds ratio, 3.5; 95% CI, 1.7 to 7.2; P < .001). Mean knowledge scores were higher in the intervention arm than in the control arm (3.3 ± 1.0 v 2.6 ± 1.3, respectively; P < .001), and 65 participants (93%) in the intervention arm were comfortable watching the video. Conclusion Participants with advanced cancer who viewed a video of CPR were less likely to opt for CPR than those who listened to a verbal narrative. PMID:23233708

  3. On Decision-Making Among Multiple Rule-Bases in Fuzzy Control Systems

    NASA Technical Reports Server (NTRS)

    Tunstel, Edward; Jamshidi, Mo

    1997-01-01

    Intelligent control of complex multi-variable systems can be a challenge for single fuzzy rule-based controllers. This class of problems cam often be managed with less difficulty by distributing intelligent decision-making amongst a collection of rule-bases. Such an approach requires that a mechanism be chosen to ensure goal-oriented interaction between the multiple rule-bases. In this paper, a hierarchical rule-based approach is described. Decision-making mechanisms based on generalized concepts from single-rule-based fuzzy control are described. Finally, the effects of different aggregation operators on multi-rule-base decision-making are examined in a navigation control problem for mobile robots.

  4. Teachers' Attitude toward Decision Making as a Subcategory of Learner's Control Strategy

    ERIC Educational Resources Information Center

    Kutlu, M. Oguz

    2012-01-01

    The aim of this study was to determine the usage levels of learner's control strategy among teachers according to their field and length of service in using option of decision making covered by learner's control strategy. The participants of this research were 219 teachers teaching in Adana (Turkey) State primary schools in 2010 to 2011 education…

  5. Development of an Automated Decision-Making Tool for Supervisory Control System

    SciTech Connect

    Cetiner, Sacit M.; Muhlheim, Michael David; Flanagan, George F.; Fugate, David L.; Kisner, Roger A.

    2014-09-01

    This technical report was generated as a product of the Supervisory Control for Multi-Modular Small Modular Reactor (SMR) Plants project within the Instrumentation, Control and Human-Machine Interface technology area under the Advanced Small Modular Reactor (AdvSMR) Research and Development Program of the US Department of Energy. The report documents the definition of strategies, functional elements, and the structural architecture of a supervisory control system for multi-modular AdvSMR plants. This research activity advances the state of the art by incorporating real-time, probabilistic-based decision-making into the supervisory control system architectural layers through the introduction of a tiered-plant system approach. The report provides background information on the state of the art of automated decision-making, including the description of existing methodologies. It then presents a description of a generalized decision-making framework, upon which the supervisory control decision-making algorithm is based. The probabilistic portion of automated decision-making is demonstrated through a simple hydraulic loop example.

  6. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  7. Pig farmers' perceptions, attitudes, influences and management of information in the decision-making process for disease control.

    PubMed

    Alarcon, Pablo; Wieland, Barbara; Mateus, Ana L P; Dewberry, Chris

    2014-10-01

    academia. This study identified a range of factors influencing the decision-making process for disease control by pig farmers. In addition, it highlighted the lack of awareness and difficult access of producers to current scientific research outputs. The factors identified should be considered when developing communication strategies to disseminate research findings and advice for disease control. PMID:24016600

  8. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  9. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  10. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  11. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  12. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  13. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  14. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  15. Control Decisions for Flammable Gas Hazards in Double Contained Receiver Tanks (DCRTs)

    SciTech Connect

    KRIPPS, L.J.

    2000-06-28

    This report describes the control decisions for flammable gas hazards in double-contained receiver tanks (DCRTs) made at control decision meetings on November 16, 17, and 18, 1999, on April 19,2000, and on May 10,2000, and their basis. These control decisions, and the analyses that support them, will be documented in an amendment to the Final Safety Analysis Report (FSAR) (CHG 2000a) and Technical Safety Requirements (TSR) (CHG 2000b) to close the Flammable Gas Unreviewed Safety Question (USQ) (Bacon 1996 and Wagoner 1996) for DCRTs. Following the contractor Tier I review of the FSAR and TSR amendment, it will be submitted to the U.S. Department of Energy (DOE), Office of River Protection (ORP) for review and approval.

  16. Modelling risk aversion to support decision-making for controlling zoonotic livestock diseases.

    PubMed

    van Asseldonk, M A P M; Bergevoet, R H M; Ge, L

    2013-12-01

    Zoonotic infectious livestock diseases are becoming a significant burden for both animal and human health and are rapidly gaining the attention of decision-makers who manage public health programmes. If control decisions have only monetary components, governments are generally regarded as being risk-neutral and the intervention strategy with the highest expected benefit (lowest expected net costs) should be preferred. However, preferences will differ and alternative intervention plans will prevail if (human) life and death outcomes are involved. A rational decision framework must therefore consider risk aversion in the decision-maker and controversial values related to public health. In the present study, risk aversion and its impact on both the utility for the monetary component and the utility for the non-monetary component is shown to be an important element when dealing with emerging zoonotic infectious livestock diseases and should not be ignored in the understanding and support of decision-making. The decision framework was applied to several control strategies for the reduction of human cases of brucellosis (Brucella melitensis) originating from sheep in Turkey.

  17. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  18. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  19. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  20. Deciding How To Decide: Self-Control and Meta-Decision Making.

    PubMed

    Boureau, Y-Lan; Sokol-Hessner, Peter; Daw, Nathaniel D

    2015-11-01

    Many different situations related to self control involve competition between two routes to decisions: default and frugal versus more resource-intensive. Examples include habits versus deliberative decisions, fatigue versus cognitive effort, and Pavlovian versus instrumental decision making. We propose that these situations are linked by a strikingly similar core dilemma, pitting the opportunity costs of monopolizing shared resources such as executive functions for some time, against the possibility of obtaining a better outcome. We offer a unifying normative perspective on this underlying rational meta-optimization, review how this may tie together recent advances in many separate areas, and connect several independent models. Finally, we suggest that the crucial mechanisms and meta-decision variables may be shared across domains.

  1. RCRA ground-water monitoring decision procedures viewed as quality control schemes.

    PubMed

    Starks, T H; Flatman, G T

    1991-01-01

    The problems of developing and comparing statistical procedures appropriate to the monitoring of ground water at hazardous waste sites are discussed. It is suggested that these decision procedures should be viewed as quality control schemes and compared in the same way that industrial quality control schemes are compared. The results of a Monte Carlo simulation study of run-length distribution of a combined Shewhart-CUSUM quality control scheme are reported.

  2. Multi Criteria Decision Making to evaluate control strategies of contagious animal diseases.

    PubMed

    Mourits, M C M; van Asseldonk, M A P M; Huirne, R B M

    2010-09-01

    The decision on which strategy to use in the control of contagious animal diseases involves complex trade-offs between multiple objectives. This paper describes a Multi Criteria Decision Making (MCDM) application to illustrate its potential support to policy makers in choosing the control strategy that best meets all of the conflicting interests. The presented application focused on the evaluation of alternative strategies to control Classical Swine Fever (CSF) epidemics within the European Union (EU) according to the preferences of the European Chief Veterinary Officers (CVO). The performed analysis was centred on the three high-level objectives of epidemiology, economics and social ethics. The appraised control alternatives consisted of the EU compulsory control strategy, a pre-emptive slaughter strategy, a protective vaccination strategy and a suppressive vaccination strategy. Using averaged preference weights of the elicited CVOs, the preference ranking of the control alternatives was determined for six EU regions. The obtained results emphasized the need for EU region-specific control. Individual CVOs differed in their views on the relative importance of the various (sub)criteria by which the performance of the alternatives were judged. Nevertheless, the individual rankings of the control alternatives within a region appeared surprisingly similar. Based on the results of the described application it was concluded that the structuring feature of the MCDM technique provides a suitable tool in assisting the complex decision making process of controlling contagious animal diseases.

  3. Effects of automatic/controlled access processes on semantic memory in Alzheimer's disease.

    PubMed

    Arroyo-Anlló, Eva M; Bellouard, Stéphanie; Ingrand, Pierre; Gil, Roger

    2011-01-01

    This study examines the impact of automatic/controlled access processes on the semantic network in 30 patients with Alzheimer's disease (AD). The AD group was compared with a control group using a battery of neuropsychological tests, a variation of Hodges's semantic testing battery, designed to assess semantic knowledge. The AD group had markedly lower scores than the normal group on each semantic test, but with a different degree of deterioration depending on the nature of the processes (controlled/automatic) in accessing the semantic network. AD patients had poorer performances on the explicit semantic tasks mainly involving controlled-process access (e.g., the WAIS Similarities Subtest) than those involving mainly automatic-process access (e.g., the Verbal Automatism test). Analyses of confidence intervals allowed a gradient of impaired performances in increasing order to be elaborated: a) the Verbal Automatism test, b) the WAIS Vocabulary Subtest, c) the WAIS Information Subtest, d) the Letter Fluency Task, e) Naming as a Response to Definition, f) the Category Fluency Task, g) the WAIS Similarities Subtest, and h) the Oral Denomination 80 Test. The results of our study suggest that explicit semantic tasks needing passive or automatic processes to access semantic memory would be better preserved in AD. PMID:21471640

  4. Enhanced situation awareness and decision making for an intelligent reconfigurable reactor power controller

    SciTech Connect

    Kenney, S.J.; Edwards, R.M.

    1996-07-01

    A Learning Automata based intelligent reconfigurable controller has been adapted for use as a reactor power controller to achieve improved reactor temperature performance. The intelligent reconfigurable controller is capable of enforcing either a classical or an optimal reactor power controller based on control performance feedback. Four control performance evaluation measures: dynamically estimated average quadratic temperature error, power, rod reactivity and rod reactivity rate were developed to provide feedback to the control decision component of the intelligent reconfigurable controller. Fuzzy Logic and Neural Network controllers have been studied for inclusion in the bank of controllers that form the intermediate level of an enhanced intelligent reconfigurable reactor power controller (IRRPC). The increased number of alternatives available to the supervisory level of the IRRPC requires enhanced situation awareness. Additional performance measures have been designed and a method for synthesizing them into a single indication of the overall performance of the currently enforced reactor power controller has been conceptualized. Modification of the reward/penalty scheme implemented in the existing IRRPC to increase the quality of the supervisory level decision process has been studied. The logogen model of human memory (Morton, 1969) and individual controller design information could be used to allocate reward to the most appropriate controller. Methods for allocating supervisory level attention were also studied with the goal of maximizing learning rate.

  5. 76 FR 25401 - Petition Under Section 302 on Access to the German Bar Aptitude Examination; Decision Not To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... TRADE REPRESENTATIVE Petition Under Section 302 on Access to the German Bar Aptitude Examination... German bar aptitude examination. DATES: Effective Date: April 28, 2011. FOR FURTHER INFORMATION CONTACT... regarding requirements for access to the German bar aptitude examination. The petition contends that...

  6. Dissecting the genetic control of natural variation in salt tolerance of Arabidopsis thaliana accessions

    PubMed Central

    Katori, Taku; Ikeda, Akiro; Iuchi, Satoshi; Kobayashi, Masatomo; Shinozaki, Kazuo; Maehashi, Kenji; Sakata, Yoichi; Tanaka, Shigeo; Taji, Teruaki

    2010-01-01

    Many accessions (ecotypes) of Arabidopsis have been collected. Although few differences exist among their nucleotide sequences, these subtle differences induce large genetic variation in phenotypic traits such as stress tolerance and flowering time. To understand the natural variability in salt tolerance, large-scale soil pot experiments were performed to evaluate salt tolerance among 350 Arabidopsis thaliana accessions. The evaluation revealed a wide variation in the salt tolerance among accessions. Several accessions, including Bu-5, Bur-0, Ll-1, Wl-0, and Zu-0, exhibited marked stress tolerance compared with a salt-sensitive experimental accession, Col-0. The salt-tolerant accessions were also evaluated by agar plate assays. The data obtained by the large-scale assay correlated well with the results of a salt acclimation (SA) assay, in which plants were transferred to high-salinity medium following placement on moderate-salinity medium for 7 d. Genetic analyses indicated that the salt tolerance without SA is a quantitative trait under polygenic control, whereas salt tolerance with SA is regulated by a single gene located on chromosome 5 that is common among the markedly salt-tolerant accessions. These results provide important information for understanding the mechanisms underlying natural variation of salt tolerance in Arabidopsis. PMID:20080827

  7. Insular neural system controls decision-making in healthy and methamphetamine-treated rats

    PubMed Central

    Mizoguchi, Hiroyuki; Katahira, Kentaro; Inutsuka, Ayumu; Fukumoto, Kazuya; Nakamura, Akihiro; Wang, Tian; Nagai, Taku; Sato, Jun; Sawada, Makoto; Ohira, Hideki; Yamanaka, Akihiro; Yamada, Kiyofumi

    2015-01-01

    Patients suffering from neuropsychiatric disorders such as substance-related and addictive disorders exhibit altered decision-making patterns, which may be associated with their behavioral abnormalities. However, the neuronal mechanisms underlying such impairments are largely unknown. Using a gambling test, we demonstrated that methamphetamine (METH)-treated rats chose a high-risk/high-reward option more frequently and assigned higher value to high returns than control rats, suggestive of changes in decision-making choice strategy. Immunohistochemical analysis following the gambling test revealed aberrant activation of the insular cortex (INS) and nucleus accumbens in METH-treated animals. Pharmacological studies, together with in vivo microdialysis, showed that the insular neural system played a crucial role in decision-making. Moreover, manipulation of INS activation using designer receptor exclusively activated by designer drug technology resulted in alterations to decision-making. Our findings suggest that the INS is a critical region involved in decision-making and that insular neural dysfunction results in risk-taking behaviors associated with altered decision-making. PMID:26150496

  8. Insular neural system controls decision-making in healthy and methamphetamine-treated rats.

    PubMed

    Mizoguchi, Hiroyuki; Katahira, Kentaro; Inutsuka, Ayumu; Fukumoto, Kazuya; Nakamura, Akihiro; Wang, Tian; Nagai, Taku; Sato, Jun; Sawada, Makoto; Ohira, Hideki; Yamanaka, Akihiro; Yamada, Kiyofumi

    2015-07-21

    Patients suffering from neuropsychiatric disorders such as substance-related and addictive disorders exhibit altered decision-making patterns, which may be associated with their behavioral abnormalities. However, the neuronal mechanisms underlying such impairments are largely unknown. Using a gambling test, we demonstrated that methamphetamine (METH)-treated rats chose a high-risk/high-reward option more frequently and assigned higher value to high returns than control rats, suggestive of changes in decision-making choice strategy. Immunohistochemical analysis following the gambling test revealed aberrant activation of the insular cortex (INS) and nucleus accumbens in METH-treated animals. Pharmacological studies, together with in vivo microdialysis, showed that the insular neural system played a crucial role in decision-making. Moreover, manipulation of INS activation using designer receptor exclusively activated by designer drug technology resulted in alterations to decision-making. Our findings suggest that the INS is a critical region involved in decision-making and that insular neural dysfunction results in risk-taking behaviors associated with altered decision-making.

  9. Insular neural system controls decision-making in healthy and methamphetamine-treated rats.

    PubMed

    Mizoguchi, Hiroyuki; Katahira, Kentaro; Inutsuka, Ayumu; Fukumoto, Kazuya; Nakamura, Akihiro; Wang, Tian; Nagai, Taku; Sato, Jun; Sawada, Makoto; Ohira, Hideki; Yamanaka, Akihiro; Yamada, Kiyofumi

    2015-07-21

    Patients suffering from neuropsychiatric disorders such as substance-related and addictive disorders exhibit altered decision-making patterns, which may be associated with their behavioral abnormalities. However, the neuronal mechanisms underlying such impairments are largely unknown. Using a gambling test, we demonstrated that methamphetamine (METH)-treated rats chose a high-risk/high-reward option more frequently and assigned higher value to high returns than control rats, suggestive of changes in decision-making choice strategy. Immunohistochemical analysis following the gambling test revealed aberrant activation of the insular cortex (INS) and nucleus accumbens in METH-treated animals. Pharmacological studies, together with in vivo microdialysis, showed that the insular neural system played a crucial role in decision-making. Moreover, manipulation of INS activation using designer receptor exclusively activated by designer drug technology resulted in alterations to decision-making. Our findings suggest that the INS is a critical region involved in decision-making and that insular neural dysfunction results in risk-taking behaviors associated with altered decision-making. PMID:26150496

  10. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  11. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  12. Protocol for the Quick Clinical study: a randomised controlled trial to assess the impact of an online evidence retrieval system on decision-making in general practice

    PubMed Central

    Coiera, Enrico; Magrabi, Farah; Westbrook, Johanna I; Kidd, Michael R; Day, Richard O

    2006-01-01

    Background Online information retrieval systems have the potential to improve patient care but there are few comparative studies of the impact of online evidence on clinicians' decision-making behaviour in routine clinical work. Methods/design A randomized controlled parallel design is employed to assess the effectiveness of an online evidence retrieval system, Quick Clinical (QC) in improving clinical decision-making processes in general practice. Eligible clinicians are randomised either to receive access or not to receive access to QC in their consulting rooms for 12 months. Participants complete pre- and post trial surveys. Two-hundred general practitioners are recruited. Participants must be registered to practice in Australia, have a computer with Internet access in their consulting room and use electronic prescribing. Clinicians planning to retire or move to another practice within 12 months or participating in any other clinical trial involving electronic extraction of prescriptions data are excluded from the study. The primary end-points for the study is clinician acceptance and use of QC and the resulting change in decision-making behaviour. The study will examine prescribing patterns related to frequently prescribed medications where there has been a recent significant shift in recommendations regarding their use based upon new evidence. Secondary outcome measures include self-reported changes in diagnosis, patient education, prescriptions written, investigations and referrals. Discussion A trial under experimental conditions is an effective way of examining the impact of using QC in routine general practice consultations. PMID:16928282

  13. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  14. The Role of Personalised Choice in Decision Support: A Randomized Controlled Trial of an Online Decision Aid for Prostate Cancer Screening

    PubMed Central

    Salkeld, Glenn; Cunich, Michelle; Dowie, Jack; Howard, Kirsten; Patel, Manish I.; Mann, Graham; Lipworth, Wendy

    2016-01-01

    Importance Decision support tools can assist people to apply population-based evidence on benefits and harms to individual health decisions. A key question is whether “personalising” choice within decisions aids leads to better decision quality. Objective To assess the effect of personalising the content of a decision aid for prostate cancer screening using the Prostate Specific Antigen (PSA) test. Design Randomized controlled trial. Setting Australia. Participants 1,970 men aged 40–69 years were approached to participate in the trial. Intervention 1,447 men were randomly allocated to either a standard decision aid with a fixed set of five attributes or a personalised decision aid with choice over the inclusion of up to 10 attributes. Outcome Measures To determine whether there was a difference between the two groups in terms of: 1) the emergent opinion (generated by the decision aid) to have a PSA test or not; 2) self-rated decision quality after completing the online decision aid; 3) their intention to undergo screening in the next 12 months. We also wanted to determine whether men in the personalised choice group made use of the extra decision attributes. Results 5% of men in the fixed attribute group scored ‘Have a PSA test’ as the opinion generated by the aid, as compared to 62% of men in the personalised choice group (χ2 = 569.38, 2df, p< 0001). Those men who used the personalised decision aid had slightly higher decision quality (t = 2.157, df = 1444, p = 0.031). The men in the personalised choice group made extensive use of the additional decision attributes. There was no difference between the two groups in terms of their stated intention to undergo screening in the next 12 months. Conclusions Together, these findings suggest that personalised decision support systems could be an important development in shared decision-making and patient-centered care. Trial Registration Australian New Zealand Clinical Trials Registry (ANZCTR) ACTRN

  15. Hysteresis-based congestion control at the B-ISDN access

    NASA Astrophysics Data System (ADS)

    Wissing, Johannes

    1993-11-01

    Multiplexing of bursty sources and refined congestion control strategies are still the subject of numerous research activities. Broadband applications with very high peak-to-mean bitrate ratio and long silence periods like still picture video gave rise to different ideas of rate control at the B-ISDN network access. Contributions on Input Rate Control for source coded traffic as well as on Server Rate Control within a LAN/ATM Interworking Unit have recently been presented. This paper addresses a congestion avoidance strategy at the network access regarding the aggregated traffic of bursty sources. Depending on the number of active sources as well as on certain defined congestion levels the cell rate at the network access is controlled. The proposed analytical approach is based on the model of uniform and continuous arrival and service. The selected underlying Markov chain contains `split' states in order to handle the congestion correlation. The proposed model is extended to an adaptive Non-Markov system where the buffer filling level is evaluated using a switching hysteresis. This type of congestion measurement turns out to be very useful for an adaptive rate control mechanism that guarantees a certain quality of service while still achieving a good statistical gain. The analytical approach is confirmed by results of a computer simulation that is extended to the more complex case of adaptive rate control.

  16. Among three different executive functions, general executive control ability is a key predictor of decision making under objective risk

    PubMed Central

    Schiebener, Johannes; Wegmann, Elisa; Gathmann, Bettina; Laier, Christian; Pawlikowski, Mirko; Brand, Matthias

    2014-01-01

    Executive functioning is supposed to have an important role in decision making under risk. Several studies reported that more advantageous decision-making behavior was accompanied by better performance in tests of executive functioning and that the decision-making process was accompanied by activations in prefrontal and subcortical brain regions associated with executive functioning. However, to what extent different components of executive functions contribute to decision making is still unclear. We tested direct and indirect effects of three executive functions on decision-making performance in a laboratory gambling task, the Game of Dice Task (GDT). Using Brand's model of decisions under risk (2006) we tested seven structural equation models with three latent variables that represent executive functions supposed to be involved in decision making. The latent variables were general control (represented by the general ability to exert attentional and behavioral self-control that is in accordance with task goals despite interfering information), concept formation (represented by categorization, rule detection, and set maintenance), and monitoring (represented by supervision of cognition and behavior). The seven models indicated that only the latent dimension general control had a direct effect on decision making under risk. Concept formation and monitoring only contributed in terms of indirect effects, when mediated by general control. Thus, several components of executive functioning seem to be involved in decision making under risk. However, general control functions seem to have a key role. They may be important for implementing the calculative and cognitively controlled processes involved in advantageous decision making under risk. PMID:25520690

  17. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  18. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  19. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  20. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  1. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... violation of section 337 in the infringement of certain patents. 73 FR 75131. The principal respondent was... order. 75 FR 44989-90 (July 30, 2010). The Commission also issued cease and desist orders against those... COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers...

  2. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  3. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  4. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final Rule; correction. SUMMARY: The Copyright Office makes a nonsubstantial correction to its regulation announcing...

  5. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... materials; 44 U.S.C. 2111, 44 U.S.C. 2201 et seq., and 36 CFR part 1270 for Presidential records; and 44 U.S.C. 2111 note and 36 CFR part 1275 for Nixon Presidential materials. ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What controls access...

  6. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  7. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  8. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  9. 50 CFR 648.92 - Effort-control program for monkfish limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for monkfish limited access vessels. 648.92 Section 648.92 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT... UNITED STATES Management Measures for the NE Multispecies and Monkfish Fisheries § 648.92...

  10. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  11. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  12. Fast access control of the head positioning using a digital signal processor

    NASA Astrophysics Data System (ADS)

    Hasegawa, Susumu; Mizoshita, Yoshifumi; Ueno, Takahisa; Takaishi, Kazuhiko

    1990-08-01

    We have developed a new digital servo controller for a 5"hard disk drive which has average access time of 10 ms for a 25 mm stroke. To obtain this fast access speed, we used a state estimator with a new acceleration irajectory model. The estimator and trajectory generator are implemented using a digital signal processor. There are two problems for fast access control: motor coil inductance and the mechanical resonance of the actuator and disk enclosure. To solve these problems and to achieve precise head positioning, we developed the following control method. To solve the voice coil motor inductance and actuator resonance problems, we used a new acceleration trajectory model which is not affected by the coil inductance when the head moves quickly. This design is based on an optinial control theory which minimizes the square of differentiated acceleration. By using this new trajectory model, the high harmonics of actuator drive are damped and the residual vibration ofactuator immediately after access is decreased.

  13. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  14. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  15. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  16. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  17. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  18. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    PubMed

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care.

  19. FGF/MAPK signaling sets the switching threshold of a bistable circuit controlling cell fate decisions in embryonic stem cells.

    PubMed

    Schröter, Christian; Rué, Pau; Mackenzie, Jonathan Peter; Martinez Arias, Alfonso

    2015-12-15

    Intracellular transcriptional regulators and extracellular signaling pathways together regulate the allocation of cell fates during development, but how their molecular activities are integrated to establish the correct proportions of cells with particular fates is not known. Here we study this question in the context of the decision between the epiblast (Epi) and the primitive endoderm (PrE) fate that occurs in the mammalian preimplantation embryo. Using an embryonic stem cell (ESC) model, we discover two successive functions of FGF/MAPK signaling in this decision. First, the pathway needs to be inhibited to make the PrE-like gene expression program accessible for activation by GATA transcription factors in ESCs. In a second step, MAPK signaling levels determine the threshold concentration of GATA factors required for PrE-like differentiation, and thereby control the proportion of cells differentiating along this lineage. Our findings can be explained by a simple mutual repression circuit modulated by FGF/MAPK signaling. This might be a general network architecture to integrate the activity of signal transduction pathways and transcriptional regulators, and serve to balance proportions of cell fates in several contexts.

  20. Disease Control through Voluntary Vaccination Decisions Based on the Smoothed Best Response

    PubMed Central

    Xu, Fei; Cressman, Ross

    2014-01-01

    We investigate game-theory based decisions on vaccination uptake and its effects on the spread of an epidemic with nonlinear incidence rate. It is assumed that each individual's decision approximates his/her best response (called smoothed best response) in that this person chooses to take the vaccine based on its cost-benefit analysis. The basic reproduction number of the resultant epidemic model is calculated and used to characterize the existence and stability of the disease-free and endemic equilibria of the model. The effects on the spread and control of the epidemic are revealed in terms of the sensitivity of the response to changes in costs and benefits, in the “cost” of the vaccination, and in the proportion of susceptible individuals who are faced with the decision of whether or not to be vaccinated per unit time. The effects of the best response decision rule are also analyzed and compared to those of the smoothed best response. Our study shows that, when there is a perceived cost to take the vaccine, the smoothed best response is more effective in controlling the epidemic. However, when this cost is 0, the best response is the more efficient control. PMID:24693329

  1. Process control and risky decision-making: moderation by general mental ability and need for cognition.

    PubMed

    Burkolter, Dina; Kluge, Annette

    2012-01-01

    Human factors and ergonomics research could benefit from focusing more strongly on individual differences--especially trait variables. The present study suggests the analysis of moderator effects as a promising way to enhance understanding of trait variables and process control performance. Process control performance was studied by analysing moderator effects of general mental ability (GMA) and need for cognition (NC) on risky decision-making (RDM) and performance. Fifty engineering students were trained on a process control task using a computer-based simulation for three hours and tested twice thereafter. Risky decision-making was measured using a computerised gambling task while GMA and NC were assessed with questionnaires. Risky decision-making in interaction with each GMA and NC explained variance in performance over and above variance explained by the single effects. In conclusion, the analysis of moderator effects between individual difference variables and process control performance seems promising. Practitioner Summary: Individual difference variables affect learning and performance, but have often not been studied to any great extent in human factors research. This article suggests a promising approach to studying individual differences--moderator analyses--and illustrates how such differences can lead to a better understanding of what determines process control performance. PMID:22897454

  2. Pilot/Controller Coordinated Decision Making in the Next Generation Air Transportation System

    NASA Technical Reports Server (NTRS)

    Bearman, Chris; Miller, Ronald c.; Orasanu, Judith M.

    2011-01-01

    Introduction: NextGen technologies promise to provide considerable benefits in terms of enhancing operations and improving safety. However, there needs to be a thorough human factors evaluation of the way these systems will change the way in which pilot and controllers share information. The likely impact of these new technologies on pilot/controller coordinated decision making is considered in this paper using the "operational, informational and evaluative disconnect" framework. Method: Five participant focus groups were held. Participants were four experts in human factors, between x and x research students and a technical expert. The participant focus group evaluated five key NextGen technologies to identify issues that made different disconnects more or less likely. Results: Issues that were identified were: Decision Making will not necessarily improve because pilots and controllers possess the same information; Having a common information source does not mean pilots and controllers are looking at the same information; High levels of automation may lead to disconnects between the technology and pilots/controllers; Common information sources may become the definitive source for information; Overconfidence in the automation may lead to situations where appropriate breakdowns are not initiated. Discussion: The issues that were identified lead to recommendations that need to be considered in the development of NextGen technologies. The current state of development of these technologies provides a good opportunity to utilize recommendations at an early stage so that NextGen technologies do not lead to difficulties in resolving breakdowns in coordinated decision making.

  3. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  4. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  5. Impaired Decision Making is Associated with Poor Inhibition Control in Nonpathological Lottery Gamblers.

    PubMed

    Hong, Xiaolong; Zheng, Lili; Li, Xianchun

    2015-12-01

    Previous studies by questionnaires have demonstrated that lottery gamblers who have not meet the criteria of pathological gambler show greater gambling acceptability. However, few empirical evidence of whether such nonpathological lottery gamblers (NPLGs) display the same impairments of decision making with pathological gamblers has been found so far. In present study, NPLGs and matched controls (MCs) were asked to perform the Iowa Gambling Task (IGT) and inter-temporal choice task (ICT). We found that compared to MCs, NPLGs displayed much lower IGT scores, net gains and proportions of advantageous decks in the IGT task and much higher percentages of trials during which smaller-but-sooner rewards were chosen in the ICT. These findings indicate that NPLGs display much more risky and impulsive decision makings, just like pathological gamblers in the previous studies. Next, the Go/NoGo task was employed to explore the role of response inhibition in the impairment of decision making in NPLGs. We found that NPLGs did show much higher commission errors compared to MCs. Moreover, IGT scores, net gain and proportions of advantageous decks were significantly negatively correlated with commission errors, which indicates that poor response inhibition might be involved in the impairments of decision making in NPLGs. To our knowledge, we provided the first empirical evidence of impairment of decision making and its cognitive mechanisms in NPLGs. PMID:25348253

  6. Impaired Decision Making is Associated with Poor Inhibition Control in Nonpathological Lottery Gamblers.

    PubMed

    Hong, Xiaolong; Zheng, Lili; Li, Xianchun

    2015-12-01

    Previous studies by questionnaires have demonstrated that lottery gamblers who have not meet the criteria of pathological gambler show greater gambling acceptability. However, few empirical evidence of whether such nonpathological lottery gamblers (NPLGs) display the same impairments of decision making with pathological gamblers has been found so far. In present study, NPLGs and matched controls (MCs) were asked to perform the Iowa Gambling Task (IGT) and inter-temporal choice task (ICT). We found that compared to MCs, NPLGs displayed much lower IGT scores, net gains and proportions of advantageous decks in the IGT task and much higher percentages of trials during which smaller-but-sooner rewards were chosen in the ICT. These findings indicate that NPLGs display much more risky and impulsive decision makings, just like pathological gamblers in the previous studies. Next, the Go/NoGo task was employed to explore the role of response inhibition in the impairment of decision making in NPLGs. We found that NPLGs did show much higher commission errors compared to MCs. Moreover, IGT scores, net gain and proportions of advantageous decks were significantly negatively correlated with commission errors, which indicates that poor response inhibition might be involved in the impairments of decision making in NPLGs. To our knowledge, we provided the first empirical evidence of impairment of decision making and its cognitive mechanisms in NPLGs.

  7. A genetically mediated bias in decision making driven by failure of amygdala control.

    PubMed

    Roiser, Jonathan P; de Martino, Benedetto; Tan, Geoffrey C Y; Kumaran, Dharshan; Seymour, Ben; Wood, Nicholas W; Dolan, Raymond J

    2009-05-01

    Genetic variation at the serotonin transporter-linked polymorphic region (5-HTTLPR) is associated with altered amygdala reactivity and lack of prefrontal regulatory control. Similar regions mediate decision-making biases driven by contextual cues and ambiguity, for example the "framing effect." We hypothesized that individuals hemozygous for the short (s) allele at the 5-HTTLPR would be more susceptible to framing. Participants, selected as homozygous for either the long (la) or s allele, performed a decision-making task where they made choices between receiving an amount of money for certain and taking a gamble. A strong bias was evident toward choosing the certain option when the option was phrased in terms of gains and toward gambling when the decision was phrased in terms of losses (the frame effect). Critically, this bias was significantly greater in the ss group compared with the lala group. In simultaneously acquired functional magnetic resonance imaging data, the ss group showed greater amygdala during choices made in accord, compared with those made counter to the frame, an effect not seen in the lala group. These differences were also mirrored by differences in anterior cingulate-amygdala coupling between the genotype groups during decision making. Specifically, lala participants showed increased coupling during choices made counter to, relative to those made in accord with, the frame, with no such effect evident in ss participants. These data suggest that genetically mediated differences in prefrontal-amygdala interactions underpin interindividual differences in economic decision making.

  8. Shared Treatment Decision Making Improves Adherence and Outcomes in Poorly Controlled Asthma

    PubMed Central

    Wilson, Sandra R.; Strub, Peg; Buist, A. Sonia; Knowles, Sarah B.; Lavori, Philip W.; Lapidus, Jodi; Vollmer, William M.

    2010-01-01

    Rationale: Poor adherence to asthma controller medications results in poor treatment outcomes. Objectives: To compare controller medication adherence and clinical outcomes in 612 adults with poorly controlled asthma randomized to one of two different treatment decision-making models or to usual care. Methods: In shared decision making (SDM), nonphysician clinicians and patients negotiated a treatment regimen that accommodated patient goals and preferences. In clinician decision making, treatment was prescribed without specifically eliciting patient goals/preferences. The otherwise identical intervention protocols both provided asthma education and involved two in-person and three brief phone encounters. Measurements and Main Results: Refill adherence was measured using continuous medication acquisition (CMA) indices—the total days' supply acquired per year divided by 365 days. Cumulative controller medication dose was measured in beclomethasone canister equivalents. In follow-up Year 1, compared with usual care, SDM resulted in: significantly better controller adherence (CMA, 0.67 vs. 0.46; P < 0.0001) and long-acting β-agonist adherence (CMA, 0.51 vs. 0.40; P = 0.0225); higher cumulative controller medication dose (canister equivalent, 10.9 vs. 5.2; P < 0.0001); significantly better clinical outcomes (asthma-related quality of life, health care use, rescue medication use, asthma control, and lung function). In Year 2, compared with usual care, SDM resulted in significantly lower rescue medication use, the sole clinical outcome available for that year. Compared with clinician decision making, SDM resulted in: significantly better controller adherence (CMA, 0.67 vs. 0.59; P = 0.03) and long-acting β-agonist adherence (CMA, 0.51 vs. 0.41; P = 0.0143); higher cumulative controller dose (CMA, 10.9 vs. 9.1; P = 0.005); and quantitatively, but not significantly, better outcomes on all clinical measures. Conclusions: Negotiating patients' treatment decisions

  9. Decision-making for foot-and-mouth disease control: Objectives matter

    USGS Publications Warehouse

    Probert, William J. M.; Shea, Katriona; Fonnesbeck, Christopher J.; Runge, Michael C.; Carpenter, Tim E.; Durr, Salome; Garner, M. Graeme; Harvey, Neil; Stevenson, Mark A.; Webb, Colleen T.; Werkman, Marleen; Tildesley, Michael J.; Ferrari, Matthew J.

    2016-01-01

    Formal decision-analytic methods can be used to frame disease control problems, the first step of which is to define a clear and specific objective. We demonstrate the imperative of framing clearly-defined management objectives in finding optimal control actions for control of disease outbreaks. We illustrate an analysis that can be applied rapidly at the start of an outbreak when there are multiple stakeholders involved with potentially multiple objectives, and when there are also multiple disease models upon which to compare control actions. The output of our analysis frames subsequent discourse between policy-makers, modellers and other stakeholders, by highlighting areas of discord among different management objectives and also among different models used in the analysis. We illustrate this approach in the context of a hypothetical foot-and-mouth disease (FMD) outbreak in Cumbria, UK using outputs from five rigorously-studied simulation models of FMD spread. We present both relative rankings and relative performance of controls within each model and across a range of objectives. Results illustrate how control actions change across both the base metric used to measure management success and across the statistic used to rank control actions according to said metric. This work represents a first step towards reconciling the extensive modelling work on disease control problems with frameworks for structured decision making.

  10. Integrating biological and chemical controls in decision making: European corn borer (Lepidoptera: Crambidae) control in sweet corn as an example.

    PubMed

    Musser, Fred R; Nyrop, Jan P; Shelton, Anthony M

    2006-10-01

    As growers switch to transgenic crops and selective insecticides that are less toxic to natural enemies, natural enemies can become more important in agricultural pest management. Current decision-making guides are generally based on pest abundance and do not address pest and natural enemy toxicity differences among insecticides or the impact of natural enemies on pest survival. A refined approach to making pest management decisions is to include the impact of natural enemies and insecticides, thereby better integrating biological and chemical control. The result of this integration is a dynamic threshold that varies for each product and the level of biological control expected. To demonstrate the significance of conserved biological control in commercial production, a decision-making guide was developed that evaluates control options for European corn borer, Ostrinia nubilalis (Hübner) (Lepidoptera: Crambidae), in sweet corn, Zea mays L., where the primary natural enemies are generalist predators. Management options are lambda-cyhalothrin (broad-spectrum insecticide), spinosad (selective insecticide), Trichogramma ostriniae (Peng and Chen) (Hymenoptera: Trichogrammatidae) (parasitoid), and Bacillus thuringiensis (Bt) sweet corn (transgenic variety). The key factors influencing thresholds for all treatments are the intended market, predator populations, and the presence of alternative foods for the predators. Treatment cost is the primary factor separating the threshold for each treatment within a common scenario, with the lowest cost treatment having the lowest pest threshold. However, when the impact of a treatment on natural enemies is projected over the 3-wk control period, the impact of the treatment on predators becomes the key factor in determining the threshold, so the lowest thresholds are for broad-spectrum treatments, whereas selective products can have thresholds > 6 times higher by the third week. This decision guide can serve as a framework to help

  11. Acid rain and photochemical oxidants control policies in the European community: A decision analysis framework

    NASA Astrophysics Data System (ADS)

    Bell, Sarah; Raymond, Karen; Watson, Stephen; Wenman, Paul

    The methodology and key findings are presented of a study to evaluate costs and benefits of alternative acid rain control strategies to be implemented at a European Community level between 1980 and 2000. The methodology adopted was decision analysis whose key advantage is an explicit consideration of uncertainty. Benefits predicted under some of the control strategies were found to be significantly greater than those predicted for the 'no control' case, particularly for lakes; urban environmental quality was only expected to improve greatly under the strategy that specifically targeted urban emissions; predictions for crops and forests were relatively uncertain due to inadequacies in the measurement and modelling of ozone.

  12. Understanding the Voice of the Customer: Practical, Data-Driven Planning and Decision Making for Access Services

    ERIC Educational Resources Information Center

    Huff-Eibl, Robyn; Miller-Wells, John; Begay, Wendy

    2014-01-01

    This article describes the process and role frontline access and public service staff play in needs assessment and evaluation of user services, specifically in understanding the voice of the customer. Information includes how the University of Arizona Libraries have incorporated daily data collection into the strategic planning process, resources…

  13. Using the Critical Incident Technique to Research Decision Making regarding Access to Training and Development in Medium-Sized Enterprises

    ERIC Educational Resources Information Center

    Coetzer, Alan; Redmond, Janice; Sharafizad, Jalleh

    2012-01-01

    Employees in small and medium-sized enterprises (SMEs) form part of a "disadvantaged" group within the workforce that receives less access to training and development (T&D) than employees in large firms. Prior research into reasons for the relatively low levels of employee participation in training and development has typically involved surveys of…

  14. Computer vector multiprocessing control with multiple access memory and priority conflict resolution method

    SciTech Connect

    Chen, S.S.; Schiffleger, A.J.

    1990-02-13

    This patent describes a multiprocessor memory system. It comprises: a central memory comprised of a plurality of independently addressable memory banks organized into a plurality of sections each accessible through a plurality of access paths; a plurality of processing machines; each of the processing machine including a plurality of ports for generating memory references to any one of the central memory sections; and conflict resolution means interfacing each of the ports to each of the central memory sections through the central memory access paths. The resolution means for receiving references from the ports and coordinating and controlling the procession of the references along to the access paths. The conflict resolution means comprising a plurality of conflict resolution circuits corresponding in number to the memory sections, each of the circuits receiving the references to its corresponding section from any one of the ports and selectively conveying the references to the access paths for the corresponding section. The circuits each including; means for checking the readiness of the memory banks to be referenced and holding a reference to a busy one of the banks until the bank is ready to be referenced; means for detecting when more than one of the references is pending to the same bank simultaneously and holding all but one of the simultaneously pending references; and means communicating with the ports and the other of the conflict resolution circuits to cause one of the ports referencing the memory to suspend generation of further references when a reference from the referencing port is being held.

  15. Decision Making and Finite-Time Motion Control for a Group of Robots.

    PubMed

    Lu, Qiang; Liu, Shirong; Xie, Xiaogao; Wang, Jian

    2013-04-01

    This paper deals with the problem of odor source localization by designing and analyzing a decision-control system (DCS) for a group of robots. In the decision level, concentration magnitude information and wind information detected by robots are used to predict a probable position of the odor source. Specifically, the idea of particle swarm optimization is introduced to give a probable position of the odor source in terms of concentration magnitude information. Moreover, an observation model of the position of the odor source is built according to wind information, and a Kalman filter is used to estimate the position of the odor source, which is combined with the position obtained by using concentration magnitude information in order to make a decision on the position of the odor source. In the control level, two types of the finite-time motion control algorithms are designed; one is a finite-time parallel motion control algorithm, while the other is a finite-time circular motion control algorithm. Precisely, a nonlinear finite-time consensus algorithm is first proposed, and a Lyapunov approach is used to analyze the finite-time convergence of the proposed consensus algorithm. Then, on the basis of the proposed finite-time consensus algorithm, a finite-time parallel motion control algorithm, which can control the group of robots to trace the plume and move toward the probable position of odor source, is derived. Next, a finite-time circular motion control algorithm, which can enable the robot group to circle the probable position of the odor source in order to search for odor clues, is also developed. Finally, the performance capabilities of the proposed DCS are illustrated through the problem of odor source localization. PMID:23033435

  16. Distributed joint power and access control algorithm for secondary spectrum sharing

    NASA Astrophysics Data System (ADS)

    Li, Hongyan; Chen, Enqing; Fu, Hongliang

    2010-08-01

    Based on interference temperature model, the problem of efficient secondary spectrum sharing is formulated as a power optimization problem with some constraints at physical layer. These constraints and optimization objective limit a feasible power vector set which leads to the need of access control besides power control. In this paper, we consider the decentralized cognitive radio network scenario where short-term data service is required, and the problem of distributed joint power and access control is studied to maximize the total secondary system throughput, subject to Quality of Service (QoS) constraints from individual secondary users and interference temperature limit (ITL) from primary system. Firstly, a pricing-based game model was used to solve distributed power allocation optimization problem in both high and low signal to interference noise ratio (SINR) scenarios. Secondly, when not all the secondary links can be supported with their QoS requirement and ITL, a distributed joint power and access control algorithm was introduced to find the allowable links which results in maximum network throughput with all the constraints satisfied, and the convergence performance is tested by simulations.

  17. Translating PrEP effectiveness into public health impact: key considerations for decision-makers on cost-effectiveness, price, regulatory issues, distributive justice and advocacy for access

    PubMed Central

    Hankins, Catherine; Macklin, Ruth; Warren, Mitchell

    2015-01-01

    Introduction The extraordinary feat of proving the effectiveness of oral pre-exposure prophylaxis (PrEP) in clinical trials in different populations in a variety of settings may prove to have been easier than ensuring it is used well. Decision-makers must make difficult choices to realize the promise of antiretroviral prophylaxis for their countries. This paper outlines key economic, regulatory and distributive justice issues that must be addressed for effective and acceptable PrEP implementation. Discussion In considering the role that PrEP can play in combination prevention programmes, decision-makers must determine who can benefit most from PrEP, how PrEP can be provided safely and efficiently, and what kind of health system support will ensure successful implementation. To do this, they need contextualized information on disease burden by population, analyses of how PrEP services might best be delivered, and projections of the human resource and infrastructure requirements for each potential delivery model. There are cost considerations, varying cost-effectiveness results and regulatory challenges. The principles of ethics can inform thorny discussions about who should be prioritized for oral PrEP and how best to introduce it fairly. We describe the cost-effectiveness of PrEP in different populations at higher risk of HIV exposure, its price in low- and middle-income countries, and the current regulatory situation. We explore the principles of ethics that can inform resource allocation decision-making about PrEP anchored in distributive justice, at a time when universal access to antiretroviral treatment remains to be assured. We then highlight the role of advocacy in moving the PrEP agenda forward. Conclusions The time is ripe now for decisions about whether, how and for whom PrEP should be introduced into a country's HIV response. It has the potential to contribute significantly to high impact HIV prevention if it is tailored to those who can most benefit

  18. Cancer's Margins: Trans* and Gender Nonconforming People's Access to Knowledge, Experiences of Cancer Health, and Decision-Making

    PubMed Central

    Bryson, Mary K.

    2016-01-01

    Abstract Purpose: Research in Canada and the United States indicates that minority gender and sexuality status are consistently associated with health disparities and poor health outcomes, including cancer health. This article investigates experiences of cancer health and care, and access to knowledge for trans* and gender nonconforming people diagnosed with and treated for breast and/or gynecologic cancer. Our study contributes new understandings about gender minority populations that will advance knowledge concerning the provision of culturally appropriate care. This is the first study we are aware of that focuses on trans* and gender nonconforming peoples' experiences of cancer care and treatment, support networks, and access to and mobilization of knowledge. Methods: This article analyzes trans* and gender nonconforming patient interviews from the Cancer's Margins project (www.lgbtcancer.ca): Canada's first nationally-funded project that investigates the complex intersections of sexual and/or gender marginality, cancer knowledge, treatment experiences, and modes of the organization of support networks. Results: Our analysis documents how different bodies of knowledge relative to cancer treatment and gendered embodiment are understood, accessed, and mobilized by trans* and gender nonconforming patients. Findings reported here suggest that one's knowledge of a felt sense of gender is closely interwoven with knowledge concerning cancer treatment practices; a dynamic which organizes knowledge mobilities in cancer treatment. Conclusions: The findings support the assertion that cisgender models concerning changes to the body that occur as a result of biomedical treatment for breast and/or gynecologic cancer are wholly inadequate in order to account for trans* and gender nonconforming peoples' experiences of cancer treatments, and access to and mobilization of related knowledge. PMID:26789402

  19. Controlled Access Headings in EAD Finding Aids: Current Practices in Number of and Types of Headings Assigned

    ERIC Educational Resources Information Center

    Mascaro, Michelle

    2011-01-01

    This article presents the findings from a study of controlled access headings assigned to encoded archival description finding aids in the Ohio Library and Information Network Finding Aid Repository, focusing on the number of headings per finding aid and the category of terms assigned. Assigning multiple controlled access headings was widely…

  20. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  1. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  2. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  3. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  4. The regulatory network controlling the proliferation-meiotic entry decision in the Caenorhabditis elegans germ line.

    PubMed

    Hansen, Dave; Schedl, Tim

    2006-01-01

    The germ line of sexually reproducing animals, at some point in development, consists of both proliferating and differentiating cells. Proliferation is needed to increase cell number, ensuring that a sufficient quantity of gametes is produced. Meiotic development is needed to produce gametes that can support embryogenesis, each with half the ploidy of the somatic cells. For the reproductive strategy of a given species, regulating the timing and number of gametes, and thus controlling the timing of differentiation and the extent of proliferation, is very important for reproductive fitness. Therefore, animals have evolved regulatory mechanisms that tightly control and balance the proliferation-initiation of meiotic development (meiotic entry) decision. Genetic analysis has identified signaling mechanisms involved in controlling this balance in some animals, including mice, Drosophila, and Caenorhabditis elegans. In this chapter, we present our understanding of the genetic hierarchy controlling the proliferation-meiotic entry decision in C. elegans. A core regulatory network controls the decision under all known conditions (developmental stage, sex, and growth temperature). It consists of a canonical Notch signaling pathway promoting proliferation by inhibiting two redundant mRNA regulatory pathways, the GLD-1 and GLD-2 pathways, which promote meiotic entry. Superimposed on the core network is a complex set of factors, some yet to be identified, and many with regulatory relationships still poorly understood, which control the activities of the GLD-1 and GLD-2 pathways and possibly parallel pathways. Some of the complexity arises from these regulators acting only under certain conditions. We also highlight major areas where we lack knowledge. For example, it is unknown if the entire population of proliferating cells are stem cells capable of self-renewal or if only a small portion are stem cells and the rest are transit amplifying cells.

  5. The Association Between Prepregnancy Parental Support and Control and Adolescent Girls’ Pregnancy Resolution Decisions

    PubMed Central

    Madkour, Aubrey Spriggs; Xie, Yiqiong; Harville, Emily W.

    2013-01-01

    Purpose To examine the influence of prepregnancy parental support and control on adolescent girls’ pregnancy resolution decisions. Methods Data from the National Longitudinal Study of Adolescent Health were analyzed. Girls whose first pregnancy reported in wave IV occurred after wave I and before age 20 were included (n = 1,107). Participants self-reported pregnancy disposition (abortion, ectopic or tubal pregnancy, miscarriage, stillbirth, live birth) for each pregnancy; responses were dichotomized as abortion versus other. Girls’ perceptions of parental support and control were measured at wave I. Controls were included for wave I age, age at pregnancy, year at the end of pregnancy, race/ethnicity, and parent characteristics (i.e., education, religious affiliation, age at first marriage, and educational expectations). Weighted multivariable logistic regression models were performed. Results Approximately 18% of girls reporting a teen pregnancy reported having an abortion. In crude analyses, parental support was marginally negatively related to abortion (odds ratio [OR] =.83, p =.06) and parental control was significantly negatively related to abortion (OR = .78, p = .02). In multivariable analyses, higher parental control was significantly negatively related to abortion versus other pregnancy outcomes (adjusted OR .80, 95% confidence interval .66–.98). Perceived parental support was unassociated with pregnancy resolution decisions. The only other factor associated with abortion decisions was parent education: odds of choosing abortion versus other pregnancy outcomes were significantly higher for adolescent girls whose parents had a bachelor’s degree or greater versus those with lower educational attainment. Conclusions Pregnant adolescents with less educated parents or parents exercising greater control were less likely to have an abortion. PMID:23763966

  6. A human rights view on access to controlled substances for medical purposes under the international drug control framework.

    PubMed

    Gispen, Marie Elske C

    2013-11-01

    The world is confronted with a major public health deficit caused by poor access to controlled essential medicines under the international drug control framework. This is affecting millions of patients on a daily basis and resulting in numerous human rights violations. The present review contextualises this deficit from a human rights perspective. Drug control efforts are informed by a twofold objective stemming from the double nature of scheduled substances: free access for medical purposes should be ensured, though non-medical use of substances such as opium should be restricted. The international drug control framework is, in theory, based on this twofold notion, however at the level of interpretation, monitoring, and implementation, a one-sided emphasis is demonstrated. By tracing a parallel between the obligations of states under the international drug control framework and those that derive from human rights law, the review shows that the two systems seem incoherent and conflicting in nature and flags the importance of cross-disciplinary research into drug control and human rights.

  7. Predicting Human Error in Air Traffic Control Decision Support Tools and Free Flight Concepts

    NASA Technical Reports Server (NTRS)

    Mogford, Richard; Kopardekar, Parimal

    2001-01-01

    The document is a set of briefing slides summarizing the work the Advanced Air Transportation Technologies (AATT) Project is doing on predicting air traffic controller and airline pilot human error when using new decision support software tools and when involved in testing new air traffic control concepts. Previous work in this area is reviewed as well as research being done jointly with the FAA. Plans for error prediction work in the AATT Project are discussed. The audience is human factors researchers and aviation psychologists from government and industry.

  8. [Principle for strategic decision based on population health risk in emergence environmental cadmium pollution control].

    PubMed

    Shang, Qi

    2012-05-01

    The principles for strategic decision in emergence environmental pollution control was summarized based on population health risk and features of emergence events of environmental cadmium pollution. Main task and strategies for the events control was suggested in emergency treatment and post-event for water and soil cadmium pollution respectively. The work, monitoring method, key problems for both environment cadmium pollution and human health risk, and main content of health education for cadmium exposure people was proposed in follow-up action, at meanwhile, achievements of study on human health effects caused by environmental cadmium pollution was introduced briefly over recent years.

  9. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  10. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  11. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  12. MPEG-21 as an access control tool for the National Health Service Care Records Service.

    PubMed

    Brox, Georg A

    2005-01-01

    Since the launch of the National Health Service (NHS) Care Records Service with plans to share patient information across England, there has been an emphasis on the need for manageable access control methods. MPEG-21 is a structured file format which includes an Intellectual Property Management and Protection (IPMP) function using XML to present all digitally stored items in the patient record. Using DICreator software, patient records consisting of written text, audio-recordings, non-X-ray digital imaging and video sequences were linked up successfully. Audio records were created using Talk-Back 2002 to standardize and optimize recording quality. The recorded reports were then linked and archived using iTunes. A key was used each time the file was displayed to secure access to confidential patient data. The building of the correct file structure could be monitored during the entire creation of the file. The results demonstrated the ability to ensure secure access of the MPEG-21 file by both health-care professionals and patients by use of different keys and a specific MPEG-21 browser. The study also showed that the enabling of IPMP will provide accurate audit trails to authenticate appropriate access to medical information. PMID:16035983

  13. Access to information and expectations of treatment decisions for prostate cancer patients--results of a European survey.

    PubMed

    Tombal, B; Baskin-Bey, E; Schulman, C

    2013-03-01

    We surveyed patients in France, Germany, Italy, Spain and Poland to examine information requirements and expectations of patients with prostate cancer. Patients were identified via their healthcare teams or via existing databases and interviewed by telephone, or in face-to-face interviews (Italy). Survey questions were either multiple choice or rank-based, and additional information was available to assist patient comprehension. Overall, 80% of patients received information about prostate cancer at diagnosis and 76% rated their physician as the most useful information source. However, around a third of French and German patients did not receive any information about their condition at diagnosis, compared with 8%, 12% and 10% of Spanish, Italian and Polish patients, respectively. Most patients rated the information they received as 'very informative', but there were regional variations, with German patients being the least satisfied with the quality of information received. Despite receiving the least amount of information at diagnosis, more patients from France and Germany preferred to be involved in treatment decisions than patients from Spain, Italy and Poland. Results from this survey highlight important gaps in information provision for patients with prostate cancer in terms of information supplied and patient expectations regarding treatment decisions.

  14. Developing an Intelligent Reservoir Flood Control Decision Support System through Integrating Artificial Neural Networks

    NASA Astrophysics Data System (ADS)

    Chang, L. C.; Kao, I. F.; Tsai, F. H.; Hsu, H. C.; Yang, S. N.; Shen, H. Y.; Chang, F. J.

    2015-12-01

    Typhoons and storms hit Taiwan several times every year and cause serious flood disasters. Because the mountainous terrain and steep landform rapidly accelerate the speed of flood flow, rivers cannot be a stable source of water supply. Reservoirs become one of the most important and effective floodwater storage facilities. However, real-time operation for reservoir flood control is a continuous and instant decision-making process based on rules, laws, meteorological nowcast, in addition to the immediate rainfall and hydrological data. The achievement of reservoir flood control can effectively mitigate flood disasters and store floodwaters for future uses. In this study, we construct an intelligent decision support system for reservoir flood control through integrating different types of neural networks and the above information to solve this problem. This intelligent reservoir flood control decision support system includes three parts: typhoon track classification, flood forecast and adaptive water release models. This study used the self-organizing map (SOM) for typhoon track clustering, nonlinear autoregressive with exogenous inputs (NARX) for multi-step-ahead reservoir inflow prediction, and adaptive neuro-fuzzy inference system (ANFIS) for reservoir flood control. Before typhoons landfall, we can estimate the entire flood hydrogragh of reservoir inflow by using SOM and make a pre-release strategy and real-time reservoir flood operating by using ANFIS. In the meanwhile, NARX can be constantly used real-time five-hour-ahead inflow prediction for providing the newest flood information. The system has been successfully implemented Typhoons Trami (2013), Fitow (2013) and Matmo (2014) in Shihmen Reservoir.

  15. Nucleus accumbens D2R cells signal prior outcomes and control risky decision-making.

    PubMed

    Zalocusky, Kelly A; Ramakrishnan, Charu; Lerner, Talia N; Davidson, Thomas J; Knutson, Brian; Deisseroth, Karl

    2016-03-31

    A marked bias towards risk aversion has been observed in nearly every species tested. A minority of individuals, however, instead seem to prefer risk (repeatedly choosing uncertain large rewards over certain but smaller rewards), and even risk-averse individuals sometimes opt for riskier alternatives. It is not known how neural activity underlies such important shifts in decision-making--either as a stable trait across individuals or at the level of variability within individuals. Here we describe a model of risk-preference in rats, in which stable individual differences, trial-by-trial choices, and responses to pharmacological agents all parallel human behaviour. By combining new genetic targeting strategies with optical recording of neural activity during behaviour in this model, we identify relevant temporally specific signals from a genetically and anatomically defined population of neurons. This activity occurred within dopamine receptor type-2 (D2R)-expressing cells in the nucleus accumbens (NAc), signalled unfavourable outcomes from the recent past at a time appropriate for influencing subsequent decisions, and also predicted subsequent choices made. Having uncovered this naturally occurring neural correlate of risk selection, we then mimicked the temporally specific signal with optogenetic control during decision-making and demonstrated its causal effect in driving risk-preference. Specifically, risk-preferring rats could be instantaneously converted to risk-averse rats with precisely timed phasic stimulation of NAc D2R cells. These findings suggest that individual differences in risk-preference, as well as real-time risky decision-making, can be largely explained by the encoding in D2R-expressing NAc cells of prior unfavourable outcomes during decision-making. PMID:27007845

  16. Nucleus accumbens D2R cells signal prior outcomes and control risky decision-making.

    PubMed

    Zalocusky, Kelly A; Ramakrishnan, Charu; Lerner, Talia N; Davidson, Thomas J; Knutson, Brian; Deisseroth, Karl

    2016-03-31

    A marked bias towards risk aversion has been observed in nearly every species tested. A minority of individuals, however, instead seem to prefer risk (repeatedly choosing uncertain large rewards over certain but smaller rewards), and even risk-averse individuals sometimes opt for riskier alternatives. It is not known how neural activity underlies such important shifts in decision-making--either as a stable trait across individuals or at the level of variability within individuals. Here we describe a model of risk-preference in rats, in which stable individual differences, trial-by-trial choices, and responses to pharmacological agents all parallel human behaviour. By combining new genetic targeting strategies with optical recording of neural activity during behaviour in this model, we identify relevant temporally specific signals from a genetically and anatomically defined population of neurons. This activity occurred within dopamine receptor type-2 (D2R)-expressing cells in the nucleus accumbens (NAc), signalled unfavourable outcomes from the recent past at a time appropriate for influencing subsequent decisions, and also predicted subsequent choices made. Having uncovered this naturally occurring neural correlate of risk selection, we then mimicked the temporally specific signal with optogenetic control during decision-making and demonstrated its causal effect in driving risk-preference. Specifically, risk-preferring rats could be instantaneously converted to risk-averse rats with precisely timed phasic stimulation of NAc D2R cells. These findings suggest that individual differences in risk-preference, as well as real-time risky decision-making, can be largely explained by the encoding in D2R-expressing NAc cells of prior unfavourable outcomes during decision-making.

  17. The scaffold protein Ste5 directly controls a switch-like mating decision in yeast.

    PubMed

    Malleshaiah, Mohan K; Shahrezaei, Vahid; Swain, Peter S; Michnick, Stephen W

    2010-05-01

    Evolution has resulted in numerous innovations that allow organisms to increase their fitness by choosing particular mating partners, including secondary sexual characteristics, behavioural patterns, chemical attractants and corresponding sensory mechanisms. The haploid yeast Saccharomyces cerevisiae selects mating partners by interpreting the concentration gradient of pheromone secreted by potential mates through a network of mitogen-activated protein kinase (MAPK) signalling proteins. The mating decision in yeast is an all-or-none, or switch-like, response that allows cells to filter weak pheromone signals, thus avoiding inappropriate commitment to mating by responding only at or above critical concentrations when a mate is sufficiently close. The molecular mechanisms that govern the switch-like mating decision are poorly understood. Here we show that the switching mechanism arises from competition between the MAPK Fus3 and a phosphatase Ptc1 for control of the phosphorylation state of four sites on the scaffold protein Ste5. This competition results in a switch-like dissociation of Fus3 from Ste5 that is necessary to generate the switch-like mating response. Thus, the decision to mate is made at an early stage in the pheromone pathway and occurs rapidly, perhaps to prevent the loss of the potential mate to competitors. We argue that the architecture of the Fus3-Ste5-Ptc1 circuit generates a novel ultrasensitivity mechanism, which is robust to variations in the concentrations of these proteins. This robustness helps assure that mating can occur despite stochastic or genetic variation between individuals. The role of Ste5 as a direct modulator of a cell-fate decision expands the functional repertoire of scaffold proteins beyond providing specificity and efficiency of information processing. Similar mechanisms may govern cellular decisions in higher organisms and be disrupted in cancer. PMID:20400943

  18. Financial Management and Control for Decision Making in Urban Local Bodies in India Using Statistical Techniques

    NASA Astrophysics Data System (ADS)

    Bhattacharyya, Sidhakam; Bandyopadhyay, Gautam

    2010-10-01

    The council of most of the Urban Local Bodies (ULBs) has a limited scope for decision making in the absence of appropriate financial control mechanism. The information about expected amount of own fund during a particular period is of great importance for decision making. Therefore, in this paper, efforts are being made to present set of findings and to establish a model of estimating receipts of own sources and payments thereof using multiple regression analysis. Data for sixty months from a reputed ULB in West Bengal have been considered for ascertaining the regression models. This can be used as a part of financial management and control procedure by the council to estimate the effect on own fund. In our study we have considered two models using multiple regression analysis. "Model I" comprises of total adjusted receipt as the dependent variable and selected individual receipts as the independent variables. Similarly "Model II" consists of total adjusted payments as the dependent variable and selected individual payments as independent variables. The resultant of Model I and Model II is the surplus or deficit effecting own fund. This may be applied for decision making purpose by the council.

  19. Using a geographical-information-system-based decision support to enhance malaria vector control in zambia.

    PubMed

    Chanda, Emmanuel; Mukonka, Victor Munyongwe; Mthembu, David; Kamuliwo, Mulakwa; Coetzer, Sarel; Shinondo, Cecilia Jill

    2012-01-01

    Geographic information systems (GISs) with emerging technologies are being harnessed for studying spatial patterns in vector-borne diseases to reduce transmission. To implement effective vector control, increased knowledge on interactions of epidemiological and entomological malaria transmission determinants in the assessment of impact of interventions is critical. This requires availability of relevant spatial and attribute data to support malaria surveillance, monitoring, and evaluation. Monitoring the impact of vector control through a GIS-based decision support (DSS) has revealed spatial relative change in prevalence of infection and vector susceptibility to insecticides and has enabled measurement of spatial heterogeneity of trend or impact. The revealed trends and interrelationships have allowed the identification of areas with reduced parasitaemia and increased insecticide resistance thus demonstrating the impact of resistance on vector control. The GIS-based DSS provides opportunity for rational policy formulation and cost-effective utilization of limited resources for enhanced malaria vector control.

  20. Multi-criteria decision making approaches for quality control of genome-wide association studies.

    PubMed

    Malovini, Alberto; Rognoni, Carla; Puca, Annibale; Bellazzi, Riccardo

    2009-03-01

    Experimental errors in the genotyping phases of a Genome-Wide Association Study (GWAS) can lead to false positive findings and to spurious associations. An appropriate quality control phase could minimize the effects of this kind of errors. Several filtering criteria can be used to perform quality control. Currently, no formal methods have been proposed for taking into account at the same time these criteria and the experimenter's preferences. In this paper we propose two strategies for setting appropriate genotyping rate thresholds for GWAS quality control. These two approaches are based on the Multi-Criteria Decision Making theory. We have applied our method on a real dataset composed by 734 individuals affected by Arterial Hypertension (AH) and 486 nonagenarians without history of AH. The proposed strategies appear to deal with GWAS quality control in a sound way, as they lead to rationalize and make explicit the experimenter's choices thus providing more reproducible results.

  1. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  2. Pre-consultation educational group intervention to improve shared decision-making in postmastectomy breast reconstruction: study protocol for a pilot randomized controlled trial

    PubMed Central

    2013-01-01

    Background The Pre-Consultation Educational Group Intervention pilot study seeks to assess the feasibility and inform the optimal design for a definitive randomized controlled trial that aims to improve the quality of decision-making in postmastectomy breast reconstruction patients. Methods/design This is a mixed-methods pilot feasibility randomized controlled trial that will follow a single-center, 1:1 allocation, two-arm parallel group superiority design. Setting: The University Health Network, a tertiary care cancer center in Toronto, Canada. Participants: Adult women referred to one of three plastic and reconstructive surgeons for delayed breast reconstruction or prophylactic mastectomy with immediate breast reconstruction. Intervention: We designed a multi-disciplinary educational group workshop that incorporates the key components of shared decision-making, decision-support, and psychosocial support for cancer survivors prior to the initial surgical consult. The intervention consists of didactic lectures by a plastic surgeon and nurse specialist on breast reconstruction choices, pre- and postoperative care; a value-clarification exercise led by a social worker; and discussions with a breast reconstruction patient. Control: Usual care includes access to an informational booklet, website, and patient volunteer if desired. Outcomes: Expected pilot outcomes include feasibility, recruitment, and retention targets. Acceptability of intervention and full trial outcomes will be established through qualitative interviews. Trial outcomes will include decision-quality measures, patient-reported outcomes, and service outcomes, and the treatment effect estimate and variability will be used to inform the sample size calculation for a full trial. Discussion Our pilot study seeks to identify the (1) feasibility, acceptability, and design of a definitive RCT and (2) the optimal content and delivery of our proposed educational group intervention. Thirty patients have been

  3. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  4. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  5. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    PubMed

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms. PMID:21843997

  6. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  7. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    PubMed

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  8. An interaction-based access control model (IBAC) for collaborative services

    SciTech Connect

    Altunay, Mine; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  9. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 2: Switches and Environmental Controls. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…

  10. Adolescent Temperament and Parental Control in the Development of the Adolescent Decision Making in a Chilean Sample

    ERIC Educational Resources Information Center

    Perez, J. Carola; Cumsille, Patricio

    2012-01-01

    The study analyzes the way in which adolescents' temperamental characteristics interact with parental control to shape adolescent decision making development. A sample of high-school Chilean adolescents (N = 391) answered a self-report questionnaire that included measures of behavioral autonomy (the extent to which adolescents make decisions in…

  11. Countering the negative effects of job insecurity through participative decision making: lessons from the demand-control model.

    PubMed

    Probst, Tahira M

    2005-10-01

    This study examined the effectiveness of increased organizational participative decision making in attenuating the negative consequences of job insecurity. Data were collected from 807 employees in 6 different companies. Analyses suggest that job insecurity is related to lower coworker, work, and supervisor satisfaction and higher turnover intentions and work withdrawal behaviors. However, employees with greater participative decision-making opportunities reported fewer negative consequences of job insecurity compared with employees with fewer participative decision-making opportunities. Results are interpreted using the demand-control model and suggest that organizations that allow greater employee participative decision making may experience fewer negative side effects from today's rising levels of employee job insecurity. PMID:16248683

  12. Facilitating climate change assessments by providing easy access to data and decision-support tools on-line

    NASA Astrophysics Data System (ADS)

    Bachelet, D. M.

    2012-12-01

    Public land managers are under increasing pressure to consider the potential impacts of climate change but they often lack access to the necessary scientific information and the support to interpret projections. Over 27% of the United States land area are designated as protected areas (e.g. National Parks and Wilderness Areas) including 76,900,000 ha of National Forests areas for which management plans need to be revised to prepare for climate change. Projections of warmer drier conditions raise concerns about extended summer drought, increased fire risks and potential pest/insect outbreaks threatening the carbon sequestration potential of the region as well as late summer water availability. Downscaled climate projections, soil vulnerability indices, and simulated climate change impacts on vegetation cover, fire frequency, carbon stocks, as well as species range shifts, have been uploaded in databasin.org to provide easy access to documented information that can be displayed, shared, and freely manipulated on line. We have uploaded NARCCAP scenarios and provided animations and time series display to look at regional and temporal trends in climate projections. We have uploaded simulation results of vegetation shifts from the global scale to local national parks and shared results with concerned managers. We have used combinations of vegetation models and niche models to evaluate wildlife resilience to future conditions. We have designed fuzzy logic models for ecological assessment projects and made them available on the Data Basin web site. We describe how we have used all this information to quantify climate change vulnerability for a variety of ecosystems, developing new web tools to provide comparative summaries of the various types of spatial and temporal data available for different regions.

  13. Optimization of matrix tablets controlled drug release using Elman dynamic neural networks and decision trees.

    PubMed

    Petrović, Jelena; Ibrić, Svetlana; Betz, Gabriele; Đurić, Zorica

    2012-05-30

    The main objective of the study was to develop artificial intelligence methods for optimization of drug release from matrix tablets regardless of the matrix type. Static and dynamic artificial neural networks of the same topology were developed to model dissolution profiles of different matrix tablets types (hydrophilic/lipid) using formulation composition, compression force used for tableting and tablets porosity and tensile strength as input data. Potential application of decision trees in discovering knowledge from experimental data was also investigated. Polyethylene oxide polymer and glyceryl palmitostearate were used as matrix forming materials for hydrophilic and lipid matrix tablets, respectively whereas selected model drugs were diclofenac sodium and caffeine. Matrix tablets were prepared by direct compression method and tested for in vitro dissolution profiles. Optimization of static and dynamic neural networks used for modeling of drug release was performed using Monte Carlo simulations or genetic algorithms optimizer. Decision trees were constructed following discretization of data. Calculated difference (f(1)) and similarity (f(2)) factors for predicted and experimentally obtained dissolution profiles of test matrix tablets formulations indicate that Elman dynamic neural networks as well as decision trees are capable of accurate predictions of both hydrophilic and lipid matrix tablets dissolution profiles. Elman neural networks were compared to most frequently used static network, Multi-layered perceptron, and superiority of Elman networks have been demonstrated. Developed methods allow simple, yet very precise way of drug release predictions for both hydrophilic and lipid matrix tablets having controlled drug release.

  14. Infectious disease and health systems modelling for local decision making to control neglected tropical diseases

    PubMed Central

    2015-01-01

    Most neglected tropical diseases (NTDs) have complex life cycles and are challenging to control. The “2020 goals” of control and elimination as a public health programme for a number of NTDs are the subject of significant international efforts and investments. Beyond 2020 there will be a drive to maintain these gains and to push for true local elimination of transmission. However, these diseases are affected by variations in vectors, human demography, access to water and sanitation, access to interventions and local health systems. We therefore argue that there will be a need to develop local quantitative expertise to support elimination efforts. If available now, quantitative analyses would provide updated estimates of the burden of disease, assist in the design of locally appropriate control programmes, estimate the effectiveness of current interventions and support ‘real-time’ updates to local operations. Such quantitative tools are increasingly available at an international scale for NTDs, but are rarely tailored to local scenarios. Localised expertise not only provides an opportunity for more relevant analyses, but also has a greater chance of developing positive feedback between data collection and analysis by demonstrating the value of data. This is essential as rational program design relies on good quality data collection. It is also likely that if such infrastructure is provided for NTDs there will be an additional impact on the health system more broadly. Locally tailored quantitative analyses can help achieve sustainable and effective control of NTDs, but also underpin the development of local health care systems.

  15. Multi-phase intelligent decision model for reservoir real-time flood control during typhoons

    NASA Astrophysics Data System (ADS)

    Hsu, Nien-Sheng; Huang, Chien-Lin; Wei, Chih-Chiang

    2015-03-01

    This study applies an Adaptive Network-based Fuzzy Inference System (ANFIS) and a Real-Time Recurrent Learning Neural Network (RTRLNN) with an optimized reservoir release hydrograph using Mixed Integer Linear Programming (MILP) from historical typhoon events to develop a multi-phase intelligent real-time reservoir operation model for flood control. The flood control process is divided into three stages: (1) before flood (Stage I); (2) before peak flow (Stage II); and (3) after peak flow (Stage III). The models are then constructed with either three phase modules (ANFIS-3P and RTRLNN-3P) or two phase (Stage I + II and Stage III) modules (ANFIS-2P and RTRLNN-2P). The multi-phase modules are developed with consideration of the difference in operational decision mechanisms, decision information, release functions, and targets between each flood control stage to solve the problem of time-consuming computation and difficult system integration of MILP. In addition, the model inputs include the coupled short lead time and total reservoir inflow forecast information that are developed using radar- and satellite-based meteorological monitoring techniques, forecasted typhoon tracks, meteorological image similarity analysis, ANFIS and RTRLNN. This study uses the Tseng-Wen Reservoir basin as the study area, and the model results showed that RTRLNN outperformed ANFIS in the simulated outcomes from the optimized hydrographs. This study also applies the models to Typhoons Kalmaegi and Morakot to compare the simulations to historical operations. From the operation results, the RTRLNN-3P model is better than RTRLNN-2P and historical operations. Further, because the RTRLNN-3P model combines the innovative multi-phase module with monitored and forecasted decision information, the operation can simultaneously, effectively and automatically achieve the dual goals of flood detention at peak flow periods and water supply at the end of a typhoon event.

  16. Adolescents’ risky decision-making activates neural networks related to social cognition and cognitive control processes

    PubMed Central

    Rodrigo, María José; Padrón, Iván; de Vega, Manuel; Ferstl, Evelyn C.

    2014-01-01

    This study examines by means of functional magnetic resonance imaging the neural mechanisms underlying adolescents’ risk decision-making in social contexts. We hypothesize that the social context could engage brain regions associated with social cognition processes and developmental changes are also expected. Sixty participants (adolescents: 17–18, and young adults: 21–22 years old) read narratives describing typical situations of decision-making in the presence of peers. They were asked to make choices in risky situations (e.g., taking or refusing a drug) or ambiguous situations (e.g., eating a hamburger or a hotdog). Risky as compared to ambiguous scenarios activated bilateral temporoparietal junction (TPJ), bilateral middle temporal gyrus (MTG), right medial prefrontal cortex, and the precuneus bilaterally; i.e., brain regions related to social cognition processes, such as self-reflection and theory of mind (ToM). In addition, brain structures related to cognitive control were active [right anterior cingulate cortex (ACC), bilateral dorsolateral prefrontal cortex (DLPFC), bilateral orbitofrontal cortex], whereas no significant clusters were obtained in the reward system (ventral striatum). Choosing the dangerous option involved a further activation of control areas (ACC) and emotional and social cognition areas (temporal pole). Adolescents employed more neural resources than young adults in the right DLPFC and the right TPJ in risk situations. When choosing the dangerous option, young adults showed a further engagement in ToM related regions (bilateral MTG) and in motor control regions related to the planning of actions (pre-supplementary motor area). Finally, the right insula and the right superior temporal gyrus were more activated in women than in men, suggesting more emotional involvement and more intensive modeling of the others’ perspective in the risky conditions. These findings call for more comprehensive developmental accounts of decision

  17. Adolescents' risky decision-making activates neural networks related to social cognition and cognitive control processes.

    PubMed

    Rodrigo, María José; Padrón, Iván; de Vega, Manuel; Ferstl, Evelyn C

    2014-01-01

    This study examines by means of functional magnetic resonance imaging the neural mechanisms underlying adolescents' risk decision-making in social contexts. We hypothesize that the social context could engage brain regions associated with social cognition processes and developmental changes are also expected. Sixty participants (adolescents: 17-18, and young adults: 21-22 years old) read narratives describing typical situations of decision-making in the presence of peers. They were asked to make choices in risky situations (e.g., taking or refusing a drug) or ambiguous situations (e.g., eating a hamburger or a hotdog). Risky as compared to ambiguous scenarios activated bilateral temporoparietal junction (TPJ), bilateral middle temporal gyrus (MTG), right medial prefrontal cortex, and the precuneus bilaterally; i.e., brain regions related to social cognition processes, such as self-reflection and theory of mind (ToM). In addition, brain structures related to cognitive control were active [right anterior cingulate cortex (ACC), bilateral dorsolateral prefrontal cortex (DLPFC), bilateral orbitofrontal cortex], whereas no significant clusters were obtained in the reward system (ventral striatum). Choosing the dangerous option involved a further activation of control areas (ACC) and emotional and social cognition areas (temporal pole). Adolescents employed more neural resources than young adults in the right DLPFC and the right TPJ in risk situations. When choosing the dangerous option, young adults showed a further engagement in ToM related regions (bilateral MTG) and in motor control regions related to the planning of actions (pre-supplementary motor area). Finally, the right insula and the right superior temporal gyrus were more activated in women than in men, suggesting more emotional involvement and more intensive modeling of the others' perspective in the risky conditions. These findings call for more comprehensive developmental accounts of decision-making in

  18. POWER-ENHANCED MULTIPLE DECISION FUNCTIONS CONTROLLING FAMILY-WISE ERROR AND FALSE DISCOVERY RATES

    PubMed Central

    Peña, Edsel A.; Habiger, Joshua D.; Wu, Wensong

    2014-01-01

    Improved procedures, in terms of smaller missed discovery rates (MDR), for performing multiple hypotheses testing with weak and strong control of the family-wise error rate (FWER) or the false discovery rate (FDR) are developed and studied. The improvement over existing procedures such as the Šidák procedure for FWER control and the Benjamini–Hochberg (BH) procedure for FDR control is achieved by exploiting possible differences in the powers of the individual tests. Results signal the need to take into account the powers of the individual tests and to have multiple hypotheses decision functions which are not limited to simply using the individual p-values, as is the case, for example, with the Šidák, Bonferroni, or BH procedures. They also enhance understanding of the role of the powers of individual tests, or more precisely the receiver operating characteristic (ROC) functions of decision processes, in the search for better multiple hypotheses testing procedures. A decision-theoretic framework is utilized, and through auxiliary randomizers the procedures could be used with discrete or mixed-type data or with rank-based nonparametric tests. This is in contrast to existing p-value based procedures whose theoretical validity is contingent on each of these p-value statistics being stochastically equal to or greater than a standard uniform variable under the null hypothesis. Proposed procedures are relevant in the analysis of high-dimensional “large M, small n” data sets arising in the natural, physical, medical, economic and social sciences, whose generation and creation is accelerated by advances in high-throughput technology, notably, but not limited to, microarray technology. PMID:25018568

  19. Fuzzy decision trees for planning and autonomous control of a coordinated team of UAVs

    NASA Astrophysics Data System (ADS)

    Smith, James F., III; Nguyen, ThanhVu H.

    2007-04-01

    A fuzzy logic resource manager that enables a collection of unmanned aerial vehicles (UAVs) to automatically cooperate to make meteorological measurements will be discussed. Once in flight no human intervention is required. Planning and real-time control algorithms determine the optimal trajectory and points each UAV will sample, while taking into account the UAVs' risk, risk tolerance, reliability, mission priority, fuel limitations, mission cost, and related uncertainties. The control algorithm permits newly obtained information about weather and other events to be introduced to allow the UAVs to be more effective. The approach is illustrated by a discussion of the fuzzy decision tree for UAV path assignment and related simulation. The different fuzzy membership functions on the tree are described in mathematical detail. The different methods by which this tree is obtained are summarized including a method based on using a genetic program as a data mining function. A second fuzzy decision tree that allows the UAVs to automatically collaborate without human intervention is discussed. This tree permits three different types of collaborative behavior between the UAVs. Simulations illustrating how the tree allows the different types of collaboration to be automated are provided. Simulations also show the ability of the control algorithm to allow UAVs to effectively cooperate to increase the UAV team's likelihood of success.

  20. Emergence of viral diseases: mathematical modeling as a tool for infection control, policy and decision making.

    PubMed

    Louz, Derrick; Bergmans, Hans E; Loos, Birgit P; Hoeben, Rob C

    2010-08-01

    Mathematical modeling can be used for the development and implementation of infection control policy to combat outbreaks and epidemics of communicable viral diseases. Here an outline is provided of basic concepts and approaches used in mathematical modeling and parameterization of disease transmission. The use of mathematical models is illustrated, using the 2001 UK foot-and-mouth disease (FMD) epidemic, the 2003 global severe acute respiratory syndrome (SARS) epidemic, and human influenza pandemics, as examples. This provides insights in the strengths, limitations, and weaknesses of the various models, and demonstrates their potential for supporting policy and decision making. PMID:20218764

  1. Emergence of viral diseases: mathematical modeling as a tool for infection control, policy and decision making.

    PubMed

    Louz, Derrick; Bergmans, Hans E; Loos, Birgit P; Hoeben, Rob C

    2010-08-01

    Mathematical modeling can be used for the development and implementation of infection control policy to combat outbreaks and epidemics of communicable viral diseases. Here an outline is provided of basic concepts and approaches used in mathematical modeling and parameterization of disease transmission. The use of mathematical models is illustrated, using the 2001 UK foot-and-mouth disease (FMD) epidemic, the 2003 global severe acute respiratory syndrome (SARS) epidemic, and human influenza pandemics, as examples. This provides insights in the strengths, limitations, and weaknesses of the various models, and demonstrates their potential for supporting policy and decision making.

  2. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  3. Health-related beliefs and decisions about accessing HIV medical care among HIV-infected persons who are not receiving care.

    PubMed

    Beer, Linda; Fagan, Jennifer L; Valverde, Eduardo; Bertolli, Jeanne

    2009-09-01

    In the United States, the publically supported national HIV medical care system is designed to provide HIV medical care to those who would otherwise not receive such care. Nevertheless, many HIV-infected persons are not receiving medical care. Limited information is available from HIV-infected persons not currently in care about the reasons they are not receiving care. From November 2006 to February 2007, we conducted five focus groups at community-based organizations and health departments in five U.S. cities to elicit qualitative information about barriers to entering HIV care. The 37 participants were mostly male (n = 29), over the age of 30 (n = 34), and all but one had not received HIV medical care in the previous 6 months. The focus group discussions revealed health belief-related barriers that have often been overlooked by studies of access to care. Three key themes emerged: avoidance and disbelief of HIV serostatus, conceptions of illness and appropriate health care, and negative experiences with, and distrust of, health care. Our findings point to the potentially important influence of these health-related beliefs on individual decisions about whether to access HIV medical care. We also discuss the implications of these beliefs for provider-patient communication, and suggest that providers frame their communications with patients such that they are attentive to the issues identified by our respondents, to better engage patients as partners in the treatment process.

  4. Wireless Access Control with Smart Antenna for M2M Communications

    NASA Astrophysics Data System (ADS)

    Sakamoto, Hiroshi; Bandai, Masaki; Watanabe, Takashi

    Machine to machine (M2M) is a promising technology to achieve an ubiquitous environment by uniting machines and machines over the Internet. The network used for M2M consists of core network and access network. This paper discusses effective controls of the wireless access network for M2M. Among typical examples of the wireless access network for M2M is a wireless sensor network (WSN). WSN for M2M may require energy efficiency, high reliability and throughput. For these requirements, in this paper, we propose a scheme to build a hierarchical sensor network using smart antenna. The proposed scheme uses omni-directional antennas together with smart antennas. Since smart antennas can extend communications distance, the proposed scheme enables reduction of number of hops to reduce the traffic load on relay nodes. As a result, the energy consumption, data collection ratio and throughput can be improved. We implement the proposed scheme on a real testbed. The testbed uses UNAGI as smart antenna nodes and Mica Mote as sensor nodes. In addition to the fundamental evaluation on the testbed, we simulate large-scale sensor networks. The results show the effectiveness of the proposed hierarchical sensor network with smart antennas.

  5. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    NASA Astrophysics Data System (ADS)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  6. Decision Making in Action

    NASA Technical Reports Server (NTRS)

    Orasanu, Judith; Statler, Irving C. (Technical Monitor)

    1994-01-01

    The importance of decision-making to safety in complex, dynamic environments like mission control centers and offshore installations has been well established. NASA-ARC has a program of research dedicated to fostering safe and effective decision-making in the manned spaceflight environment. Because access to spaceflight is limited, environments with similar characteristics, including aviation and nuclear power plants, serve as analogs from which space-relevant data can be gathered and theories developed. Analyses of aviation accidents cite crew judgement and decision making as causes or contributing factors in over half of all accidents. A similar observation has been made in nuclear power plants. Yet laboratory research on decision making has not proven especially helpful in improving the quality of decisions in these kinds of environments. One reason is that the traditional, analytic decision models are inappropriate to multidimensional, high-risk environments, and do not accurately describe what expert human decision makers do when they make decisions that have consequences. A new model of dynamic, naturalistic decision making is offered that may prove useful for improving decision making in complex, isolated, confined and high-risk environments. Based on analyses of crew performance in full-mission simulators and accident reports, features that define effective decision strategies in abnormal or emergency situations have been identified. These include accurate situation assessment (including time and risk assessment), appreciation of the complexity of the problem, sensitivity to constraints on the decision, timeliness of the response, and use of adequate information. More effective crews also manage their workload to provide themselves with time and resources to make good decisions. In brief, good decisions are appropriate to the demands of the situation. Effective crew decision making and overall performance are mediated by crew communication. Communication

  7. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    NASA Astrophysics Data System (ADS)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  8. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  9. Development of a First-of-a-Kind Deterministic Decision-Making Tool for Supervisory Control System

    SciTech Connect

    Cetiner, Sacit M; Kisner, Roger A; Muhlheim, Michael David; Fugate, David L

    2015-07-01

    Decision-making is the process of identifying and choosing alternatives where each alternative offers a different approach or path to move from a given state or condition to a desired state or condition. The generation of consistent decisions requires that a structured, coherent process be defined, immediately leading to a decision-making framework. The overall objective of the generalized framework is for it to be adopted into an autonomous decision-making framework and tailored to specific requirements for various applications. In this context, automation is the use of computing resources to make decisions and implement a structured decision-making process with limited or no human intervention. The overriding goal of automation is to replace or supplement human decision makers with reconfigurable decision- making modules that can perform a given set of tasks reliably. Risk-informed decision making requires a probabilistic assessment of the likelihood of success given the status of the plant/systems and component health, and a deterministic assessment between plant operating parameters and reactor protection parameters to prevent unnecessary trips and challenges to plant safety systems. The implementation of the probabilistic portion of the decision-making engine of the proposed supervisory control system was detailed in previous milestone reports. Once the control options are identified and ranked based on the likelihood of success, the supervisory control system transmits the options to the deterministic portion of the platform. The deterministic multi-attribute decision-making framework uses variable sensor data (e.g., outlet temperature) and calculates where it is within the challenge state, its trajectory, and margin within the controllable domain using utility functions to evaluate current and projected plant state space for different control decisions. Metrics to be evaluated include stability, cost, time to complete (action), power level, etc. The

  10. Decision support system for optimal reservoir operation modeling within sediment deposition control.

    PubMed

    Hadihardaja, Iwan K

    2009-01-01

    Suspended sediment deals with surface runoff moving toward watershed affects reservoir sustainability due to the reduction of storage capacity. The purpose of this study is to introduce a reservoir operation model aimed at minimizing sediment deposition and maximizing energy production expected to obtain optimal decision policy for both objectives. The reservoir sediment-control operation model is formulated by using Non-Linear Programming with an iterative procedure based on a multi-objective measurement in order to achieve optimal decision policy that is established in association with the development of a relationship between stream inflow and sediment rate by utilizing the Artificial Neural Network. Trade off evaluation is introduced to generate a strategy for controlling sediment deposition at same level of target ratio while producing hydroelectric energy. The case study is carried out at the Sanmenxia Reservoir in China where redesign and reconstruction have been accomplished. However, this model deals only with the original design and focuses on a wet year operation. This study will also observe a five-year operation period to show the accumulation of sediment due to the impact of reservoir storage capacity.

  11. Management of redundancy in flight control systems using optimal decision theory

    NASA Technical Reports Server (NTRS)

    1981-01-01

    The problem of using redundancy that exists between dissimilar systems in aircraft flight control is addressed. That is, using the redundancy that exists between a rate gyro and an accelerometer--devices that have dissimilar outputs which are related only through the dynamics of the aircraft motion. Management of this type of redundancy requires advanced logic so that the system can monitor failure status and can reconfigure itself in the event of one or more failures. An optimal decision theory was tutorially developed for the management of sensor redundancy and the theory is applied to two aircraft examples. The first example is the space shuttle and the second is a highly maneuvering high performance aircraft--the F8-C. The examples illustrate the redundancy management design process and the performance of the algorithms presented in failure detection and control law reconfiguration.

  12. An interactive driving simulation for driver control and decision-making research

    NASA Technical Reports Server (NTRS)

    Allen, R. W.; Hogge, J. R.; Schwartz, S. H.

    1975-01-01

    Display techniques and equations of motion for a relatively simple fixed base car simulation are described. The vehicle dynamics include simplified lateral (steering) and longitudinal (speed) degrees of freedom. Several simulator tasks are described which require a combination of operator control and decision making, including response to wind gust inputs, curved roads, traffic signal lights, and obstacles. Logic circuits are used to detect speeding, running red lights, and crashes. A variety of visual and auditory cues are used to give the driver appropriate performance feedback. The simulated equations of motion are reviewed and the technique for generating the line drawing CRT roadway display is discussed. On-line measurement capabilities and experimenter control features are presented, along with previous and current research results demonstrating simulation capabilities and applications.

  13. Privacy-aware access control for video data in intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Vagts, Hauke; Jakoby, Andreas

    2012-06-01

    Surveillance systems became powerful. Objects can be identified and intelligent surveillance services can generate events when a specific situation occurs. Such surveillance services can be organized in a Service Oriented Architecture (SOA) to fulfill surveillance tasks for specific purposes. Therefore the services process information on a high level, e.g., just the position of an object. Video data is still required to visualize a situation to an operator and is required as evidence in court. Processing of personal related and sensitive information threatens privacy. To protect the user and to be compliant with legal requirements it must be ensured that sensitive information can only be processed for a defined propose by specific users or services. This work proposes an architecture for Access Control that enforces the separation of data between different surveillance tasks. Access controls are enforced at different levels: for the users starting the tasks, for the services within the tasks processing data stored in central store or calculated by other services and for sensor related services that extract information out of the raw data and provide them.

  14. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  15. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  16. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  17. Improved efficiency access control equipment and explosive, weapons and drug abuse detection

    SciTech Connect

    Jenkins, A.; Milford, A.; Woollven, J.

    1985-01-01

    The second generation portal explosives detector has been designed with increased detection capability and convenience in service. The method of detection and performance relative to the first generation is described. A novel method of auto-calibration and self diagnosis is described and results are discussed. Improvements in convenience of operation have been achieved and operating space and costs reduced by combining metal detection capability, together with explosives detection. This allows both alarm signal and diagnostic outputs to be combined on a single remote panel in the guard room, and reduces the number of guards needed to man the access control. This type of access control is entirely a defensive measure against attack but a further additional feature is proposed which will also check the state of mind of all personnel passing through the check point. Any person suffering from the effect of narcotic or alcohol will be detected by their inability to reproduce their normal signature. A new method of signature analysis in five dimensions is described together with proposals for integrating the check without increasing the time in the test area. Some recent results on the effects of alcohol on signature reproduction is given.

  18. Gate controllable resistive random access memory devices using reduced graphene oxide

    NASA Astrophysics Data System (ADS)

    Hazra, Preetam; Resmi, A. N.; Jinesh, K. B.

    2016-04-01

    The biggest challenge in the resistive random access memory (ReRAM) technology is that the basic operational parameters, such as the set and reset voltages, the current on-off ratios (hence the power), and their operational speeds, strongly depend on the active and electrode materials and their processing methods. Therefore, for its actual technological implementations, the unification of the operational parameters of the ReRAM devices appears to be a difficult task. In this letter, we show that by fabricating a resistive memory device in a thin film transistor configuration and thus applying an external gate bias, we can control the switching voltage very accurately. Taking partially reduced graphene oxide, the gate controllable switching is demonstrated, and the possible mechanisms are discussed.

  19. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  20. Preliminary assessment of Tongue Drive System in medium term usage for computer access and wheelchair control.

    PubMed

    Yousefi, Behnaz; Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless, wearable assistive technology that enables individuals with severe motor impairments access computers, drive wheelchairs, and control their environments using tongue motion. In this paper, we have evaluated the TDS performance as a computer input device using ISO9241-9 standard tasks for pointing and selecting, based on the well known Fitts' Law, and as a powered wheelchair controller through an obstacle course navigation task. Nine able-bodied subjects who already had tongue piercing participated in this trial over 5 sessions during 5 weeks, allowing us to study the TDS learning process and its current limiting factors. Subjects worn tongue rings made of titanium in the form of a barbell with a small rare earth magnetic tracer hermetically sealed inside the upper ball. Comparing the results between 1(st) and 5(th) sessions showed that subjects' performance improved in all the measures through 5 sessions, demonstrating the effects of learning. PMID:22255650

  1. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  2. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  3. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  4. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  5. Regulating outdoor advertisement boards; employing spatial decision support system to control urban visual pollution

    NASA Astrophysics Data System (ADS)

    Wakil, K.; Hussnain, MQ; Tahir, A.; Naeem, M. A.

    2016-06-01

    Unmanaged placement, size, location, structure and contents of outdoor advertisement boards have resulted in severe urban visual pollution and deterioration of the socio-physical living environment in urban centres of Pakistan. As per the regulatory instruments, the approval decision for a new advertisement installation is supposed to be based on the locational density of existing boards and their proximity or remoteness to certain land- uses. In cities, where regulatory tools for the control of advertisement boards exist, responsible authorities are handicapped in effective implementation due to the absence of geospatial analysis capacity. This study presents the development of a spatial decision support system (SDSS) for regularization of advertisement boards in terms of their location and placement. The knowledge module of the proposed SDSS is based on provisions and restrictions prescribed in regulatory documents. While the user interface allows visualization and scenario evaluation to understand if the new board will affect existing linear density on a particular road and if it violates any buffer restrictions around a particular land use. Technically the structure of the proposed SDSS is a web-based solution which includes open geospatial tools such as OpenGeo Suite, GeoExt, PostgreSQL, and PHP. It uses three key data sets including road network, locations of existing billboards and building parcels with land use information to perform the analysis. Locational suitability has been calculated using pairwise comparison through analytical hierarchy process (AHP) and weighted linear combination (WLC). Our results indicate that open geospatial tools can be helpful in developing an SDSS which can assist solving space related iterative decision challenges on outdoor advertisements. Employing such a system will result in effective implementation of regulations resulting in visual harmony and aesthetic improvement in urban communities.

  6. Statistical learning and adaptive decision-making underlie human response time variability in inhibitory control

    PubMed Central

    Ma, Ning; Yu, Angela J.

    2015-01-01

    Response time (RT) is an oft-reported behavioral measure in psychological and neurocognitive experiments, but the high level of observed trial-to-trial variability in this measure has often limited its usefulness. Here, we combine computational modeling and psychophysics to examine the hypothesis that fluctuations in this noisy measure reflect dynamic computations in human statistical learning and corresponding cognitive adjustments. We present data from the stop-signal task (SST), in which subjects respond to a go stimulus on each trial, unless instructed not to by a subsequent, infrequently presented stop signal. We model across-trial learning of stop signal frequency, P(stop), and stop-signal onset time, SSD (stop-signal delay), with a Bayesian hidden Markov model, and within-trial decision-making with an optimal stochastic control model. The combined model predicts that RT should increase with both expected P(stop) and SSD. The human behavioral data (n = 20) bear out this prediction, showing P(stop) and SSD both to be significant, independent predictors of RT, with P(stop) being a more prominent predictor in 75% of the subjects, and SSD being more prominent in the remaining 25%. The results demonstrate that humans indeed readily internalize environmental statistics and adjust their cognitive/behavioral strategy accordingly, and that subtle patterns in RT variability can serve as a valuable tool for validating models of statistical learning and decision-making. More broadly, the modeling tools presented in this work can be generalized to a large body of behavioral paradigms, in order to extract insights about cognitive and neural processing from apparently quite noisy behavioral measures. We also discuss how this behaviorally validated model can then be used to conduct model-based analysis of neural data, in order to help identify specific brain areas for representing and encoding key computational quantities in learning and decision-making. PMID:26321966

  7. Quality measurement and control in physician decision making: state of the art.

    PubMed Central

    Anderson, O W; Shields, M C

    1982-01-01

    The status of the concept of controlling the quality of physicians is reviewed as are studies that have been done on methods to measure and improve quality. The conclusions are dismal given the rhetoric and actions on attempts to measure and control quality of physician decision making. Massive attempts are being made, for example, mandating PSROs to monitor quality before there is a methodology. Cost and quality reviews have, at most, a marginal impact and do not deserve the expenditures to conduct them. Studies on utilization review show minimal impact on reducing utilization. Administrative reviews reduce utilization for certain specific, narrowly defined procedures such as injections. There is no operational definition of "unnecessary" utilization. The tendency is to regard the lowest levels as optimal, presumably because they result in lower expenditures. Bureaucratic reviews do not provide incentives to decision makers the way various types of HMO delivery types do from current evidence. Hence, HMOs, deductibles and coinsurance, and competition have greater promise for limiting expenditures than do utilization reviews. Quality audits are also marginally effective because of limited promise of changing provider behavior given current methods of doing so. They miss the organizational aspects in which incentives are generated. Research is needed, therefore, on alternative forms of quality and cost control such as HMOs, physician risk sharing, competitive models, and deductibles and coinsurance. Until the much needed research has been done, the amount of resources spent on review should be minimized. In the meantime, the review processes should concentrate on extreme variations of very narrowly defined criteria of proven validity while improving the review methodology by systematic research on quality monitoring. PMID:7047464

  8. A highly efficient SDRAM controller supporting variable-length burst access and batch process for discrete reads

    NASA Astrophysics Data System (ADS)

    Li, Nan; Wang, Junzheng

    2016-03-01

    A highly efficient Synchronous Dynamic Random Access Memory (SDRAM) controller supporting variable-length burst access and batch process for discrete reads is proposed in this paper. Based on the Principle of Locality, command First In First Out (FIFO) and address range detector are designed within this controller to accelerate its responses to discrete read requests, which dramatically improves the average Effective Bus Utilization Ratio (EBUR) of SDRAM. Our controller is finally verified by driving the Micron 256-Mb SDRAM MT48LC16M16A2. Successful simulation and verification results show that our controller exhibits much higher EBUR than do most existing designs in case of discrete reads.

  9. Controlled access of p53 to the nucleus regulates its proteasomal degradation by MDM2.

    PubMed

    Davis, James R; Mossalam, Mohanad; Lim, Carol S

    2013-04-01

    The tumor suppressor p53 can be sent to the proteasome for degradation by placing its nucleo-cytoplasmic shuttling under ligand control. Endogenous p53 is ubiquitinated by MDM2 in the nucleus, and controlling the access of p53 to the nuclear compartment regulates its ubiquitination and proteasomal degradation. This was accomplished by the use of a protein switch that places nuclear translocation under the control of externally applied dexamethasone. Fluorescence microscopy revealed that sending protein switch p53 (PS-p53) to the nucleus produces a distinct punctate distribution in both the cytoplasm and nucleus. The nuclear role in accessing the proteasome was investigated by inhibiting classical nuclear export with leptomycin B. Trapping PS-p53 in the nucleus only allows this punctate staining in that compartment, suggesting that PS-p53 must translocate first to the nuclear compartment for cytoplasmic punctate staining to occur. The role of MDM2 binding was explored by inhibiting MDM2/p53 binding with nutlin-3. Inhibition of this interaction blocked both nuclear export and cytoplasmic and nuclear punctate staining, providing evidence that any change in localization after nuclear translocation is due to MDM2 binding. Further, blocking the proteolytic activity of the proteasome maintained the nuclear localization of the construct. Truncations of p53 were made to determine smaller constructs still capable of interacting with MDM2, and their subcellular localization and degradation potential was observed. PS-p53 and a smaller construct containing the two MDM2 binding regions of p53 (Box I + V) were indeed degraded by the proteasome as measured by loss of enhanced green fluorescent protein that was also fused to the construct. The influence of these constructs on p53 gene transactivation function was assessed and revealed that PS-p53 decreased gene transactivation, while PS-p53(Box I + V) did not significantly change baseline gene transactivation.

  10. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  11. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  12. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  13. Metabolism and the Control of Cell Fate Decisions and Stem Cell Renewal

    PubMed Central

    Ito, Kyoko; Ito, Keisuke

    2016-01-01

    Although the stem cells of various tissues remain in the quiescent state to maintain their undifferentiated state, they also undergo cell divisions as required, and if necessary, even a single stem cell is able to provide for lifelong tissue homeostasis. Stem cell populations are precisely controlled by the balance between their symmetric and asymmetric divisions, with their division patterns determined by whether the daughter cells involved retain their self-renewal capacities. Recent studies have reported that metabolic pathways and the distribution of mitochondria are regulators of the division balance of stem cells and that metabolic defects can shift division balance toward symmetric commitment, which leads to stem cell exhaustion. It has also been observed that in asymmetric division, old mitochondria, which are central metabolic organelles, are segregated to the daughter cell fated to cell differentiation, whereas in symmetric division, young and old mitochondria are equally distributed between both daughter cells. Thus, metabolism and mitochondrial biology play important roles in stem cell fate decisions. As these decisions directly affect tissue homeostasis, understanding their regulatory mechanisms in the context of cellular metabolism is critical. PMID:27482603

  14. Oxytocin Effect on Collective Decision Making: A Randomized Placebo Controlled Study.

    PubMed

    Hertz, Uri; Kelly, Maria; Rutledge, Robb B; Winston, Joel; Wright, Nicholas; Dolan, Raymond J; Bahrami, Bahador

    2016-01-01

    Collective decision making often benefits both the individuals and the group in a variety of contexts. However, for the group to be successful, individuals should be able to strike a balance between their level of competence and their influence on the collective decisions. The hormone oxytocin has been shown to promote trust, conformism and attention to social cues. We wondered if this hormone may increase participants' (unwarranted) reliance on their partners' opinion, resulting in a reduction in collective benefit by disturbing the balance between influence and competence. To test this hypothesis we employed a randomized double-blind placebo-controlled design in which male dyads self-administered intranasal oxytocin or placebo and then performed a visual search task together. Compared to placebo, collective benefit did not decrease under oxytocin. Using an exploratory time dependent analysis, we observed increase in collective benefit over time under oxytocin. Moreover, trial-by-trial analysis showed that under oxytocin the more competent member of each dyad was less likely to change his mind during disagreements, while the less competent member showed a greater willingness to change his mind and conform to the opinion of his more reliable partner. This role-dependent effect may be mediated by enhanced monitoring of own and other's performance level under oxytocin. Such enhanced social learning could improve the balance between influence and competence and lead to efficient and beneficial collaboration.

  15. Oxytocin Effect on Collective Decision Making: A Randomized Placebo Controlled Study.

    PubMed

    Hertz, Uri; Kelly, Maria; Rutledge, Robb B; Winston, Joel; Wright, Nicholas; Dolan, Raymond J; Bahrami, Bahador

    2016-01-01

    Collective decision making often benefits both the individuals and the group in a variety of contexts. However, for the group to be successful, individuals should be able to strike a balance between their level of competence and their influence on the collective decisions. The hormone oxytocin has been shown to promote trust, conformism and attention to social cues. We wondered if this hormone may increase participants' (unwarranted) reliance on their partners' opinion, resulting in a reduction in collective benefit by disturbing the balance between influence and competence. To test this hypothesis we employed a randomized double-blind placebo-controlled design in which male dyads self-administered intranasal oxytocin or placebo and then performed a visual search task together. Compared to placebo, collective benefit did not decrease under oxytocin. Using an exploratory time dependent analysis, we observed increase in collective benefit over time under oxytocin. Moreover, trial-by-trial analysis showed that under oxytocin the more competent member of each dyad was less likely to change his mind during disagreements, while the less competent member showed a greater willingness to change his mind and conform to the opinion of his more reliable partner. This role-dependent effect may be mediated by enhanced monitoring of own and other's performance level under oxytocin. Such enhanced social learning could improve the balance between influence and competence and lead to efficient and beneficial collaboration. PMID:27070542

  16. Oxytocin Effect on Collective Decision Making: A Randomized Placebo Controlled Study

    PubMed Central

    Kelly, Maria; Rutledge, Robb B.; Winston, Joel; Wright, Nicholas; Dolan, Raymond J.; Bahrami, Bahador

    2016-01-01

    Collective decision making often benefits both the individuals and the group in a variety of contexts. However, for the group to be successful, individuals should be able to strike a balance between their level of competence and their influence on the collective decisions. The hormone oxytocin has been shown to promote trust, conformism and attention to social cues. We wondered if this hormone may increase participants’ (unwarranted) reliance on their partners’ opinion, resulting in a reduction in collective benefit by disturbing the balance between influence and competence. To test this hypothesis we employed a randomized double-blind placebo-controlled design in which male dyads self-administered intranasal oxytocin or placebo and then performed a visual search task together. Compared to placebo, collective benefit did not decrease under oxytocin. Using an exploratory time dependent analysis, we observed increase in collective benefit over time under oxytocin. Moreover, trial-by-trial analysis showed that under oxytocin the more competent member of each dyad was less likely to change his mind during disagreements, while the less competent member showed a greater willingness to change his mind and conform to the opinion of his more reliable partner. This role-dependent effect may be mediated by enhanced monitoring of own and other’s performance level under oxytocin. Such enhanced social learning could improve the balance between influence and competence and lead to efficient and beneficial collaboration. PMID:27070542

  17. Privacy aware access controls for medical data disclosure on European healthgrids.

    PubMed

    Rahmouni, Hanene Boussi; Solomonides, Tony; Mont, Marco Casassa; Shiu, Simon

    2010-01-01

    To be processed within a healthgrid environment, medical data goes through a complete lifecycle and several stages until it is finally used for the primary reason it has been collected for. This stage is not always the final occurrence of when the data would have been manipulated. The data could rather continue to be needed for secondary purposes of legitimate or non legitimate nature. Although other privacy issues are related to the processing of patient data while it is residing on a healthgrid environment, the control of data disclosure is our primary interest. When sharing medical data between different Healthcare and biomedical research organizations in Europe, it is important that the different parties involved in the sharing handle the data in the same way indicated by the legislation of the member state where the data was originally collected as the requirements might differ from one state to another. Privacy requirements, such as patient consent, may be subject to conflicting conditions between different national frameworks as well as between different legal and ethical frameworks within a single member state. These circumstances have made the compliance management process in European healthgrid very challenging. In this paper we are presenting an approach to tackle these issues by relying on several technologies contained in the semantic web stack. Our work suggests a direct mapping from high level legislation on privacy and data protection to operational level privacy aware controls. Additionally we suggest an architecture for the enforcement of these controls on access control models adopted by healthgrids security infrastructures.

  18. e-VLBI Access Point (eAXP) - a centralized control and EGAE configuration / management application

    NASA Astrophysics Data System (ADS)

    Ruszczyk, Chester Whitney, Alan

    Setting up experiments to utilize Experiment Guided Adaptive Endpoint (EGAE) and e-VLBI is presently a complex and time intensive process requiring scientific, Mark5 and networking knowledge. There is no central access to point to configure and manage all of these aspects of an experiment. The e-VLBI Access Point (eAXP) is a centralized control plane management tool that offers a GUI interface to augment the command line interface presently being used to set up and conduct experiments. eAXP contains three major toolsets: one to set up and execute an experiment using real-time or non-real time modes; the second to configure and manage EGAE; and a third to view statistics of the experiments. Initially the overall system architecture for eAXP is presented, followed by details of the Experiment Profiler toolset including screen shots of the system presently being tested. This will be followed by how eAXP will support real-time modes interfacing to the Dynamic Resource Allocation over GMPLS Optical Network (DRAGON) resource management project.

  19. Quantitative trait loci controlling light and hormone response in two accessions of Arabidopsis thaliana.

    PubMed Central

    Borevitz, Justin O; Maloof, Julin N; Lutes, Jason; Dabi, Tsegaye; Redfern, Joanna L; Trainer, Gabriel T; Werner, Jonathan D; Asami, Tadao; Berry, Charles C; Weigel, Detlef; Chory, Joanne

    2002-01-01

    We have mapped quantitative trait loci (QTL) responsible for natural variation in light and hormone response between the Cape Verde Islands (Cvi) and Landsberg erecta (Ler) accessions of Arabidopsis thaliana using recombinant inbred lines (RILs). Hypocotyl length was measured in four light environments: white, blue, red, and far-red light and in the dark. In addition, white light plus gibberellin (GA) and dark plus the brassinosteroid biosynthesis inhibitor brassinazole (BRZ) were used to detect hormone effects. Twelve QTL were identified that map to loci not previously known to affect light response, as well as loci where candidate genes have been identified from known mutations. Some QTL act in all environments while others show genotype-by-environment interaction. A global threshold was established to identify a significant epistatic interaction between two loci that have few main effects of their own. LIGHT1, a major QTL, has been confirmed in a near isogenic line (NIL) and maps to a new locus with effects in all light environments. The erecta mutation can explain the effect of the HYP2 QTL in the blue, BRZ, and dark environments, but not in far-red. LIGHT2, also confirmed in an NIL, has effects in white and red light and shows interaction with GA. The phenotype and map position of LIGHT2 suggest the photoreceptor PHYB as a candidate gene. Natural variation in light and hormone response thus defines both new genes and known genes that control light response in wild accessions. PMID:11861571

  20. Point and counterpoint: patient control of access to data in their electronic health records.

    PubMed

    Caine, Kelly; Tierney, William M

    2015-01-01

    Information collection, storage, and management is central to the practice of health care. For centuries, patients' and providers' expectations kept medical records confidential between providers and patients. With the advent of electronic health records, patient health information has become more widely available to providers and health care managers and has broadened its potential use beyond individual patient care. Adhering to the principles of Fair Information Practice, including giving patients control over the availability and use of their individual health records, would improve care by fostering the sharing of sensitive information between patients and providers. However, adherence to such principles could put patients at risk for unsafe care as a result of both missed opportunities for providing needed care as well as provision of contraindicated care, as it would prevent health care providers from having full access to health information. Patients' expectations for the highest possible quality and safety of care, therefore, may be at odds with their desire to limit provider access to their health records. Conversely, provider expectations that patients would willingly seek care for embarrassing conditions and disclose sensitive information may be at odds with patients' information privacy rights. An open dialogue between patients and providers will be necessary to balance respect for patient rights with provider need for patient information.

  1. Point and counterpoint: patient control of access to data in their electronic health records.

    PubMed

    Caine, Kelly; Tierney, William M

    2015-01-01

    Information collection, storage, and management is central to the practice of health care. For centuries, patients' and providers' expectations kept medical records confidential between providers and patients. With the advent of electronic health records, patient health information has become more widely available to providers and health care managers and has broadened its potential use beyond individual patient care. Adhering to the principles of Fair Information Practice, including giving patients control over the availability and use of their individual health records, would improve care by fostering the sharing of sensitive information between patients and providers. However, adherence to such principles could put patients at risk for unsafe care as a result of both missed opportunities for providing needed care as well as provision of contraindicated care, as it would prevent health care providers from having full access to health information. Patients' expectations for the highest possible quality and safety of care, therefore, may be at odds with their desire to limit provider access to their health records. Conversely, provider expectations that patients would willingly seek care for embarrassing conditions and disclose sensitive information may be at odds with patients' information privacy rights. An open dialogue between patients and providers will be necessary to balance respect for patient rights with provider need for patient information. PMID:25480723

  2. Iterative algorithm analysis for phase-only diffractive control access system

    NASA Astrophysics Data System (ADS)

    Mihailescu, Mona; Preda, Alexandru; Cojoc, Dan; Scarlat, Eugen; Preda, Liliana

    2007-08-01

    A new architecture with two phases-only diffractive elements and one decryption mask for optical control access system is presented. Only three different persons which keep this element have the permission to access together. The Iterative Fourier Transform Algorithm (IFTA) is analyzed for phase-only diffractive optical elements (PODE) design with different constraints in the input and output plane and the optimal variant is chosen for better image quality in the output plane (big value for diffraction efficiency and small value for merit function and signal to noise ratio). For higher security we propose different incident waves. That are compared with the case when the first phase-only diffractive element and decryption masks are designed together in an extended iteration and the output images of them (first desired image) is taken over the second phase-only diffractive element. In order to increase security level, this finally PODE are designed to increase some parts from the first desired image. Only with this condition the key image on the detector is formed.

  3. Improved Hypoxia Modeling for Nutrient Control Decisions in the Gulf of Mexico

    NASA Technical Reports Server (NTRS)

    Habib, Shahid; Pickering, Ken; Tzortziou, Maria; Maninio, Antonio; Policelli, Fritz; Stehr, Jeff

    2011-01-01

    The Gulf of Mexico Modeling Framework is a suite of coupled models linking the deposition and transport of sediment and nutrients to subsequent bio-geo chemical processes and the resulting effect on concentrations of dissolved oxygen in the coastal waters of Louisiana and Texas. Here, we examine the potential benefits of using multiple NASA remote sensing data products within this Modeling Framework for increasing the accuracy of the models and their utility for nutrient control decisions in the Gulf of Mexico. Our approach is divided into three components: evaluation and improvement of (a) the precipitation input data (b) atmospheric constituent concentrations in EPA's air quality/deposition model and (c) the calculation of algal biomass, organic carbon and suspended solids within the water quality/eutrophication models of the framework.

  4. Decision support system for control and automation of dynamical processes. Master's thesis

    SciTech Connect

    Nann, S.

    1990-03-01

    The thesis presents the concept and development of a diagnostic decision support system for real-time control and automation of dynamic processes. This system, known as DECA (Diagnostic Evaluation and Corrective Action), will take advantage of the computer's ability to manipulate vast amounts of data, and employ qualitative reasoning for the monitoring and diagnosis of dynamical processes during time-constrained, routine, and emergency situations where an immediate response is necessary to avoid catastrophic failure of the system. The software system's architecture has been structured in such a manner that is can be applied to any dynamic process without reprogramming. DECA is written in Lisp and was verified using the data from the Three Mile Island Nuclear Reactor Accident.

  5. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  6. Racism, Gun Ownership and Gun Control: Biased Attitudes in US Whites May Influence Policy Decisions

    PubMed Central

    O’Brien, Kerry; Forrest, Walter; Lynott, Dermot; Daly, Michael

    2013-01-01

    Objective Racism is related to policies preferences and behaviors that adversely affect blacks and appear related to a fear of blacks (e.g., increased policing, death penalty). This study examined whether racism is also related to gun ownership and opposition to gun controls in US whites. Method The most recent data from the American National Election Study, a large representative US sample, was used to test relationships between racism, gun ownership, and opposition to gun control in US whites. Explanatory variables known to be related to gun ownership and gun control opposition (i.e., age, gender, education, income, conservatism, anti-government sentiment, southern vs. other states, political identification) were entered in logistic regression models, along with measures of racism, and the stereotype of blacks as violent. Outcome variables included; having a gun in the home, opposition to bans on handguns in the home, support for permits to carry concealed handguns. Results After accounting for all explanatory variables, logistic regressions found that for each 1 point increase in symbolic racism there was a 50% increase in the odds of having a gun at home. After also accounting for having a gun in the home, there was still a 28% increase in support for permits to carry concealed handguns, for each one point increase in symbolic racism. The relationship between symbolic racism and opposition to banning handguns in the home (OR1.27 CI 1.03,1.58) was reduced to non-significant after accounting for having a gun in the home (OR1.17 CI.94,1.46), which likely represents self-interest in retaining property (guns). Conclusions Symbolic racism was related to having a gun in the home and opposition to gun control policies in US whites. The findings help explain US whites’ paradoxical attitudes towards gun ownership and gun control. Such attitudes may adversely influence US gun control policy debates and decisions. PMID:24204867

  7. 77 FR 41973 - Record of Decision for the Entry Control Reconfiguration and Base Perimeter Fence Relocation in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-17

    ... Department of the Air Force Record of Decision for the Entry Control Reconfiguration and Base Perimeter Fence Relocation in area A Wright-Patterson AF Base, Ohio, Final Environmental Impact Statement ACTION: Notice of... the ROD for the Entry Control Reconfiguration and Base Perimeter Fence Relocation in Area A...

  8. Including Life Cycle Assessment for decision-making in controlling wastewater nutrient removal systems.

    PubMed

    Corominas, Lluís; Larsen, Henrik F; Flores-Alsina, Xavier; Vanrolleghem, Peter A

    2013-10-15

    This paper focuses on the use of Life Cycle Assessment (LCA) to evaluate the performance of seventeen control strategies in wastewater treatment plants (WWTPs). It tackles the importance of using site-specific factors for nutrient enrichment when decision-makers have to select best operating strategies. Therefore, the LCA evaluation is repeated for three different scenarios depending on the limitation of nitrogen (N), phosphorus (P), or both, when evaluating the nutrient enrichment impact in water bodies. The LCA results indicate that for treated effluent discharged into N-deficient aquatic systems (e.g. open coastal areas) the most eco-friendly strategies differ from the ones dealing with discharging into P-deficient (e.g. lakes and rivers) and N&P-deficient systems (e.g. coastal zones). More particularly, the results suggest that strategies that promote increased nutrient removal and/or energy savings present an environmental benefit for N&P and P-deficient systems. This is not the case when addressing N-deficient systems for which the use of chemicals (even for improving N removal efficiencies) is not always beneficial for the environment. A sensitivity analysis on using weighting of the impact categories is conducted to assess how value choices (policy decisions) may affect the management of WWTPs. For the scenarios with only N-limitation, the LCA-based ranking of the control strategies is sensitive to the choice of weighting factors, whereas this is not the case for N&P or P-deficient aquatic systems.

  9. Including Life Cycle Assessment for decision-making in controlling wastewater nutrient removal systems.

    PubMed

    Corominas, Lluís; Larsen, Henrik F; Flores-Alsina, Xavier; Vanrolleghem, Peter A

    2013-10-15

    This paper focuses on the use of Life Cycle Assessment (LCA) to evaluate the performance of seventeen control strategies in wastewater treatment plants (WWTPs). It tackles the importance of using site-specific factors for nutrient enrichment when decision-makers have to select best operating strategies. Therefore, the LCA evaluation is repeated for three different scenarios depending on the limitation of nitrogen (N), phosphorus (P), or both, when evaluating the nutrient enrichment impact in water bodies. The LCA results indicate that for treated effluent discharged into N-deficient aquatic systems (e.g. open coastal areas) the most eco-friendly strategies differ from the ones dealing with discharging into P-deficient (e.g. lakes and rivers) and N&P-deficient systems (e.g. coastal zones). More particularly, the results suggest that strategies that promote increased nutrient removal and/or energy savings present an environmental benefit for N&P and P-deficient systems. This is not the case when addressing N-deficient systems for which the use of chemicals (even for improving N removal efficiencies) is not always beneficial for the environment. A sensitivity analysis on using weighting of the impact categories is conducted to assess how value choices (policy decisions) may affect the management of WWTPs. For the scenarios with only N-limitation, the LCA-based ranking of the control strategies is sensitive to the choice of weighting factors, whereas this is not the case for N&P or P-deficient aquatic systems. PMID:23856224

  10. A new computational account of cognitive control over reinforcement-based decision-making: Modeling of a probabilistic learning task.

    PubMed

    Zendehrouh, Sareh

    2015-11-01

    Recent work on decision-making field offers an account of dual-system theory for decision-making process. This theory holds that this process is conducted by two main controllers: a goal-directed system and a habitual system. In the reinforcement learning (RL) domain, the habitual behaviors are connected with model-free methods, in which appropriate actions are learned through trial-and-error experiences. However, goal-directed behaviors are associated with model-based methods of RL, in which actions are selected using a model of the environment. Studies on cognitive control also suggest that during processes like decision-making, some cortical and subcortical structures work in concert to monitor the consequences of decisions and to adjust control according to current task demands. Here a computational model is presented based on dual system theory and cognitive control perspective of decision-making. The proposed model is used to simulate human performance on a variant of probabilistic learning task. The basic proposal is that the brain implements a dual controller, while an accompanying monitoring system detects some kinds of conflict including a hypothetical cost-conflict one. The simulation results address existing theories about two event-related potentials, namely error related negativity (ERN) and feedback related negativity (FRN), and explore the best account of them. Based on the results, some testable predictions are also presented. PMID:26339919

  11. A new computational account of cognitive control over reinforcement-based decision-making: Modeling of a probabilistic learning task.

    PubMed

    Zendehrouh, Sareh

    2015-11-01

    Recent work on decision-making field offers an account of dual-system theory for decision-making process. This theory holds that this process is conducted by two main controllers: a goal-directed system and a habitual system. In the reinforcement learning (RL) domain, the habitual behaviors are connected with model-free methods, in which appropriate actions are learned through trial-and-error experiences. However, goal-directed behaviors are associated with model-based methods of RL, in which actions are selected using a model of the environment. Studies on cognitive control also suggest that during processes like decision-making, some cortical and subcortical structures work in concert to monitor the consequences of decisions and to adjust control according to current task demands. Here a computational model is presented based on dual system theory and cognitive control perspective of decision-making. The proposed model is used to simulate human performance on a variant of probabilistic learning task. The basic proposal is that the brain implements a dual controller, while an accompanying monitoring system detects some kinds of conflict including a hypothetical cost-conflict one. The simulation results address existing theories about two event-related potentials, namely error related negativity (ERN) and feedback related negativity (FRN), and explore the best account of them. Based on the results, some testable predictions are also presented.

  12. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials.

  13. New scheme of variable optical buffer for IP packets used in access control of HORNET

    NASA Astrophysics Data System (ADS)

    Fang, Nian; Wang, Lutang; Huang, Zhaoming

    2002-09-01

    A new scheme of variable optical buffer for IP packets is reported. It may be used in access control of HORNET (Hybrid Optoelectronic Ring NETwork), to avoid collision of added packet and the packet already on the ring and improve the loss ratio of the packets. In this scheme, a new multi-wavelength fiber loop memory technique is employed. This architecture uses the wavelength converter (WC) to specify the packets delay and wavelength conversion is accomplished by the technique of four-wave-mixing (FWM) with a semiconductor optical amplifier (SOA). The range of delay is 10 to 9990 bytes periods. First, architecture, operation principle, characteristics and applications of this scheme of variable optical buffer are introduced. Next, a new unslotted CSMA/CA MAC scheme based on the variable optical buffer is briefly introduced too. Finally, the simulation results are presented.

  14. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    PubMed Central

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  15. [Assessment of exposure to cancerogenic aromatic hydrocarbon during controlled-access highways management activities].

    PubMed

    Martinotti, I; Cirla, A M; Cottica, D; Cirla, P E

    2011-01-01

    The purpose of this study was an integrated assessment of exposure to benzene and Polycyclic Aromatic Hydrocarbons (PAH) in 29 workers employed to manage a controlled-access highways. A campaign was performed in summertime by environmental monitoring (active and passive airborne personal sampler), as well as by biological monitoring (urine samples of the beginning and of the end of daily shift, baseline after two days of vacation). The measured environmental levels did not differ from background environmental concentrations found in a metropolitan area (i.e. benzo[a]pyrene < 1 ng/m3; benzene < 5 mcg/m3), and the results of biological monitoring were in agreement and were compatible with extra-professional habits of the investigated subjects (1-hydroxipyrene 50-990 ng/g creatinine; unmetabolized benzene 15-2010 ng/I; t-t muconic acid < 4-222 mcg/g creatinine).

  16. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    PubMed Central

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  17. An Extended Role-Based Access Control Model for Delegating Obligations

    NASA Astrophysics Data System (ADS)

    Ben-Ghorbel-Talbi, Meriam; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Bouhoula, Adel

    The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the administration and delegation of obligations. Managing such delegations implies more requirements than managing traditional privileges delegation. In fact, delegating obligations may include two interpretations: the delegation of the obligation and the delegation of the responsibility related to this obligation. Therefore, it is important to deal with these two notions separately. Moreover, since delegating an obligation involves the delegation of sanctions, then the consent of the user who receives this delegation may be required in some cases. We address in this paper these requirements and we propose a formalism to deal with them.

  18. A multi-step approach to improving NASA Earth Science data access and use for decision support through online and hands-on training

    NASA Astrophysics Data System (ADS)

    Prados, A. I.; Gupta, P.; Mehta, A. V.; Schmidt, C.; Blevins, B.; Carleton-Hug, A.; Barbato, D.

    2014-12-01

    NASA's Applied Remote Sensing Training Program (ARSET), http://arset.gsfc.nasa.gov, within NASA's Applied Sciences Program, has been providing applied remote sensing training since 2008. The goals of the program are to develop the technical and analytical skills necessary to utilize NASA resources for decision-support, and to help end-users navigate through the vast data resources freely available. We discuss our multi-step approach to improving data access and use of NASA satellite and model data for air quality, water resources, disaster, and land management. The program has reached over 1600 participants world wide using a combined online and interactive approach. We will discuss lessons learned as well as best practices and success stories in improving the use of NASA Earth Science resources archived at multiple data centers by end-users in the private and public sectors. ARSET's program evaluation method for improving the program and assessing the benefits of trainings to U.S and international organizations will also be described.

  19. Controlling electronic access to the spin excitations of a single molecule in a tunnel junction

    NASA Astrophysics Data System (ADS)

    Hirjibehedin, Cyrus F.; Warner, Ben; El Hallak, Fadi; Prueser, Henning; Ajibade, Afolabi; Gill, Tobias G.; Fisher, Andrew J.; Persson, Mats

    Spintronic phenomena can be utilized to create new devices with applications in data storage and sensing. Scaling these down to the single molecule level requires controlling the properties of the current-carrying orbitals to enable access to spin states through phenomena such as inelastic electron tunneling. Here we show that the spintronic properties of a tunnel junction containing a single molecule can be controlled by their coupling to the local environment. For tunneling through iron phthalocyanine (FePc) on an insulating copper nitride (Cu2N) monolayer above Cu(001), we find that spin transitions may be strongly excited depending on the binding site of the central Fe atom. Different interactions between the Fe and the underlying Cu or N atoms shift the Fe d-orbitals with respect to the Fermi energy, and control the relative strength of the spin excitations, an effect that can described in a simple co-tunneling model. This work demonstrates the importance of the atomic-scale environment in the development of single molecule spintronic devices.

  20. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  1. Influence of proxy attributes on multiattribute decision analysis: An empirical investigation in the context of air pollution control

    SciTech Connect

    Damodaran, N.

    1988-01-01

    Three separate studies in decision analysis were conducted in the context of air pollution control wherein the preferences of informed subjects were individually assessed. The first study was designed to develop a decision model for the control of sulfur dioxide emissions by incorporating multi-media effects of pollution control using both fundamental and proxy attributes. The second study specifically compared fundamental and proxy attributes and tested the hypothesis that proxy attributes lead to biased decisions. The third study validated the results of the previous one and was extended to examine the hypothesis that proxy bias could be reduced by appropriate elicitation techniques. The findings of this study indicated that subjects behaved according to the norms of expected utility theory when the unidimensional utility function for the proxy attribute was assessed. However, subjects exhibited a near universal bias to overweight the proxy attribute, relative to prescriptions of expected utility theory, in a multi-attribute scenario.

  2. Development and characterization of 96 microsatellite markers suitable for QTL mapping and accession control in an Arabidopsis core collection

    PubMed Central

    2014-01-01

    Background To identify plant genes involved in various key traits, QTL mapping is a powerful approach. This approach is based on the use of mapped molecular markers to identify genomic regions controlling quantitative traits followed by a fine mapping and eventually positional cloning of candidate genes. Mapping technologies using SNP markers are still rather expensive and not feasible in every laboratory. In contrast, microsatellite (also called SSR for Simple Sequence Repeat) markers are technologically less demanding and less costly for any laboratory interested in genetic mapping. Results In this study, we present the development and the characterization of a panel of 96 highly polymorphic SSR markers along the Arabidopsis thaliana genome allowing QTL mapping among accessions of the Versailles 24 core collection that covers a high percentage of the A. thaliana genetic diversity. These markers can be used for any QTL mapping analysis involving any of these accessions. We optimized the use of these markers in order to reveal polymorphism using standard PCR conditions and agarose gel electrophoresis. In addition, we showed that the use of only three of these markers allows differentiating all 24 accessions which makes this set of markers a powerful tool to control accession identity or any cross between any of these accessions. Conclusion The set of SSR markers developed in this study provides a simple and efficient tool for any laboratory focusing on QTL mapping in A. thaliana and a simple means to control seed stock or crosses between accessions. PMID:24447639

  3. Improved Hypoxia Modeling for Nutrient Control Decisions in the Gulf of Mexico

    NASA Technical Reports Server (NTRS)

    Habib, Shaid; Pickering, Ken; Tzortziou, Maria; Maninio, Antonio; Policelli, Fritz

    2010-01-01

    As required by the Harmful Algal Bloom and Hypoxia Research Control Act of 1998, the Mississippi River/Gulf of Mexico Watershed Nutrient Task Force issued the 2001 Gulf Hypoxia Action Plan (updated in 2008). In response to the Gulf Hypoxia Action Plan of 2001 (updated in 2008), the EPA Gulf of Mexico Hypoxia Modeling and Monitoring Project has established a detailed model for the Mississippi-Attchafalaya River Basin which provides a capability to forecast the multi-source nutrient loading to the Gulf and the subsequent bio-geochemical processes leading to hypoxic conditions and subsequent effects on Gulf habitats and fisheries. The primary purpose of the EPA model is to characterize the impacts of nutrient management actions, or proposed actions on the spatial and temporal characteristics of the Gulf hypoxic zone. The model is expected to play a significant role in determining best practices and improved strategies for incentivizing nutrient reduction strategies, including installation of on-farm structures to reduce sediment and nutrient runoff, use of cover crops and other agricultural practices, restoration of wetlands and riparian buffers, improved waste water treatment and decreased industrial nitrogen emissions. These decisions are currently made in a fragmented way by federal, state, and local agencies, using a variety of small scale models and limited data. During the past three years, EPA has collected an enormous amount of in-situ data to be used in the model. We believe that the use of NASA satellite data products in the model and for long term validation of the model has the potential to significantly increase the accuracy and therefore the utility of the model for the decision making described above. This proposal addresses the Gulf of Mexico Alliance (GOMA) priority issue of reductions in nutrient inputs to coastal ecosystem. It further directly relates to water quality for healthy beaches and shellfish beds and wetland and coastal conservation

  4. Controlling multidrug-resistant tuberculosis and access to expensive drugs: a rational framework.

    PubMed Central

    Pablos-Mendez, Ariel; Gowda, Deepthiman K.; Frieden, Thomas R.

    2002-01-01

    The emergence and spread of multidrug-resistant tuberculosis (MDR-TB), i.e. involving resistance to at least isoniazid and rifampicin, could threaten the control of TB globally. Controversy has emerged about the best way of confronting MDR-TB in settings with very limited resources. In 1999, the World Health Organization (WHO) created a working group on DOTS-Plus, an initiative exploring the programmatic feasibility and cost-effectiveness of treating MDR-TB in low-income and middle-income countries, in order to consider the management of MDR-TB under programme conditions. The challenges of implementation have proved more daunting than those of access to second-line drugs, the prices of which are dropping. Using data from the WHO/International Union Against Tuberculosis and Lung Disease surveillance project, we have grouped countries according to the proportion of TB patients completing treatment successfully and the level of MDR-TB among previously untreated patients. The resulting matrix provides a reasonable framework for deciding whether to use second-line drugs in a national programme. Countries in which the treatment success rate, i.e. the proportion of new patients who complete the scheduled treatment, irrespective of whether bacteriological cure is documented, is below 70% should give the highest priority to introducing or improving DOTS, the five-point TB control strategy recommended by WHO and the International Union Against Tuberculosis and Lung Disease. A poorly functioning programme can create MDR-TB much faster than it can be treated, even if unlimited resources are available. There is no single prescription for controlling MDR-TB but the various tools available should be applied wisely. Firstly, good DOTS and infection control; then appropriate use of second-line drug treatment. The interval between the two depends on the local context and resources. As funds are allocated to treat MDR-TB, human and financial resources should be increased to expand

  5. TWRS FSAR integrated control decision meetings - January 22 - 31,1997

    SciTech Connect

    Saladin, V.L.

    1997-03-17

    U.S. Department of Energy (DOE), Richland Operations Office (RL) letter 97-MSD-163 dated January 15, 1997, directed the Project Hanford Management Contractor (Contractor), Fluor Daniel Hanford, inc., to form a joint RL-Contractor Integrated Control Decision Team (ICDT) to evaluate the Tank Waste Remediation System (TWRS) Final Safety Analysis Report (FSAR) accident scenarios that were identified to be above the risk evaluation guidelines (radiological and/or toxicological) defined by the April 8, 1996, letter from J. Kinzer, RL-TWRS (96-MSO-069) to Dr. A. L. Trego, Westinghouse Hanford Company. The ICDT evaluated six postulated accidents from the draft FSAR which had analyzed consequences above the DOE directed risk evaluation guidelines after controls were applied. The accidents were: (1) Organic Solvent Fires; (2) Organic Salt-Nitrate Fire; (3) Spray Leak; (4) Flammable Gas; (5) Steam Intrusion; and (6) Seismic Event. Five of the postulated accidents exceed radiological risk guidelines. Although the postulated steam intrusion accident does not exceed the radiological risk guidelines, it was considered in the ICDT evaluation because its calculated consequences exceed toxicological risk evaluation guidelines. Figure 1 delineates the mitigated and unmitigated risk evaluations performed for the FSAR.

  6. Nuclear receptor NR5A2 controls neural stem cell fate decisions during development

    PubMed Central

    Stergiopoulos, Athanasios; Politis, Panagiotis K.

    2016-01-01

    The enormous complexity of mammalian central nervous system (CNS) is generated by highly synchronized actions of diverse factors and signalling molecules in neural stem/progenitor cells (NSCs). However, the molecular mechanisms that integrate extrinsic and intrinsic signals to control proliferation versus differentiation decisions of NSCs are not well-understood. Here we identify nuclear receptor NR5A2 as a central node in these regulatory networks and key player in neural development. Overexpression and loss-of-function experiments in primary NSCs and mouse embryos suggest that NR5A2 synchronizes cell-cycle exit with induction of neurogenesis and inhibition of astrogliogenesis by direct regulatory effects on Ink4/Arf locus, Prox1, a downstream target of proneural genes, as well as Notch1 and JAK/STAT signalling pathways. Upstream of NR5a2, proneural genes, as well as Notch1 and JAK/STAT pathways control NR5a2 endogenous expression. Collectively, these observations render NR5A2 a critical regulator of neural development and target gene for NSC-based treatments of CNS-related diseases. PMID:27447294

  7. A BMP regulatory network controls ectodermal cell fate decisions at the neural plate border.

    PubMed

    Reichert, Sabine; Randall, Rebecca A; Hill, Caroline S

    2013-11-01

    During ectodermal patterning the neural crest and preplacodal ectoderm are specified in adjacent domains at the neural plate border. BMP signalling is required for specification of both tissues, but how it is spatially and temporally regulated to achieve this is not understood. Here, using a transgenic zebrafish BMP reporter line in conjunction with double-fluorescent in situ hybridisation, we show that, at the beginning of neurulation, the ventral-to-dorsal gradient of BMP activity evolves into two distinct domains at the neural plate border: one coinciding with the neural crest and the other abutting the epidermis. In between is a region devoid of BMP activity, which is specified as the preplacodal ectoderm. We identify the ligands required for these domains of BMP activity. We show that the BMP-interacting protein Crossveinless 2 is expressed in the BMP activity domains and is under the control of BMP signalling. We establish that Crossveinless 2 functions at this time in a positive-feedback loop to locally enhance BMP activity, and show that it is required for neural crest fate. We further demonstrate that the Distal-less transcription factors Dlx3b and Dlx4b, which are expressed in the preplacodal ectoderm, are required for the expression of a cell-autonomous BMP inhibitor, Bambi-b, which can explain the specific absence of BMP activity in the preplacodal ectoderm. Taken together, our data define a BMP regulatory network that controls cell fate decisions at the neural plate border.

  8. Risk-sensitivity and the mean-variance trade-off: decision making in sensorimotor control

    PubMed Central

    Nagengast, Arne J.; Braun, Daniel A.; Wolpert, Daniel M.

    2011-01-01

    Numerous psychophysical studies suggest that the sensorimotor system chooses actions that optimize the average cost associated with a movement. Recently, however, violations of this hypothesis have been reported in line with economic theories of decision-making that not only consider the mean payoff, but are also sensitive to risk, that is the variability of the payoff. Here, we examine the hypothesis that risk-sensitivity in sensorimotor control arises as a mean-variance trade-off in movement costs. We designed a motor task in which participants could choose between a sure motor action that resulted in a fixed amount of effort and a risky motor action that resulted in a variable amount of effort that could be either lower or higher than the fixed effort. By changing the mean effort of the risky action while experimentally fixing its variance, we determined indifference points at which participants chose equiprobably between the sure, fixed amount of effort option and the risky, variable effort option. Depending on whether participants accepted a variable effort with a mean that was higher, lower or equal to the fixed effort, they could be classified as risk-seeking, risk-averse or risk-neutral. Most subjects were risk-sensitive in our task consistent with a mean-variance trade-off in effort, thereby, underlining the importance of risk-sensitivity in computational models of sensorimotor control. PMID:21208966

  9. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  10. Use of online safety decision aid by abused women: effect on decisional conflict in randomized controlled trial

    PubMed Central

    Eden, Karen B.; Perrin, Nancy A.; Hanson, Ginger C.; Messing, Jill T.; Bloom, Tina L.; Campbell, Jacquelyn C.; Gielen, Andrea C.; Clough, Amber S.; Barnes-Hoyt, Jamie S.; Glass, Nancy E.

    2014-01-01

    Background An Internet safety decision aid was developed to help abused women understand their risk for repeat and near-lethal intimate partner violence, clarify priorities related to safety, and develop an action plan customized to these priorities. Purpose The overall purpose of this study was to test the effectiveness of a safety decision aid compared with usual safety planning (control) delivered through a secure website, using a multi-state randomized controlled trial design. The paper evaluated the effectiveness of the safety decision aid in reducing decisional conflict after a single use by abused women. Design Randomized controlled trial referred to as IRIS, Internet Resource for Intervention and Safety Participants Abused women who spoke English (N = 708) were enrolled in a four-state, randomized controlled trial. Intervention and Control The intervention was an interactive safety decision aid with personalized safety plan; the control condition was usual safety planning resources. Both were delivered to participants through the secure study website. Main Outcome Measures This paper compared women’s decisional conflict about safety: total decisional conflict and the four subscales of this measure (feeling: uninformed, uncertain, unclear about safety priorities; and sensing lack of support) between intervention/control conditions. Data were collected 3/2011–5/2013 and analyzed 1/2014–3/2014. Results Immediately following the first use of the interactive safety decision aid, intervention women had significantly lower total decisional conflict than control women, controlling for baseline value of decisional conflict (p=0.002, effect size=.12). After controlling for baseline values, the safety decision aid group had significantly greater reduction in feeling uncertain (p=0.006, effect size=.07), and in feeling unsupported (p=0.008, effect size=.07) about safety than the usual safety planning group. Conclusions Abused women randomized to the safety

  11. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    NASA Astrophysics Data System (ADS)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  12. The Treatment of cardiovascular Risk in Primary care using Electronic Decision suppOrt (TORPEDO) study: intervention development and protocol for a cluster randomised, controlled trial of an electronic decision support and quality improvement intervention in Australian primary healthcare

    PubMed Central

    Peiris, David; Usherwood, Tim; Panaretto, Katie; Harris, Mark; Hunt, Jenny; Patel, Bindu; Zwar, Nicholas; Redfern, Julie; MacMahon, Stephen; Colagiuri, Stephen; Hayman, Noel; Patel, Anushka

    2012-01-01

    Background Large gaps exist in the implementation of guideline recommendations for cardiovascular disease (CVD) risk management. Electronic decision support (EDS) systems are promising interventions to close these gaps but few have undergone clinical trial evaluation in Australia. We have developed HealthTracker, a multifaceted EDS and quality improvement intervention to improve the management of CVD risk. Methods/design It is hypothesised that the use of HealthTracker over a 12-month period will result in: (1) an increased proportion of patients receiving guideline-indicated measurements of CVD risk factors and (2) an increased proportion of patients at high risk will receive guideline-indicated prescriptions for lowering their CVD risk. Sixty health services (40 general practices and 20 Aboriginal Community Controlled Health Services (ACCHSs) will be randomised in a 1:1 allocation to receive either the intervention package or continue with usual care, stratified by service type, size and participation in existing quality improvement initiatives. The intervention consists of point-of-care decision support; a risk communication interface; a clinical audit tool to assess performance on CVD-related indicators; a quality improvement component comprising peer-ranked data feedback and support to develop strategies to improve performance. The control arm will continue with usual care without access to these intervention components. Quantitative data will be derived from cross-sectional samples at baseline and end of study via automated data extraction. Detailed process and economic evaluations will also be conducted. Ethics and dissemination The general practice component of the study is approved by the University of Sydney Human Research Ethics Committee (HREC) and the ACCHS component is approved by the Aboriginal Health and Medical Research Council HREC. Formal agreements with each of the participating sites have been signed. In addition to the usual scientific forums

  13. Impact of adolescent sucrose access on cognitive control, recognition memory, and parvalbumin immunoreactivity

    PubMed Central

    Killcross, Simon; Hambly, Luke D.; Morris, Margaret J.; Westbrook, R. Fred

    2015-01-01

    In this study we sought to determine the effect of daily sucrose consumption in young rats on their subsequent performance in tasks that involve the prefrontal cortex and hippocampus. High levels of sugar consumption have been associated with the development of obesity, however less is known about how sugar consumption influences behavioral control and high-order cognitive processes. Of particular concern is the fact that sugar intake is greatest in adolescence, an important neurodevelopmental period. We provided sucrose to rats when they were progressing through puberty and adolescence. Cognitive performance was assessed in adulthood on a task related to executive function, a rodent analog of the Stroop task. We found that sucrose-exposed rats failed to show context-appropriate responding during incongruent stimulus compounds presented at test, indicative of impairments in prefrontal cortex function. Sucrose exposed rats also showed deficits in an on object-in-place recognition memory task, indicating that both prefrontal and hippocampal function was impaired. Analysis of brains showed a reduction in expression of parvalbumin-immunoreactive GABAergic interneurons in the hippocampus and prefrontal cortex, indicating that sucrose consumption during adolescence induced long-term pathology, potentially underpinning the cognitive deficits observed. These results suggest that consumption of high levels of sugar-sweetened beverages by adolescents may also impair neurocognitive functions affecting decision-making and memory, potentially rendering them at risk for developing mental health disorders. PMID:25776039

  14. The Interplay between Information and Control Theory within Interactive Decision-Making Problems

    ERIC Educational Resources Information Center

    Gorantla, Siva Kumar

    2012-01-01

    The context for this work is two-agent team decision systems. An "agent" is an intelligent entity that can measure some aspect of its environment, process information and possibly influence the environment through its action. In a collaborative two-agent team decision system, the agents can be coupled by noisy or noiseless interactions…

  15. Object classification in images for Epo doping control based on fuzzy decision trees

    NASA Astrophysics Data System (ADS)

    Bajla, Ivan; Hollander, Igor; Heiss, Dorothea; Granec, Reinhard; Minichmayr, Markus

    2005-02-01

    Erythropoietin (Epo) is a hormone which can be misused as a doping substance. Its detection involves analysis of images containing specific objects (bands), whose position and intensity are critical for doping positivity. Within a research project of the World Anti-Doping Agency (WADA) we are implementing the GASepo software that should serve for Epo testing in doping control laboratories world-wide. For identification of the bands we have developed a segmentation procedure based on a sequence of filters and edge detectors. Whereas all true bands are properly segmented, the procedure generates a relatively high number of false positives (artefacts). To separate these artefacts we suggested a post-segmentation supervised classification using real-valued geometrical measures of objects. The method is based on the ID3 (Ross Quinlan's) rule generation method, where fuzzy representation is used for linking the linguistic terms to quantitative data. The fuzzy modification of the ID3 method provides a framework that generates fuzzy decision trees, as well as fuzzy sets for input data. Using the MLTTM software (Machine Learning Framework) we have generated a set of fuzzy rules explicitly describing bands and artefacts. The method eliminated most of the artefacts. The contribution includes a comparison of the obtained misclassification errors to the errors produced by some other statistical classification methods.

  16. Performing under pressure: gaze control, decision making and shooting performance of elite and rookie police officers.

    PubMed

    Vickers, Joan N; Lewinski, William

    2012-02-01

    Gaze of elite (E) and rookie (R) officers were analyzed as they faced a potentially lethal encounter that required use of a handgun, or inhibition of the shot when a cell phone was drawn. The E shot more accurately than the R (E 74.60%; R 53.80%) and made fewer decisions errors in the cell condition when 18.50% of E and 61.50% of R fired at the assailant. E and R did not differ in duration of the draw/aim/fire phases, but the R's motor onsets were later, during the final second compared to the E's final 2.5 s. Across the final six fixations the E increased the percent of fixations on the assailant's weapon/cell to 71% and to 86% on hits, compared to a high of 34% for the R. Before firing, the R made a rapid saccade to their own weapon on 84% of trials leading to a failure to fixate the assailant on 50% of trials as they fired. Compared to the R, the E had a longer quiet eye duration on the assailant's weapon/cell prior to firing. The results provide new insights into officer weapon focus, firearms training and the role of optimal gaze control when under extreme pressure. PMID:21807433

  17. Effects of a Web-Based Decision Aid Regarding Diagnostic Self-Testing. A Single-Blind Randomized Controlled Trial

    ERIC Educational Resources Information Center

    Ickenroth, Martine H. P.; Grispen, J. E. J.; de Vries, N. K.; Dinant, G. J.; Ronda, G.; van der Weijden, T.

    2016-01-01

    Currently, there are many diagnostic self-tests on body materials available to consumers. The aim of this study was to assess the effect of an online decision aid on diagnostic self-testing for cholesterol and diabetes on knowledge among consumers with an intention to take these tests. A randomized controlled trial was designed. A total of 1259…

  18. Agency Decision-Making Control and Employment Outcomes by Vocational Rehabilitation Consumers Who Are Blind or Visually Impaired

    ERIC Educational Resources Information Center

    Steinman, Bernard A.; Kwan, Ngai; Boeltzig-Brown, Heike; Haines, Kelly; Halliday, John; Foley, Susan M.

    2013-01-01

    Introduction: We hypothesized that consumers who are blind or visually impaired (that is, those who have low vision) who were served by state vocational rehabilitation agencies with decision-making control over administrative functions would experience better vocational rehabilitation outcomes than consumers served by vocational rehabilitation…

  19. Controlling the taste receptor accessible structure of rebaudioside A via binding to bovine serum albumin.

    PubMed

    Mudgal, Samriddh; Keresztes, Ivan; Feigenson, Gerald W; Rizvi, S S H

    2016-04-15

    We illustrate a method that uses bovine serum albumin (BSA) to control the receptor-accessible part of rebaudioside A (Reb A). The critical micelle concentration (CMC) of Reb A was found to be 4.5 mM and 5 mM at pH 3 and 6.7 respectively. NMR studies show that below its CMC, Reb A binds weakly to BSA to generate a Reb A-protein complex ("RPC"), which is only modestly stable under varying conditions of pH (3.0-6.7) and temperature (4-40°C) with its binding affinities determined to be in the range of 5-280 mM. Furthermore, saturation transfer difference (STD) NMR experiments confirm that the RPC has fast exchange of the bitterness-instigating diterpene of Reb A into the binding sites of BSA. Our method can be used to alter the strength of Reb A-receptor interaction, as a result of binding of Reb A to BSA, which may ultimately lead to moderation of its taste.

  20. Peptide-controlled access to the interior surface of empty virus nanoparticles.

    PubMed

    Sainsbury, Frank; Saunders, Keith; Aljabali, Alaa A A; Evans, David J; Lomonossoff, George P

    2011-11-01

    The structure of Cowpea mosaic virus (CPMV) is known to high resolution, thereby enabling the rational use of the particles in diverse applications, from vaccine design to nanotechnology. A recently devised method for the production of empty virus-like particles (eVLPs) has opened up new possibilities for CPMV capsid-based technologies, such as internal mineralisation of the particle. We have investigated the role of the carboxyl (C) terminus of the small coat (S) protein in controlling access to the interior of CPMV eVLPs by determining the efficiency of internal mineralisation. The presence of the C-terminal 24-amino acid peptide of the S protein was found to inhibit internal mineralisation, an effect that could be eliminated by enzymatic removal of this region. We have also demonstrated the amenability of the C terminus to genetic modification. Substitution with six histidine residues generated stable particles and facilitated external mineralisation by cobalt. These findings demonstrate consistent internal and external mineralisation of CPMV, and will aid the further exploration and development of the use of eVLPs for bionanotechnological and medical applications.

  1. Towards human-centric visual access control for clinical data management.

    PubMed

    Fahl, Sascha; Harbach, Marian; Smith, Matthew

    2012-01-01

    We propose a novel human-centric, visual, and context-aware access control (AC) system for distributed clinical data management and health information systems. Human-centricity in this context means that medical staff should be able to configure AC rules, both in a timesaving and reliable manner. Since medical data often includes (meta-) information about a patient, it is essential that an AC system includes the patient into the AC process. To cater for the strong security needs in the medical domain, both the AC policy creation by medical staff as well as the patient-interaction feature need to be taken into account. While traditional AC systems offer sufficient security in theory, they lack in comfort and flexibility and as a result find no widespread acceptance with non tech-savvy users. Distributed medical institutions could enormously benefit from the opportunity of dynamic AC configuration at an end-user level while adhering to legal, ethical or other privacy requirements. Hence, this paper presents a human-centric visual AC model for medical data, addressing usability, information security and patient interaction. PMID:22874293

  2. Controlling the taste receptor accessible structure of rebaudioside A via binding to bovine serum albumin.

    PubMed

    Mudgal, Samriddh; Keresztes, Ivan; Feigenson, Gerald W; Rizvi, S S H

    2016-04-15

    We illustrate a method that uses bovine serum albumin (BSA) to control the receptor-accessible part of rebaudioside A (Reb A). The critical micelle concentration (CMC) of Reb A was found to be 4.5 mM and 5 mM at pH 3 and 6.7 respectively. NMR studies show that below its CMC, Reb A binds weakly to BSA to generate a Reb A-protein complex ("RPC"), which is only modestly stable under varying conditions of pH (3.0-6.7) and temperature (4-40°C) with its binding affinities determined to be in the range of 5-280 mM. Furthermore, saturation transfer difference (STD) NMR experiments confirm that the RPC has fast exchange of the bitterness-instigating diterpene of Reb A into the binding sites of BSA. Our method can be used to alter the strength of Reb A-receptor interaction, as a result of binding of Reb A to BSA, which may ultimately lead to moderation of its taste. PMID:26616927

  3. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  4. Distributed multisensor processing, decision making, and control under constrained resources for remote health and environmental monitoring

    NASA Astrophysics Data System (ADS)

    Talukder, Ashit; Sheikh, Tanwir; Chandramouli, Lavanya

    2004-04-01

    Previous field-deployable distributed sensing systems for health/biomedical applications and environmental sensing have been designed for data collection and data transmission at pre-set intervals, rather than for on-board processing These previous sensing systems lack autonomous capabilities, and have limited lifespans. We propose the use of an integrated machine learning architecture, with automated planning-scheduling and resource management capabilities that can be used for a variety of autonomous sensing applications with very limited computing, power, and bandwidth resources. We lay out general solutions for efficient processing in a multi-tiered (three-tier) machine learning framework that is suited for remote, mobile sensing systems. Novel dimensionality reduction techniques that are designed for classification are used to compress each individual sensor data and pass only relevant information to the mobile multisensor fusion module (second-tier). Statistical classifiers that are capable of handling missing/partial sensory data due to sensor failure or power loss are used to detect critical events and pass the information to the third tier (central server) for manual analysis and/or analysis by advanced pattern recognition techniques. Genetic optimisation algorithms are used to control the system in the presence of dynamic events, and also ensure that system requirements (i.e. minimum life of the system) are met. This tight integration of control optimisation and machine learning algorithms results in a highly efficient sensor network with intelligent decision making capabilities. The applicability of our technology in remote health monitoring and environmental monitoring is shown. Other uses of our solution are also discussed.

  5. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  6. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  7. Controlling false discoveries in multidimensional directional decisions, with applications to gene expression data on ordered categories.

    PubMed

    Guo, Wenge; Sarkar, Sanat K; Peddada, Shyamal D

    2010-06-01

    Microarray gene expression studies over ordered categories are routinely conducted to gain insights into biological functions of genes and the underlying biological processes. Some common experiments are time-course/dose-response experiments where a tissue or cell line is exposed to different doses and/or durations of time to a chemical. A goal of such studies is to identify gene expression patterns/profiles over the ordered categories. This problem can be formulated as a multiple testing problem where for each gene the null hypothesis of no difference between the successive mean gene expressions is tested and further directional decisions are made if it is rejected. Much of the existing multiple testing procedures are devised for controlling the usual false discovery rate (FDR) rather than the mixed directional FDR (mdFDR), the expected proportion of Type I and directional errors among all rejections. Benjamini and Yekutieli (2005, Journal of the American Statistical Association 100, 71-93) proved that an augmentation of the usual Benjamini-Hochberg (BH) procedure can control the mdFDR while testing simple null hypotheses against two-sided alternatives in terms of one-dimensional parameters. In this article, we consider the problem of controlling the mdFDR involving multidimensional parameters. To deal with this problem, we develop a procedure extending that of Benjamini and Yekutieli based on the Bonferroni test for each gene. A proof is given for its mdFDR control when the underlying test statistics are independent across the genes. The results of a simulation study evaluating its performance under independence as well as under dependence of the underlying test statistics across the genes relative to other relevant procedures are reported. Finally, the proposed methodology is applied to a time-course microarray data obtained by Lobenhofer et al. (2002, Molecular Endocrinology 16, 1215-1229). We identified several important cell-cycle genes, such as DNA

  8. Volatile decision dynamics: experiments, stochastic description, intermittency control and traffic optimization

    NASA Astrophysics Data System (ADS)

    Helbing, Dirk; Schönhof, Martin; Kern, Daniel

    2002-06-01

    The coordinated and efficient distribution of limited resources by individual decisions is a fundamental, unsolved problem. When individuals compete for road capacities, time, space, money, goods, etc, they normally make decisions based on aggregate rather than complete information, such as TV news or stock market indices. In related experiments, we have observed a volatile decision dynamics and far-from-optimal payoff distributions. We have also identified methods of information presentation that can considerably improve the overall performance of the system. In order to determine optimal strategies of decision guidance by means of user-specific recommendations, a stochastic behavioural description is developed. These strategies manage to increase the adaptibility to changing conditions and to reduce the deviation from the time-dependent user equilibrium, thereby enhancing the average and individual payoffs. Hence, our guidance strategies can increase the performance of all users by reducing overreaction and stabilizing the decision dynamics. These results are highly significant for predicting decision behaviour, for reaching optimal behavioural distributions by decision support systems and for information service providers. One of the promising fields of application is traffic optimization.

  9. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  10. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  11. Nurses' knowledge and practice of vascular access infection control in haemodialysis patients in the Republic of Ireland.

    PubMed

    Higgins, Margaret; Evans, David S

    2008-06-01

    Vascular access hygiene is an integral component of haemodialysis care. Ensuring nurses possess sufficient knowledge and utilise recommended guidelines on infection control is essential for safe practice and patient safety. The study aimed to investigate nurses' knowledge and practice of vascular access infection control among adult haemodialysis patients in the Republic of Ireland. A confidential self-completion questionnaire was sent to all 190 qualified nurses employed in nine haemodialysis units in the Republic of Ireland, which assessed knowledge and behaviour in infection control. Although 92% of respondents reported that policies had been developed by their units and 47% had received infection control education in the previous year, knowledge and adherence to best practice demonstrated significant scope for improvement. The study recommended the development of standard guidelines and regular reviews and updates of policies. Systems should also be developed to ensure a high level of compliance. PMID:18498567

  12. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    PubMed

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility. PMID:26259633

  13. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    PubMed

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.

  14. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  15. Are decision trees a feasible knowledge representation to guide extraction of critical information from randomized controlled trial reports?

    PubMed Central

    Chung, Grace Y; Coiera, Enrico

    2008-01-01

    Background This paper proposes the use of decision trees as the basis for automatically extracting information from published randomized controlled trial (RCT) reports. An exploratory analysis of RCT abstracts is undertaken to investigate the feasibility of using decision trees as a semantic structure. Quality-of-paper measures are also examined. Methods A subset of 455 abstracts (randomly selected from a set of 7620 retrieved from Medline from 1998 – 2006) are examined for the quality of RCT reporting, the identifiability of RCTs from abstracts, and the completeness and complexity of RCT abstracts with respect to key decision tree elements. Abstracts were manually assigned to 6 sub-groups distinguishing whether they were primary RCTs versus other design types. For primary RCT studies, we analyzed and annotated the reporting of intervention comparison, population assignment and outcome values. To measure completeness, the frequencies by which complete intervention, population and outcome information are reported in abstracts were measured. A qualitative examination of the reporting language was conducted. Results Decision tree elements are manually identifiable in the majority of primary RCT abstracts. 73.8% of a random subset was primary studies with a single population assigned to two or more interventions. 68% of these primary RCT abstracts were structured. 63% contained pharmaceutical interventions. 84% reported the total number of study subjects. In a subset of 21 abstracts examined, 71% reported numerical outcome values. Conclusion The manual identifiability of decision tree elements in the abstract suggests that decision trees could be a suitable construct to guide machine summarisation of RCTs. The presence of decision tree elements could also act as an indicator for RCT report quality in terms of completeness and uniformity. PMID:18957129

  16. Scoping decision document for HEPA filter differential pressure interlock control installation and tank farm exhauster operation

    SciTech Connect

    GUSTAVSON, R.D.

    2001-06-27

    This document is a decision document regarding the scope of HEPA filter differential pressure interlock system installations at Tank Farm emission units. It is intended to provide supporting information for administration of Baseline Change Request.

  17. Out of control mortality matters: the effect of perceived uncontrollable mortality risk on a health-related decision

    PubMed Central

    Nettle, Daniel

    2014-01-01

    Prior evidence from the public health literature suggests that both control beliefs and perceived threats to life are important for health behaviour. Our previously presented theoretical model generated the more specific hypothesis that uncontrollable, but not controllable, personal mortality risk should alter the payoff from investment in health protection behaviours. We carried out three experiments to test whether altering the perceived controllability of mortality risk would affect a health-related decision. Experiment 1 demonstrated that a mortality prime could be used to alter a health-related decision: the choice between a healthier food reward (fruit) and an unhealthy alternative (chocolate). Experiment 2 demonstrated that it is the controllability of the mortality risk being primed that generates the effect, rather than mortality risk per se. Experiment 3 showed that the effect could be seen in a surreptitious experiment that was not explicitly health related. Our results suggest that perceptions about the controllability of mortality risk may be an important factor in people’s health-related decisions. Thus, techniques for adjusting perceptions about mortality risk could be important tools for use in health interventions. More importantly, tackling those sources of mortality that people perceive to be uncontrollable could have a dual purpose: making neighbourhoods and workplaces safer would have the primary benefit of reducing uncontrollable mortality risk, which could lead to a secondary benefit from improved health behaviours. PMID:25024922

  18. Controlling equine influenza: policy networks and decision-making during the 2007 Australian equine influenza outbreak.

    PubMed

    Schemann, K; Gillespie, J A; Toribio, J-A L M L; Ward, M P; Dhand, N K

    2014-10-01

    Rapid, evidence-based decision-making is critical during a disease outbreak response; however, compliance by stakeholders is necessary to ensure that such decisions are effective - especially if the response depends on voluntary action. This mixed method study evaluated technical policy decision-making processes during the 2007 outbreak of equine influenza in Australia by identifying and analysing the stakeholder network involved and the factors driving policy decision-making. The study started with a review of the outbreak literature and published policy documents. This identified six policy issues regarding policy modifications or differing interpretations by different state agencies. Data on factors influencing the decision-making process for these six issues and on stakeholder interaction were collected using a pre-tested, semi-structured questionnaire. Face-to-face interviews were conducted with 24 individuals representing 12 industry and government organizations. Quantitative data were analysed using social network analysis. Qualitative data were coded and patterns matched to test a pre-determined general theory using a method called theory-oriented process-tracing. Results revealed that technical policy decisions were framed by social, political, financial, strategic and operational considerations. Industry stakeholders had influence through formal pre-existing channels, yet specific gaps in stakeholder interaction were overcome by reactive alliances formed during the outbreak response but outside the established system. Overall, the crisis management system and response were seen as positive, and 75-100% of individuals interviewed were supportive of, had interest in and considered the outcome as good for the majority of policy decisions, yet only 46-75% of those interviewed considered that they had influence on these decisions. Training to increase awareness and knowledge of emergency animal diseases (EADs) and response systems will improve stakeholder

  19. Controlling equine influenza: policy networks and decision-making during the 2007 Australian equine influenza outbreak.

    PubMed

    Schemann, K; Gillespie, J A; Toribio, J-A L M L; Ward, M P; Dhand, N K

    2014-10-01

    Rapid, evidence-based decision-making is critical during a disease outbreak response; however, compliance by stakeholders is necessary to ensure that such decisions are effective - especially if the response depends on voluntary action. This mixed method study evaluated technical policy decision-making processes during the 2007 outbreak of equine influenza in Australia by identifying and analysing the stakeholder network involved and the factors driving policy decision-making. The study started with a review of the outbreak literature and published policy documents. This identified six policy issues regarding policy modifications or differing interpretations by different state agencies. Data on factors influencing the decision-making process for these six issues and on stakeholder interaction were collected using a pre-tested, semi-structured questionnaire. Face-to-face interviews were conducted with 24 individuals representing 12 industry and government organizations. Quantitative data were analysed using social network analysis. Qualitative data were coded and patterns matched to test a pre-determined general theory using a method called theory-oriented process-tracing. Results revealed that technical policy decisions were framed by social, political, financial, strategic and operational considerations. Industry stakeholders had influence through formal pre-existing channels, yet specific gaps in stakeholder interaction were overcome by reactive alliances formed during the outbreak response but outside the established system. Overall, the crisis management system and response were seen as positive, and 75-100% of individuals interviewed were supportive of, had interest in and considered the outcome as good for the majority of policy decisions, yet only 46-75% of those interviewed considered that they had influence on these decisions. Training to increase awareness and knowledge of emergency animal diseases (EADs) and response systems will improve stakeholder

  20. Radical Decisions in Cancer: Redox Control of Cell Growth and Death

    PubMed Central

    Sainz, Rosa M.; Lombo, Felipe; Mayo, Juan C.

    2012-01-01

    Free radicals play a key role in many physiological decisions in cells. Since free radicals are toxic to cellular components, it is known that they cause DNA damage, contribute to DNA instability and mutation and thus favor carcinogenesis. However, nowadays it is assumed that free radicals play a further complex role in cancer. Low levels of free radicals and steady state levels of antioxidant enzymes are responsible for the fine tuning of redox status inside cells. A change in redox state is a way to modify the physiological status of the cell, in fact, a more reduced status is found in resting cells while a more oxidative status is associated with proliferative cells. The mechanisms by which redox status can change the proliferative activity of cancer cells are related to transcriptional and posttranscriptional modifications of proteins that play a critical role in cell cycle control. Since cancer cells show higher levels of free radicals compared with their normal counterparts, it is believed that the anti-oxidative stress mechanism is also increased in cancer cells. In fact, the levels of some of the most important antioxidant enzymes are elevated in advanced status of some types of tumors. Anti-cancer treatment is compromised by survival mechanisms in cancer cells and collateral damage in normal non-pathological tissues. Though some resistance mechanisms have been described, they do not yet explain why treatment of cancer fails in several tumors. Given that some antitumoral treatments are based on the generation of free radicals, we will discuss in this review the possible role of antioxidant enzymes in the survival mechanism in cancer cells and then, its participation in the failure of cancer treatments. PMID:24213319

  1. Plasticity of Decision-Making Abilities Among Maltreated Adolescents: Evidence From a Random Controlled Trial

    PubMed Central

    Weller, Joshua A.; Leve, Leslie D.; Kim, Hyoun K.; Bhimji, Jabeene; Fisher, Philip A.

    2014-01-01

    Childhood maltreatment has lasting negative effects throughout the lifespan. Early intervention research has demonstrated that these effects can be remediated through skill-based, family-centered interventions. However, less is known about plasticity during adolescence, and whether interventions are effective many years after children experience maltreatment. This study investigated this question by examining adolescent girls’ ability to make advantageous decisions in the face of risk using a validated decision-making task; performance on this task has been associated with key neural regions involved in affective processing and executive functioning. Maltreated foster girls (n = 92), randomly assigned at age 11 to either an intervention designed to prevent risk-taking behaviors or services as usual (SAU), and non-maltreated age and SES-matched girls living with their biological parent(s) (n = 80), completed a decision-making task (at age 15–17) that assessed risk-taking and sensitivity to expected value, an index of advantageous decision-making. Girls in the SAU condition demonstrated the greatest decision-making difficulties, primarily for risks to avoid losses. In the SAU group, frequency of neglect was related to greater difficulties in this area. Girls in the intervention condition with less neglect performed similarly to non-maltreated peers. This research suggests that early maltreatment may impact decision-making abilities into adolescence and that enriched environments during early adolescence provide a window of plasticity that may ameliorate these negative effects. PMID:25997770

  2. The Junior College and the Courts: Summaries of Decisions Related to Authorization and Control. The Junior College and the Courts, Part I: Authorization and Control.

    ERIC Educational Resources Information Center

    Frankie, Richard J.

    This, the first of a series of three publications dealing with the junior college and the courts, summarizes 17 selected case decisions from 1929-70 relating to the authorization and control of the junior college. The cases, treated chronologically, involve private and public colleges. The legal aspects are complex and often in conflict, for the…

  3. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  4. Decision Making in the Airplane

    NASA Technical Reports Server (NTRS)

    Orasanu, Judith; Shafto, Michael G. (Technical Monitor)

    1995-01-01

    The Importance of decision-making to safety in complex, dynamic environments like mission control centers, aviation, and offshore installations has been well established. NASA-ARC has a program of research dedicated to fostering safe and effective decision-making in the manned spaceflight environment. Because access to spaceflight is limited, environments with similar characteristics, including aviation and nuclear power plants, serve as analogs from which space-relevant data can be gathered and theories developed. Analyses of aviation accidents cite crew judgement and decision making as causes or contributing factors in over half of all accidents. Yet laboratory research on decision making has not proven especially helpful In improving the quality of decisions in these kinds of environments. One reason is that the traditional, analytic decision models are inappropriate to multi-dimensional, high-risk environments, and do not accurately describe what expert human decision makers do when they make decisions that have consequences. A new model of dynamic, naturalistic decision making is offered that may prove useful for improving decision making in complex, isolated, confined and high-risk environments. Based on analyses of crew performance in full-mission simulators and accident reports, features that define effective decision strategies in abnormal or emergency situations have been identified. These include accurate situation assessment (including time and risk assessment), appreciation of the complexity of the problem, sensitivity to constraints on the decision, timeliness of the response, and use of adequate information. More effective crews also manage their workload to provide themselves with time and resources to make good decisions. In brief, good decisions are appropriate to the demands of the situation. Effective crew decision making and overall performance are mediated by crew communication. Communication contributes to performance because it assures that

  5. The decision to engage cognitive control is driven by expected reward-value: neural and behavioral evidence.

    PubMed

    Dixon, Matthew L; Christoff, Kalina

    2012-01-01

    Cognitive control is a fundamental skill reflecting the active use of task-rules to guide behavior and suppress inappropriate automatic responses. Prior work has traditionally used paradigms in which subjects are told when to engage cognitive control. Thus, surprisingly little is known about the factors that influence individuals' initial decision of whether or not to act in a reflective, rule-based manner. To examine this, we took three classic cognitive control tasks (Stroop, Wisconsin Card Sorting Task, Go/No-Go task) and created novel 'free-choice' versions in which human subjects were free to select an automatic, pre-potent action, or an action requiring rule-based cognitive control, and earned varying amounts of money based on their choices. Our findings demonstrated that subjects' decision to engage cognitive control was driven by an explicit representation of monetary rewards expected to be obtained from rule-use. Subjects rarely engaged cognitive control when the expected outcome was of equal or lesser value as compared to the value of the automatic response, but frequently engaged cognitive control when it was expected to yield a larger monetary outcome. Additionally, we exploited fMRI-adaptation to show that the lateral prefrontal cortex (LPFC) represents associations between rules and expected reward outcomes. Together, these findings suggest that individuals are more likely to act in a reflective, rule-based manner when they expect that it will result in a desired outcome. Thus, choosing to exert cognitive control is not simply a matter of reason and willpower, but rather, conforms to standard mechanisms of value-based decision making. Finally, in contrast to current models of LPFC function, our results suggest that the LPFC plays a direct role in representing motivational incentives. PMID:23284730

  6. State preemption of local tobacco control policies restricting smoking, advertising, and youth access--United States, 2000-2010.

    PubMed

    2011-08-26

    Preemptive state tobacco control legislation prohibits localities from enacting tobacco control laws that are more stringent than state law. State preemption provisions can preclude any type of local tobacco control policy. The three broad types of state preemption tracked by CDC include preemption of local policies that restrict 1) smoking in workplaces and public places, 2) tobacco advertising, and 3) youth access to tobacco products. A Healthy People 2020 objective (TU-16) calls for eliminating state laws that preempt any type of local tobacco control law. A previous study reported that the number of states that preempt local smoking restrictions in one or more of three settings (government worksites, private-sector worksites, and restaurants) has decreased substantially in recent years. To measure progress toward achieving Healthy People 2020 objectives, this study expands on the previous analysis to track changes in state laws that preempt local advertising and youth access restrictions and to examine policy changes from December 31, 2000, to December 31, 2010. This new analysis found that, in contrast with the substantial progress achieved during the past decade in reducing the number of states that preempt local smoking restrictions, no progress has been made in reducing the number of states that preempt local advertising restrictions and youth access restrictions. Increased progress in removing state preemption provisions will be needed to achieve the relevant Healthy People 2020 objective.

  7. An efficient key-management scheme for hierarchical access control in e-medicine system.

    PubMed

    Wu, Shuhua; Chen, Kefei

    2012-08-01

    In e-medicine system, the sharing of patients' medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.'s scheme proposed most recently, the time complexity and the required storage space is reduced significantly. Moreover, it provides provable security, and is easy to implement. Therefore, our scheme is more suitable for e-medicine system.

  8. Approaches to optimal aquifer management and intelligent control in a multiresolutional decision support system

    NASA Astrophysics Data System (ADS)

    Orr, Shlomo; Meystel, Alexander M.

    2005-03-01

    Despite remarkable new developments in stochastic hydrology and adaptations of advanced methods from operations research, stochastic control, and artificial intelligence, solutions of complex real-world problems in hydrogeology have been quite limited. The main reason is the ultimate reliance on first-principle models that lead to complex, distributed-parameter partial differential equations (PDE) on a given scale. While the addition of uncertainty, and hence, stochasticity or randomness has increased insight and highlighted important relationships between uncertainty, reliability, risk, and their effect on the cost function, it has also (a) introduced additional complexity that results in prohibitive computer power even for just a single uncertain/random parameter; and (b) led to the recognition in our inability to assess the full uncertainty even when including all uncertain parameters. A paradigm shift is introduced: an adaptation of new methods of intelligent control that will relax the dependency on rigid, computer-intensive, stochastic PDE, and will shift the emphasis to a goal-oriented, flexible, adaptive, multiresolutional decision support system (MRDS) with strong unsupervised learning (oriented towards anticipation rather than prediction) and highly efficient optimization capability, which could provide the needed solutions of real-world aquifer management problems. The article highlights the links between past developments and future optimization/planning/control of hydrogeologic systems. Malgré de remarquables nouveaux développements en hydrologie stochastique ainsi que de remarquables adaptations de méthodes avancées pour les opérations de recherche, le contrôle stochastique, et l'intelligence artificielle, solutions pour les problèmes complexes en hydrogéologie sont restées assez limitées. La principale raison est l'ultime confiance en les modèles qui conduisent à des équations partielles complexes aux paramètres distribués (PDE) à une

  9. Decision-Making Style among Adolescents: Relationship with Sensation Seeking and Locus of Control

    ERIC Educational Resources Information Center

    Baiocco, Roberto; Laghi, Fiorenzo; D'Alessio, Maria

    2009-01-01

    The principal aim of the study was to examine the psychometric properties and construct validity of the General Decision-Making Scale (GDMS) in a sample of 700 adolescents (aged 15-19 years). Confirmatory and exploratory factor analyses provide evidence for a solid five-dimension structure reflecting the theorized construct: rational, intuitive,…

  10. 78 FR 2111 - California State Motor Vehicle Pollution Control Standards; Notice of Decision Granting a Waiver...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-09

    ... the scope of waiver determinations in 66 FR 7751 (January 25, 2001) at p. 5 and 51 FR 12391 (April 10, 1986) at p. 2, see also, e.g., 46 FR 36742 (July 15, 1981). In this case, California is combining three... emission programs.\\5\\ \\5\\ EPA's LEV waiver decisions are found at 58 FR 4166 (January 13, 1993); 64...

  11. The Right to Control One's Own Body: A Look at the "Eve" Decision.

    ERIC Educational Resources Information Center

    Rioux, Marcia; Yarmol, Karen

    1987-01-01

    The article reviews the arguments and decision of the "Eve" sterilization case decided by the Supreme Court of Canada. The court held that no one, including the courts themselves, has the power to approve the sterilization, for contraceptive purposes, of any person, mentally handicapped or not, who does not give consent. (DB)

  12. Decision Maker Perception of Information Quality: A Case Study of Military Command and Control

    ERIC Educational Resources Information Center

    Morgan, Grayson B.

    2013-01-01

    Decision maker perception of information quality cues from an "information system" (IS) and the process which creates such meta cueing, or data about cues, is a critical yet un-modeled component of "situation awareness" (SA). Examples of common information quality meta cueing for quality criteria include custom ring-tones for…

  13. Does Family Group Decision Making Affect Child Welfare Outcomes? Findings from a Randomized Control Study

    ERIC Educational Resources Information Center

    Berzin, Stephanie Cosner; Cohen, Ed; Thomas, Karen; Dawson, William C.

    2008-01-01

    This article describes the evaluation of two family group decision-making programs administered under the California Title IV-E Waiver Demonstration Project. This is the only evaluation using random assignment to examine FGDM. Overall, results did not indicate more positive outcomes for children receiving the intervention, but did indicate that…

  14. Preferred Roles in Treatment Decision Making Among Patients With Cancer: A Pooled Analysis of Studies Using the Control Preferences Scale

    PubMed Central

    Singh, Jasvinder A.; Sloan, Jeff A.; Atherton, Pamela J.; Smith, Tenbroeck; Hack, Thomas F.; Huschka, Mashele M.; Rummans, Teresa A.; Clark, Matthew M.; Diekmann, Brent; Degner, Lesley F.

    2010-01-01

    Objectives To collect normative data, assess differences between demographic groups, and indirectly compare US and Canadian medical systems relative to patient expectations of involvement in cancer treatment decision making. Study Design Meta-analysis. Methods Individual patient data were compiled across 6 clinical studies among 3491 patients with cancer who completed the 2-item Control Preferences Scale indicating the roles they preferred versus actually experienced in treatment decision making. Results The roles in treatment decision making that patients preferred were 26% active, 49% collaborative, and 25% passive. The roles that patients reported actually experiencing were 30% active, 34% collaborative, and 36% passive. Roughly 61% of patients reported having their preferred role; only 6% experienced extreme discordance between their preferred versus actual roles. More men than women (66% vs 60%, P = .001) and more US patients than Canadian patients (84% vs 54%, P <.001) reported concordance between their preferred versus actual roles. More Canadian patients than US patients preferred and actually experienced (42% vs 18%, P <.001) passive roles. More women than men reported taking a passive role (40% vs 24%, P <.001). Older patients preferred and were more likely than younger patients to assume a passive role. Conclusions Roughly half of the studied patients with cancer indicated that they preferred to have a collaborative relationship with physicians. Although most patients had the decision-making role they preferred, about 40% experienced discordance. This highlights the need for incorporation of individualized patient communication styles into treatment plans. PMID:20873956

  15. Multi-component access to a commercially available weight loss program: A randomized controlled trial

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This study examined weight loss between a community-based, intensive behavioral counseling program (Weight Watchers PointsPlus that included three treatment access modes and a self-help condition. A total of 292 participants were randomized to a Weight Watchers (WW; n=147) or a self-help condition (...

  16. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    .... See, e.g., Carol E. Curtis, Aite: More Oversight Inevitable for Sponsored Access, Securities Industry.... 40354 (August 24, 1998), 63 FR 46264 (August 31, 1998) (NASD NTM-98-66). Certain market participants may..., proprietary trading strategies, and reduce trading costs by lowering operational costs,\\7\\ commissions,...

  17. 50 CFR 648.92 - Effort-control program for monkfish limited access vessels.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... § 648.92, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... the SFMA must declare that they are fishing in this area through the vessel call-in system or VMS... fishing in the NFMA with a VMS unit. Any limited access NE multispecies vessel fishing on a sector trip...

  18. 50 CFR 648.92 - Effort-control program for monkfish limited access vessels.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... § 648.92, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... the vessel call-in system or VMS prior to the start of every trip. In addition, if a vessel does not... declaration provision for vessels fishing in the NFMA with a VMS unit. Any limited access NE...

  19. 50 CFR 648.92 - Effort-control program for monkfish limited access vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... § 648.92, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... the SFMA must declare that they are fishing in this area through the vessel call-in system or VMS... fishing in the NFMA with a VMS unit. Any limited access NE multispecies vessel fishing on a sector trip...

  20. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.