Science.gov

Sample records for access control intrusion

  1. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  2. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  3. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  4. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  5. Attentional Control and Suppressing Negative Thought Intrusions in Pathological Worry

    PubMed Central

    Fox, Elaine; Dutton, Kevin; Yates, Alan; Georgiou, George A.; Mouchlianitis, Elias

    2015-01-01

    Adaptive behavior relies on the ability to effectively and efficiently ignore irrelevant information, an important component of attentional control. The current research found that fundamental difficulties in ignoring irrelevant material are related to dispositional differences in trait propensity to worry, suggesting a core deficit in attentional control in high worriers. The degree of deficit in attentional control correlated with the degree of difficulty in suppressing negative thought intrusions in a worry assessment task. A cognitive training procedure utilizing a flanker task was used in an attempt to improve attentional control. Although the cognitive training was largely ineffective, improvements in attentional control were associated with improvements in the ability to suppress worry-related thought intrusions. Across two studies, the findings indicate that the inability to control worry-related negative thought intrusions is associated with a general deficiency in attentional control. PMID:26504672

  6. Evaluation of vapor intrusion using controlled building pressure.

    PubMed

    McHugh, Thomas E; Beckley, Lila; Bailey, Danielle; Gorder, Kyle; Dettenmaier, Erik; Rivera-Duarte, Ignacio; Brock, Samuel; MacGregor, Ian C

    2012-05-01

    The use of measured volatile organic chemical (VOC) concentrations in indoor air to evaluate vapor intrusion is complicated by (i) indoor sources of the same VOCs and (ii) temporal variability in vapor intrusion. This study evaluated the efficacy of utilizing induced negative and positive building pressure conditions during a vapor intrusion investigation program to provide an improved understanding of the potential for vapor intrusion. Pressure control was achieved in five of six buildings where the investigation program was tested. For these five buildings, the induced pressure differences were sufficient to control the flow of soil gas through the building foundation. A comparison of VOC concentrations in indoor air measured during the negative and positive pressure test conditions was sufficient to determine whether vapor intrusion was the primary source of VOCs in indoor air at these buildings. The study results indicate that sampling under controlled building pressure can help minimize ambiguity caused by both indoor sources of VOCs and temporal variability in vapor intrusion. PMID:22486634

  7. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  8. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  9. Control and intrusive memories as possible determinants of chronic stress.

    PubMed

    Baum, A; Cohen, L; Hall, M

    1993-01-01

    Amidst confusion about the nature and usefulness of the stress construct and distinctions between acute and chronic stress, research has begun to identify mechanisms by which stress affects health and by which stress can persist beyond the physical presence of the stressor. In addition, research has begun to identify reasons for selective vulnerability to chronic stress. One of the possible reasons for chronic stress following traumatic events is the disorganizing effect of loss of control and violation of expectations for regulating aspects of one's life normally under control. Data from a longitudinal study of chronic stress at Three Mile Island in the wake of the nuclear accident there suggest that loss of control and frequent experience of intrusive memories about the accident and its aftermath were related to persistent stress responding several years after the accident. The relationships between stress responding and conditioning and consolidation of stressful memories are considered as a basis for persistent intrusive memories and chronic stress. PMID:8346335

  10. Assessment of regional management strategies for controlling seawater intrusion

    USGS Publications Warehouse

    Reichard, E.G.; Johnson, T.A.

    2005-01-01

    Simulation-optimization methods, applied with adequate sensitivity tests, can provide useful quantitative guidance for controlling seawater intrusion. This is demonstrated in an application to the West Coast Basin of coastal Los Angeles that considers two management options for improving hydraulic control of seawater intrusion: increased injection into barrier wells and in lieu delivery of surface water to replace current pumpage. For the base-case optimization analysis, assuming constant groundwater demand, in lieu delivery was determined to be most cost effective. Reduced-cost information from the optimization provided guidance for prioritizing locations for in lieu delivery. Model sensitivity to a suite of hydrologic, economic, and policy factors was tested. Raising the imposed average water-level constraint at the hydraulic-control locations resulted in nonlinear increases in cost. Systematic varying of the relative costs of injection and in lieu water yielded a trade-off curve between relative costs and injection/in lieu amounts. Changing the assumed future scenario to one of increasing pumpage in the adjacent Central Basin caused a small increase in the computed costs of seawater intrusion control. Changing the assumed boundary condition representing interaction with an adjacent basin did not affect the optimization results. Reducing the assumed hydraulic conductivity of the main productive aquifer resulted in a large increase in the model-computed cost. Journal of Water Resources Planning and Management ?? ASCE.

  11. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  12. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  13. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    PubMed

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts. PMID:10816904

  14. Obsessive intrusive thoughts in nonclinical subjects. Part II. Cognitive appraisal, emotional response and thought control strategies.

    PubMed

    Purdon, C; Clark, D A

    1994-05-01

    This second part of the study reports on the appraisal and thought control responses of 270 students to their most upsetting intrusive thought. Multiple regression analysis revealed that belief that one could act on the intrusive thought and perceived uncontrollability of the thought were the two most important predictors of the frequency, or persistence of the distressing intrusion. Intrusions rated as very difficult to control were also associated with increased belief that one could act on the intrusion, avoidance of situations that may trigger the intrusion, reduced success with one's most typical thought control strategy and higher thought frequency. Based on the Padua Inventory Total score, high and low obsessional Ss were selected. Highly obsessional individuals reported more unwanted obsessive intrusive thoughts and rated their thoughts as significantly more frequent and believable than low obsessive individuals. The type of thought control strategy typically used was not a factor in thought frequency and controllability, nor did it differentiate between high and low obsessional groups. The results are discussed in terms of Salkovskis' cognitive model of obsessions and intrusive thoughts. PMID:8192639

  15. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    ERIC Educational Resources Information Center

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  16. Bibliographic Access and Control System.

    ERIC Educational Resources Information Center

    Kelly, Betsy; And Others

    1982-01-01

    Presents a brief summary of the functions of the Bibliographic Access & Control System (BACS) implemented at the Washington University School of Medicine Library, and outlines the design, development, and uses of the system. Bibliographic control of books and serials and user access to the system are also discussed. (Author/JL)

  17. Externalizing symptoms, effortful control, and intrusive parenting: A test of bidirectional longitudinal relations during early childhood.

    PubMed

    Eisenberg, Nancy; Taylor, Zoe E; Widaman, Keith F; Spinrad, Tracy L

    2015-11-01

    At approximately 30, 42, and 54 months of age (N = 231), the relations among children's externalizing symptoms, intrusive maternal parenting, and children's effortful control (EC) were examined. Both intrusive parenting and low EC have been related to psychopathology, but children's externalizing problems and low EC might affect the quality of parenting and one another. Mothers' intrusive behavior with their children was assessed with observations, children's EC was measured with mothers' and caregivers' reports, and children's externalizing symptoms were assessed with mothers', fathers', and caregivers' reports. In a structural equation panel model, bidirectional relations between intrusive parenting and EC were found: EC at 30 and 42 months predicted low levels of intrusive parenting a year later, controlling for prior levels of parenting and vice versa. Moreover, high levels of children's externalizing problems at both 30 and 42 months negatively predicted EC a year later, controlling for prior levels of EC. Although externalizing problems positively predicted high EC over time, this appeared to be a suppression effect because these variables had a strong negative pattern in the zero-order correlations. Moreover, when controlling for the stability of intrusive parenting, EC, and externalizing (all exhibited significant stability across time) and the aforementioned cross-lagged predictive paths, EC and externalizing problems were still negatively related within the 54-month assessment. The findings are consistent with the view that children's externalizing behavior undermines their EC and contributes to intrusive mothering and that relations between intrusive parenting and EC are bidirectional across time. Thus, interventions that focus on modifying children's externalizing problems (as well as the quality of parenting) might affect the quality of parenting they receive and, hence, subsequent problems with adjustment. PMID:26439056

  18. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  19. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  20. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  1. Controlling Access to Suicide Means

    PubMed Central

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  2. ACCESS: Detector Control and Performance

    NASA Astrophysics Data System (ADS)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  3. Multiple Levels of Bilingual Language Control: Evidence from Language Intrusions in Reading Aloud

    PubMed Central

    Gollan, Tamar H.; Schotter, Elizabeth R.; Gomez, Joanne; Murillo, Mayra; Rayner, Keith

    2013-01-01

    Bilinguals rarely produce words in an unintended language. However, we induced such intrusion errors (e.g., saying el instead of he) in 32 Spanish-English bilinguals who read aloud language-selective and language-mixed paragraphs with English or Spanish word order. Bilinguals produced language intrusions almost exclusively in language-mixed paragraphs, and most often when attempting to produce dominant-language targets (accent-only errors also exhibited reversed language dominance effects). Most intrusion errors occurred for function word targets, especially when they did not match paragraph language word order. Eye movements showed that fixating a word in the non-target language increased intrusion errors only for function word targets. Together, these results imply multiple mechanisms of language control, including (a) inhibition of the dominant language at both lexical (Green, 1998) and sublexical processing levels, (b) special retrieval mechanisms for function words in mixed-language utterances (Myers-Scotton, 1993), and (c) attention’s role in monitoring target language for match with intended language. PMID:24367061

  4. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  5. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  6. Offshore Stratigraphic Controls on Salt-Water Intrusion in Los Angeles Area Coastal Aquifers

    NASA Astrophysics Data System (ADS)

    Edwards, B. D.; Ponti, D. J.; Ehman, K. D.; Tinsley, J. C.; Reichard, E. G.

    2002-12-01

    Ground water is a major component of the water supply for the ~10 million residents of Los Angeles County. Ground water pumping, linked to population growth since the early 1900's, caused water levels to decline, reversed seaward hydraulic gradients in some coastal aquifers, and resulted in salt water intrusion. United States Geological Survey geologists and hydrologists are working cooperatively with local water agencies to (1) understand and model the process of salt-water intrusion in this siliciclastic, structurally complex basin, and (2) identify potential pathways for the salt-water intrusion. We collected over 2000 trackline-km of single- and multi-channel intermediate- and high-resolution seismic-reflection profiles (60 to 5000 Hz) from the Los Angeles/Long Beach Harbor complex and the adjacent San Pedro shelf to develop a 3-dimensional stratigraphic model of the coastal aquifer system. These data define stratal geometries, paleo-channels, and fault traces in the offshore that are potential pathways of salt-water intrusion. The offshore seismic-reflection profiles correlate with onshore geophysical and borehole data collected from four nearby drill sites that were cored continuously to depths ranging to 400 meters. These core holes provide detailed 1-dimensional reference sections that furnish stratigraphic, age, and facies control for the seismic-reflection profiles. The coastal aquifer system is described using sequence stratigraphic concepts as units deposited during eustatic sea level fluctuations during the Pleistocene to Recent. Seismic-reflection profiles identify sequence boundaries, and hence aquifer and aquitard units, by the truncation and onlap of reflectors. If and where the sequences crop out on the sea floor provides a potential pathway for intrusion. The youngest unit, the Gaspur aquifer, is intruded with salt water and consists of at least two flat-lying sequences, each marked by basal gravelly sands deposited by the ancestral Los Angeles

  7. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  8. Controlling factors on earthquake swarms associated with magmatic intrusions; constraints from Iceland

    NASA Astrophysics Data System (ADS)

    Pedersen, R.; Sigmundsson, F.; Einarsson, P.; Brandsdottir, B.; Arnadottir, T.

    2005-12-01

    Intrusion of magma into the Earth's crust is frequently associated with seismic activity, often occurring as distinct earthquake swarms. Understanding the nature of these swarms is important for evaluating crisis situations in volcanic areas. However, there often seem to be little correlation between the amount of seismic energy release, the spatial extent of the volume of rock affected by the stress perturbations, and the volume of magma on the move, which complicates the immediate risk evaluation. A number of factors may influence the evolution of a magmatically induced seismic swarm and the resulting seismic energy release. A number of factors need to be evaluated in each individual case. These are, in random order: the crustal thickness, presence/absence of a crustal magma chamber, geothermal gradient, magmatic flow rate/stressing rate, intrusion volume, depth of intrusion, tectonic setting of the intruded area, regional stresses and tectonic history. Based on three case studies, where seismic swarm activities have been confirmed through deformation measurements to be related to magmatic movements, we attempt to evaluate the relative importance of the assumed controlling factors. All case examples are located within Iceland, but in different tectonic settings. 1. The Hengill triple junction, situated where two extensional plate boundaries join a transform zone. The area experienced a period of unusually persistent earthquake activity from 1994 to 1999, contemporaneously with ground uplift at a rate of 1-2 cm/yr. The uplift was modeled as a response to magma injection at about 7 km depth. 2. The Eyjafjallajokull volcano, situated in a volcanic flank zone where extensional fractures are only poorly developed. Two minor seismic swarms, in 1994 and 1999; were associated with a cumulative surface uplift of more than 35 cm. The two uplift events were modeled as sill intrusions at depths of 4.5 to 6.5 km. 3. The Krafla rift segment, forming part of an extensional

  9. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Design and Performance Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic irradiator must have a door or other...

  10. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  11. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  12. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  13. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  14. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  15. Intrusive versus domiciliated triatomines and the challenge of adapting vector control practices against Chagas disease

    PubMed Central

    Waleckx, Etienne; Gourbière, Sébastien; Dumonteil, Eric

    2015-01-01

    Chagas disease prevention remains mostly based on triatomine vector control to reduce or eliminate house infestation with these bugs. The level of adaptation of triatomines to human housing is a key part of vector competence and needs to be precisely evaluated to allow for the design of effective vector control strategies. In this review, we examine how the domiciliation/intrusion level of different triatomine species/populations has been defined and measured and discuss how these concepts may be improved for a better understanding of their ecology and evolution, as well as for the design of more effective control strategies against a large variety of triatomine species. We suggest that a major limitation of current criteria for classifying triatomines into sylvatic, intrusive, domiciliary and domestic species is that these are essentially qualitative and do not rely on quantitative variables measuring population sustainability and fitness in their different habitats. However, such assessments may be derived from further analysis and modelling of field data. Such approaches can shed new light on the domiciliation process of triatomines and may represent a key tool for decision-making and the design of vector control interventions. PMID:25993504

  16. Stress control of deep rift intrusion at Mauna Loa volcano, Hawaii.

    PubMed

    Amelung, Falk; Yun, Sang-Ho; Walter, Thomas R; Segall, Paul; Kim, Sang-Wan

    2007-05-18

    Mauna Loa volcano, Hawaii, deforms by a combination of shallow dike intrusions in the rift zones and earthquakes along the base of the volcano, but it is not known how the spreading is accommodated in the lower part of the volcanic edifice. We present evidence from interferometric synthetic aperture radar data for secular inflation of a dike-like magma body at intermediate depth in the southwest rift zone during 2002 to 2005. Magma accumulation occurred in a section of the rift zone that was unclamped by previous dikes and earthquakes, suggesting that stress transfer plays an important role in controlling subsurface magma accumulation. PMID:17510364

  17. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  18. To suppress, or not to suppress? That is repression: controlling intrusive thoughts in addictive behaviour.

    PubMed

    Moss, Antony C; Erskine, James A K; Albery, Ian P; Allen, James Richard; Georgiou, George J

    2015-05-01

    Research to understand how individuals cope with intrusive negative or threatening thoughts suggests a variety of different cognitive strategies aimed at thought control. In this review, two of these strategies--thought suppression and repressive coping--are discussed in the context of addictive behaviour. Thought suppression involves conscious, volitional attempts to expel a thought from awareness, whereas repressive coping, which involves the avoidance of thoughts without the corresponding conscious intention, appears to be a far more automated process. Whilst there has been an emerging body of research exploring the role of thought suppression in addictive behaviour, there remains a dearth of research which has considered the role of repressive coping in the development of, and recovery from, addiction. Based on a review of the literature, and a discussion of the supposed mechanisms which underpin these strategies for exercising mental control, a conceptual model is proposed which posits a potential common mechanism. This model makes a number of predictions which require exploration in future research to fully understand the cognitive strategies utilised by individuals to control intrusive thoughts related to their addictive behaviour. PMID:25648574

  19. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  20. Comparing the performance of injection and infiltration in controlling seawater intrusion

    NASA Astrophysics Data System (ADS)

    Lu, C.

    2015-12-01

    Among various strategies introduced for controlling seawater intrusion, artificial recharge through either well injection or pond infiltration is used most commonly in practice. In this study, we compare the performance of well injection and pond infiltration in controlling seawater intrusion through two scenario groups. First, a single injection well is compared with an elliptical infiltration pond by assuming that the pond and the well share the same location and the recharge rate. Second, an injection-extraction well pair system is compared with an elliptical pond infiltration-well extraction system by assuming the same condition as in the first scenario and the same location of the extraction well. The quantitative indicators including the interface toe location, saltwater volume, and the maximum net extraction rate are derived analytically using the potential theory. By comparing the two schemes in the first scenario group, it is found that the infiltration pond significantly outperforms the injection well under the condition that the major semi-axis of the ellipse is along the coastline. Importantly, a critical location of the infiltration pond/injection well is found, under which the maximum reduction in the saltwater volume is achieved. The study of the second scenario suggests that the pond-well system significantly outperforms a well-pair system in terms of the maximum net extraction rate, if the major semi-axis of the ellipse is along the coastline. Sensitivity analysis shows that the shape of the elliptical pond (i.e., the ratio of the major semi-axis to the minor semi-axis) is a key design parameter controlling its performance. The analytical analysis in this study provides initial guidance for practitioners when using the aquifer recharge strategy to restore a salinized coastal aquifer.

  1. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  2. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  3. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  4. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2010-01-01 2010-01-01 false Access control. 36.23 Section 36.23 Energy...

  5. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy...

  6. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy...

  7. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2014-01-01 2014-01-01 false Access control. 36.23 Section 36.23 Energy...

  8. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  9. Speed control system for an access gate

    SciTech Connect

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  10. Bro Intrusion Detection System

    SciTech Connect

    Paxson, Vern; Campbell, Scott; leres, Craig; Lee, Jason

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or access to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.

  11. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  12. Intrusive prospective imagery, posttraumatic intrusions and anxiety in schizophrenia.

    PubMed

    Malcolm, Charlotte P; Picchioni, Marco M; Ellett, Lyn

    2015-12-30

    Trauma exposure and intrusive thoughts are commonly reported in both schizophrenia and posttraumatic stress disorder (PTSD). Information processing accounts suggest that intrusions occur in the two conditions as a result of insufficient state and/or trait contextual processing in long-term memory. Most research has focused on intrusions about past events, while growing evidence suggests that intrusions about prospective imagined events warrants further investigation. Prospective intrusive imagery has yet to be examined in psychotic disorders but could provide crucial information regarding the aetiology and maintenance of psychotic symptoms. The current study examines the role of prospective intrusive imagery, posttraumatic intrusions and anxiety in schizophrenia. Fifty-seven participants (30 patients and 27 healthy controls) completed measures of trauma, PTSD, anxiety, general non-affective use of imagery, and intrusive prospective imagery. Patients reported significantly more intrusive prospective imagery relative to control participants but, importantly, not greater use of general non-affective imagery. Intrusive prospective imagery was associated with posttraumatic intrusions and anxiety in schizophrenia. The findings are consistent with information processing models of intrusions and psychosis, and provide novel insights for theoretical accounts, clinical formulation and therapeutic targets for psychotic symptoms in schizophrenia. PMID:26619917

  13. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  14. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  15. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Control of public access. 420.53 Section....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and unauthorized, unescorted access to explosive hazard facilities or other hazard areas not otherwise...

  16. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  17. Context-Based E-Health System Access Control Mechanism

    NASA Astrophysics Data System (ADS)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  18. Application-Defined Decentralized Access Control.

    PubMed

    Xu, Yuanzhong; Dunn, Alan M; Hofmann, Owen S; Lee, Michael Z; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%-9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications' security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  19. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  20. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  1. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... individuals authorized to have unescorted access to the secured area are able to gain entry; (2) Ensure...

  2. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site,...

  3. Controls on magmatic PGE and Au mineralization in the Skaergaard Intrusion

    NASA Astrophysics Data System (ADS)

    Keays, Reid; Tegner, Christian

    2013-04-01

    The Skaergaard Intrusion of East Greenland is the host for significant magmatic PGE and Au mineralization (the Platinova Reefs). It was formed from a single batch of magma that crystallized in its entirety as a closed system. Unlike all other examples of significant magmatic PGE and Ni-Cu-PGE mineralization, the Skaergaard rocks exhibit no evidence of crustal contamination, the major factor responsible for driving magmas to sulphide saturation and ore genesis. Although the Skaergaard rocks and mineralized zones have extremely low S contents, the mineralization is believed to be the product of late stage sulphide saturation of the magma. Three factors drove the magma to sulphide saturation, viz: (1) prolonged build up of S in the residual melt of the fractionating magma; (2) crystallization of magnetite which slowed down the build up of FeO in the fractionating magma; and (3) cooling of the magma against the walls of the intrusion. High quality PGE, Au, Cu, S, Se data and other geochemical data for samples from a detailed stratigraphic section through the Skaergaard intrusion are used to model these elements throughout its crystallization history, estimate their concentrations in the Skaergaard parental magma, and to establish the timing of sulphide saturation and the causes of PGE-Au mineralization. The model indicates that the parental magma contained 4.0 ppb Au, 18.7 ppb Pd, 9.0 ppb Pt, 95 ppb Se and 240 ppm Cu. The high Pd/Pt ratio indicates that the magma had undergone a significant amount of fractionation prior to entry into the Skaergaard magma chamber, consistent with the silicate mineralogy. A sharp increase in PGE contents (but not Cu or incompatible lithophile trace elements) 300m below the Platinova Reefs coincides with the first appearance of cumulus magnetite and marks the stratigraphic position at which tiny amounts of cumulus PGE-rich sulphides segregated from the magma. Although the S contents of all rocks below the Platinova Reefs are below the

  4. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  5. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  6. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured...

  7. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  8. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  9. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  10. Modelling The Environmental Impact of Controlling Saline Intrusion In The Mekong River Delta, Vietnam

    NASA Astrophysics Data System (ADS)

    Lehmann, E.; Gowing, J.; Payton, R.

    The delta at the mouth of the Mekong River extends over 50,000 km2 in Vietnam and Cambodia. It is a highly productive environment both for rice and fish, but conflicts arise between their water quality demands. In this paper we focus on an investigation of this conflict in the Ca Mau peninsula, which lies entirely within Vietnam at the southern tip of the delta. The study area is a highly modified environment in which the natural mangrove veg- etation has been removed and a complex network of natural and man-made channels has been created. In an attempt to manage salinity intrusion into this environment, a number of tidal sluices have been constructed in recent years leading to progressive expansion of the area suitable for intensification of rice production. However, this has also led to negative impact on fish and shrimp production due to the change from brackish to fresh water conditions. The impact of this change is further exacerbated by the existence throughout a large part of the Ca Mau peninsula of acid sulphate soils. These are old marine sediments which are sulphur rich and have the potential to release sulphuric acid once they be- come oxidised. This has serious implications for productivity of rice fields and also for severe impacts on the aquatic environment. This paper reports an interdisciplinary investigation of the environmental impact of these changes. We identify the sources of acidity, which include rice fields, shrimp ponds and excavated channel sediments. We add different water quality modules to an existing hydraulic and transport model to allow simulation of temporal and spatial variation of water quality within the study area. We show a special interest on the water exchange between the fields and the canals as the area suffers from floods and dry spells.

  11. Cross-Language Intrusion Errors in Aging Bilinguals Reveal the Link Between Executive Control and Language Selection

    PubMed Central

    Gollan, Tamar H.; Sandoval, Tiffany; Salmon, David P.

    2013-01-01

    Bilinguals outperform monolinguals on measures of executive control, but it is not known how bilingualism introduces these advantages. To address this question, we investigated whether language-control failures increase with aging-related declines in executive control. Eighteen younger and 18 older Spanish-English bilinguals completed a verbal-fluency task, in which they produced words in 18 categories (9 in each language), and a flanker task. Performance on both tasks exhibited robust effects of aging, but cross-language and within-language errors on the verbal-fluency task differed in a number of ways. Within-language errors occurred relatively often and decreased with higher levels of education in both younger and older bilinguals. In contrast, cross-language intrusions (e.g., inadvertently saying an English word on a Spanish-language trial) were rarely produced, were not associated with education level, and were strongly associated with flanker-task errors in older but not younger bilinguals. These results imply that executive control plays a role in maintaining language selection, but they also suggest the presence of independent forces that prevent language-selection errors. PMID:21775653

  12. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed. PMID:21751015

  13. Uniaxial creep as a control on mercury intrusion capillary pressure in consolidating rock salt

    SciTech Connect

    Dewers, Thomas; Heath, Jason E.; Leigh, Christi D.

    2015-09-01

    The nature of geologic disposal of nuclear waste in salt formations requires validated and verified two - phase flow models of transport of brine and gas through intact, damaged, and consolidating crushed salt. Such models exist in oth er realms of subsurface engineering for other lithologic classes (oil and gas, carbon sequestration etc. for clastics and carbonates) but have never been experimentally validated and parameterized for salt repository scenarios or performance assessment. Mo dels for waste release scenarios in salt back - fill require phenomenological expressions for capillary pressure and relative permeability that are expected to change with degree of consolidation, and require experimental measurement to parameterize and vali date. This report describes a preliminary assessment of the influence of consolidation (i.e. volume strain or porosity) on capillary entry pressure in two phase systems using mercury injection capillary pressure (MICP). This is to both determine the potent ial usefulness of the mercury intrusion porosimetry method, but also to enable a better experimental design for these tests. Salt consolidation experiments are performed using novel titanium oedometers, or uniaxial compression cells often used in soil mech anics, using sieved run - of - mine salt from the Waste Isolation Pilot Plant (WIPP) as starting material. Twelve tests are performed with various starting amounts of brine pore saturation, with axial stresses up to 6.2 MPa (%7E900 psi) and temperatures to 90 o C. This corresponds to UFD Work Package 15SN08180211 milestone "FY:15 Transport Properties of Run - of - Mine Salt Backfill - Unconsolidated to Consolidated". Samples exposed to uniaxial compression undergo time - dependent consolidation, or creep, to various deg rees. Creep volume strain - time relations obey simple log - time behavior through the range of porosities (%7E50 to 2% as measured); creep strain rate increases with temperature and applied stress as

  14. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  15. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  16. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  17. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  18. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  19. Role Based Access Control system in the ATLAS experiment

    NASA Astrophysics Data System (ADS)

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  20. Access control within military C4ISR systems

    NASA Astrophysics Data System (ADS)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  1. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  2. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  3. An analogue study of intrusions.

    PubMed

    Laposa, Judith M; Alden, Lynn E

    2006-07-01

    According to cognitive theorists, intrusive trauma memories have their origin in how information during the event is processed. Two studies investigated functional cognitive strategies during medical crises that might protect against intrusions. In Study 1, interviews with health-care professionals were used to identify cognitive strategies judged to be effective in controlling emotions and dealing with medical crises. Study 2 systematically manipulated the use of those strategies in a trauma analogue film paradigm. Experimental participants reported fewer intrusions, and less fear and avoidance of film-related stimuli during the subsequent week than controls. The manipulation did not affect anxiety during the film or memory disorganization. Implications for cognitive theories of intrusion development are discussed. PMID:16125135

  4. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  5. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  6. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  7. Structural control on basaltic dike and sill emplacement, Paiute Ridge mafic intrusion complex, southern Nevada

    SciTech Connect

    Carter Krogh, K.E.; Valentine, G.A.

    1996-08-01

    Late Miocene basaltic sills and dikes in the Paiute Ridge area of southern nevada show evidence that their emplacement was structurally controlled. Basaltic dikes in this area formed by dilating pre-existing vertical to steeply E-dipping normal faults. Magma propagation along these faults must have required less energy than the creation of a self-propagated fracture at dike tips and the magma pressure must have been greater than the compressive stress perpendicular to the fault surface. N- to NE-trending en echelon dikes formed locally and are not obviously attached to the three main dikes in the area. The en echelon segments are probably pieces of deeper dikes, which are segmented perhaps as a result of a documented rotation of the regional stresses. Alternatively, changes in orientation of principal stresses in the vicinity of each en echelon dike could have resulted from local loads associated with paleotopographic highs or nearby structures. Sills locally branched off some dikes within 300 m of the paleosurface. These subhorizontal bodies occur consistently in the hanging wall block of the dike-injected faults, and intrude Tertiary tuffs near the Paleozoic-Tertiary contact. The authors suggest that the change in stresses near the earth`s surface, the material strength of the tuff and paleozoic rocks, and the Paleozoic bedding dip direction probably controlled the location of sill formation and direction of sill propagation. The two largest sills deflected the overlying tuffs to form lopoliths, indicating that the magma pressure exceeded vertical stresses at that location and that the shallow level and large size of the sills allowed interaction with the free (earth`s) surface. 32 refs., 4 figs., 1 tab.

  8. Implementing context and team based access control in healthcare intranets.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users. PMID:12507264

  9. Access control in healthcare: the methodology from legislation to practice.

    PubMed

    Ferreira, Ana; Correia, Ricardo; Chadwick, David; Antunes, Luis

    2010-01-01

    Translating legislation and regulations into access control systems in healthcare is, in practice, not a straightforward task. Excessive regulation can create barriers to appropriate patient treatment. The main objective of this paper is to present a new methodology that can define, from legislation to practice, an access control policy as well as a RBAC model, in order to comprise generic legislation and regulation issues together with the access control needs from the ends users of a healthcare information system. The methodology includes the use of document analysis as well as grounded theory and mixed methods research. This methodology can be easily applied within a healthcare practice or any other domain with similar requirements. It helps to bridge the gap between legislation and end users' needs, while integrating information security into the healthcare processes in a more meaningful way. PMID:20841770

  10. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  11. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena. PMID:20391178

  12. Emergency access authorization for personally controlled online health care data.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2012-02-01

    Personally controlled health records (PCHR) systems have emerged to allow patients to control their own medical data. In a PCHR system, all the access privileges to a patient's data are granted by the patient. However, in many emergency cases, it is impossible for the patient to participate in access authorization on site when immediate medical treatment is needed. To solve the emergency access authorization problem in the absence of patients, we consider two cases: a) the requester is already in the PCHR system but has not obtained the access privilege of the patient's health records, and b) the requester does not even have an account in the PCHR system to submit its request. For each of the two cases, we present a method for emergency access authorization, utilizing the weighted voting and source authentication cryptographic techniques. Our methods provide an effective, secure and private solution for emergency access authorization, that makes the existing PCHR system frameworks more practical and thus improves the patients' experiences of health care when using PCHR systems. We have implemented a prototype system as a proof of concept. PMID:20703719

  13. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  14. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  15. Controlling user access to electronic resources without password

    SciTech Connect

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  16. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  17. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  18. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  19. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  20. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  1. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  2. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  3. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  4. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  5. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  6. Access control and interlock system at the Advanced Photon Source

    SciTech Connect

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  7. Accessibility

    MedlinePlus

    ... www.nlm.nih.gov/medlineplus/accessibility.html MedlinePlus Accessibility To use the sharing features on this page, ... Subscribe to RSS Follow us Disclaimers Copyright Privacy Accessibility Quality Guidelines Viewers & Players MedlinePlus Connect for EHRs ...

  8. Acoustic emission intrusion detector

    DOEpatents

    Carver, Donald W.; Whittaker, Jerry W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  9. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  10. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  11. Structural control on the shape of intrusions in the Koktokay ore district, Chinese Altai, north western China

    NASA Astrophysics Data System (ADS)

    Tian, Ye; Qin, Ke Zhang; Zhou, Qi Feng; Paterson, Greig

    2016-02-01

    The Koktokay pegmatite-type rare-metal-bearing ore district in the Altai orogen is famous for both its large scale and its diversity of rare metals. However, the emplacement mechanisms of the ore-bearing pegmatite intrusions in the Koktokay ore district are still unclear. Based on field observations, the emplacement of the ore-bearing pegmatite intrusions falls into two types. The first type is typical of the formation of dykes and sills, whereby they intruded into fan shaped, moderate dipping, joints within plutonic rocks. The second type involves the formation of a punched laccolith that was fed by a pegmatite sill. Magmatic stoping is the main mechanism of the laccolith emplacement. The peripheral faults played an important role in helping the emplacement of the laccolith. The trend of dykes and sills indicate two potential prospecting areas, which are located in the western and northern regions of the Koktokay ore district.

  12. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  13. RDFacl: A Secure Access Control Model Based on RDF Triple

    NASA Astrophysics Data System (ADS)

    Kim, Jaehoon; Park, Seog

    An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.

  14. Current status of link access control and encryption system

    SciTech Connect

    Springer, E.

    1984-01-01

    The purpose of this project is to develop necessary technologies for the secure protection of data communication networks. Data encryption equipment, using the federal government's Data Encryption Standard (DES) algorithm, was designed and developed. This equipment is the Link Access Control and Encryption (Link ACE) system. It protects unclassified sensitive data transmissions over unprotected lines between central computers and remote terminals. Link ACE units have been installed and are operational in the Department of Energy's Central Personnel Clearance Index (CPCI) system.

  15. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  16. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  17. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  18. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control. PMID:20703920

  19. Segmented proportional spacing medium access control protocol for APONs

    NASA Astrophysics Data System (ADS)

    Wang, Hongbin; Yu, Yiqing; Zhou, Dongru; Meng, Bo

    2004-04-01

    Combining asynchronous transfer mode (ATM) over a passive optical network (APON) can provide broadband services as defined by the international telecommunications union (ITU). The medium access control (MAC) layer is of primary importance to the access scheme as in controls the flow of traffic in the access network. This paper presents a novel MAC protocol-segmented proportional spacing MAC protocol, which complies with ITU-T recommendations, is firstly designed for APON system based on the analysis of different type of bandwidth allocation algorithms. The main idea of protocol is: frame structure adopts the structure regulated by ITU; fine time division for the optical network unit (ONU) to apply bandwidth; the bandwidth"s application is not based on the T-interface but ONU, the bandwidth allocation algorithm uses segmented proportional spacing algorithm. At last, we compare our protocol to other MAC protocols, the results show that proportional spacing and segmented bandwidth allocation control the cell jitter with satisfactory and improve the system bandwidth efficiency at same time, the correlative conclusions are given finally.

  20. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  1. Global Access-controlled Transfer e-frame (GATe)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, asmore » well as provides reporting capabilities.« less

  2. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  3. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  4. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  5. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  6. Access Control of Cloud Service Based on UCON

    NASA Astrophysics Data System (ADS)

    Danwei, Chen; Xiuli, Huang; Xunyi, Ren

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. This paper introduces cloud computing and cloud service firstly, and then gives cloud services access control model based on UCON and negotiation technologies, and also designs the negotiation module.

  7. Interior intrusion detection systems

    SciTech Connect

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  8. Controls of evaporative irrigation return flows in comparison to seawater intrusion in coastal karstic aquifers in northern Sri Lanka: evidence from solutes and stable isotopes

    NASA Astrophysics Data System (ADS)

    Chandrajith, Rohana; Diyabalanage, Saranga; Premathilake, Mahinda; Hanke, Christian; van Geldern, Robert; Barth, Johannes A. C.

    2016-04-01

    region occurs through anthropogenic pollution, and particularly so due to agricultural activities. Extensive groundwater use in the peninsula may also further add concerns of active seawater intrusion after intense abstraction. The area should remain under close monitoring for both quality and quantity in order to protect groundwater as a vulnerable resource. Reference Chandrajith, R., Diyabalanage, S., Premathilake, K.M., Hanke, C., van Geldern, R. and Barth, J.A.C. (2016): Controls of evaporative irrigation return flows in comparison to seawater intrusion in coastal karstic aquifers in northern Sri Lanka: evidence from solutes and stable isotopes. - Science of the Total Environment, in press, [doi:10.1016/j.scitotenv.2016.01.050].

  9. Evaluation of descriptive and non-intrusive geophysical methods for the identification of saturation area dynamics and their controls

    NASA Astrophysics Data System (ADS)

    Steenhuis, T. S.; Dahlke, H. E.; Harpold, A. A.

    2006-12-01

    In the Catskill Mountains of New York State runoff is most commonly generated from groundwater seeps, causing parts of the landscape to saturate. Groundwater seeps and frequently saturated near stream areas are important source waters for streams, but can also be contaminant-contributing areas in agricultural fields. Knowledge of the landscape position of these saturation areas, the spatial/temporal evolution of runoff generation and the connectivity to surface water bodies are important parameters to consider. Many water quality models and risk assessment techniques should rely on these principles when assessing non-point source pollution in agricultural watersheds. However, there is little research that has comprehensively studied the spatial/temporal dynamics of these saturated areas and provides methods that meet the present needs in hydrology and hydrological modelling applications. To characterize the spatial extent of saturated areas a study was conducted on a 2.44 ha hillslope in the Town Brook watershed in the Catskill Mountains. Various non-intrusive methods were used consisting of vegetation surveys, GPS mapping and electromagnetic induction (EMI) and compared to existing information obtained from ground water table measurements and remotely sensed data. To better understand the location of the saturated area we characterized the soil profile with Ground Penetrating Radar (GPR) and Geoseismic surveys. The non-intrusive methods could not agree with the observed patterns of the saturated areas nor with a simple distributed model that used only topography and low-resolution soil information. For a better characterization of these areas additional information about soil characteristics and preferential flow paths was needed. The latter could be obtained with the Geoseismic and Ground Penetrating Radar. These instruments were capable of measuring the local depth to the shallow hard pan and the presence of natural pipes that carried large amounts of water via

  10. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  11. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal Register... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published...

  12. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  13. Controlled Access under Review: Improving the Governance of Genomic Data Access.

    PubMed

    Shabani, Mahsa; Dyke, Stephanie O M; Joly, Yann; Borry, Pascal

    2015-12-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  14. Controlled Access under Review: Improving the Governance of Genomic Data Access

    PubMed Central

    Shabani, Mahsa; Dyke, Stephanie O. M.; Joly, Yann; Borry, Pascal

    2015-01-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  15. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  16. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  17. Safety systems and access control in the National Ignition Facility.

    PubMed

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  18. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  19. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  20. Fast detection of network intrusion

    NASA Astrophysics Data System (ADS)

    Chen, Xinjia; Walker, Ernest

    2011-06-01

    In this paper, we propose new network intrusion detection techniques which promptly detect malicious attacks and thus lower the resulting damage. Moreover, our approach rigorously control the probability of falsely implicating benign remote hosts as malicious. Such technique is especially suitable for detecting DoS attackers and port-scan attackers routinely perform random "portscans" of IP addresses to find vulnerable servers to compromise. Our method performs significantly faster and also more accurate than other current solutions.

  1. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  2. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  3. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  4. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  5. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  6. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  7. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  8. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  9. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  10. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  11. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  12. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  13. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  14. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  15. Numerical Study of a Groundwater Flow Cycling Controlled By Seawater Intrusion within Karst Conduit Networks Using Modflow-CFP

    NASA Astrophysics Data System (ADS)

    Xu, Z.; Hu, B. X.; Davis, H.

    2014-12-01

    A groundwater flow cycling process between a submarine spring and an inland fresh water spring has been simulated using the latest research version of MODFLOW-CFP (Conduit Flow Process). Spring Creek Springs and Wakulla Spring, which are located in a marine estuary and 18 km inland, respectively, are two major groundwater discharge spots of Woodville Karst Plain (WKP), North Florida, USA. The two springs are found to be connected with karst conduits networks. Rising sea level may put seawater into the Spring Creek Springs and block groundwater discharge, which, in turn, increases freshwater discharge at Wakulla Spring. Three repeating phases in a karst spring flow cycle were proposed from low rainfall period to heavy rainfall period, and back to low rainfall period. During low rainfall periods, seawater flowed back into the conduits at Spring Creek Spring and freshwater was diverted to Wakulla Spring. After heavy rainfall, seawater was pushed back from Spring Creek Spring conduits. A MODFLOW model for WKP was modified to numerically study the groundwater flow cycling and seawater intrusion for three years. Conduit network distribution, high speed groundwater flow and exchange between conduits and matrix domain were simulated through the MODFLOW-CFP model. Rainfall, springs and creeks discharge data were used to calibrate the model. Simulation results catch very well with measurements, and numerically presented the three-phase groundwater cycling. In additional, simulation results were also supported by temperature data measured in conduits, which reflect precipitation recharge to groundwater, and indicate conduit flow direction. Key Words: Karst, Seawater Instrusion, MODFLOW-CFP, Groundwater Cycling

  16. The role of estrogen in intrusive memories.

    PubMed

    Cheung, Jessica; Chervonsky, Liza; Felmingham, Kim L; Bryant, Richard A

    2013-11-01

    Intrusive memories are highly vivid, emotional and involuntary recollections which cause significant distress across psychological disorders including posttraumatic disorder (PTSD). Recent evidence has potentially extended our understanding of the development of intrusive memories by identifying biological factors which significantly impact on memories for emotionally arousing stimuli. This study investigated the role of stress on the development of intrusions for negative and neutral images, and indexed the potential contributions of sex (estrogen and progesterone) and stress (noradrenaline and cortisol) hormones. Whilst viewing the images, half the participants underwent a cold pressor stress (CPS) procedure to induce stress while the control participants immersed their hands in warm water. Saliva samples were collected to index estrogen, progesterone and noradrenergic and cortisol response. Participants (55 university students, 26 men, 29 women) viewed a series of negatively arousing and neutral images. Participants completed recall and intrusions measures 2 days later. Negative images resulted in greater recall and more intrusions than neutral images. In the cold water condition females recalled fewer neutral memories than males. Cortisol increase predicted decreased recall of negative memories in males, and estrogen predicted increased intrusions of negative images in women. These findings are consistent with evidence that circulating levels of ovarian hormones influence memory for emotionally arousing events, and provides the first evidence of the influence of sex hormones on intrusive memories. These results provide one possible explanation for the higher incidence of anxiety disorders in women. PMID:23891994

  17. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  18. Detection and response to unauthorized access to a communication device

    DOEpatents

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  19. Concurrency control and recovery on lightweight directory access protocol

    NASA Astrophysics Data System (ADS)

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  20. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  1. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  2. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  3. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  4. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas. In addition to the requirements in...

  5. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a) The licensee shall ensure that...

  6. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  7. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  8. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  9. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  10. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  11. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  13. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  14. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for establishing logical access... Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional practitioner. (a... practitioner that enters permissions for logical access controls into the application. The...

  15. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  16. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  17. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  18. Zircon Recycling in Arc Intrusions

    NASA Astrophysics Data System (ADS)

    Miller, J.; Barth, A.; Matzel, J.; Wooden, J.; Burgess, S.

    2008-12-01

    Recycling of zircon has been well established in arc intrusions and arc volcanoes, but a better understanding of where and how zircons are recycled can help illuminate how arc magma systems are constructed. To that end, we are conducting age, trace element (including Ti-in-zircon temperatures; TzrnTi) and isotopic studies of zircons from the Late Cretaceous (95-85 Ma) Tuolumne Intrusive Suite (TIS) in the Sierra Nevada Batholith (CA). Within the TIS zircons inherited from ancient basement sources and/or distinctly older host rocks are uncommon, but recycled zircon antecrysts from earlier periods of TIS-related magmatism are common and conspicuous in the inner and two most voluminous units of the TIS, the Half Dome and Cathedral Peak Granodiorites. All TIS units have low bulk Zr ([Zr]<150 ppm) and thus low calculated zircon saturation temperatures (Tzrnsat). Within the Half Dome and Cathedral Peak, TzrnTi values are predominantly at or below average Tzrnsat, and there is no apparent correlation between age and TzrnTi. At temperatures appropriate for granodiorite/tonalite melt generation (at or above biotite dehydration; >825°C), [Zr] in the TIS is a factor of 2 to 3 lower than saturation values. Low [Zr] in TIS rocks might be attributed to a very limited supply of zircon in the source, by disequilibrium melting and rapid melt extraction [1], by melting reactions involving formation of other phases that can incorporate appreciable Zr [2], or by removal of zircon at an earlier stage of magma evolution. Based on a preliminary compilation of literature data, low [Zr] is common to Late Cretaceous N.A. Cordilleran granodioritic/tonalitic intrusions (typically <200 ppm and frequently 100-150 ppm for individual large intrusions or intrusive suites). We infer from this that [Zr] in anatectic melts is probably not limited by zircon supply and is primarily controlled by melting parameters. Comparison of the data from TIS with one of these intrusions, the smaller but otherwise

  19. A General Model for Shallow Magmatic Intrusions

    NASA Astrophysics Data System (ADS)

    Thorey, C.; Michaut, C.

    2015-12-01

    Shallow magmatic intrusions make room for themselves by upward bending of the elastic overburden. Previous studies have shown that the bending of the overlying layer first controls the dynamics. Then, when the radius reaches a few times the flexural wavelength of the overburden, it transitions to a gravity current regime. This model predicts the appropriate geometry for both terrestrial laccoliths and large mafic sills. However, it underestimates the absolute dimensions of these magmatic intrusions; in particular, it requires abnormally high viscosity to reconcile both observations and predictions. To get some insights into the effective flow viscosity, we develop a model that account for the cooling of such elastic-plated gravity currents. We show that the coupling between the temperature field and the flow itself leads to the formation of a highly viscous region at the tip that slows down the spreading in both regimes. The intrusions are predicted to be thicker and their dimensions, especially in the bending regime, are now consistent with observations. By introducing the potentially complex structure of the overburden, we also show that the topography largely contributes to constrain the final intrusion morphology. For instance, in the case of an intrusion centered below a circular depression, the model predicts that the lithostatic increase at the crater rim prevents the magma from spreading laterally and enhances the thickening of the intrusion. This model has already proven successful in reproducing the deformations observed on potential intrusion centered below lunar impact craters. Caldera complexes often exhibit ground deformations that might be associated to the formation of shallow magmatic intrusions. InSAR imaging and GPS measurements now provide efficient tools to monitor these deformations. We conclude this study by examining the ability of the model to reproduce the deformation observed in several caldera complexes.

  20. A comparison of thought suppression to an acceptance-based technique in the management of personal intrusive thoughts: a controlled evaluation.

    PubMed

    Marcks, Brook A; Woods, Douglas W

    2005-04-01

    Research suggests that suppressing unwanted thoughts is not possible, leads to a subsequent increase in frequency of the suppressed thoughts, and results in higher levels of distress. Because thought suppression may have negative effects, an alternative, acceptance-based approach has been proposed. The current paper reports the outcomes of two studies. Study I examined the relationships between two naturally occurring strategies of thought management (thought suppression and acceptance), symptoms of psychopathology, and experiences with personally relevant intrusive thoughts. Results showed that those who naturally suppress personally relevant intrusive thoughts have more, are more distressed by, and have a greater "urge to do something" about the thoughts, while those who are naturally more accepting of their intrusive thoughts are less obsessional, have lower levels of depression, and are less anxious. Study II compared three groups (thought suppression, acceptance, and monitor-only groups) on the frequency and distress associated with experiencing personally relevant intrusive thoughts. Results revealed that those instructed to suppress their personal intrusive thoughts were unable to do so and experienced an increased level of distress after suppression, whereas those instructed to use an acceptance-based strategy experienced a decrease in discomfort level (but not thought frequency) after having used such a strategy. These data offer initial evidence that acceptance may be a useful alternative to the suppression of personally relevant intrusive thoughts. PMID:15701355

  1. A Quality of Context-Aware Approach to Access Control in Pervasive Environments

    NASA Astrophysics Data System (ADS)

    Toninelli, Alessandra; Corradi, Antonio; Montanari, Rebecca

    The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users to share resources anywhere and anytime, but makes access control a crucial issue. User/device mobility and heterogeneity, together with network topology and conditions variability, complicate access control and call for novel solutions to dynamically adapt access decisions to the different operating conditions. Several research efforts have emerged in recent years that propose to exploit context-awareness to control access to resources based on context visibility and changes. Context-based access control requires, however, to take into account the quality of context information used to drive access decisions (QoC). Quality of context has in fact a profound impact on the correct behavior of any context-aware access control framework. Using context information with insufficient quality might increase the risk of incorrect access control decisions, thus leading to dangerous security breaches in resource sharing. In this paper we propose a QoC-aware approach to access control for anywhere, anytime resource sharing. The paper describes the design, implementation and evaluation of the Proteus policy framework, which combines two design guidelines to enable dynamic adaptation of policies depending on context changes: context-awareness with QoC guarantees and semantic technologies to allow high-level description of context/policy specification and reasoning about context/policies.

  2. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  3. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  4. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  5. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  6. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  7. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  8. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  9. Bro Intrusion Detection System

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or accessmore » to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.« less

  10. Discretionary access control in a heterogeneous distributed data base management system

    SciTech Connect

    Wang, C.Y.

    1986-01-01

    An important technical problem in building a distributed database management system (DDBMS) is access control which prevents unauthorized access or malicious destruction of a database. Consider a DDBMS that uses a uniform global data model to integrate the local schemes of existing DBMSs at the sites of a network. The local DBMSs are unchanged, and the DDBMS is implemented as a module on top of the existing DBMSs at each site. The DBMS at each site is expected to retain its autonomy. That is, the local DBMS at each site maintains control of the data stored at that site. Each local DBMS decides for itself if a user (of the local DBMS or of the DDBMS) may access the data it manages. The design of the access control system for the database in such an environment presents several problems. First, the DBMSs at different sites may have different and incompatible access control mechanisms. Second, queries involving data from multiple sites must be processed by the access control mechanisms of multiple and possible different local DBMSs. Coordinating the access control mechanisms of these DBMSs to provide a consistent access control facility to the users of the heterogeneous DDBMS is a difficult task. This research discusses the problem described above. A general architecture for a DDBMS was developed. Data abstraction techniques were adapted to specify the architecture. A formal verification for the specification was completed.

  11. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  12. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  13. Detection of intrusion across multiple sensors

    NASA Astrophysics Data System (ADS)

    Long, William J.; Doyle, Jon; Burke, Glenn; Szolovits, Peter

    2003-08-01

    We have been developing an architecture for reasoning with multiple sensors distributed on a computer network, linking them with analysis modules and reasoning with the results to combine evidence of possible intrusion for display to the user. The architecture, called MAITA, consists of monitors distributed across machines and linked together under control of the user and supported by a monitor of monitors that manages the interaction among the monitors. This architecture enables the system to reason about evidence from multiple sensors. For example, a monitor can track FTP logs to detect password scans followed by successful uploads of data from foreign sites. At the same time it can monitor disk use and detect significant trends. Monitors can then combine the evidence in the sequence in which they occur and present evidence to the user that someone has successfully gained write access to the FTP site and is occupying significant disk space. This paper discusses the architecture enabling the creation, linking, and support of the monitors. The monitors may be running on the same or different machines and so appropriate communication links must be supported as well as regular status checks to ensure that monitors are still running. We will also discuss the construction of monitors for sensing the data, abstracting and characterizing data, synchronizing data from different sources, detecting patterns, and displaying the results.

  14. Non-Intrusive Impedance-Based Cable Tester

    NASA Technical Reports Server (NTRS)

    Medelius, Pedro J. (Inventor); Simpson, Howard J. (Inventor)

    1999-01-01

    A non-intrusive electrical cable tester determines the nature and location of a discontinuity in a cable through application of an oscillating signal to one end of the cable. The frequency of the oscillating signal is varied in increments until a minimum, close to zero voltage is measured at a signal injection point which is indicative of a minimum impedance at that point. The frequency of the test signal at which the minimum impedance occurs is then employed to determine the distance to the discontinuity by employing a formula which relates this distance to the signal frequency and the velocity factor of the cable. A numerically controlled oscillator is provided to generate the oscillating signal, and a microcontroller automatically controls operation of the cable tester to make the desired measurements and display the results. The device is contained in a portable housing which may be hand held to facilitate convenient use of the device in difficult to access locations.

  15. Relationships between volcano gravitational spreading and magma intrusion

    NASA Astrophysics Data System (ADS)

    Delcamp, Audray; van Wyk de Vries, Benjamin; James, Mike R.; Gailler, L. S.; Lebas, E.

    2012-04-01

    Volcano spreading, with its characteristic sector grabens, is caused by outward flow of weak substrata due to gravitational loading. This process is now known to affect many present-day edifices. A volcano intrusive complex can form an important component of an edifice and may induce deformation while it develops. Such intrusions are clearly observed in ancient eroded volcanoes, like the Scottish Palaeocene centres, or in geophysical studies such as in La Réunion, or inferred from large calderas, such as in Hawaii, the Canaries or Galapagos volcanoes. Volcano gravitational spreading and intrusive complex emplacement may act simultaneously within an edifice. We explore the coupling and interactions between these two processes. We use scaled analogue models, where an intrusive complex made of Golden syrup is emplaced within a granular model volcano based on a substratum of a ductile silicone layer overlain by a brittle granular layer. We model specifically the large intrusive complex growth and do not model small-scale and short-lived events, such as dyke intrusion, that develop above the intrusive complex. The models show that the intrusive complex develops in continual competition between upward bulging and lateral gravity spreading. The brittle substratum strongly controls the deformation style, the intrusion shape and also controls the balance between intrusive complex spreading and ductile layer-related gravitational spreading. In the models, intrusive complex emplacement and spreading produce similar structures to those formed during volcano gravitational spreading alone (i.e. grabens, folds, en échelon fractures). Therefore, simple analysis of fault geometry and fault kinetic indicators is not sufficient to distinguish gravitational from intrusive complex spreading, except when the intrusive complex is eccentric from the volcano centre. However, the displacement fields obtained for (1) a solely gravitational spreading volcano and for (2) a gravitational

  16. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  17. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  18. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  19. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    ERIC Educational Resources Information Center

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  20. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings, and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  1. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings, and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  2. Daytime intrusive thoughts and subjective insomnia symptoms.

    PubMed

    Baker, Louise D; Baldwin, David S; Garner, Matthew

    2015-10-30

    Insomnia is increasingly recognised as a 24h complaint that is associated with an increased risk of mood and anxiety disorders. However, the effects of insomnia symptoms on maladaptive daytime patterns of thinking are poorly understood. We examined the relationship between subjective insomnia symptoms, attentional control and negative thought intrusions during daytime in a large sample of undergraduates experiencing poor sleep. A total of 109 participants completed self-report measures of sleep quality, current sleepiness, anxiety and attentional control. A behavioural measure of intrusive thought required participants to control their attention during two focus periods separated by a 5min period of self-referential worry. Thought intrusions were sampled throughout the pre- and post-worry periods. Perceived insomnia severity was associated with the reduced ability to focus attention and uniquely associated with increased negative thought intrusions in the pre-worry period. These results support suggestions that acute episodes of poor sleep can dysregulate key networks involved in attentional control and emotion regulation, and that promote negative cognitive activity. PMID:26279126

  3. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  4. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ...The Librarian of Congress announces that the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted...

  5. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  6. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  7. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  8. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ...The Copyright Office makes a nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted...

  9. Increasing software testability with standard access and control interfaces

    NASA Technical Reports Server (NTRS)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  10. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    USGS Publications Warehouse

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  11. Working memory capacity and suppression of intrusive thoughts.

    PubMed

    Brewin, Chris R; Smart, Laura

    2005-03-01

    We sought to show that individual differences in working memory capacity are related to the ability to intentionally suppress personally relevant intrusive thoughts, and that this effect cannot be explained by differences in negative mood. Sixty participants identified their most frequent intrusive thought and then completed a thought suppression task. Better performance on a measure of working memory capacity (OSPAN) was related to having fewer intrusions in the suppression condition but was unrelated to number of intrusions in the expression condition, suggesting a specific association with attempts to inhibit unwanted thoughts. In contrast, a more negative mood was related to having more intrusions in both conditions, suggestive of a more general influence on the accessibility of unwanted thoughts. Working memory capacity was not associated with negative mood or with the frequency of intrusive thoughts reported in everyday life. The findings extend previous results to the domain of personally relevant intrusive thoughts and support the idea that individual differences in the cognitive abilities supporting inhibitory mechanisms are relevant to clinical conditions such as obsessive-compulsive disorder and posttraumatic stress disorder. PMID:15687010

  12. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  13. Periodicity of Kı¯lauea's Dike Intrusions

    NASA Astrophysics Data System (ADS)

    Montgomery-Brown, E. K.; Miklius, A.

    2015-12-01

    Magmatic intrusions commonly occur in the rift zones of Kı¯lauea Volcano. Individual dike intrusions observed by geodetic methods are usually 5 to 10 km long, and can occur repeatedly in the same region. Five such intrusions in Kı¯lauea's East Rift Zone, with inferred locations downrift of the bend where the NNW trending upper ERZ turns to the ENE trending ERZ, have occurred since the start of the ongoing ERZ eruption in 1983. The intrusions occur on one of two segments that correlate with seismic segments (Wright and Klein, USGS PP1806, 2014): Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of dike opening was between 2 and 3 meters. Intrusions into the UERZ tend to be much smaller (~10 cm of dike opening) and occur more frequently. The time between ERZ intrusions for same-segment pairs are: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events, as was noted by Owen et al. (GRL, 2000) for the 1983 and 1997 intrusions. The recurrence interval of ~14 years appears to be unaffected by the magma surge of 2003-2007 (Poland et al., Nature, 2012), suggesting that flank motion, rather than magma supply, could be a controlling factor in the periodicity of intrusions. The long duration of the seismic catalog and the coincidence of repeated dike intrusions with the seismic segments suggest that on the timescale of decades, Kı¯lauea's East Rift Zone segments are persistent rather than ephemeral features related to single intrusion events.

  14. Hybrid network intrusion detection

    NASA Astrophysics Data System (ADS)

    Tahmoush, David

    2014-05-01

    We report on a machine learning classifier that can be used to discover the patterns hidden within large networking data flows. It utilizes an existing intrusion detection system (IDS) as an oracle to learn a faster, less resource intensive normalcy classifier as a front-end to a hybrid network IDS. This system has the capability to recognize new attacks that are similar to known attack signatures. It is also more highly scalable and distributable than the signature-based IDS. The new hybrid design also allows distributed updates and retraining of the normalcy classifier to stay up-to-date with current threats.

  15. Integrated Scalable Parallel Firewall and Intrusion Detection System for High-Speed Networks

    SciTech Connect

    Fulp, Errin W; Anderson, Robert E; Ahn, David K

    2009-08-31

    This project developed a new scalable network firewall and Intrusion Protection System (IPS) that can manage increasing traffic loads, higher network speeds, and strict Quality of Service (QoS) requirements. This new approach provides a strong foundation for next-generation network security technologies and products that address growing and unmet needs in the government and corporate sectors by delivering Optimal Network Security. Controlling access is an essential task for securing networks that are vital to private industry, government agencies, and the military. This access can be granted or denied based on the packet header or payload contents. For example, a simple network firewall enforces a security policy by inspecting and filtering the packet headers. As a complement to the firewall, an Intrusion Detection System (IDS) inspects the packet payload for known threat signatures; for example, virus or worm. Similar to a firewall policy, IDS policies consist of multiple rules that specify an action for matching packets. Each rule can specify different items, such as the signature contents and the signature location within the payload. When the firewall and IDS are merged into one device, the resulting system is referred to as an Intrusion Protection System (IPS), which provides both packet header and payload inspections. Having both types of inspections is very desirable and more manageable in a single device.

  16. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  17. Potential mitigation approach to minimize salinity intrusion in the Lower Savannah River Estuary due to reduced controlled releases from Lake Thurmond

    USGS Publications Warehouse

    Conrads, Paul A.; Greenfield, James M.

    2010-01-01

    The Savannah River originates at the confluence of the Seneca and Tugaloo Rivers, near Hartwell, Ga. and forms the State boundary between South Carolina and Georgia. The J. Strom Thurmond Dam and Lake, located 187 miles upstream from the coast, is responsible for most of the flow regulation that affects the Savannah River from Augusta to the coast. The Savannah Harbor experiences semi-diurnal tides of two high and two low tides in a 24.8-hour period with pronounced differences in tidal range between neap and spring tides occurring on a 14-day and 28-day lunar cycle. The Savannah National Wildlife Refuge is located in the Savannah River Estuary. The tidal freshwater marsh is an essential part of the 28,000-acre refuge and is home to a diverse variety of wildlife and plant communities. The Southeastern U.S. experienced severe drought conditions in 2008 and if the conditions had persisted in Georgia and South Carolina, Thurmond Lake could have reached an emergency operation level where outflow from the lake is equal to the inflow to the lake. To decrease the effect of the reduced releases on downstream resources, a stepped approach was proposed to reduce the flow in increments of 500 cubic feet per second (ft3/s) intervals. Reduced flows from 3,600 ft3/s to 3,100 ft3/s and 2,600 ft3/s were simulated with two previously developed models of the Lower Savannah River Estuary to evaluate the potential effects on salinity intrusion. The end of the previous drought (2002) was selected as the baseline condition for the simulations with the model. Salinity intrusion coincided with the 28-day cycle semidiurnal tidal cycles. The results show a difference between the model simulations of how the salinity will respond to the decreased flows. The Model-to-Marsh Decision Support System (M2MDSS) salinity response shows a large increase in the magnitude (> 6.0 practical salinity units, psu) and duration (3-4 days) of the salinity intrusion with extended periods (21 days) of tidal

  18. Signalprint-Based Intrusion Detection in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Mitchell, Rob; Chen, Ing-Ray; Eltoweissy, Mohamed

    Wireless networks are a critical part of global communication for which intrusion detection techniques should be applied to secure network access, or the cost associated with successful attacks will overshadow the benefits that wireless networks offer. In this paper we investigate a new scheme called Nodeprints to extend the existing centralized Signalprints design for authentication to a distributed voting-based design for intrusion detection. We analyze the effect of voting-based intrusion detection designs, the probability of an individual node voting incorrectly, the ratio of mobile nodes to base stations, and the rate at which nodes are compromised, on the system performance measured by the probability that the intrusion detection system yields a false result. We develop a performance model for evaluating our Nodeprints design and identify conditions under which Nodeprints outperforms the existing Signalprints design.

  19. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  20. Generalized access control strategies for integrated services token passing systems

    NASA Astrophysics Data System (ADS)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  1. Magma rheology variation in sheet intrusions (Invited)

    NASA Astrophysics Data System (ADS)

    Magee, C.; O'Driscoll, B.; Petronis, M. S.; Stevenson, C.

    2013-12-01

    The rheology of magma fundamentally controls igneous intrusion style as well as the explosivity and type of volcanic eruptions. Importantly, the dynamic interplay between the viscosity of magma and other processes active during intrusion (e.g., crystallisation, magma mixing, assimilation of crystal mushes and/or xenolith entrainment) will likely bear an influence on the temporal variation of magma rheology. Constraining the timing of rheological changes during magma transit therefore plays an important role in understanding the nuances of volcanic systems. However, the rheological evolution of actively emplacing igneous intrusions cannot be directly studied. While significant advances have been made via experimental modelling and analysis of lava flows, how these findings relate to intruding magma remains unclear. This has led to an increasing number of studies that analyse various characteristics of fully crystallised intrusions in an attempt to ';back-out' the rheological conditions governing emplacement. For example, it has long been known that crystallinity affects the rheology and, consequently, the velocity of intruding magma. This means that quantitative textural analysis of crystal populations (e.g., crystal size distribution; CSD) used to elucidate crystallinity at different stages of emplacement can provide insights into magma rheology. Similarly, methods that measure flow-related fabrics (e.g., anisotropy of magnetic susceptibility; AMS) can be used to discern velocity profiles, a potential proxy for the magma rheology. To illustrate these ideas, we present an integrated AMS and petrological study of several sheet intrusions located within the Ardnamurchan Central Complex, NW Scotland. We focus on the entrainment and transport dynamics of gabbroic inclusions that were infiltrated by the host magma upon entrainment. Importantly, groundmass magnetic fabrics within and external to these inclusions are coaxial. This implies that a deviatoric stress was

  2. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  3. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  4. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  5. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  6. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  7. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  8. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... reports.\\10\\ \\1\\ See Exchange Act Release No. 63241 (Nov. 3, 2010), 75 FR 69792 (Nov. 15, 2010) (``Rule... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures...

  9. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Effort-control program for NE...-control program for NE multispecies limited access vessels. (a) Except as provided in §§ 648.17 and 648.82... program described in this section, unless otherwise provided elsewhere in this part. (1) End-of-year...

  10. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    .... 40354 (August 24, 1998), 63 FR 46264 (August 31, 1998) (NASD NTM-98-66). Certain market participants may... subscribers to ATSs, appropriately control the risks associated with market access, so as not to jeopardize... unaware of the trading activity occurring under its market identifier and have no mechanism to control...

  11. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  12. Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users

    NASA Astrophysics Data System (ADS)

    Long, Chengnian; Guan, Xinping

    We consider a distributed joint random access and power control scheme for interference management in wireless ad hoc networks. To derive decentralized solutions that do not require any cooperation among the users, we formulate this problem as non-cooperative joint random access and power control game, in which each user minimizes its average transmission cost with a given rate constraint. Using supermodular game theory, the existence and uniqueness of Nash equilibrium are established. Furthermore, we present an asynchronous distributed algorithm to compute the solution of the game based on myopic best response updates, which converges to Nash equilibrium globally.

  13. Corporate Mergers in the Publishing Industry: Helpful or Intrusive?

    ERIC Educational Resources Information Center

    Rudman, Herbert C.

    1990-01-01

    Examines the effects of corporate mergers in the publishing industry on the publishing of textbooks and standardized tests. Concludes that restructuring, acquisitions, and mergers have an intrusive effect on established practices of academic publishing and may severely limit the access of scholars to the academic marketplace. (FMW)

  14. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  15. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  16. Nonorthogonal CSK/CDMA with Received-Power Adaptive Access Control Scheme

    NASA Astrophysics Data System (ADS)

    Komuro, Nobuyoshi; Habuchi, Hiromasa; Tsuboi, Toshinori

    The measurements for Multiple Access Interference (MAI) problems and the improvement of the data rate are key issues on the advanced wireless networks. In this paper, the nonorthogonal Code Shift Keying Code Division Multiple Access (CSK/CDMA) with received-power adaptive access control scheme is proposed. In our system, a user who is ready to send measures the received power from other users, and then the user decides whether to transmit or refrain from transmission according to the received power and a pre-decided threshold. Not only overcoming the MAI problems, but our system also improve the throughput performance. The throughput performance of the proposed system is evaluated by theoretical analysis. Consequently, the nonorthogonal CSK/CDMA system improves by applying received-power adaptive access control. It was also found that the throughput performance of the nonorthogonal CSK/CDMA system is better than that of the orthogonal CSK/CDMA system at any Eb/N0. We conclude that the nonorthogonal CSK/CDMA system with received-power adaptive access control scheme is expected to be effective in advanced wireless networks.

  17. Health-related intrusive thoughts.

    PubMed

    Freeston, M H; Gagnon, F; Ladouceur, R; Thibodeau, N; Letarte, H; Rhéaume, J

    1994-04-01

    Two studies address the prevalence, concomitants, and appraisal of health-related intrusive thoughts. Eighty-three percent of adults (N = 658) in waiting rooms of two general hospitals reported at least one intrusive thought during the preceding month and 75.0% of patients and 55.5% of people accompanying them reported a health-related intrusive thought in the same period. The intrusions were associated with anxious and depressive symptoms. Health related intrusive thoughts were reported by 61% of a sample of university students (N = 608) and were the most frequent intrusive thought among 19.9% of the students. First, triggering stimuli reported by the subjects were significant predictors of thought frequency, worry, removal difficulty, and effort used in removing the thought. Second, appraisals of high probability were significant predictors of high frequency, worry, and especially difficulty in removing the thought. Finally, perceived responsibility and disapproval of the thought were also significant predictors of thought frequency, worry, removal difficulty, effort used in removing the thought, and guilt. These data support the position that cognitive appraisal of intrusive thoughts is closely linked to the subjective experience of the thought: more extreme appraisals were associated with more troublesome thoughts. The clinical implications of these studies are discussed in terms of current models of hypochondriasis and health anxiety. PMID:8027960

  18. Toward Federated Security and Data Access Control within a Services Oriented Architecture for Publishing Hydrologic Data

    NASA Astrophysics Data System (ADS)

    Horsburgh, J. S.; Tarboton, D. G.; Schreuders, K.; Patil, K. S.

    2010-12-01

    Academic researchers who manage experimental watersheds, observatories, and research sites need the ability to effectively collect, manage, and publish hydrologic data. This often requires the ability to control and document access to the data. One current mechanism for publishing data from experimental sites uses the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) Hydrologic Information System (HIS). The CUAHSI HIS Project has developed a software stack called HydroServer for publishing hydrologic data. HydroServer relies on a standard relational database schema for storing hydrologic observations, called the Observations Data Model (ODM), a standard set of web services for publishing observations stored in an ODM database, called WaterOneFlow, and a standard XML schema for exchanging hydrologic observations data, called Water Markup Language (WaterML). These standards make is possible for disparate investigators to publish their data as web services within a federated network of HydroServers. Once a HydroServer is operational, all Internet users can access all of the data on the server, with no requirement for users to identify themselves, or restriction on what can be accessed. There are a number of situations where data producers want to take advantage of the organization and functionality that ODM and the HydroServer software stack provides, but without providing unrestricted and unlogged access to all of the data that they are putting on their server. These include the desire of academic data collectors to: 1) control who can access/download data; 2) publish research results based on data before the data are released to the general public; 3) keep track of who is downloading and using their data to evaluate and document its impact on the community; 4) have and use a data use/access agreement and ensure that they get credit and appropriate citation for the data that they publish; 5) expose the best or highest quality data

  19. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  20. Efficient Service Delivery for High-speed Railway Communications Using MIMO and Access Control Technique

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2014-07-01

    In order to realize the notion of "anytime, anywhere" communication for high-speed train passengers, the Long Term Evolution for Railway is designed to provide broadband accesses and reliable communications for high-speed train passengers. However, with the increase of train speed, the system is subject to high bit error rate, Doppler frequency shift, and call drops. This paper is trying to solve these problems by employing the Multiple-Input Multiple-Output technique and access control schemes. The goal is to provide higher quality of services such as data rate, reliability, and delay for train passengers. Physical layer performance analysis and access control schemes are proposed in a two-hop model. Handovers and service types are also considered. Simulation results show that proposed models and schemes perform better in improving the quality of services.

  1. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  2. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  3. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  4. The role of stress during memory reactivation on intrusive memories.

    PubMed

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders. PMID:25911248

  5. Occurrence of seawater intrusion overshoot

    NASA Astrophysics Data System (ADS)

    Morgan, Leanne K.; Bakker, Mark; Werner, Adrian D.

    2015-04-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position. Recently, physical sand-tank modeling has shown overshoot to be a physical process. In this paper, we have carried out numerical modeling of SLR-SI to demonstrate that overshoot can occur at the field scale within unconfined aquifers. This result is contrary to previous conclusions drawn from a restricted number of cases. In addition, we show that SI overshoot is plausible under scenarios of gradual sea level rise that are consistent with conditions predicted by the Intergovernmental Panel for Climate Change. Overshoot was found to be largest in flux-controlled unconfined aquifers characterized by low freshwater flux, high specific yield, and large inland extent. These conditions result in longer timeframes for the aquifer to reach new steady state conditions following SLR, and the extended period prior to reequilibration of the groundwater flow field produces more extensive overshoot.

  6. Legal Factors Related to Access to Campuses of Public Colleges and Universities: An Occasional Paper.

    ERIC Educational Resources Information Center

    Lytle, Michael A.

    Legal methods and related case law that can be used by public higher education administrators to deal with intrusions by outsiders onto the campus are examined. The following legal factors related to control of campus access are addressed: risk management, police power, general trespass, school related trespass/loitering statutes, First and…

  7. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  8. Kinetically Controlled Chemoselective Cyclization Simplifies the Access to Cyclic and Branched Peptides.

    PubMed

    Boll, Emmanuelle; Drobecq, Hervé; Lissy, Elizabeth; Cantrelle, François-Xavier; Melnyk, Oleg

    2016-08-01

    A bis(2-sulfanylethyl)amido group reacts significantly faster with cysteinyl peptides when installed on the C-terminal end of a peptide in comparison with the side-chain of Asp and Glu. This property enabled the design of a kinetically controlled chemoselective peptide cyclization reaction, giving straightforward access to cyclic and branched peptides in one pot. PMID:27398649

  9. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Effort-control program for NE multispecies limited access vessels. 648.82 Section 648.82 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES Management Measures...

  10. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... violation of section 337 in the infringement of certain patents. 73 FR 75131. The principal respondent was... order. 75 FR 44989-90 (July 30, 2010). The Commission also issued cease and desist orders against those... COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers...

  11. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  12. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  13. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  14. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings, and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PERMANENT PROGRAM PERFORMANCE STANDARDS PERMANENT PROGRAM...

  15. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings, and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PERMANENT PROGRAM PERFORMANCE STANDARDS PERMANENT PROGRAM...

  16. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  17. An Application Instance of Fingerprint Identification in the School Office Access Control System

    NASA Astrophysics Data System (ADS)

    Yu, Lijun

    This paper designs the school office access control system by using the fingerprint identification method, and introduces the software design and the adopted hardware modules. These include fingerprint collection, fingerprint image processing, and fingerprint identification and verification. As proved in the experimental results, this design can fully meet the expectation.

  18. Control of Access to Memory: The Use of Task Interference as a Behavioral Probe

    ERIC Educational Resources Information Center

    Loft, Shayne; Humphreys, Michael S.; Whitney, Susannah J.

    2008-01-01

    Directed forgetting and prospective memory methods were combined to examine differences in the control of memory access. Between studying two lists of target words, participants were either instructed to forget the first list, or to continue remembering the first list. After study participants performed a lexical decision task with an additional…

  19. Longitudinal occupancy of controlled access right-of-way by utilities. A synthesis of highway practice

    SciTech Connect

    Williams, R.L.

    1996-06-01

    This synthesis will be of interest to transportation agency administrators, design engineers, maintenance engineers and maintenance staff, traffic engineers, and safety officials. It will also provide useful information to the utilities and telecommunications industries. Information is presented on the state transportation agencies` policies, practices, and experience associated with occupancy of the rights-of-way on controlled- (or Limited-) access highways.

  20. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  1. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  2. Controls of evaporative irrigation return flows in comparison to seawater intrusion in coastal karstic aquifers in northern Sri Lanka: Evidence from solutes and stable isotopes.

    PubMed

    Chandrajith, Rohana; Diyabalanage, Saranga; Premathilake, K M; Hanke, Christian; van Geldern, Robert; Barth, Johannes A C

    2016-04-01

    Groundwater in Miocene karstic aquifers in the Jaffna Peninsula of Sri Lanka is an important resource since no other fresh water sources are available in the region. The subsurface is characterized by highly productive limestone aquifers that are used for drinking and agriculture purposes. A comprehensive hydrogeochemical study was carried out to reveal the processes affecting the groundwater quality in this region. Major and trace element composition and environmental isotope ratios of oxygen and hydrogen (δ(18)OH2O and δ(2)HH2O) were determined in 35 groundwater samples for this investigation. The ion abundance of groundwater in the region was characterized by an anion sequence order with HCO3->Cl->SO4->NO3-. For cations, average Na(+)+K(+) contents in groundwater exceeded those of Ca(2+)+Mg(2+) in most cases. Ionic relationships of major solutes indicated open system calcite dissolution while seawater intrusions are also evident but only close to the coast. The solute contents are enriched by agricultural irrigation returns and associated evaporation. This was confirmed by the stable isotope composition of groundwater that deviated from the local meteoric water line (LMWL) and formed its own regression line denoted as the local evaporation line (LEL). The latter can be described by δ(2)HH2O=5.8×δ(18)OH2O -- 2.9. Increased contents of nitrate-N (up to 5mg/L), sulfate (up to 430mg/L) and fluoride (up to 1.5mg/L) provided evidences for anthropogenic inputs of solutes, most likely from agriculture activities. Among trace elements Ba, Sr, As and Se levels in the Jaffna groundwater were higher compared to that of the dry zone metamorphic aquifers in Sri Lanka. Solute geochemistry and stable isotope evidences from the region indicates that groundwater in the area is mainly derived from local modern precipitation but modified heavily by progressive evaporative concentration rather than seawater intrusion. PMID:26803741

  3. Distributed data access in the LAMPF (Los Alamos Meson Physics Facility) control system

    SciTech Connect

    Schaller, S.C.; Bjorklund, E.A.

    1987-01-01

    We have extended the Los Alamos Meson Physics Facility (LAMPF) control system software to allow uniform access to data and controls throughout the control system network. Two aspects of this work are discussed here. Of primary interest is the use of standard interfaces and standard messages to allow uniform and easily expandable inter-node communication. A locally designed remote procedure call protocol will be described. Of further interest is the use of distributed databases to allow maximal hardware independence in the controls software. Application programs use local partial copies of the global device description database to resolve symbolic device names.

  4. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  5. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  6. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    PubMed Central

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  7. Gas intrusion into SPR caverns

    SciTech Connect

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T.; Giles, H.N.

    1995-12-01

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  8. The Virtual Jason Control Van: A GeoBrowser Application for Automatic Data Cataloging and Access

    NASA Astrophysics Data System (ADS)

    Lerner, S.

    2001-12-01

    Today's scientific underwater remotely operated vehicles (ROVs) generate a tremendous amount of data collected from a variety of sensors in real-time. Often integrated information such as multiple video streams, vehicle telemetry, and scientific data are only available to the users in the ROV control-van during real-time operations. Although all the data is logged, it is extremely difficult for scientists to re-create this integrated information and have the ability to view and access an entire cruise dataset in an integrated fashion. We introduce a methodology of taking real-time information snapshots during events that occur within the ROV control-van and using these snapshots for data access and analysis. We take control-van snapshots during "interesting" events as defined whenever a scientist enters an event via a computer, and we also take snapshots at regular time intervals such as once a minute to ensure complete data coverage. As part of the JasonII ROV upgrade, we have developed a prototype system that automatically captures the information in the control-van during ROV operations including up to four simultaneous video sources, vehicle data, scientific instrument data, and event data. These control-van snapshots are automatically cataloged and immediately accessible and searchable via a web-browser. The system is designed for both scientific and public outreach needs and will be integrated with the SeaNet system to provide remote access on-shore for scientific collaboration and public outreach. During this past year, the prototype system has been deployed on four Jason cruises and has captured over 40,000 control-van snapshots, containing more than 160,000 images. Each control-van snapshot seamlessly integrates the four simultaneous video snapshots with vehicle data such as navigation, depth, and heading, scientific instrument data from instruments such as a ctd and a magnetometer, and event data as entered by scientists. All this information is

  9. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    NASA Astrophysics Data System (ADS)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  10. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  11. Controlled Access Headings in EAD Finding Aids: Current Practices in Number of and Types of Headings Assigned

    ERIC Educational Resources Information Center

    Mascaro, Michelle

    2011-01-01

    This article presents the findings from a study of controlled access headings assigned to encoded archival description finding aids in the Ohio Library and Information Network Finding Aid Repository, focusing on the number of headings per finding aid and the category of terms assigned. Assigning multiple controlled access headings was widely…

  12. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  13. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  14. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  15. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  16. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    NASA Astrophysics Data System (ADS)

    Gibbon, T. B.; Osadchiy, A. V.; Kjær, R.; Jensen, J. B.; Monroy, I. Tafur

    2009-06-01

    Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 2 31-1 PRBS pattern. The results suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient control in WDM access networks.

  17. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  18. From intrusive to oscillating thoughts.

    PubMed

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle. PMID:17904485

  19. Dramatic reduction of read disturb through pulse width control in spin torque random access memory

    NASA Astrophysics Data System (ADS)

    Wang, Zihui; Wang, Xiaobin; Gan, Huadong; Jung, Dongha; Satoh, Kimihiro; Lin, Tsann; Zhou, Yuchen; Zhang, Jing; Huai, Yiming; Chang, Yao-Jen; Wu, Te-ho

    2013-09-01

    Magnetizations dynamic effect in low current read disturb region is studied both experimentally and theoretically. Dramatic read error rate reduction through read pulse width control is theoretically predicted and experimentally observed. The strong dependence of read error rate upon pulse width contrasts conventional energy barrier approach and can only be obtained considering detailed magnetization dynamics at long time thermal magnetization reversal region. Our study provides a design possibility for ultra-fast low current spin torque random access memory.

  20. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  1. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  2. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    PubMed

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care. PMID:22732236

  3. Layered Multicast Encryption of Motion JPEG2000 Code Streams for Flexible Access Control

    NASA Astrophysics Data System (ADS)

    Nakachi, Takayuki; Toyoshima, Kan; Tonomura, Yoshihide; Fujii, Tatsuya

    In this paper, we propose a layered multicast encryption scheme that provides flexible access control to motion JPEG2000 code streams. JPEG2000 generates layered code streams and offers flexible scalability in characteristics such as resolution and SNR. The layered multicast encryption proposal allows a sender to multicast the encrypted JPEG2000 code streams such that only designated groups of users can decrypt the layered code streams. While keeping the layering functionality, the proposed method offers useful properties such as 1) video quality control using only one private key, 2) guaranteed security, and 3) low computational complexity comparable to conventional non-layered encryption. Simulation results show the usefulness of the proposed method.

  4. MPEG-21 as an access control tool for the National Health Service Care Records Service.

    PubMed

    Brox, Georg A

    2005-01-01

    Since the launch of the National Health Service (NHS) Care Records Service with plans to share patient information across England, there has been an emphasis on the need for manageable access control methods. MPEG-21 is a structured file format which includes an Intellectual Property Management and Protection (IPMP) function using XML to present all digitally stored items in the patient record. Using DICreator software, patient records consisting of written text, audio-recordings, non-X-ray digital imaging and video sequences were linked up successfully. Audio records were created using Talk-Back 2002 to standardize and optimize recording quality. The recorded reports were then linked and archived using iTunes. A key was used each time the file was displayed to secure access to confidential patient data. The building of the correct file structure could be monitored during the entire creation of the file. The results demonstrated the ability to ensure secure access of the MPEG-21 file by both health-care professionals and patients by use of different keys and a specific MPEG-21 browser. The study also showed that the enabling of IPMP will provide accurate audit trails to authenticate appropriate access to medical information. PMID:16035983

  5. Hypertension Detection, Management, Control and Associated Factors Among Residents Accessing Community Health Services In Beijing

    PubMed Central

    JIANG, Bin; LIU, Hongmei; RU, Xiaojuan; ZHANG, Hui; WU, Shengping; WANG, Wenzhi

    2014-01-01

    The aim of this study was to analyse high blood pressure detection, management, control and associated factors among residents accessing community health services (CHSs) in Beijing. We screened for HBP in 9524 individuals aged 50 years or older who accessed care in four Beijing CHSs. Among the 9397 residents with questionnaire responses that qualified them for inclusion in the study, 5029 patients with HBP were identified, 1510 (i.e., 30% of the HBP patient group) of whom were newly identified cases. The rate of hypertension detection was 53.5%. Among the 5029 HBP patients, the rates of awareness, treatment and control of hypertension were 70.0%, 62.1% and 29.6%, respectively. In general, the rate of hypertension control was higher when the rates of hypertension awareness and treatment were higher in subgroups stratified by different sociodemographic and risk factors, except for the overweight and obesity subgroups. In conclusion, suboptimal HBP awareness, treatment, and control are still major problems confronting CHSs in Beijing. Control of hypertension in the population may be improved by increasing awareness and improving the treatment of hypertension in CHSs. PMID:24784167

  6. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  7. A network access control framework for 6LoWPAN networks.

    PubMed

    Oliveira, Luís M L; Rodrigues, Joel J P C; de Sousa, Amaro F; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  8. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  9. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  10. An interaction-based access control model (IBAC) for collaborative services

    SciTech Connect

    Altunay, Mine; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  11. WiFi Miner: An Online Apriori-Infrequent Based Wireless Intrusion System

    NASA Astrophysics Data System (ADS)

    Rahman, Ahmedur; Ezeife, C. I.; Aggarwal, A. K.

    Intrusion detection in wireless networks has become a vital part in wireless network security systems with wide spread use of Wireless Local Area Networks (WLAN). Currently, almost all devices are Wi-Fi (Wireless Fidelity) capable and can access WLAN. This paper proposes an Intrusion Detection System, WiFi Miner, which applies an infrequent pattern association rule mining Apriori technique to wireless network packets captured through hardware sensors for purposes of real time detection of intrusive or anomalous packets. Contributions of the proposed system includes effectively adapting an efficient data mining association rule technique to important problem of intrusion detection in a wireless network environment using hardware sensors, providing a solution that eliminates the need for hard-to-obtain training data in this environment, providing increased intrusion detection rate and reduction of false alarms.

  12. Intrusive Music: The Perception of Everyday Music Explored by Diaries

    ERIC Educational Resources Information Center

    Gavin, Helen

    2006-01-01

    This paper describes research investigating the perception of intrusive music, that is, music heard when choice, volume, and occurrence are not under the control of the participant. Participants were directed to record diary accounts of episodes in which music was played in instances when they were not in control of the decision to play the music…

  13. Data Mining for Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  14. A stochastic control approach to Slotted-ALOHA random access protocol

    NASA Astrophysics Data System (ADS)

    Pietrabissa, Antonio

    2013-12-01

    ALOHA random access protocols are distributed protocols based on transmission probabilities, that is, each node decides upon packet transmissions according to a transmission probability value. In the literature, ALOHA protocols are analysed by giving necessary and sufficient conditions for the stability of the queues of the node buffers under a control vector (whose elements are the transmission probabilities assigned to the nodes), given an arrival rate vector (whose elements represent the rates of the packets arriving in the node buffers). The innovation of this work is that, given an arrival rate vector, it computes the optimal control vector by defining and solving a stochastic control problem aimed at maximising the overall transmission efficiency, while keeping a grade of fairness among the nodes. Furthermore, a more general case in which the arrival rate vector changes in time is considered. The increased efficiency of the proposed solution with respect to the standard ALOHA approach is evaluated by means of numerical simulations.

  15. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  16. Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect

    NASA Astrophysics Data System (ADS)

    von Helden, Josef; Bente, Ingo

    Network Access Control (NAC) is the most promising approach to provide protection against sophisticated attacks that first compromise endpoints to subsequently continue their evil work in networks accessible via the compromised endpoint. Trusted Network Connect (TNC) is a NAC approach featuring interoperability and unforgeability due to its openness, broad vendor support and integration of Trusted Computing functions.

  17. Paying attention to saccadic intrusions.

    PubMed

    Gowen, E; Abadi, R V; Poliakoff, E

    2005-12-01

    Fixation to a target in primary gaze is invariably interrupted by physiological conjugate saccadic intrusions (SI). These small idiosyncratic eye movements (usually <1 degrees in amplitude) take the form of an initial horizontal fast eye movement away from the desired eye position, followed after a variable duration by a return saccade or drift. As the aetiology of SI is still unclear, it was the aim of this study to investigate whether SI are related to exogenous or endogenous attentional processes. This was achieved by varying (a) the "bottom-up" target viewing conditions (target presence, servo control of the target, target background, target size) and (b) the 'top-down' attentional state (instruction change--'look' or 'hold eyes steady' and passive fixation versus active--'respond to change' fixation) in 13 subjects (the number of participants in each task varied between 7 and 11). We also manipulated the orientation of pure exogenous attention through a cue-target task, during which subjects were required to respond to a target, preceded by a non-informative cue by either pressing a button or making a saccade towards the target. SI amplitude, duration, frequency and direction were measured. SI amplitude was found to be significantly higher when the target was absent and SI frequency significantly lower during open loop conditions. Target size and background influenced SI behaviour in an idiosyncratic manner, although there was a trend for subjects to exhibit lower SI frequencies and amplitudes when a patterned background was present and larger SI amplitudes with larger target sizes. SI frequency decreased during the "hold eyes steady" passive command as well as during active fixation but SI direction was not influenced by the exogenous cue-target task. These results suggest that SI are related to endogenous rather than exogenous attention mechanisms. Our experiments lead us to propose that SI represent shifts in endogenous attention that reflect a baseline

  18. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    NASA Astrophysics Data System (ADS)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  19. Seismic intrusion detector system

    DOEpatents

    Hawk, Hervey L.; Hawley, James G.; Portlock, John M.; Scheibner, James E.

    1976-01-01

    A system for monitoring man-associated seismic movements within a control area including a geophone for generating an electrical signal in response to seismic movement, a bandpass amplifier and threshold detector for eliminating unwanted signals, pulse counting system for counting and storing the number of seismic movements within the area, and a monitoring system operable on command having a variable frequency oscillator generating an audio frequency signal proportional to the number of said seismic movements.

  20. Sandia Network Intrusion Detection Assessment Version 1.0

    SciTech Connect

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusion detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a complete

  1. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  2. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  3. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2010-01-01

    NASA s Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  4. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  5. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  6. Control of substrate access to the active site in methane monooxygenase.

    PubMed

    Lee, Seung Jae; McCormick, Michael S; Lippard, Stephen J; Cho, Uhn-Soo

    2013-02-21

    Methanotrophs consume methane as their major carbon source and have an essential role in the global carbon cycle by limiting escape of this greenhouse gas to the atmosphere. These bacteria oxidize methane to methanol by soluble and particulate methane monooxygenases (MMOs). Soluble MMO contains three protein components, a 251-kilodalton hydroxylase (MMOH), a 38.6-kilodalton reductase (MMOR), and a 15.9-kilodalton regulatory protein (MMOB), required to couple electron consumption with substrate hydroxylation at the catalytic diiron centre of MMOH. Until now, the role of MMOB has remained ambiguous owing to a lack of atomic-level information about the MMOH-MMOB (hereafter termed H-B) complex. Here we remedy this deficiency by providing a crystal structure of H-B, which reveals the manner by which MMOB controls the conformation of residues in MMOH crucial for substrate access to the active site. MMOB docks at the α(2)β(2) interface of α(2)β(2)γ(2) MMOH, and triggers simultaneous conformational changes in the α-subunit that modulate oxygen and methane access as well as proton delivery to the diiron centre. Without such careful control by MMOB of these substrate routes to the diiron active site, the enzyme operates as an NADH oxidase rather than a monooxygenase. Biological catalysis involving small substrates is often accomplished in nature by large proteins and protein complexes. The structure presented in this work provides an elegant example of this principle. PMID:23395959

  7. Privacy-aware access control for video data in intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Vagts, Hauke; Jakoby, Andreas

    2012-06-01

    Surveillance systems became powerful. Objects can be identified and intelligent surveillance services can generate events when a specific situation occurs. Such surveillance services can be organized in a Service Oriented Architecture (SOA) to fulfill surveillance tasks for specific purposes. Therefore the services process information on a high level, e.g., just the position of an object. Video data is still required to visualize a situation to an operator and is required as evidence in court. Processing of personal related and sensitive information threatens privacy. To protect the user and to be compliant with legal requirements it must be ensured that sensitive information can only be processed for a defined propose by specific users or services. This work proposes an architecture for Access Control that enforces the separation of data between different surveillance tasks. Access controls are enforced at different levels: for the users starting the tasks, for the services within the tasks processing data stored in central store or calculated by other services and for sensor related services that extract information out of the raw data and provide them.

  8. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  9. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  10. Gate controllable resistive random access memory devices using reduced graphene oxide

    NASA Astrophysics Data System (ADS)

    Hazra, Preetam; Resmi, A. N.; Jinesh, K. B.

    2016-04-01

    The biggest challenge in the resistive random access memory (ReRAM) technology is that the basic operational parameters, such as the set and reset voltages, the current on-off ratios (hence the power), and their operational speeds, strongly depend on the active and electrode materials and their processing methods. Therefore, for its actual technological implementations, the unification of the operational parameters of the ReRAM devices appears to be a difficult task. In this letter, we show that by fabricating a resistive memory device in a thin film transistor configuration and thus applying an external gate bias, we can control the switching voltage very accurately. Taking partially reduced graphene oxide, the gate controllable switching is demonstrated, and the possible mechanisms are discussed.

  11. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  12. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  13. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  14. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  15. The Effect of an Executive Functioning Training Program on Working Memory Capacity and Intrusive Thoughts.

    PubMed

    Bomyea, Jessica; Amir, Nader

    2011-12-01

    Recurrent intrusive thoughts are apparent across numerous clinical disorders, including depression (i.e., rumination) and anxiety disorders (e.g., worry, obsessions; Brewin et al. 2010). Theoretical accounts of intrusive thoughts suggest that individual differences in executive functioning, specifically poor inhibitory control, may account for the persistence of these thoughts in some individuals (e.g., Anderson and Levy 2009). The present study examined the causal effect of inhibitory control on intrusive thoughts by experimentally manipulating inhibition requirements in a working memory capacity (WMC) task and evaluating the effect of this training on intrusive thoughts during a thought suppression task. Unselected undergraduate participants were randomly assigned to repeatedly practice a task requiring either high inhibitory control (training condition) or low inhibitory control (control condition). Results indicated that individuals in the training condition demonstrated significantly greater WMC performance improvements from pre to post assessment relative to the control group. Moreover, individuals in the training group experienced fewer intrusions during a thought suppression task. These results provide support for theoretical accounts positing a relationship between inhibitory control and intrusive thoughts. Moreover, improving inhibitory control through computerized training programs may have clinical utility in disorders characterized by recurrent intrusive thoughts (e.g., depression, PTSD). PMID:22514357

  16. Evaluation of Intrusion Detection Systems

    PubMed Central

    Ulvila, Jacob W.; Gaffney, John E.

    2003-01-01

    This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric. Results are given for the operation of a single IDS and for a combination of two IDSs. The method is illustrated for: 1) determining the best operating point for a single and double IDS based on the costs of mistakes and the hostility of the operating environment as represented in the prior probability of intrusion and 2) evaluating single and double IDSs on the basis of expected cost. A method is also described for representing a compound IDS as an equivalent single IDS. Results are presented from the point of view of a system administrator, but they apply equally to designers of IDSs.

  17. Cancer-Related Intrusive Thoughts Predict Behavioral Symptoms Following Breast Cancer Treatment

    PubMed Central

    Dupont, Alexandra; Bower, Julienne E.; Stanton, Annette L.; Ganz, Patricia A.

    2013-01-01

    Objective Behavioral symptoms are common in breast cancer survivors, including disturbances in energy, sleep, and mood, though few risk factors for these negative outcomes have been identified. Our study examined intrusive thoughts as a predictor of lingering symptoms in breast cancer survivors in the year following treatment. Method Data come from the Moving Beyond Cancer psychoeducational intervention trial, aimed at easing the transition from patient to survivor. Women (n = 558) completed psychosocial questionnaires within 4 weeks posttreatment and again 2, 6, and 12 months later. We examined intrusive thoughts about cancer at the baseline assessment as a predictor of fatigue, sleep problems, pain, breast cancer-specific symptoms, depressive symptoms, negative affect, and quality of life using growth curve modeling, controlling for study condition and other covariates. Results Intrusive thoughts were associated with higher levels of all symptoms at baseline and at the 12-month assessment. Intrusive thoughts also influenced the trajectory of pain, depressive symptoms, negative affect, and physical functioning over time; women with higher intrusions at baseline started worse and improved over time, whereas those with lower intrusions remained at a constant, lower level over time. Intrusions were not associated with the trajectory of fatigue, sleep, breast cancer-specific symptoms, or mental functioning; women with higher intrusions at baseline started worse and remained worse over time. Conclusion Intrusive thoughts are associated with enduring elevations in behavioral symptoms and impaired quality of life in the year after breast cancer treatment and may be a risk factor for poor outcomes. PMID:23379385

  18. PFNA-based measurements for non-intrusive waste characterization

    SciTech Connect

    Pentaleri, E.

    1994-12-31

    Pulsed Fast Neutron Analysis (PFNA) is a non-intrusive technique for inspecting bulk samples whose size may range from that of a suitcase to that of a commercial-cargo truck trailer. In an earlier paper, the authors discussed techniques for performing PFNA-based TRU assays on waste drums, and described why such measurements would yield improved accuracy, sensitivity, and throughput over existing instruments. Here they describe a set of non-intrusive measurements useful for further improving the accuracy of TRU assay results, certifying compliance with waste acceptance criteria, or enhancing the control of waste-treatment processes. In principle, these measurements, based mainly upon the analysis of inelastic-neutron-scattering and neutron-capture gamma rays, can be performed concurrently with TRU-assay measurements. Based on the measurements described, a single PFNA-based waste inspection system would allow substantially complete non-intrusive characterization of waste containers to be performed.

  19. A highly efficient SDRAM controller supporting variable-length burst access and batch process for discrete reads

    NASA Astrophysics Data System (ADS)

    Li, Nan; Wang, Junzheng

    2016-03-01

    A highly efficient Synchronous Dynamic Random Access Memory (SDRAM) controller supporting variable-length burst access and batch process for discrete reads is proposed in this paper. Based on the Principle of Locality, command First In First Out (FIFO) and address range detector are designed within this controller to accelerate its responses to discrete read requests, which dramatically improves the average Effective Bus Utilization Ratio (EBUR) of SDRAM. Our controller is finally verified by driving the Micron 256-Mb SDRAM MT48LC16M16A2. Successful simulation and verification results show that our controller exhibits much higher EBUR than do most existing designs in case of discrete reads.

  20. Hydrothermal alteration related to a deep mantle source controlled by a Cambrian intracontinental strike-slip fault: Evidence for the Meruoca felsic intrusion associated with the Transbraziliano Lineament, Northeastern Brazil

    NASA Astrophysics Data System (ADS)

    Santos, Roberto Ventura; Oliveira, Claudinei Gouveia de; Parente, Clóvis Vaz; Garcia, Maria da Glória Motta; Dantas, Elton Luis

    2013-04-01

    One of the most prominent geological structures in Borborema Province, northeast Brazil, is the Transbraziliano Lineament that crosscuts most of the South American Platform and was active at least until the Devonian. This continental structure is responsible for the formation of rift and pull-apart basins in Northeastern Brazil, most of which filled with volcanic and continental sedimentary rocks (Parente et al., 2004). In the region of Sobral, Ceará State, this same continental structure controlled the intrusion of the Meruoca pluton and the formation of the Jaibaras Basin, which is bounded by strike-slip shear zones. Hydrothermal alterations seem to have been pervasive in Meruoca, as indicated by disturbances in both the Rb-Sr and U-Pb systems (Sial et al., 1981; Fetter, 1999) and by the large dispersion of anisotropic magnetic susceptibility (AMS) (Archanjo et al., 2009). In this paper, we address the origin of the hydrothermal fluids that affected the borders of the Meruoca batholith and their relationship with the activity of the Transbraziliano Lineament. These fluids were responsible for carbonate veins and Fe-Cu mineral concentrations that are commonly found associated with hydrothermally altered breccias. The carbon and oxygen isotope composition of these carbonate veins suggest that they may be related to CO2-bearing mantle-derived fluids that were channelized by the Transbraziliano Lineament. Based on oxygen isotopes, we argue that Fe-Cu concentrations may have formed in isotope equilibrium with the rhyolitic rocks at temperatures between 500 and 560 °C. This scenario points to magmatism as the main process in the formation of these rocks. We also report a K-Ar age of 530 ± 12 Ma for muscovite associated with the last ductile event that affected the Sobral-Pedro II Shear Zone and a U-Pb age of 540.8 ± 5.1 Ma for the Meruoca pluton. We further suggest that this granite is a late-kinematic intrusion that is most likely associated with the Parapu

  1. Controlled Access of p53 to the Nucleus Regulates its Proteasomal Degradation by MDM2

    PubMed Central

    Davis, James R.; Mossalam, Mohanad; Lim, Carol S.

    2013-01-01

    The tumor suppressor p53 can be sent to the proteasome for degradation by placing its nucleo-cytoplasmic shuttling under ligand control. Endogenous p53 is ubiquitinated by MDM2 in the nucleus, and controlling the access of p53 to the nuclear compartment regulates its ubiquitination and proteasomal degradation. This was accomplished by the use of a “protein switch” that places nuclear translocation under the control of externally applied dexamethasone. Fluorescence microscopy revealed that sending protein switch p53 (PS-p53) to the nucleus produces a distinct punctate distribution in both the cytoplasm and nucleus. The nuclear role in accessing the proteasome was investigated by inhibiting classical nuclear export with leptomycin B. Trapping PS-p53 in the nucleus only allows this punctate staining in that compartment, suggesting that PS-p53 must translocate first to the nuclear compartment for cytoplasmic punctate staining to occur. The role of MDM2 binding was explored by inhibiting MDM2/p53 binding with nutlin-3. Inhibition of this interaction blocked both nuclear export and cytoplasmic and nuclear punctate staining, providing evidence that any change in localization after nuclear translocation is due to MDM2 binding. Further, blocking the proteolytic activity of the proteasome maintained the nuclear localization of the construct. Truncations of p53 were made to determine smaller constructs still capable of interacting with MDM2, and their subcellular localization and degradation potential was observed. PS-p53 and a smaller construct, construct containing the two MDM2 binding regions of p53 (Box I+V) were indeed degraded by the proteasome as measured by loss of enhanced green fluorescent protein that was also fused to the construct. The influence of these constructs on p53 gene transactivation function was assessed, and revealed that PS-p53 decreased gene transactivation, while PS-p53(BoxI+V) did not significantly change baseline gene transactivation. PMID

  2. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  3. A method for protecting and controlling access to JPEG2000 images

    NASA Astrophysics Data System (ADS)

    Serrão, Carlos; Serra, Antonio; Fonseca, Pedro; Salles Dias, Jose M.

    2003-11-01

    The image compression standard JPEG2000 brings not only powerful compression performance but also new functionality unavailable in previous standards (such as region of interest, scalability and random access to image data, through flexible code stream description of the image). ISO/IEC JTC1/SC29/WG1, which is the ISO Committee working group for JPEG2000 standardization is currently defining additional parts to the standard that will allow extended functionalities. One of these extensions is Part 8 JPSEC - JPEG2000 security, which deals with the protection and access control of JPEG2000 code-stream. This paper reports the JPSEC activities detailing with the three core experiments which are in progress to supply the JPEG2000 ISO Committee, with the appropriate protection technology. These core experiments are focusing on the protection of the code-stream itself and on the overall security infrastructure that is needed to manage the access rights of users and applications to that protected code-stream. Regarding the encryption/scrambling process, this one deals with the JPEG2000 code stream in such a way that only the packets, which contain image data information are encrypted. All the other code-stream data will be in clear mode. This paper will also advance details of one of the JPSEC proposed solutions for the security infrastructure - OpenSDRM (Open and Secure Digital Rights Management), which provides security and rights management from the content provider to the content final user. A use case where this security infrastructure was successfully used will also be provided.

  4. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  5. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  6. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  7. Point and counterpoint: patient control of access to data in their electronic health records.

    PubMed

    Caine, Kelly; Tierney, William M

    2015-01-01

    Information collection, storage, and management is central to the practice of health care. For centuries, patients' and providers' expectations kept medical records confidential between providers and patients. With the advent of electronic health records, patient health information has become more widely available to providers and health care managers and has broadened its potential use beyond individual patient care. Adhering to the principles of Fair Information Practice, including giving patients control over the availability and use of their individual health records, would improve care by fostering the sharing of sensitive information between patients and providers. However, adherence to such principles could put patients at risk for unsafe care as a result of both missed opportunities for providing needed care as well as provision of contraindicated care, as it would prevent health care providers from having full access to health information. Patients' expectations for the highest possible quality and safety of care, therefore, may be at odds with their desire to limit provider access to their health records. Conversely, provider expectations that patients would willingly seek care for embarrassing conditions and disclose sensitive information may be at odds with patients' information privacy rights. An open dialogue between patients and providers will be necessary to balance respect for patient rights with provider need for patient information. PMID:25480723

  8. e-VLBI Access Point (eAXP) - a centralized control and EGAE configuration / management application

    NASA Astrophysics Data System (ADS)

    Ruszczyk, Chester Whitney, Alan

    Setting up experiments to utilize Experiment Guided Adaptive Endpoint (EGAE) and e-VLBI is presently a complex and time intensive process requiring scientific, Mark5 and networking knowledge. There is no central access to point to configure and manage all of these aspects of an experiment. The e-VLBI Access Point (eAXP) is a centralized control plane management tool that offers a GUI interface to augment the command line interface presently being used to set up and conduct experiments. eAXP contains three major toolsets: one to set up and execute an experiment using real-time or non-real time modes; the second to configure and manage EGAE; and a third to view statistics of the experiments. Initially the overall system architecture for eAXP is presented, followed by details of the Experiment Profiler toolset including screen shots of the system presently being tested. This will be followed by how eAXP will support real-time modes interfacing to the Dynamic Resource Allocation over GMPLS Optical Network (DRAGON) resource management project.

  9. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  10. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    PubMed Central

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  11. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    PubMed Central

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  12. Non-intrusive calibration for three-dimensional particle imaging

    NASA Astrophysics Data System (ADS)

    Schosser, Constantin; Fuchs, Thomas; Hain, Rainer; Kähler, Christian J.

    2016-05-01

    This letter introduces a non-intrusive calibration scheme for three-dimensional (3D) optical flow velocimetry techniques. For these 3D techniques, including tomographic PIV and 3D-PTV, calibration targets need to be imaged within the measurement volume at different depth positions. However, for domains with limited access and with small dimensions, it is difficult or impossible to place a calibration target. Therefore, a non-intrusive calibration approach is proposed to overcome these drawbacks, by employing light reflections of a continuous wave laser in the measurement domain. The laser is translated to different locations, yielding a set of calibration points, comprising the spatial coordinates of the light reflections and their corresponding sensor coordinates.

  13. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  14. Controlling electronic access to the spin excitations of a single molecule in a tunnel junction

    NASA Astrophysics Data System (ADS)

    Hirjibehedin, Cyrus F.; Warner, Ben; El Hallak, Fadi; Prueser, Henning; Ajibade, Afolabi; Gill, Tobias G.; Fisher, Andrew J.; Persson, Mats

    Spintronic phenomena can be utilized to create new devices with applications in data storage and sensing. Scaling these down to the single molecule level requires controlling the properties of the current-carrying orbitals to enable access to spin states through phenomena such as inelastic electron tunneling. Here we show that the spintronic properties of a tunnel junction containing a single molecule can be controlled by their coupling to the local environment. For tunneling through iron phthalocyanine (FePc) on an insulating copper nitride (Cu2N) monolayer above Cu(001), we find that spin transitions may be strongly excited depending on the binding site of the central Fe atom. Different interactions between the Fe and the underlying Cu or N atoms shift the Fe d-orbitals with respect to the Fermi energy, and control the relative strength of the spin excitations, an effect that can described in a simple co-tunneling model. This work demonstrates the importance of the atomic-scale environment in the development of single molecule spintronic devices.

  15. Development and characterization of 96 microsatellite markers suitable for QTL mapping and accession control in an Arabidopsis core collection

    PubMed Central

    2014-01-01

    Background To identify plant genes involved in various key traits, QTL mapping is a powerful approach. This approach is based on the use of mapped molecular markers to identify genomic regions controlling quantitative traits followed by a fine mapping and eventually positional cloning of candidate genes. Mapping technologies using SNP markers are still rather expensive and not feasible in every laboratory. In contrast, microsatellite (also called SSR for Simple Sequence Repeat) markers are technologically less demanding and less costly for any laboratory interested in genetic mapping. Results In this study, we present the development and the characterization of a panel of 96 highly polymorphic SSR markers along the Arabidopsis thaliana genome allowing QTL mapping among accessions of the Versailles 24 core collection that covers a high percentage of the A. thaliana genetic diversity. These markers can be used for any QTL mapping analysis involving any of these accessions. We optimized the use of these markers in order to reveal polymorphism using standard PCR conditions and agarose gel electrophoresis. In addition, we showed that the use of only three of these markers allows differentiating all 24 accessions which makes this set of markers a powerful tool to control accession identity or any cross between any of these accessions. Conclusion The set of SSR markers developed in this study provides a simple and efficient tool for any laboratory focusing on QTL mapping in A. thaliana and a simple means to control seed stock or crosses between accessions. PMID:24447639

  16. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  17. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. PMID:27347649

  18. Social support, intrusive thoughts, and quality of life in breast cancer survivors.

    PubMed

    Lewis, J A; Manne, S L; DuHamel, K N; Vickburg, S M; Bovbjerg, D H; Currie, V; Winkel, G; Redd, W H

    2001-06-01

    This study explores the moderating effect of social support on the relationship between cancer-related intrusive thoughts and quality of life. Sixty-four breast cancer survivors completed self-report measures of appraisal social support (the disclosure of thoughts and feelings to significant others), cancer-related intrusive thoughts, and quality of life. Controlling for demographic and treatment variables, the negative impact of cancer-related intrusive thoughts on both physical and mental quality of life measures was moderated by appraisal social support. For women with high levels of appraisal support, cancer-related intrusive thoughts had no significant relationship with quality of life. However, for women with low levels of appraisal support, the relationship between cancer-related intrusive thoughts and quality of life was significant and negative. These results suggest that appraisal social support can mitigate the impact of traumatic life events. PMID:11436544

  19. The impact of dissociation on perceptual priming and intrusions after listening to auditory narratives.

    PubMed

    Dorahy, Martin J; Peck, Rowan K; Huntjens, Rafaele J C

    2016-01-01

    This study investigates the causal role of dissociation in intrusive memory development and possible underlying aberrant memory processes (e.g., increased perceptual priming). Using an audio-only adaption of the trauma film paradigm, we divided 60 participants into 3 conditions and presented them with different visual tasks-mirror staring, dot staring, or neutral images. The former 2 conditions were hypothesized to induce dissociation. Postaudio, a number of factors were assessed, including state dissociation, perceptual priming and conceptual priming, as well as intrusions over 3 days. Participants in the dissociation conditions displayed an increase in perceptual priming compared to those in the control condition and reported more distressing intrusions. No differences were found in conceptual priming and the overall number of intrusions between conditions. Findings contribute to the growing knowledge on the impact of dissociation and cognitive processing in the etiology of posttraumatic stress disorder intrusions. PMID:26727461

  20. Controlling multidrug-resistant tuberculosis and access to expensive drugs: a rational framework.

    PubMed Central

    Pablos-Mendez, Ariel; Gowda, Deepthiman K.; Frieden, Thomas R.

    2002-01-01

    The emergence and spread of multidrug-resistant tuberculosis (MDR-TB), i.e. involving resistance to at least isoniazid and rifampicin, could threaten the control of TB globally. Controversy has emerged about the best way of confronting MDR-TB in settings with very limited resources. In 1999, the World Health Organization (WHO) created a working group on DOTS-Plus, an initiative exploring the programmatic feasibility and cost-effectiveness of treating MDR-TB in low-income and middle-income countries, in order to consider the management of MDR-TB under programme conditions. The challenges of implementation have proved more daunting than those of access to second-line drugs, the prices of which are dropping. Using data from the WHO/International Union Against Tuberculosis and Lung Disease surveillance project, we have grouped countries according to the proportion of TB patients completing treatment successfully and the level of MDR-TB among previously untreated patients. The resulting matrix provides a reasonable framework for deciding whether to use second-line drugs in a national programme. Countries in which the treatment success rate, i.e. the proportion of new patients who complete the scheduled treatment, irrespective of whether bacteriological cure is documented, is below 70% should give the highest priority to introducing or improving DOTS, the five-point TB control strategy recommended by WHO and the International Union Against Tuberculosis and Lung Disease. A poorly functioning programme can create MDR-TB much faster than it can be treated, even if unlimited resources are available. There is no single prescription for controlling MDR-TB but the various tools available should be applied wisely. Firstly, good DOTS and infection control; then appropriate use of second-line drug treatment. The interval between the two depends on the local context and resources. As funds are allocated to treat MDR-TB, human and financial resources should be increased to expand

  1. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  2. Non-intrusive speed sensor

    NASA Technical Reports Server (NTRS)

    Wyett, L.

    1986-01-01

    In Phase I of the Non-Intrusive Speed Sensor program, a computerized literature search was performed to identify candidate technologies for remote, non-intrusive speed sensing applications in Space Shuttle Main Engine (SSME) turbopumps. The three most promising technologies were subjected to experimental evaluation to quantify their performance characteristics under the harsh environmental requirements within the turbopumps. Although the infrared and microwave approaches demonstrated excellent cavitation immunity in laboratory tests, the variable-source magnetic speed sensor emerged as the most viable approach. Preliminary design of this speed sensor encountered no technical obstacles and resulted in viable and feasible speed nut, sensor housing, and sensor coil designs. Phase II of this program developed the variable-source magnetic speed sensor through the detailed design task and guided the design into breadboard fabrication. The speed sensor and its integral speed nut were evaluated at both unit and system level testing. The final room-temperature and cryogenic spin testing of the hardware demonstrated that the sensor was capable of generating sufficient output signal to enable remote speed sensing from 1500 to 40000 rpm over a speed nut/sensor separation of 3.5 inches.

  3. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  4. A Multi-Domain Access Control Infrastructure Based on Diameter and EAP

    NASA Astrophysics Data System (ADS)

    Ben Ayed, Souheil; Teraoka, Fumio

    The evolution of Internet, the growth of Internet users and the new enabled technological capabilities place new requirements to form the Future Internet. Many features improvements and challenges were imposed to build a better Internet, including securing roaming of data and services over multiple administrative domains. In this research, we propose a multi-domain access control infrastructure to authenticate and authorize roaming users through the use of the Diameter protocol and EAP. The Diameter Protocol is a AAA protocol that solves the problems of previous AAA protocols such as RADIUS. The Diameter EAP Application is one of Diameter applications that extends the Diameter Base Protocol to support authentication using EAP. The contributions in this paper are: 1) first implementation of Diameter EAP Application, called DiamEAP, capable of practical authentication and authorization services in a multi-domain environment, 2) extensibility design capable of adding any new EAP methods, as loadable plugins, without modifying the main part, and 3) provision of EAP-TLS plugin as one of the most secure EAP methods. DiamEAP Server basic performances were evaluated and tested in a real multi-domain environment where 200 users attempted to access network using the EAP-TLS method during an event of 4 days. As evaluation results, the processing time of DiamEAP using the EAP-TLS plugin for authentication of 10 requests is about 20ms while that for 400 requests/second is about 1.9 second. Evaluation and operation results show that DiamEAP is scalable and stable with the ability to handle more than 6 hundreds of authentication requests per second without any crashes. DiamEAP is supported by the AAA working group of the WIDE Project.

  5. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    NASA Astrophysics Data System (ADS)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  6. Life-history and hormonal control of aggression in black redstarts: Blocking testosterone does not decrease territorial aggression, but changes the emphasis of vocal behaviours during simulated territorial intrusions

    PubMed Central

    2013-01-01

    Introduction Many studies in behavioural endocrinology attempt to link territorial aggression with testosterone, but the exact relationship between testosterone and territorial behaviour is still unclear and may depend on the ecology of a species. The degree to which testosterone facilitates territorial behaviour is particularly little understood in species that defend territories during breeding and outside the breeding season, when plasma levels of testosterone are low. Here we suggest that species that defend territories in contexts other than reproduction may have lost the direct regulation of territorial behaviour by androgens even during the breeding season. In such species, only those components of breeding territoriality that function simultaneously as sexually selected signals may be under control of sex steroids. Results We investigated black redstarts (Phoenicurus ochruros), a species that shows periods of territoriality within and outside of the breeding season. We treated territorial males with an anti-androgen and an aromatase inhibitor during the breeding season to block both the direct and indirect effects of testosterone. Three and ten days after the treatment, implanted males were challenged with a simulated territorial intrusion. The treatment did not reduce the overall territorial response, but it changed the emphasis of territoriality: experimental males invested more in behaviours addressed directly towards the intruder, whereas placebo-treated males put most effort into their vocal response, a component of territoriality that may be primarily directed towards their mating partner rather than the male opponent. Conclusions In combination with previous findings, these data suggest that overall territoriality may be decoupled from testosterone in male black redstarts. However, high levels of testosterone during breeding may facilitate-context dependent changes in song. PMID:23433033

  7. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    NASA Astrophysics Data System (ADS)

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  8. Emotional and Behavioral Reaction to Intrusive Thoughts

    ERIC Educational Resources Information Center

    Berry, Lisa-Marie; May, Jon; Andrade, Jackie; Kavanagh, David

    2010-01-01

    A self-report measure of the emotional and behavioral reactions to intrusive thoughts was developed. The article presents data that confirm the stability, reliability, and validity of the new seven-item measure. Emotional and behavioral reactions to intrusions emerged as separate factors on the Emotional and Behavioral Reactions to Intrusions…

  9. Legal Vs. Psychological Aspects of Intrusiveness.

    ERIC Educational Resources Information Center

    Binder, Virginia L.

    Court decisions stressing the rights of mental patients have necessitated a radical revision in the management of behavioral treatment programs. The client's rights to the least intrusive procedures to achieve treatment goals have become important in case law. Factors which identify intrusiveness include: (1) the extent to which the "new mental…

  10. Vapour Intrusion into Buildings - A Literature Review

    EPA Science Inventory

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  11. Emplacement of sandstone intrusions during contractional tectonics

    NASA Astrophysics Data System (ADS)

    Palladino, Giuseppe; Grippa, Antonio; Bureau, Denis; Alsop, G. Ian; Hurst, Andrew

    2016-08-01

    Sandstone injections are created by the forceful emplacement of remobilized sand in response to increases in overpressure. However, the contribution provided by horizontal compressive stress to the build-up in overpressure, and the resulting emplacement of sand injection complexes, is still to be substantiated by robust field observations. An opportunity to address this issue occurs in Central California where a large volume of sandstone intrusions record regionally-persistent supra-lithostatic pore-pressure. Detailed fieldwork allows sandstone-filled thrusts to be recognized and, for the first time, permits us to demonstrate that some sandstone intrusions are linked to contractional deformation affecting the western border of the Great Valley Basin. Fluidized sand was extensively injected along thrust surfaces, and also fills local dilatant cavities linked to thrusting. The main aims of this paper are to provide detailed descriptions of the newly recognized syn-tectonic injections, and describe detailed cross-cutting relationships with earlier sandstone injection complexes in the study area. Finally, an evolutionary model consisting of three phases of sand injection is provided. In this model, sand injection is linked to contractional tectonic episodes affecting the western side of the Great Valley Basin during the Early-Middle Cenozoic. This study demonstrates that sand injections, driven by fluid overpressure, may inject along thrusts and folds and thereby overcome stresses associated with regional contractional deformation. It is shown that different generations of sand injection can develop in the same area under the control of different stress regimes, linked to the evolving mountain chain.

  12. Using Unix system auditing for detecting network intrusions

    SciTech Connect

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators know what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.

  13. Ongoing Spontaneous Activity Controls Access to Consciousness: A Neuronal Model for Inattentional Blindness

    PubMed Central

    2005-01-01

    Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden “ignition” of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of “inattentional blindness,” in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness. PMID:15819609

  14. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon.

    PubMed

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S

    2015-06-15

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome-Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S-RQC and 80S-Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome-translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel. PMID:25877867

  15. Analysis of driver injury severity in wrong-way driving crashes on controlled-access highways.

    PubMed

    Pour-Rouholamin, Mahdi; Zhou, Huaguo

    2016-09-01

    For more than five decades, wrong-way driving (WWD) has been notorious as a traffic safety issue for controlled-access highways. Numerous studies and efforts have tried to identify factors that contribute to WWD occurrences at these sites in order to delineate between WWD and non-WWD crashes. However, none of the studies investigate the effect of various confounding variables on the injury severity being sustained by the at-fault drivers in a WWD crash. This study tries to fill this gap in the existing literature by considering possible variables and taking into account the ordinal nature of injury severity using three different ordered-response models: ordered logit or proportional odds (PO), generalized ordered logit (GOL), and partial proportional odds (PPO) model. The findings of this study reveal that a set of variables, including driver's age, condition (i.e., intoxication), seatbelt use, time of day, airbag deployment, type of setting, surface condition, lighting condition, and type of crash, has a significant effect on the severity of a WWD crash. Additionally, a comparison was made between the three proposed methods. The results corroborate that the PPO model outperforms the other two models in terms of modeling injury severity using our database. Based on the findings, several countermeasures at the engineering, education, and enforcement levels are recommended. PMID:27263080

  16. Controlling the taste receptor accessible structure of rebaudioside A via binding to bovine serum albumin.

    PubMed

    Mudgal, Samriddh; Keresztes, Ivan; Feigenson, Gerald W; Rizvi, S S H

    2016-04-15

    We illustrate a method that uses bovine serum albumin (BSA) to control the receptor-accessible part of rebaudioside A (Reb A). The critical micelle concentration (CMC) of Reb A was found to be 4.5 mM and 5 mM at pH 3 and 6.7 respectively. NMR studies show that below its CMC, Reb A binds weakly to BSA to generate a Reb A-protein complex ("RPC"), which is only modestly stable under varying conditions of pH (3.0-6.7) and temperature (4-40°C) with its binding affinities determined to be in the range of 5-280 mM. Furthermore, saturation transfer difference (STD) NMR experiments confirm that the RPC has fast exchange of the bitterness-instigating diterpene of Reb A into the binding sites of BSA. Our method can be used to alter the strength of Reb A-receptor interaction, as a result of binding of Reb A to BSA, which may ultimately lead to moderation of its taste. PMID:26616927

  17. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  18. An energy-efficient media access control protocol for chain-type wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Wang, Yu; Chen, Chang Wen

    2005-06-01

    We present in this paper an energy efficient media access control (MAC) protocol for chain-type wireless sensor networks. The chain-type sensor networks are fundamentally different from traditional sensor networks in that the sensor nodes in this class of networks are deployed along narrow and elongated geographical areas and form a chain-type topology. Recently, we have successfully developed hierarchical network architecture, sensor deployment strategy, and corresponding network initialization and operation protocols for this class of sensor networks. In this paper, we present a novel TDMA scheduling protocol that takes full advantages of the available channel reuse inherent in the chain-type sensor networks to develop energy efficient and high data throughput MAC protocols for sensor data transmission. The synchronized TDMA scheduling allows the nodes to power on only when it is scheduled to send and receive and therefore results in additional energy saving. Within a cluster, parallel transmission is made possible because of the linear distribution of nodes within the chain-type topology and this yields the desired high throughput. Preliminary simulations have been carried out to show that the proposed TDMA scheduling outperforms the well-know SMAC scheme in terms of energy efficiency and data throughput under various duty cycles.

  19. Intrusion detection using secure signatures

    DOEpatents

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  20. Emotional and behavioral reaction to intrusive thoughts.

    PubMed

    Berry, Lisa-Marie; May, Jon; Andrade, Jackie; Kavanagh, David

    2010-03-01

    A self-report measure of the emotional and behavioral reactions to intrusive thoughts was developed. The article presents data that confirm the stability, reliability, and validity of the new seven-item measure. Emotional and behavioral reactions to intrusions emerged as separate factors on the Emotional and Behavioral Reactions to Intrusions Questionnaire (EBRIQ), a finding confirmed by an independent stress study. Test-retest reliability over 30 to 70 days was good. Expected relationships with other constructs were significant. Stronger negative responses to intrusions were associated with lower mindfulness scores and higher ratings of experiential avoidance, thought suppression, and intensity and frequency of craving. The EBRIQ will help explore differences in reactions to intrusive thoughts in clinical and nonclinical populations, and across different emotional and behavioral states. It will also be useful in assessing the effects of therapeutic approaches such as mindfulness. PMID:19797324

  1. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    PubMed

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD. PMID:21491252

  2. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  3. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  4. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  5. Negative appraisals and cognitive avoidance of intrusive memories in depression: a replication and extension.

    PubMed

    Williams, Alishia D; Moulds, Michelle L

    2008-01-01

    Recent research has demonstrated that intrusive negative autobiographical memories represent a shared phenomenological feature of posttraumatic stress disorder (PTSD) and depression. A preliminary investigation (Starr and Moulds, 2006) successfully applied a cognitive appraisal model of PTSD to the maintenance of intrusive memories in depression. The current investigation sought to replicate and extend these findings. Two hundred and fifty first-year undergraduate students were interviewed to assess for the presence of a negative autobiographical memory that had spontaneously intruded in the past week. Participants completed self-report inventories assessing trait and situational employment of cognitive avoidance mechanisms in response to these memories. Consistent with Starr and Moulds, intrusion-related distress correlated with dysphoria, irrespective of intrusion frequency. Assigning negative appraisals to one's intrusive memory and attempts to control the memory were positively associated with intrusion-related distress, level of depression, and cognitive avoidance mechanisms. Additionally, negative appraisals and control influenced the employment rumination as an avoidant response to a greater degree than the corresponding trait tendency. Finally, negative appraisals and the use of cognitive mechanisms were predictive of depression concurrently. The results support the validity of borrowing from PTSD models to elucidate the cognitive mechanisms that maintain intrusive memories in depressed samples. PMID:17994585

  6. The effect of intrusive orthodontic force on dental pulp of adults versus adolescents

    PubMed Central

    Abtahi, Mostafa; Eslami, Neda; Abadi, Reza Zare Mahmoud; Rezaei, Saber Pooria

    2016-01-01

    Background: There is no conclusive evidence on the effect of orthodontic force application on dental pulp tissue. The aim of this study was to compare early and delayed histological effects of intrusive forces on dental pulp of adolescents and adults. Materials and Methods: Patients referred to the Department of Orthodontics of Mashhad University of Medical Sciences participated in this study. They were assigned to adult (25–32-year-old) and adolescent (13–18-year-old) Groups. A cantilever spring made of 16 × 22 steel wire was used to apply intrusive force to upper first premolars (11 teeth in adolescents and 11 teeth in adults) and the opposing teeth were considered as control group. In each group, 6 pairs of teeth were extracted after one week, and the remaining 5 pairs were extracted after one month of intrusion. Histologic changes were compared between the control and intrusive groups and also between the adults and adolescents after 7 days and 1 month. Statistical analysis was performed using Statistical Package for the Social Sciences and Wilcoxon and Mann–Whitney U-tests. P ≤ 0.05 was set as statistically significant. Results: Significant difference was not found in any histological parameters between intrusive and control groups 1 week and 1 month after intrusion in adolescents and adults (P > 0.05). One month after intrusion, inflammatory cell response intensity (P = 0.032) and frequency of chronic inflammation (P = 0.032) were significantly higher in adults compared to adolescents. Conclusion: Mild intrusive force in closed apex teeth causes no significant histologic changes in adolescents and adults. However, it seems that inflammatory-related histologic pulpal changes are more severe in adults after one month of intrusion. PMID:27605996

  7. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  8. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  9. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  10. Detection of stratospheric ozone intrusions by windprofiler radars.

    PubMed

    Hocking, W K; Carey-Smith, T; Tarasick, D W; Argall, P S; Strong, K; Rochon, Y; Zawadzki, I; Taylor, P A

    2007-11-01

    Stratospheric ozone attenuates harmful ultraviolet radiation and protects the Earth's biosphere. Ozone is also of fundamental importance for the chemistry of the lowermost part of the atmosphere, the troposphere. At ground level, ozone is an important by-product of anthropogenic pollution, damaging forests and crops, and negatively affecting human health. Ozone is critical to the chemical and thermal balance of the troposphere because, via the formation of hydroxyl radicals, it controls the capacity of tropospheric air to oxidize and remove other pollutants. Moreover, ozone is an important greenhouse gas, particularly in the upper troposphere. Although photochemistry in the lower troposphere is the major source of tropospheric ozone, the stratosphere-troposphere transport of ozone is important to the overall climatology, budget and long-term trends of tropospheric ozone. Stratospheric intrusion events, however, are still poorly understood. Here we introduce the use of modern windprofiler radars to assist in such transport investigations. By hourly monitoring the radar-derived tropopause height in combination with a series of frequent ozonesonde balloon launches, we find numerous intrusions of ozone from the stratosphere into the troposphere in southeastern Canada. On some occasions, ozone is dispersed at altitudes of two to four kilometres, but on other occasions it reaches the ground, where it can dominate the ozone density variability. We observe rapid changes in radar tropopause height immediately preceding these intrusion events. Such changes therefore serve as a valuable diagnostic for the occurrence of ozone intrusion events. Our studies emphasize the impact that stratospheric ozone can have on tropospheric ozone, and show that windprofiler data can be used to infer the possibility of ozone intrusions, as well as better represent tropopause motions in association with stratosphere-troposphere transport. PMID:17994096

  11. Alleviating distressing intrusive memories in depression: a comparison between computerised cognitive bias modification and cognitive behavioural education.

    PubMed

    Newby, Jill M; Lang, Tamara; Werner-Seidler, Aliza; Holmes, Emily; Moulds, Michelle L

    2014-05-01

    Negative appraisals maintain intrusive memories and intrusion-distress in depression, but treatment is underdeveloped. This study compared the efficacy of computerised bias modification positive appraisal training (CBM) versus a therapist-delivered cognitive behavioural therapy session (CB-Education) that both aimed to target and alter negative appraisals of a negative intrusive autobiographical memory. Dysphoric participants (Mean BDI-II = 27.85; N = 60) completed baseline ratings of a negative intrusive memory, negative appraisals and the Impact of Event Scale, and were randomly allocated either one session of CBM, CB-Education, or a no intervention monitoring control condition (Control). Mood and intrusion symptoms were assessed at one week follow-up. For all groups, there were significant reductions over one week in mood (depression and anxiety), memory intrusiveness and negative appraisals. Groups differed in terms of intrusion-related distress, with the CB-Education group showing greatest reduction, followed by the CBM group. The study provides evidence for the link between maladaptive appraisals of intrusive memories and distress in depressed mood. Further, both a single session of CB-Education and (to a lesser degree) CBM are useful in reducing intrusion-related distress. This study may have been underpowered to detect differences and replication is needed with larger samples. PMID:24685536

  12. Self-report may underestimate trauma intrusions.

    PubMed

    Takarangi, Melanie K T; Strange, Deryn; Lindsay, D Stephen

    2014-07-01

    Research examining maladaptive responses to trauma routinely relies on spontaneous self-report to index intrusive thoughts, which assumes people accurately recognize and report their intrusive thoughts. However, "mind-wandering" research reveals people are not always meta-aware of their thought content: they often fail to notice shifts in their attention. In two experiments, we exposed subjects to trauma films, then instructed them to report intrusive thoughts during an unrelated reading task. Intermittently, we asked whether they were thinking about the trauma. As expected, subjects often spontaneously reported intrusive thoughts. However, they were also "caught" engaging in unreported trauma-oriented thoughts. The presence and frequency of intermittent probes did not influence self-caught intrusions. Both self-caught and probe-caught intrusions were related to an existing tendency toward intrusive cognition, film-related distress, and thought suppression attempts. Our data suggest people may lack meta-awareness of trauma-related thoughts, which has implications for theory, research and treatment relating to trauma-related psychopathology. PMID:24993526

  13. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  14. "I see what you're saying": intrusive images from listening to a traumatic verbal report.

    PubMed

    Krans, Julie; Näring, Gérard; Holmes, Emily A; Becker, Eni S

    2010-01-01

    We tested the hypothesis that intrusive visual images could develop from listening to a traumatic verbal report. Eighty-six participants listened to a traumatic verbal report under one of three conditions: while shaping plasticine (visuospatial condition), while performing articulatory suppression (verbal condition), or with no extra task (control condition). Results showed that intrusive visual images developed from listening to the traumatic report. In line with the idea that central executive processes guide encoding of information, intrusion frequency was reduced in both the visuospatial and the verbal condition compared to the no task control condition. Overall, this pattern is similar to intrusive images from a traumatic film as found in earlier studies. This study provides a valuable addition to models of posttraumatic stress disorder and autobiographical memory. Additionally, the results have potential implications for therapists working with traumatized individuals. PMID:19864108

  15. Quasi-horizontal circulation cells in 3D seawater intrusion

    NASA Astrophysics Data System (ADS)

    Abarca, Elena; Carrera, Jesús; Sánchez-Vila, Xavier; Voss, Clifford I.

    2007-06-01

    SummaryThe seawater intrusion process is characterized by the difference in freshwater and seawater density that causes freshwater to float on seawater. Many confined aquifers have a large horizontal extension with respect to thickness. In these cases, while buoyancy acts in the vertical direction, flow is confined between the upper and bottom boundaries and the effect of gravity is controlled by variations of aquifer elevation. Therefore, the effective gravity is controlled by the slope and the shape of the aquifer boundaries. Variability in the topography of the aquifer boundaries is one case where 3D analysis is necessary. In this work, density-dependent flow processes caused by 3D aquifer geometry are studied numerically and specifically, considering a lateral slope of the aquifer boundaries. Sub-horizontal circulation cells are formed in the saltwater entering the aquifer. The penetration of the saltwater can be quantified by a dimensionless buoyancy number that measures the lateral slope of the aquifer relative to freshwater flux. The penetration of the seawater intrusion wedge is controlled more by this slope than by the aquifer thickness and dispersivity. Thus, the slope must be taken into account in order to accurately evaluate seawater intrusion.

  16. Quasi-horizontal circulation cells in 3D seawater intrusion

    USGS Publications Warehouse

    Abarca, E.; Carrera, J.; Sanchez-Vila, X.; Voss, C.I.

    2007-01-01

    The seawater intrusion process is characterized by the difference in freshwater and seawater density that causes freshwater to float on seawater. Many confined aquifers have a large horizontal extension with respect to thickness. In these cases, while buoyancy acts in the vertical direction, flow is confined between the upper and bottom boundaries and the effect of gravity is controlled by variations of aquifer elevation. Therefore, the effective gravity is controlled by the slope and the shape of the aquifer boundaries. Variability in the topography of the aquifer boundaries is one case where 3D analysis is necessary. In this work, density-dependent flow processes caused by 3D aquifer geometry are studied numerically and specifically, considering a lateral slope of the aquifer boundaries. Sub-horizontal circulation cells are formed in the saltwater entering the aquifer. The penetration of the saltwater can be quantified by a dimensionless buoyancy number that measures the lateral slope of the aquifer relative to freshwater flux. The penetration of the seawater intrusion wedge is controlled more by this slope than by the aquifer thickness and dispersivity. Thus, the slope must be taken into account in order to accurately evaluate seawater intrusion. ?? 2007 Elsevier B.V. All rights reserved.

  17. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    PubMed

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. PMID:24596069

  18. Controls upon microbial accessibility to soil organic matter following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, C. A.; Boutton, T. W.; Filley, T. R.

    2009-12-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic matter (SOM) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and soil hydrology. To elucidate the controls upon microbial accessibility to SOM, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas A&M Agricultural Experimental Station La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, plant biopolymer chemistry in SOM, and microbial community structure were tracked. Respiration rates declined steadily over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total carbon was mineralized to CO2 throughout the incubation. After day 84 a significantly (p < 0.05) greater portion of carbon was mineralized from soils of older woody clusters (34-86 years) than from soils of younger clusters (14-23 years) and the native grassland. Approximately 80% of patterns seen in cumulative CO2 loss could be explained by the proportions of macro- and micro-aggregates within each soil, suggesting soil structure is a major controlling factor of respiration rates. Despite documented carbon accrual within La Copita soils due to WPE, we observed no evidence of enhanced carbon stabilization in these respiration experiments. In fact, a greater proportion of total carbon was lost from the soil of mature woody stands than from young stands, suggesting carbon accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. A cluster approximately 34 years in age represents a transition point in WPE where respiration dynamics become distinct between grassland and wooded elements. By day 84 of the incubation CO2 respired from all soils was depleted with respect to bulk SOM (1.5 to 5‰) and this

  19. Laboratory experiments of salt water intrusion

    NASA Astrophysics Data System (ADS)

    Crestani, Elena; Camporese, Matteo; Salandin, Paolo

    2015-04-01

    The problem of saltwater intrusion in coastal aquifers is dealt with by the proper setup of a sand-box device to develop laboratory experiments in a controlled environment. Saline intrusion is a problem of fundamental importance and affects the quality of both surface water and groundwater in coastal areas. In both cases the phenomenon may be linked to anthropogenic (construction of reservoirs, withdrawals, etc.) and/or natural (sea-level excursions, variability of river flows, etc.) changes. In recent years, the escalation of this problem has led to the development of specific projects and studies to identify possible countermeasures, typically consisting of underground barriers. Physical models are fundamental to study the saltwater intrusion problem, since they provide benchmarks for numerical model calibrations and for the evaluation of the effectiveness of solutions to contain the salt wedge. In order to study and describe the evolution of the salt wedge, the effectiveness of underground barriers, and the distance from the coast of a withdrawal that guarantees a continuous supply of fresh water, a physical model has been realized at the University of Padova to represent the terminal part of a coastal aquifer. It consists of a laboratory flume 500 cm long, 30 cm wide and 60 cm high, filled for an height of 45 cm with glass beads with a d50 of 0.6 mm and a uniformity coefficient d60/d10~= 1.5. The material is homogeneous and characterized by a porosity of about 0.37 and by an hydraulic conductivity of about 1.8×10-3 m/s. Upstream from the sand-box, a tank, continuously supplied by a pump, provides fresh water to recharge the aquifer, while the downstream tank, filled with salt water, simulates the sea. The volume of the downstream tank (~= 2 m3) is about five times the upstream one, so that density variations due to the incoming fresh water flow are negligible. The water level in the two tanks is continuously monitored by means of two level probes and is

  20. Advanced technologies for perimeter intrusion detection sensors

    SciTech Connect

    Williams, J.D.

    1995-03-01

    The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

  1. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    NASA Astrophysics Data System (ADS)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2011-11-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  2. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    NASA Astrophysics Data System (ADS)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  3. AIDE - Advanced Intrusion Detection Environment

    SciTech Connect

    Smith, Cathy L.

    2013-04-28

    Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

  4. Autonomous Rule Creation for Intrusion Detection

    SciTech Connect

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  5. Online Intrusion Alert Aggregation Through Mobile

    NASA Astrophysics Data System (ADS)

    kumar, S. Magesh; Mohan, K.; Kadirvelu, G.; Muruganandam, S.

    2012-08-01

    Online Intrusion Alert Aggregation with Generative Data Stream Modeling is a generative modeling approach using probabilistic methods. Assuming that attack instances can be regarded as random processes ìproducingî alerts, we aim at modeling these processes using approximative maximum likelihood parameterestimation techniques. Thus, the beginning as well as the completion of attack instances can be detected. In the proposed scheme of Online Intrusion Alert Aggregation, we extend our idea of sending Intrusion alerts to the mobile. This makes the process easier and comfortable. Online Intrusion Alert Aggregation with Generative Data Stream Modeling does not degrade system performance as individual layers are independent and are trained with only a small number of features, thereby, resulting in an efficient system

  6. Adapting safety requirements analysis to intrusion detection

    NASA Technical Reports Server (NTRS)

    Lutz, R.

    2001-01-01

    Several requirements analysis techniques widely used in safety-critical systems are being adapted to support the analysis of secure systems. Perhaps the most relevant system safety techique for Intrusion Detection Systems is hazard analysis.

  7. Anomaly-based intrusion detection for SCADA systems

    SciTech Connect

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  8. Effects of recharge wells and flow barriers on seawater intrusion.

    PubMed

    Luyun, Roger; Momii, Kazuro; Nakagawa, Kei

    2011-01-01

    The installation of recharge wells and subsurface flow barriers are among several strategies proposed to control seawater intrusion on coastal groundwater systems. In this study, we performed laboratory-scale experiments and numerical simulations to determine the effects of the location and application of recharge wells, and of the location and penetration depth of flow barriers, on controlling seawater intrusion in unconfined coastal aquifers. We also compared the experimental results with existing analytical solutions. Our results showed that more effective saltwater repulsion is achieved when the recharge water is injected at the toe of the saltwater wedge. Point injection yields about the same repulsion compared with line injection from a screened well for the same recharge rate. Results for flow barriers showed that more effective saltwater repulsion is achieved with deeper barrier penetration and with barriers located closer to the coast. When the flow barrier is installed inland from the original toe position however, saltwater intrusion increases with deeper barrier penetration. Saltwater repulsion due to flow barrier installation was found to be linearly related to horizontal barrier location and a polynomial function of the barrier penetration depth. PMID:20533955

  9. [Intrusive care and the nursing approach].

    PubMed

    Bécu, Anays Vaplet; Viltart, Valérie

    2015-04-01

    All caregivers who listen to patients will hear them tell their experience of the intrusive nature of care, whether it be basic, technical, educational or relational. The relational approach implemented by nurses enables them to identify organisational and behavioural methods which favour the establishment of a climate of trust. It helps them appropriate this interdisciplinary approach to caregiving, limiting as much as possible the intrusion felt by the patient during their hospital stay. PMID:26043629

  10. Slotted Aloha multiple access and error control coding for land mobile satellite networks

    NASA Astrophysics Data System (ADS)

    Lutz, Erich

    1992-10-01

    This paper considers a satellite network with data messages being transmitted by land mobile users according to slotted Aloha multiple access. The mobile communication links suffering from multipath fading and signal shadowing are modelled as Gilbert-Elliott channels. FEC block coding is used to correct transmission errors. The maximum achievable information throughput and the mean packet delay are derived from a combined analysis of the multiple access and FEC/ARQ protocol. The results show that the additional overhead necessary for FEC is outweighed by the benefit in throughput and delay. Finally, the capture effect and its consequences are discussed.

  11. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE...

  12. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE...

  13. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE...

  14. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE...

  15. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE...

  16. A system for distributed intrusion detection

    SciTech Connect

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. . Div. of Computer Science); Grance, T. ); Mansur, D.L.; Pon, K.L. ); Smaha, S.E. )

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  17. Managing unwanted intrusive thoughts in obsessive-compulsive disorder: relative effectiveness of suppression, focused distraction, and acceptance.

    PubMed

    Najmi, Sadia; Riemann, Bradley C; Wegner, Daniel M

    2009-06-01

    Suppression is one of various mental control techniques that people may use to manage unwanted thoughts. Evidence suggests that it is at best unsustainable and at worst counterproductive. This leads to the question: If suppression is a futile way to respond to unwanted, intrusive thoughts, what is a more effective alternative? In the current study, we evaluated the relative effectiveness of suppression and two alternative mental control techniques-focused distraction and acceptance-on the frequency of intrusions and distress associated with them. Results support the claim that suppression is a counterproductive technique for dealing with unwanted, intrusive thoughts in OCD. However, the harmfulness of suppression was reflected primarily in the magnitude of distress and not in intrusion frequency. Focused distraction and acceptance were the more effective techniques for managing clinically significant intrusive thoughts. We discuss implications for the cognitive treatment for OCD. PMID:19327753

  18. Sandia Network Intrusion Detection Assessment Version 1.0

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusionmore » detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a

  19. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  20. Multi-component access to a commercially available weight loss program: A randomized controlled trial

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This study examined weight loss between a community-based, intensive behavioral counseling program (Weight Watchers PointsPlus that included three treatment access modes and a self-help condition. A total of 292 participants were randomized to a Weight Watchers (WW; n=147) or a self-help condition (...

  1. Enrollment Quota Control, Elite Selection and Access to Education in Rural China

    ERIC Educational Resources Information Center

    Zhao, Luan

    2010-01-01

    In China, the access to education is determined by not only student's demand for schooling, but also the allocation of educational resources and the schools' selection of candidate students. Based on the data obtained from the rural life level and rural social assistance household surveys in four provinces in 2005, the demand-identified bivariate…

  2. Enhancer control of local accessibility to V(D)J recombinase.

    PubMed Central

    McMurry, M T; Hernandez-Munain, C; Lauzurica, P; Krangel, M S

    1997-01-01

    We have studied the role of transcriptional enhancers in providing recombination signal sequence (RSS) accessibility to V(D)J recombinase by examining mice carrying a transgenic human T-cell receptor (TCR) delta gene minilocus. This transgene is composed of unrearranged variable (Vdelta and Vdelta2), diversity (Ddelta3), joining (Jdelta1 and Jdelta3), and constant (Cdelta) gene segments. Previous data indicated that with the TCR delta enhancer (Edelta) present in the Jdelta3-Cdelta intron, V(D)J recombination proceeds stepwise, first V to D and then VD to J. With the enhancer deleted or mutated, V-to-D rearrangement is intact, but VD-to-J rearrangement is inhibited. We proposed that Edelta is necessary for J segment but not D segment accessibility and that J segment inaccessibility in the enhancerless minilocus resulted in the observed V(D)J recombination phenotype. In this study, we tested this notion by using ligation-mediated PCR to assess the formation of recombination-activating gene (RAG)-dependent double-strand breaks (DSBs) at RSSs 3' of Ddelta3 and 5' of Jdelta1. In five lines of mice carrying multicopy integrants of constructs that either lacked Edelta or carried an inactivated Edelta, the frequency of DSBs 5' of Jdelta1 was dramatically reduced relative to that in the wild type, whereas the frequency of DSBs 3' of Ddelta3 was unaffected. We interpret these results to indicate that Edelta is required for Jdelta1 but not Ddelta3 accessibility within the minilocus, and we conclude that enhancers regulate V(D)J recombination by providing local accessibility to the recombinase. cis-acting elements other than Edelta must maintain Ddelta3 in an accessible state in the absence of Edelta. The analysis of DSB formation in a single-copy minilocus integrant indicates that efficient DSB formation at the accessible RSS 3' of Ddelta3 requires an accessible partner RSS, arguing that RSS synapsis is required for DSB formation in chromosomal substrates in vivo. PMID

  3. The effect of cognitive load and hyperarousal on negative intrusive memories.

    PubMed

    Nixon, Reginald D V; Nehmy, Thomas; Seymour, Melanie

    2007-11-01

    Clinical theories of post-traumatic stress suggest that encoding processes at the time of a trauma are critical in determining whether intrusive memories will develop. Potential mechanisms that might influence the development of intrusive memories were studied, as was objective memory performance. In an analogue design, 65 participants were randomised to three conditions (cognitive load, hyperventilation, and control), and then watched a film of traumatic content. Intrusive memories were recorded during the experimental phase and at 1-week follow-up. Support was found for the prediction that verbal cognitive load and hyperventilation would facilitate intrusion development immediately following exposure to the trauma film; however, this was not maintained at follow-up. Consistent with cognitive models of post-traumatic stress, thought suppression and the distress associated with intrusive experiences mediated the relationship between distress caused by the film and intrusions at 1-week follow-up. Objective memory testing indicated that the three experimental groups showed similar recall and recognition performance for the content of the film; however, relative to the control group, individuals in the cognitive load condition were significantly less able to place film scenes in the correct order. PMID:17666185

  4. Novel implementations of optical switch control module and 3D-CSP for 10 Gbps active optical access system

    NASA Astrophysics Data System (ADS)

    Wakayama, Koji; Okuno, Michitaka; Matsuoka, Yasunobu; Hosomi, Kazuhiko; Sagawa, Misuzu; Sugawara, Toshiki

    2009-11-01

    We propose an optical switch control procedure for high-performance and cost-effective 10 Gbps Active Optical Access System (AOAS) in which optical switches are used instead of optical splitters in PON (Passive Optical Network). We demonstrate the implemented optical switch control module on Optical Switching Unit (OSW) with logic circuits works effectively. We also propose a compact optical 3D-CSP (Chip Scale Package) to achieve the high performance of AOAS without losing cost advantage of PON. We demonstrate the implemented 3D-CSP works effectively.

  5. The effects of hands free communication devices on clinical communication: balancing communication access needs with user control.

    PubMed

    Richardson, Joshua E; Richardson, Joshua Edwin; Ash, Joan S; Ash, Joan

    2008-01-01

    Hands Free Communication Device (HFCD) systems are a relatively new information and communication technology. HFCD systems enable clinicians to directly contact and communicate with one another using wearable, voice-controlled badges that are VoIP-based (voice-over IP) and are linked to one another over a wireless local area network (WLAN). This qualitative study utilized a grounded theory, multiple perspectives approach to understand how the use of HFCDs affected communication in the hospitals that implemented them. The study generated five themes revolving around HFCDs impact on communication. This paper specifically focuses on two of those themes: Communication Access and Control. PMID:18999046

  6. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    PubMed

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services. PMID:27240842

  7. Controls on microbial accessibility to soil organic carbon following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, Courtney; Boutton, Thomas; Olk, Dan; Filley, Timothy

    2010-05-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic carbon (SOC) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and hydrology. To elucidate the controls on microbial accessibility to SOC, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas Agrilife La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, and plant biopolymer chemistry in SOC were tracked. Respiration rates declined exponentially over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total SOC was mineralized to CO2 throughout the incubation. After day 84 a significantly (p<0.05) greater portion of SOC was mineralized from soils of older woody clusters (34-86 years) than from soils of younger woody clusters (14-23 years) and the native grassland. Invading woody stands of ≃≥35 years of age represent a transition point in WPE where respiration dynamics become distinct in wooded elements compared to grasslands; this distinction has been previously observed through changes in belowground SOC accrual, C input chemistry, and mycorrhizal productivity. Despite documented SOC accrual following WPE at La Copita, we observed no evidence of enhanced SOC stabilization in these respiration experiments. In fact, a greater proportion of total SOC was lost from the soil of mature woody stands than from young stands, suggesting SOC accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. Compound-specific analyses indicated there was a significant (p<0.05) loss of C from carbohydrates, amino acids, and amino sugars during the incubation. Amino nitrogen tended to become more concentrated during the incubation, although the trend was not significant. Relatively

  8. Experimental modelling of thin-skinned shortening around magmatic intrusions

    NASA Astrophysics Data System (ADS)

    Merle, Olivier; Vendeville, Bruno

    1995-03-01

    Magmatic intrusions can trigger thin-skinned compression of the adjacent sedimentary cover by three processes: (a) gravity gliding away from the topographic dome resulting from the ascending magma; (b) fluid push from the rear resulting from forceful intrusion then lateral spreading of the magma; and (c) increased loading by volcanic accumulation. The applicability of the first two mechanisms, gravity gliding and fluid push, was tested using dynamically scaled experiments. Model results help to elucidate the kinematics and structural evolution of thrusts and folds formed by such processes and determine which geological parameters control the deformation style. The results show that the presence of a weak layer within the sedimentary overburden is essential to form thrust and fold belts around the intrusion. Experiments suggest that although gravity gliding can dominate the early stages of deformation, most of the deformation is caused by lateral spreading of the fluid magma pushing the adjacent sedimentary rocks. Models also suggest that true laccoliths can form only if the sedimentary section comprises a basal low-viscosity stratum. Comparison with natural examples allows the evaluation of the applicability of experimental results.

  9. Composite synvolcanic intrusions associated with Precambrian VMS-related hydrothermal systems

    NASA Astrophysics Data System (ADS)

    Galley, Alan G.

    2003-06-01

    trondhjemite phases. The trondhjemite phases contain numerous internal contacts indicating emplacement as composite sills. Common structural features of the composite intrusions include early xenolith phases, abundant small comagmatic dikes, fractures and veins and, in places, columnar jointing. Internal phases may differ greatly in texture from fine- to coarse-grained, aphyric and granophyric through seriate to porphyritic. Mineralogical and isotopic evidence indicates that early phases of each composite intrusion are affected by pervasive to fracture-controlled high-temperature (350-450 °C) alteration reflecting seawater-rock interaction. Trondhjemite phases contain hydrothermal-magmatic alteration assemblages within miarolitic cavities, hydrothermal breccias and veins. This hydrothermal-magmatic alteration may, in part, be inherited from previously altered wall rocks. Two of the four intrusions are host to Cu-Mo-rich intrusive breccias and porphyry-type mineralization which formed as much as 14 Ma after the main subvolcanic magmatic activity. The recognition of these Precambrian, subvolcanic composite intrusions is important for greenfields VMS exploration, as they define the location of thermal corridors within extensional oceanic-arc regimes which have the greatest potential for significant VMS mineralization. The VMS mineralization may occur for 2,000 m above the intrusions. In some cases, VMS mineralization has been truncated or enveloped by late trondhjemite phases of the composite intrusions. Evidence that much of the trondhjemitic magmatism postdates the principal VMS activity is a critical factor when developing heat and fluid flow models for these subseafloor magmatic-hydrothermal systems.

  10. Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hurni, Philipp

    This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.

  11. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... described in § 648.4(a)(13)(i)(J) for the entire fishing year preceding the carry-over year, limited access... fishery consistent with § 648.4(a)(13)(i)(B)(2) or the TAC is adjusted consistent with § 648.260. (3... and calls out of the fishery at 10 p.m. on Friday, the next day, that vessel shall be assessed 2...

  12. Magnetic interpretation by the Monte Carlo method with application to the intrusion of the Crimea

    NASA Astrophysics Data System (ADS)

    Gryshchuk, Pavlo

    2014-05-01

    The study involves the application of geophysical methods for geological mapping. Magnetic and radiometric measurements were used to delineate the intrusive bodies in Bakhchysarai region of the Crimea. Proton magnetometers used to measure the total magnetic field in the area and variation station. Scintillation radiometer used to determine the radiation dose. Due to susceptimeter measured the magnetic susceptibility of rocks. It deal with the fact that in this area of research the rock mass appears on the surface. Anomalous values of the magnetic intensity were obtained as the difference between the observed measurements and values on variation station. Through geophysical data were given maps of the anomalous magnetic field, radiation dose, and magnetic susceptibility. Geology of area consisted from magmatic rocks and overlying sedimentary rocks. The main task of research was to study the geometry and the magnetization vector of igneous rocks. Intrusive body composed of diabase and had an average magnetic susceptibility, weak dose rate and negative magnetic field. Sedimentary rocks were represented by clays. They had a low value of the magnetic susceptibility and the average dose rate. Map of magnetic susceptibility gave information about the values and distribution of magnetized bodies close to the surface. These data were used to control and elaboration the data of the magnetic properties for magnetic modelling. Magnetic anomaly map shows the distribution of magnetization in depth. Interpretation profile was located perpendicular to the strike of the intrusive body. Modelling was performed for profile of the magnetic field. Used the approach for filling by rectangular blocks of geological media. The fitting implemented for value magnetization and its vector for ever block. Fitting was carried out using the Monte Carlo method in layers from the bottom to top. After passing through all the blocks were fixed magnetic parameters of the block with the best

  13. Gravity-driven intrusions in stratified fluids

    NASA Astrophysics Data System (ADS)

    Maurer, Benjamin Dudley

    All natural fluids stratify. Stable stratifications, in which isobars and isopycnals are parallel, are capable of supporting internal wave motion. Unstable stratification, in which density and pressure gradients are not aligned, results in gravity-driven flow. Gravity currents are a subset of these flows in which horizontal density gradients sharpen and propagate horizontally, transporting mass, momentum, and energy. If the density of the gravity current is within the density extrema of the stably stratified ambient fluid, it propagates as an intrusion at an intermediate height. Through laboratory experiments and numerical simulations, this dissertation explores the influence of stratification on the dynamics of gravity-driven intrusions. Intrusions require stable stratification in the ambient fluid, which is capable of transporting momentum and energy away from the current in the form of internal waves. We investigate the constant velocity propagation of well-mixed intrusions propagating into a linearly stratified ambient fluid. Varying the level of neutral buoyancy, we quantify the corresponding variation in structure, momentum, and energy of the upstream wave field. Adjacent stable stratifications of differing vertical density structure necessarily entail horizontal density gradients. These gradients determine the hydrostatic pressure differences driving the ensuing gravity current. We examine the mid-depth, constant velocity propagation of one linearly stratified fluid into another more strongly linearly stratified fluid. Working from the available potential energy of the system and measurements of the intrusion thickness, we develop an energy model to describe the speed of the intrusion in terms of the ratio of the two buoyancy frequencies. Distinct from adjacent linear stratifications, adjacent discrete stratifications may create flow consisting of interleaving intrusions. Single intrusions into a two-layer ambient fluid are well understood. Limiting our

  14. Toxic Substances Control Act (TSCA) chemical substances inventory: PMN number to EPA accession number link (for microcomputers). Data file

    SciTech Connect

    Not Available

    1994-05-01

    The PMN Number to EPA Accession Number Link Diskette provides a cross-reference of these numbers for commenced PMNs on the confidential portion of the Toxic Substances Control Act (TSCA) Master Inventory File. Neither this cross-reference nor the additional information included is TSCA Confidential Business Information. Provided on the diskette for each confidential commenced PMN are the PMN Case Number, EPA Accession Number, Generic Name, and EPA special flags. For more detailed information on the confidential portion of the TSCA Inventory, including generic names, users can consult the introductory material of the printed TSCA Inventory: 1985 Edition and its 1990 Supplement. New versions of this file may be issued in the future.

  15. Igneous intrusions in coal-bearing sequences

    SciTech Connect

    Gurevich, A.B.; Shishlov, S.B.

    1987-08-01

    Intrusions of various compositions, sizes, and shapes have been observed in 115 out of 620 coal basins or deposits on all the continents. They are mainly subvolcanic and hypabyssal, with depths of emplacement estimated as ranging from a few hundred meters to 6 km, but usually 3-4 km. Compositionally, 42% are basic, 31% intermediate, 23% acid, and 4% ultrabasic. Mafic (and related) rock types include dolerites, trachydolerites, gabbro-dolerites, gabbro-monzonites, monzonites, diabases, gabbrodiabases, and less often gabbros and basalts (subvolcanic bodies). These mafic intrusions occur in coal formations of various ages from Carboniferous through Neogene, but predominate in Paleozoic (47%) and Cenozoic beds (45%). They also occur in coal formations of all genetic types, apart from those on ancient stable platforms, where there are no signs of intrusive activity. The mafic intrusions are almost everywhere associated with comagmatic lavas and tuffs (mainly in the younger strata), and the coal beds themselves are to some extent enriched in pyroclastic material, particularly in the upper horizons. This paper gives a worldwide review of igneous intrusions in coal beds. 24 references.

  16. Clinical utility of far-infrared therapy for improvement of vascular access blood flow and pain control in hemodialysis patients

    PubMed Central

    Choi, Soo Jeong; Cho, Eun Hee; Jo, Hye Min; Min, Changwook; Ji, Young Sok; Park, Moo Yong; Kim, Jin Kuk; Hwang, Seung Duk

    2015-01-01

    Background Maintenance of a well-functioning vascular access and minimal needling pain are important goals for achieving adequate dialysis and improving the quality of life in hemodialysis (HD) patients. Far-infrared (FIR) therapy may improve endothelial function and increase access blood flow (Qa) and patency in HD patients. The aim of this study was to evaluate effects of FIR therapy on Qa and patency, and needling pain in HD patients. Methods This prospective clinical trial enrolled 25 outpatients who maintained HD with arteriovenous fistula. The other 25 patients were matched as control with age, sex, and diabetes. FIR therapy was administered for 40 minutes during HD 3 times/wk and continued for 12 months. The Qa was measured by the ultrasound dilution method, whereas pain was measured by a numeric rating scale at baseline, then once per month. Results One patient was transferred to another facility, and 7 patients stopped FIR therapy because of an increased body temperature and discomfort. FIR therapy improved the needling pain score from 4 to 2 after 1 year. FIR therapy increased the Qa by 3 months and maintained this change until 1 year, whereas control patients showed the decrease in Qa. The 1-year unassisted patency with FIR therapy was not significantly different from control. Conclusion FIR therapy improved needling pain. Although FIR therapy improved Qa, the unassisted patency was not different compared with the control. A larger and multicenter study is needed to evaluate the effect of FIR therapy. PMID:27069856

  17. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    NASA Astrophysics Data System (ADS)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  18. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  19. Accessibility Is the Mother of Invention: When It Comes to an Innovative Hand Control System

    ERIC Educational Resources Information Center

    Exceptional Parent, 2007

    2007-01-01

    This article features Sure Grip hand control, an innovative hand control system created by Keith Howell, the President and founder of Howell Ventures LTD. Howell was in his early teens when he experienced an accident that resulted in his quadriplegia. From that point on, Howell set about to manufacture a set of controls that would emulate the…

  20. Anterior Deep Bite Malocclusion Treated with Connecticut Intrusion Arch: Biomechanical Consideration

    PubMed Central

    Bansal, Abhishek; Sami, Laique; Tapashetti, Roopali; Gaikwad, Shashank

    2014-01-01

    Most Class II division 2 malocclusion manifest a severe deep bite, the orthodontic correction of deep overbite can be achieved with several mechanisms one such mechanics is true intrusion of anterior teeth. Deep overbite correction by intrusion of anterior teeth affords a number of advantages which includes simplifying control of the vertical dimension and allowing forward rotation of mandible to aid in Class II correction. It also aid in correction of a high gingival smile line. This case report presents the patient of a 14-year-old boy with Class II division 2 subdivision malocclusion treated with connecticut intrusion arch and also highlights the biomechanical aspect of this appliance. Intrusion of anterior teeth is difficult. An appropriate, effective and clinically manageable biomechanical system is required. The treatment approach shown in this case can treat the deep overbite precisely with incisor intrusion. The article shows the versatility of Connecticut Intrusion Arch and by applying the sound biomechanical principles we can execute the planned mechanics with minimal side effects. PMID:24995261

  1. Characteristics of illness intrusions in a non-clinical sample.

    PubMed

    Langlois, Frédéric; Ladouceur, Robert; Patrick, Gosselin; Freeston, Mark H

    2004-06-01

    This study examines whether illness intrusions can be distinguished from obsessional intrusions and worries. It also assesses the relationship between strategies, thought characteristics, and appraisal of illness intrusions. Two hundred and forty-three non-clinical participants identified an obsessive intrusive thought, a worry, and an illness intrusion. They evaluated each thought using items from the Cognitive Intrusions Questionnaire. The comparisons of intrusions showed that illness intrusions share characteristics of worries and obsessional intrusions, but also have their own characteristics. Illness intrusions seem to be particularly egosyntonic. The relationships between the strategies used to counter illness intrusions and their appraisal were also tested. Results support the idea that there are specific links between the evaluation of cognitive intrusions and the way they are processed. It demonstrated that escape/avoidance strategies are associated with the egodystonic nature of the thought and that problem-focused strategies are associated with the thought's basis in reality. Illness intrusions may be conceptualised as either obsessions or worries. This study demonstrated that the category of an intrusive thought might not be as important as the way it is processed. It seems more important to consider appraisal of the disturbing thought and the way in which the person subsequently reacts and behaves. PMID:15081884

  2. One electron-controlled multiple-valued dynamic random-access-memory

    NASA Astrophysics Data System (ADS)

    Kye, H. W.; Song, B. N.; Lee, S. E.; Kim, J. S.; Shin, S. J.; Choi, J. B.; Yu, Y.-S.; Takahashi, Y.

    2016-02-01

    We propose a new architecture for a dynamic random-access-memory (DRAM) capable of storing multiple values by using a single-electron transistor (SET). The gate of a SET is designed to be connected to a plurality of DRAM unit cells that are arrayed at intersections of word lines and bitlines. In this SET-DRAM hybrid scheme, the multiple switching characteristics of SET enables multiple value data stored in a DRAM unit cell, and this increases the storage functionality of the device. Moreover, since refreshing data requires only a small amount of SET driving current, this enables device operating with low standby power consumption.

  3. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  4. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 3: Software and Hardware. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for the disabled or the elderly, the book focuses on hardware and software. The guide's 13 chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  5. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  6. Effect of Information and Telephone-Guided Access to Community Support for People with Chronic Kidney Disease: Randomised Controlled Trial

    PubMed Central

    Blakeman, Tom; Blickem, Christian; Kennedy, Anne; Reeves, David; Bower, Peter; Gaffney, Hannah; Gardner, Caroline; Lee, Victoria; Jariwala, Praksha; Dawson, Shoba; Mossabir, Rahena; Brooks, Helen; Richardson, Gerry; Spackman, Eldon; Vassilev, Ivaylo; Chew-Graham, Carolyn; Rogers, Anne

    2014-01-01

    Background Implementation of self-management support in traditional primary care settings has proved difficult, encouraging the development of alternative models which actively link to community resources. Chronic kidney disease (CKD) is a common condition usually diagnosed in the presence of other co-morbidities. This trial aimed to determine the effectiveness of an intervention to provide information and telephone-guided access to community support versus usual care for patients with stage 3 CKD. Methods and Findings In a pragmatic, two-arm, patient level randomised controlled trial 436 patients with a diagnosis of stage 3 CKD were recruited from 24 general practices in Greater Manchester. Patients were randomised to intervention (215) or usual care (221). Primary outcome measures were health related quality of life (EQ-5D health questionnaire), blood pressure control, and positive and active engagement in life (heiQ) at 6 months. At 6 months, mean health related quality of life was significantly higher for the intervention group (adjusted mean difference = 0.05; 95% CI = 0.01, 0.08) and blood pressure was controlled for a significantly greater proportion of patients in the intervention group (adjusted odds-ratio = 1.85; 95% CI = 1.25, 2.72). Patients did not differ significantly in positive and active engagement in life. The intervention group reported a reduction in costs compared with control. Conclusions An intervention to provide tailored information and telephone-guided access to community resources was associated with modest but significant improvements in health related quality of life and better maintenance of blood pressure control for patients with stage 3 CKD compared with usual care. However, further research is required to identify the mechanisms of action of the intervention. Trial Registration Controlled-Trials.com ISRCTN45433299 PMID:25330169

  7. Cancer control in developing countries: using health data and health services research to measure and improve access, quality and efficiency

    PubMed Central

    2010-01-01

    Background Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. Discussion This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) Process: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) Outcome: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. Summary There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international

  8. Magmatic intrusions in the lunar crust

    NASA Astrophysics Data System (ADS)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  9. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  10. Convective, intrusive geothermal plays: what about tectonics?

    NASA Astrophysics Data System (ADS)

    Santilano, A.; Manzella, A.; Gianelli, G.; Donato, A.; Gola, G.; Nardini, I.; Trumpy, E.; Botteghi, S.

    2015-09-01

    We revised the concept of convective, intrusive geothermal plays, considering that the tectonic setting is not, in our opinion, a discriminant parameter suitable for a classification. We analysed and compared four case studies: (i) Larderello (Italy), (ii) Mt Amiata (Italy), (iii) The Geysers (USA) and (iv) Kizildere (Turkey). The tectonic settings of these geothermal systems are different and a matter of debate, so it is hard to use this parameter, and the results of classification are ambiguous. We suggest a classification based on the age and nature of the heat source and the related hydrothermal circulation. Finally we propose to distinguish the convective geothermal plays as volcanic, young intrusive and amagmatic.

  11. The evolution process of seawater intrusion in Laizhou Bay, and its linkage to climate change and human activity

    NASA Astrophysics Data System (ADS)

    xu, X.

    2013-12-01

    Seawater Intrusion is that seawater or saltwater intrude into the continent along the aquifer.Under the effects of the natural and artificial factors, the hydrodynamic conditions of aquifer in the coastal area has been changed ,which break the equilibrium between the seawater and the freshwater, hence the salt-fresh interface moves on the continent. Sea-level rise due to climate change and the paleoseawater hosting in marine strata combined with a rising population density in the Laizhou Bay have led to higher stresses on coastal water resources, and the risk of seawater intrusion has increased. Despite comprehensive seawater intrusion research and prevention measures are developed, the effects of climate change and human activity on seawater intrusion is still unclear. Therefore to reveal how climate change and human activity impact on seawater intrusion and to mathematical quantify it is important to establish reasonable prevention and control of seawater intrusion measures. Laizhou Bay is the region suffering from the geo-hazard of sea (saline) water intrusion most seriously in China, and is divided into seawater intrusion area, saline water (paleo-sea water) intrusion area and sea-saline water intrusion area The area of seawter intrusion in Laizhou Bay nearly 4,000 km2. And the seawater intrusion disasters in Laizhou bay can be divided into five stage from 1976 to now, which is Initial stage (1976-1979),Developing stage (1980-1985), Deterioration stage(1987-1989), Release stage (1990-2000)and Differentiation stage (2000-). The impact of human activities is shown as seawater intrusion in the linear growth trend. With the rapid economic development, the increase in abstraction from aquifers results in a serious imbalance between the seawater and freshwater interface, and the risk of seawater intrusion has increased. Taking into account of the climate change and human activity factors and seawater intrusion evaluation factors, such as the intensity of Cl

  12. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  13. Effective Simulation and Control Approaches for Alleviating the Access to High-Cost Manipulators

    ERIC Educational Resources Information Center

    Mihali, Raul; Sobh, Tarek

    2005-01-01

    A problem that becomes increasingly obvious over time derives from purchasing and working with large scale, industrial type of manipulators. Primarily affected are higher level educational institutions, where manipulators are likely to be exposed to student projects that demand diversity in control strategies and various controlling software and…

  14. An Open-Access Educational Tool for Teaching Motion Dynamics in Multi-Axis Servomotor Control

    ERIC Educational Resources Information Center

    Rivera-Guillen, J. R.; de Jesus Rangel-Magdaleno, J.; de Jesus Romero-Troncoso, R.; Osornio-Rios, R. A.; Guevara-Gonzalez, R. G.

    2012-01-01

    Servomotors are widely used in computerized numerically controlled (CNC) machines, hence motion control is a major topic covered in undergraduate/graduate engineering courses. Despite the fact that several syllabi include the motion dynamics topic in their courses, there are neither suitable tools available for designing and simulating multi-axis…

  15. Generalized control and data access at the LANSCE Accelerator Complex -- Gateway, migrators, and other servers

    SciTech Connect

    Schaller, S.C.; Oothoudt, M.A.

    1995-12-01

    All large accelerator control systems eventually outlast the technologies with which they were built. This has happened several times during the lifetime of the accelerators at Los Alamos in the LAMPF/PSR beam delivery complex. Most recently, the EPICS control system has been integrated with the existing LAMPF and PSR control systems. In this paper, the authors discuss the provisions that were made to provide uniform, and nearly transparent sharing of data among the three control systems. The data sharing mechanisms have now been in use during a very successful beam production period. They comment on the successes and failures of the project and indicate the control system properties that make such sharing possible.

  16. Utilizing SELinux to mandate ultra-secure access control of medical records.

    PubMed

    Croll, Peter R; Henricksen, Matt; Caelli, Bill; Liu, Vicky

    2007-01-01

    Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure that sensitive health information can be adequately protected yet still be accessible only to those that "need-to-know". To achieve this and ensure sustainability over the longer term, it is advocated that an alternative, stable and secure system architecture is required. This paper considers the adoption of a model targeted at health information that provides much higher degrees of protection. A purpose built demonstrator that was developed based on enterprise-level systems software products is detailed. The long term aim is to provide a viable solution by utilizing contemporary, commercially supported operating system and allied software. The advantages and limitations in its application with a medical database are discussed. The future needs in terms of research, software development and changes in organizational policy for healthcare providers, are outlined. PMID:17911767

  17. A survey of artificial immune system based intrusion detection.

    PubMed

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  18. A Survey of Artificial Immune System Based Intrusion Detection

    PubMed Central

    Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  19. On the control, stability, and waiting time in a slotted ALOHA random-access system

    NASA Technical Reports Server (NTRS)

    Ferguson, M. J.

    1975-01-01

    This paper explores some of the boundaries in performance of slotted ALOHA systems by analyzing a simple and almost optimal centrally supervised control. The control results in a very simple Markov chain model and allows an examination of stability, conditional waiting time distribution of transmitting terminals, and many other system measures. The key to the simplicity is to have a probability of successful packet transmission that is independent of the number of transmitting terminals. In considering waiting time, we calculate the mean and other moments of the waiting time of a terminal when it enters the system to find (n - 1) other terminals already there competing for the channel. Under this control, the average time is proportional to n. The control requires exact knowledge of the number of terminals contending for the channel, and hence is not implementable, except as an approximation.

  20. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... electronic prescriptions for controlled substances are current and in good standing. (c) After one individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised....

  1. SALT WATER INTRUSION IN THE UNITED STATES

    EPA Science Inventory

    Salt water intrusion, from one or more sources outlined in this report, has resulted in degradation of subsurface fresh water aquifers in 43 States. Numerous case histories delineating current problems exist, providing adequate documentation of the seriousness of salt water intru...

  2. ON-LINE CALCULATOR: VAPOR INTRUSION MODELING

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is called vapor intrusion (VI). Volatile organic chemicals in contaminated soils or groundwater can emit vapors, which may migrate through subsurface soils and may enter the indoor air of overlying build...

  3. Intrusive [r] and Optimal Epenthetic Consonants

    ERIC Educational Resources Information Center

    Uffmann, Christian

    2007-01-01

    This paper argues against the view of intrusive [r] as a synchronically arbitrary insertion process. Instead, it is seen as a phonologically natural process, which can be modelled within the framework of Optimality Theory (OT). Insertion of [r] in phonologically restricted environments is a consequence of a more general theory of consonant…

  4. Chemical Observations of a Polar Vortex Intrusion

    NASA Technical Reports Server (NTRS)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  5. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  6. Intrusion of Soil Water through Pipe Cracks

    EPA Science Inventory

    This report describes a series of experiments conducted at U.S. EPA’s Test and Evaluation Facility in 2013-2014 to study the intrusion of contaminated soil water into a pipe crack during simulated backflow events. A test rig was used consisting of a 3’ x 3’ x 3’ acrylic soil bo...

  7. Performance of a Frequency-Hopped Real-Time Remote Control System in a Multiple Access Scenario

    NASA Astrophysics Data System (ADS)

    Cervantes, Frank

    A recent trend is observed in the context of the radio-controlled aircrafts and automobiles within the hobby grade category and Unmanned Aerial Vehicles (UAV) applications moving to the well-known Industrial, Scientific and Medical (ISM) band. Based on this technological fact, the present thesis evaluates an individual user performance by featuring a multiple-user scenario where several point-to-point co-located real-time Remote Control (RC) applications operate using Frequency Hopping Spread Spectrum (FHSS) as a medium access technique in order to handle interference efficiently. Commercial-off-the-shelf wireless transceivers ready to operate in the ISM band are considered as the operational platform supporting the above-mentioned applications. The impact of channel impairments and of different critical system engineering issues, such as working with real clock oscillators and variable packet duty cycle, are considered. Based on the previous, simulation results allowed us to evaluate the range of variation for those parameters for an acceptable system performance under Multiple Access (MA) environments.

  8. BTSC VAPOR INSTRUSION PRIMER "VAPOR INTRUSION CONSIDERATION FOR REDEVELOPMENT"

    EPA Science Inventory

    This primer is designed for brownfields stakeholders concerned about vapor intrusion, including property owners, real estate developers, and contractors performing environmental site investigations. It provides an overview of the vapor intrusion issue and how it can impact the ap...

  9. Is paleoanthropology science? Naming new fossils and control of access to them.

    PubMed

    Tattersall, Ian; Schwartz, Jeffrey H

    2002-12-15

    Progress in paleoanthropology is impeded when new fossil materials are published but unavailable for comparative study, as is too often the case. In this commentary, we review the stages of description and analysis that new fossils must undergo and conclude that it is disingenuous to argue that fossils have not been properly "published" when descriptions and new names formulated in accordance with the International Code of Zoological Nomenclature have appeared in leading scientific journals. Once such names and descriptions have been published, it is imperative that the original fossils concerned be available to the scientific community for comparative analysis, for by the very nature of science, no statement about such fossils, however carefully prepared by the original describers (or anyone else), can be regarded as definitive. Science is a system of provisional knowledge that constantly requires re-examination and testing. It cannot function as a system in which assertions have to be left unchallenged for want of free access to the primary data. PMID:12467080

  10. Thermal models of dyke intrusion during development of continent-ocean transition

    NASA Astrophysics Data System (ADS)

    Daniels, K. A.; Bastow, I. D.; Keir, D.; Sparks, R. S. J.; Menand, T.

    2014-01-01

    A consensus has emerged in recent years from a variety of geoscientific disciplines that extension during continental rifting is achieved only partly by plate stretching: dyke intrusion also plays an important role. Magma intrusion can accommodate extension at lower yield stresses than are required to extend thick, strong, unmodified continental lithosphere mechanically, thereby aiding the breakup process. Dyke intrusion is also expected to heat and thereby weaken the plate, but the spatial extent of heating and the effect of different rates of magmatic extension on the timescales over which heating occurs are poorly understood. To address this issue, a numerical solution to the heat-flow equation is developed here to quantify the thermal effects of dyke intrusion on the continental crust during rifting. The thermal models are benchmarked against a priori constraints on crustal structure and dyke intrusion episodes in Ethiopia. Finite difference models demonstrate that magmatic extension rate exerts a first-order control on the crustal thermal structure. Once dyke intrusion supersedes faulting and stretching as the principal extensional mechanism the crust will heat and weaken rapidly (less than 1 Ma). In the Main Ethiopian Rift (MER), the majority of present-day extension is focused on ∼20 km-wide Quaternary-Recent axial magmatic segments that are mostly seismogenic to mid-crustal depths and show P-wave seismic velocities characteristic of heavily intruded continental crust. When reviewed in light of our models, these observations require that no more than half of the MER's extension since ∼2 Ma has been achieved by dyke intrusion. Magmatic heating and weakening of the crust would have rendered it aseismic if dyke intrusion accounted for the entire 6 mm/yr extension rate. In the older, faster extending (16 mm/yr) Red Sea rift (RSR) in Afar, dyke intrusion is expected to have had a more dramatic impact on crustal rheology. Accordingly, effective elastic plate

  11. Adaptive top-down suppression of hippocampal activity and the purging of intrusive memories from consciousness.

    PubMed

    Benoit, Roland G; Hulbert, Justin C; Huddleston, Ean; Anderson, Michael C

    2015-01-01

    When reminded of unwanted memories, people often attempt to suppress these experiences from awareness. Prior work indicates that control processes mediated by the dorsolateral prefrontal cortex (DLPFC) modulate hippocampal activity during such retrieval suppression. It remains unknown whether this modulation plays a role in purging an intrusive memory from consciousness. Here, we combined fMRI and effective connectivity analyses with phenomenological reports to scrutinize a role for adaptive top-down suppression of hippocampal retrieval processes in terminating mnemonic awareness of intrusive memories. Participants either suppressed or recalled memories of pictures depicting faces or places. After each trial, they reported their success at regulating awareness of the memory. DLPFC activation was greatest when unwanted memories intruded into consciousness and needed to be purged, and this increased engagement predicted superior control of intrusive memories over time. However, hippocampal activity was decreased during the suppression of place memories only. Importantly, the inhibitory influence of the DLPFC on the hippocampus was linked to the ensuing reduction in intrusions of the suppressed memories. Individuals who exhibited negative top-down coupling during early suppression attempts experienced fewer involuntary memory intrusions later on. Over repeated suppressions, the DLPFC-hippocampus connectivity grew less negative with the degree that they no longer had to purge unwanted memories from awareness. These findings support a role of DLPFC in countermanding the unfolding recollection of an unwanted memory via the suppression of hippocampal processing, a mechanism that may contribute to adaptation in the aftermath of traumatic experiences. PMID:25100219

  12. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOEpatents

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  13. Intrusive Memories in Perpetrators of Violent Crime: Emotions and Cognitions

    ERIC Educational Resources Information Center

    Evans, Ceri; Ehlers, Anke; Mezey, Gillian; Clark, David M.

    2007-01-01

    The authors investigated factors that may determine whether perpetrators of violent crime develop intrusive memories of their offense. Of 105 young offenders who were convicted of killing or seriously harming others, 46% reported distressing intrusive memories, and 6% had posttraumatic stress disorder. Intrusions were associated with lower…

  14. Suicidal Behavior and Firearm Access: Results from the Second Injury Control and Risk Survey

    ERIC Educational Resources Information Center

    Betz, Marian E.; Barber, Catherine; Miller, Matthew

    2011-01-01

    The association between home firearms and the likelihood and nature of suicidal thoughts and plans was examined using the Second Injury Control and Risk Survey, a 2001-2003 representative telephone survey of U.S. households. Of 9,483 respondents, 7.4% reported past-year suicidal thoughts, 21.3% with a plan. Similar proportions of those with and…

  15. Access Point Analysis: What Do Adolescents in South Africa Say about Tobacco Control Programmes?

    ERIC Educational Resources Information Center

    Swart, Dehran; Panday, Saadhna; Reddy, S Priscilla; Bergstrom, Erik; de Vries, Hein

    2006-01-01

    This paper explores adolescent preferences for the setting, timing, delivery format, provider and key elements of tobacco control programmes. The need for programme sensitivity towards urban/rural, gender and ethnic subgroups is also discussed. Schools were purposively selected from the Southern Cape-Karoo Region, South Africa. Twelve prevention…

  16. Environmental Assessment for Proposed Access Control and Traffic Improvements at Los Alamos National Laboratory, Los Alamos, New Mexico

    SciTech Connect

    N /A

    2002-08-23

    The National Nuclear Security Administration (NNSA) has assigned a continuing role to Los Alamos National Laboratory (LANL) in carrying out NNSA's national security mission. It is imperative that LANL continue this enduring responsibility and that NNSA adequately safeguard LANL capabilities. NNSA has identified the need to restrict vehicular access to certain areas within LANL for the purpose of permanently enhancing the physical security environment at LANL. It has also identified the need to change certain traffic flow patterns for the purpose of enhancing physical safety at LANL. The Proposed Action would include the construction of eastern and western bypass roads around the LANL Technical Area (TA) 3 area and the installation of vehicle access controls and related improvements to enhance security along Pajarito Road and in the LANL core area. This Proposed Action would modify the current roadway network and traffic patterns. It would also result in traversing Areas of Environmental Interest identified in the LANL Habitat Management Plan, demolition of part of an historic structure at Building 3-40, and traversing several potential release sites and part of the Los Alamos County landfill. The No Action Alternative was also considered. Under this alternative NNSA would not construct the eastern or western bypass roads, any access-control stations, or related improvements. Diamond Drive would continue to serve as the primary conduit for most vehicle traffic within the LANL core area regardless of actual trip destinations. The No Action Alternative does not meet NNSA's purpose and need for action. The proposed bypass road corridors traverse both developed and undeveloped areas. Several potential release sites are present. These would either be sampled and remediated in accordance with New Mexico Environment Department requirements before construction or avoided to allow for future remediation. In some cases, contaminant levels may fall below remediation thresholds

  17. Improving Access to Online Health Information With Conversational Agents: A Randomized Controlled Experiment

    PubMed Central

    2016-01-01

    Background Conventional Web-based search engines may be unusable by individuals with low health literacy for finding health-related information, thus precluding their use by this population. Objective We describe a conversational search engine interface designed to allow individuals with low health and computer literacy identify and learn about clinical trials on the Internet. Methods A randomized trial involving 89 participants compared the conversational search engine interface (n=43) to the existing conventional keyword- and facet-based search engine interface (n=46) for the National Cancer Institute Clinical Trials database. Each participant performed 2 tasks: finding a clinical trial for themselves and finding a trial that met prespecified criteria. Results Results indicated that all participants were more satisfied with the conversational interface based on 7-point self-reported satisfaction ratings (task 1: mean 4.9, SD 1.8 vs mean 3.2, SD 1.8, P<.001; task 2: mean 4.8, SD 1.9 vs mean 3.2, SD 1.7, P<.001) compared to the conventional Web form-based interface. All participants also rated the trials they found as better meeting their search criteria, based on 7-point self-reported scales (task 1: mean 3.7, SD 1.6 vs mean 2.7, SD 1.8, P=.01; task 2: mean 4.8, SD 1.7 vs mean 3.4, SD 1.9, P<.01). Participants with low health literacy failed to find any trials that satisfied the prespecified criteria for task 2 using the conventional search engine interface, whereas 36% (5/14) were successful at this task using the conversational interface (P=.05). Conclusions Conversational agents can be used to improve accessibility to Web-based searches in general and clinical trials in particular, and can help decrease recruitment bias against disadvantaged populations. PMID:26728964

  18. Interaction of noradrenaline and cortisol predicts negative intrusive memories in posttraumatic stress disorder.

    PubMed

    Nicholson, Emma L; Bryant, Richard A; Felmingham, Kim L

    2014-07-01

    Recent evidence suggests that an interaction of noradrenaline (NE) and cortisol (CORT) during encoding leads to greater consolidation of emotional memories. Convergent models of posttraumatic stress disorder (PTSD) suggest the release of CORT and NE lead to greater intrusive memories in PTSD. This study examined the effect of NE and CORT during encoding on recall and intrusive memories in PTSD. Fifty-eight participants (18 participants with PTSD, 20 trauma-exposed controls, and 20 non-trauma exposed controls) provided saliva samples of NE (indexed by salivary alpha amylase; sAA) and CORT at (a) baseline and (b) after viewing negative emotional stimuli. Delayed memory recall and number of intrusive memories of negative, neutral and positive stimuli were recorded two days after this initial testing session. The PTSD group had greater NE levels to negative stimuli and reported greater numbers of intrusive memories of negative stimuli than controls. Regression analyses revealed that the interaction of CORT and NE significantly predicted negative intrusive memories in the PTSD group. The trauma-exposed group reported significantly greater recall of negative images compared to controls, but did not differ significantly from the PTSD group. The PTSD group reported greater levels of suppression of negative images during encoding compared to the other groups. Our results confirm that the interaction of NE and CORT significantly predicts greater negative intrusive memories, but this occurs specifically in the PTSD group. This suggests that a level of heightened arousal is required for the relationship between stress hormones and emotional memory to manifest in PTSD. PMID:24296460

  19. Accessibility control on copper(II) complexes in mesostructured porous silica obtained by direct synthesis using bidentate organosilane ligands.

    PubMed

    Zhou, Wen-Juan; Albela, Belén; Perriat, Pascal; He, Ming-Yuan; Bonneviot, Laurent

    2010-08-17

    The accessibility of metal(II) complexes in 2D hexagonal mesostructured porous silicas obtained by direct synthesis is controlled using an appropriate organosilane ligand. This is exemplified here using copper(II) as a transition metal probe and a neutral or negatively charged ligand: N-(2-aminoethyl)-3-aminopropyltrimethoxysilane, L(A), and, N-salicylaldimine-propylamine-trimethoxysilane, L(B)(-), respectively. L(A) leads to inaccessible complexes located into the pore wall and called "embedded" sites here where silanolate groups from the siliceous network block the access to Cu(II) ions. By contrast, L(B)(-) generates accessible complexes, named "showing-on" sites here. The copper-containing silicas were synthesized with various metal molar ratios (M/SiO(2) = 0.5-3%) in basic media, with cetyltrimethylammonium p-toluenesulfonate (CTATos) as template and with sodium silicate solution as silicon source. A soft template extraction procedure has been developed to preserve the complex integrity of the showing-on copper sites during the treatment. The embedded copper(II) and nickel(II) sites were compared. Materials containing embedded, showing-on, and grafted sites were also compared with regard to pore size, surface polarity, and metal leaching. The material containing showing-on sites was found to be catalytically active for the hydroxylation of phenol into catechol and hydroquinone. Both textural and structural properties of the material and the copper sites were investigated using XRD, TEM, N(2) sorption isotherms, TGA, FT-IR, UV-visible, and EPR spectroscopies. PMID:20695596

  20. A Randomized Controlled Trial of a Mobile Clinical Decision Aid to Improve Access to Kidney Transplantation: iChoose Kidney

    PubMed Central

    Patzer, Rachel E.; Basu, Mohua; Mohan, Sumit; Smith, Kayla D.; Wolf, Michael; Ladner, Daniela; Friedewald, John J.; Chiles, Mariana; Russell, Allison; McPherson, Laura; Gander, Jennifer; Pastan, Stephen

    2016-01-01

    Kidney transplantation is the preferred treatment for patients with end-stage renal disease, as it substantially increases a patient's survival and is cost saving compared to a lifetime of dialysis. However, transplantation is not universally chosen by patients with renal failure, and limited knowledge about the survival benefit of transplantation vs. dialysis may play a role. We created a mobile application clinical decision aid called iChoose Kidney to improve access to individualized prognosis information comparing dialysis and transplantation outcomes. We describe the iChoose Kidney study, a randomized controlled trial designed to test the clinical efficacy of a mobile health decision aid among end-stage renal disease patients referred for kidney transplantation at three large, diverse transplant centers across the U.S. Approximately 450 patients will be randomized to receive either: (1) standard of care or “usual” transplantation education, or (2) standard of care plus iChoose Kidney. The primary outcome is change in knowledge about the survival benefit of kidney transplantation vs. dialysis from baseline to immediate follow-up; secondary outcomes include change in treatment preferences, improved decisional conflict, and increased access to kidney transplantation. Analyses are also planned to examine effectiveness across subgroups of race, socioeconomic status, health literacy and health numeracy. Engaging patients in health care choices can increase patient empowerment and improve knowledge and understanding of treatment choices. If the effectiveness of iChoose Kidney has a greater impact on patients with low health literacy, lower socioeconomic status, and minority race, this decision aid could help reduce disparities in access to kidney transplantation.

  1. Seawater intrusions: Coupling groundwater model and geophysical data

    NASA Astrophysics Data System (ADS)

    Steklova, K.; Haber, E.; Cockett, R.

    2012-12-01

    The process of seawater intrusions into freshwater aquifers occurs naturally, but also as a result of increased groundwater extraction. Different types of models to capture this complex process involving density driven flow and variable boundary conditions have already been proposed and implemented. However, many fewer studies were done in groundwater management planning, for example how to adjust the future groundwater extraction or injection rates with respect to saltwater intrusions occurrence. Geophysical methods (e.g. DC resistivity) offer a good alternative to standard hydrological measurement techniques which need to deal with the miscibility of both freshwater and saltwater and only scarce observation points. The resistivity survey can provide 3D data at lower cost, however the precision depends on the reference models and often decreases with depth. Therefore we suggest an optimization framework which links the hydrogeological model with geophysical datasets. The dynamics of the system is represented by a 3D model for transient groundwater flow in a confined aquifer based on discretized flow and solute mass balance equations. To overcome the difficulty of coupled nonlinear governing equations a semi - Lagrangian method is implemented for the transport equation. This enables to choose arbitrarily large time step without losing stability. For the geophysical forward and inverse problem RESINVM3D package is used. Once the coupled optimization framework is used for many time steps it leads to an optimal control problem. Kalman filtering techniques are often used for such problems, after each time step the optimal state estimates are found based on the system dynamics and observations which are in this case provided by geophysical data. For the variable density flow the process dynamic is nonlinear, in such cases the KF state estimates derivation assumes that the deviation from linearity is of a first order. For the seawater intrusions, where the concentration

  2. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications

    PubMed Central

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  3. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications.

    PubMed

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  4. Does post-event cognitive load undermine thought suppression and increase intrusive memories after exposure to an analogue stressor?

    PubMed

    Nixon, Reginald D V; Cain, Neralie; Nehmy, Thomas; Seymour, Melanie

    2009-04-01

    Ironic process theory has been used in part to explain the phenomenon of intrusive memories in various disorders including post-traumatic stress disorder. How thought suppression interacts with other cognitive processes believed to be instrumental in the development of traumatic intrusive memory was tested. In an analogue design 120 participants were randomised to five conditions, four of which also required participants to attempt to suppress intrusive memories after viewing a film of traumatic content. Participants in three conditions were also required to perform concurrent tasks that acted as a cognitive load during suppression. Intrusive memories were recorded during the experimental phase and at 1-week follow-up. Contrary to predictions, post-film processing did not undermine suppression success. There was some suggestion that post-film processing resulted in those participants experiencing intrusions of shorter duration than the no-suppression control group in two 5-minute intrusion monitoring intervals at the initial and follow-up phase of the experiment, but this was not reflected in a 1-week diary measure of intrusions. All experimental groups performed in a similar fashion in terms of memory testing of the film's content. The findings are discussed in the context of ironic process theory and cognitive models of post-traumatic stress. PMID:19132604

  5. Process characteristics of worry and obsessive intrusive thoughts.

    PubMed

    Clark, D A; Claybourn, M

    1997-12-01

    One hundred and twenty-five university students were administered a battery of self-report measures to assess worry disposition and content, frequency of obsessive intrusive thoughts, and 10 conceptually derived appraisal dimensions of worry and obsessional intrusions. Process ratings indicated that the worrisome thoughts were considered more disturbing than the ego-dystonic intrusive thoughts. Worry was also distinguished by a focus on the possible consequences of negative events, whereas concern about the personal meaning of the thought was a unique process dimension for obsessive intrusive thoughts. Both content and process variables are important in differentiating worry and obsessive-like intrusive thoughts in a nonclinical population. PMID:9465447

  6. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  7. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  8. Effects of different forms of verbal processing on the formation of intrusions.

    PubMed

    Luo, Pinchao; Jiang, Yijie; Dang, Xiaojiao; Huang, Yuesheng; Chen, Xuejun; Zheng, Xifu

    2013-04-01

    This study used the trauma film paradigm to investigate different forms of posttrauma verbal processing relevant to the formation of intrusive memories. We designed 3 experiments to investigate verbal processing that could help to reduce the formation of posttraumatic intrusions. Experiments 1 and 2 looked at the effect of several forms of verbal processing, varied in emotional foci and vantage points, on the formation of posttraumatic intrusions. Experiment 3 utilized event-related potential (ERP) technology to control emotional focus and to further examine the effect of verbal processing from different vantage points. Data produced by Experiment 1 showed that the "what-focus" group had fewer intrusions than the "why-focus" group. Experiment 2 produced no significant difference between first- and third-person vantage points. Results from the last experiment showed the what-focus group was faster to judge the colors of the words in the emotional Stroop task, and the amplitude and latency of P2 for negative words were greater than neutral words in the what-focus group. Based on the results of the experiments, participants who were led to verbalize their traumatic experiences using the what-focus and the first-person vantage point ended up with fewer intrusions. PMID:23526670

  9. The role of intrusions in the formation of Irish-type mineralisation

    NASA Astrophysics Data System (ADS)

    McCusker, Jim; Reed, Christopher

    2013-08-01

    The Stonepark Prospect is located in County Limerick, south-central Ireland. Multiple zones of Zn-Pb mineralisation have been identified at Stonepark and these are approximately 5 km west of the Pallas Green Prospect. At Stonepark, the sulphide bodies are hosted within the Waulsortian Limestone and closely resemble other Irish-type deposits. The mineralisation is composed of pyrite-marcasite, sphalerite and galena with gangue Fe-dolomite and calcite cements. A key difference at Stonepark is the presence of Chadian-aged volcanic rocks (Knockroe Volcanics) that intrude into and overlie the Waulsortian Limestone. Subsequent hydrothermal brecciation of the Waulsortian Limestone and Knockroe intrusions resulted in the formation of tabular polymict breccia bodies containing mixed carbonate and clasts of intrusive rocks. These have then been overprinted by massive sulphide mineralisation. Further syn-mineralisation brecciation has overprinted the earlier breccias. Drilling has demonstrated a spatial relationship between the volume of intrusive rocks (dykes and polymict breccias) and Zn-Pb mineralisation. This association suggests that the intrusive rocks provided a mechanism for the introduction of the mineralising fluids into the breccia bodies. This is significant as to date no large controlling fault has been identified, as is seen at other Irish-type deposits. Further work is required to understand the alteration process of the intrusive rocks and how this may relate to the mineralising process.

  10. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  11. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    PubMed

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems. PMID:22616194

  12. Speaking Two Languages for the Price of One: Bypassing Language Control Mechanisms via Accessibility-Driven Switches.

    PubMed

    Kleinman, Daniel; Gollan, Tamar H

    2016-05-01

    How do bilinguals switch easily between languages in everyday conversation, even though studies have consistently found that switching slows responses? In previous work, researchers have not considered that although switches may happen for different reasons, only some switches-including those typically studied in laboratory experiments-might be costly. Using a repeated picture-naming task, we found that bilinguals can maintain and use two languages as efficiently as a single language, switching between them frequently without any cost, if they switch only when a word is more accessible in the other language. These results suggest that language switch costs arise during lexical selection, that top-down language control mechanisms can be suspended, and that language-mixing efficiency can be strategically increased with instruction. Thus, bilinguals might switch languages spontaneously because doing so is not always costly, and there appears to be greater flexibility and efficiency in the cognitive mechanisms that enable switching than previously assumed. PMID:27016240

  13. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    PubMed Central

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  14. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    PubMed

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  15. The differentiation of the Skaergaard Intrusion

    NASA Astrophysics Data System (ADS)

    Hunter, R. H.; Sparks, R. S. J.

    1987-04-01

    Previous interpretations of the Skaergaard Intrusion suggested that differentiation involved extreme iron-enrichment but no silica-enrichment until a very late stage. This model is difficult to reconcile with petrological and geochemical evidence, with the behaviour of tholeiitic volcanic suites and with phase equilibria. We propose that the Skaergaard magma evolved on a trend of pronounced silica-enrichment after cumulus magnetite appeared at the top of the Lower Zone. At that stage, the magma was of ferrobasaltic composition with close to 50% SiO2. The Middle and Upper Zones of the intrusion dominantly represent crystal accumulation during differentiation from ferrobasalt through iron-rich basaltic andesite and icelandite to rhyolite, a fractionation sequence common in tholeiitic volcanic provinces. This interpretation requires re-appraisal of the physical processes responsible for the differentiation. In particular, residual liquids became lower in density with fractionation and would have caused the Skaergaard magma chamber to have become compositionally zoned.

  16. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  17. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  18. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  19. Detection techniques for non-intrusive testing

    SciTech Connect

    Humphrey, D.L.

    1997-02-01

    Non-intrusive testing using nuclear techniques began with neutron activation. Other industrial applications gradually developed over the years. Explosives, hidden by terrorists, and the sophisticated concealment of contraband by smugglers have motivated the development of new technology for rapid real-time inspection systems. The basic nuclear techniques that have been proposed are reviewed. The applicable detectors are compared. {copyright} {ital 1997 American Institute of Physics.}

  20. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  1. Unwanted intrusive and worrisome thoughts in adults with Attention Deficit\\Hyperactivity Disorder.

    PubMed

    Abramovitch, Amitai; Schweiger, Avraham

    2009-08-15

    Attention Deficit/Hyperactivity Disorder (ADHD) is associated with deficient motor and cognitive inhibitory mechanisms. The aim of this article is to examine two symptoms associated with cognitive disinhibition, namely: intrusive unwanted thoughts, worrisome thoughts and their suppression. Thirty-seven college students diagnosed with ADHD and 23 healthy college students were compared on the Distressing Thoughts Questionnaire and on the Anxious Thoughts Inventory. Results show that in comparison to the control group, participants with ADHD experienced significantly higher ratings on all intrusive thoughts scales, and three worrisome thoughts scales. Our results suggest that worrisome intrusive thoughts are an important phenotypical expression of adults with ADHD. A neurobiological explanation for this phenomenon is suggested, and clinical implications are discussed. PMID:19570581

  2. Intrusion detection using pattern recognition methods

    NASA Astrophysics Data System (ADS)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  3. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set). PMID:15323002

  4. Eight New Genomes and Synthetic Controls Increase the Accessibility of Rapid Melt-MAMA SNP Typing of Coxiella burnetii

    PubMed Central

    Byström, Mona; Forsman, Mats; Frangoulidis, Dimitrios; Janse, Ingmar; Larsson, Pär; Lindgren, Petter; Öhrman, Caroline; van Rotterdam, Bart; Sjödin, Andreas; Myrtennäs, Kerstin

    2014-01-01

    The case rate of Q fever in Europe has increased dramatically in recent years, mainly because of an epidemic in the Netherlands in 2009. Consequently, there is a need for more extensive genetic characterization of the disease agent Coxiella burnetii in order to better understand the epidemiology and spread of this disease. Genome reference data are essential for this purpose, but only thirteen genome sequences are currently available. Current methods for typing C. burnetii are criticized for having problems in comparing results across laboratories, require the use of genomic control DNA, and/or rely on markers in highly variable regions. We developed in this work a method for single nucleotide polymorphism (SNP) typing of C. burnetii isolates and tissue samples based on new assays targeting ten phylogenetically stable synonymous canonical SNPs (canSNPs). These canSNPs represent previously known phylogenetic branches and were here identified from sequence comparisons of twenty-one C. burnetii genomes, eight of which were sequenced in this work. Importantly, synthetic control templates were developed, to make the method useful to laboratories lacking genomic control DNA. An analysis of twenty-one C. burnetii genomes confirmed that the species exhibits high sequence identity. Most of its SNPs (7,493/7,559 shared by >1 genome) follow a clonal inheritance pattern and are therefore stable phylogenetic typing markers. The assays were validated using twenty-six genetically diverse C. burnetii isolates and three tissue samples from small ruminants infected during the epidemic in the Netherlands. Each sample was assigned to a clade. Synthetic controls (vector and PCR amplified) gave identical results compared to the corresponding genomic controls and are viable alternatives to genomic DNA. The results from the described method indicate that it could be useful for cheap and rapid disease source tracking at non-specialized laboratories, which requires accurate genotyping

  5. Differences and similarities between obsessive intrusive thoughts and worry in a non-clinical population: study 1.

    PubMed

    Langlois, F; Freeston, M H; Ladouceur, R

    2000-02-01

    Worry is the central characteristic of Generalized Anxiety Disorder (GAD) and obsessions are a central feature of Obsessive-Compulsive Disorder (OCD). There are strong similarities between these disorders: repetitive cognitive intrusions, negative emotions, difficulty dismissing the intrusion and finally, loss of mental control. Direct comparisons between obsessions and worries are almost non-existent in the literature but key distinctions have been proposed. The study attempted to specify the differences between obsessive intrusive thoughts and worry in a nonclinical population across a series of variables drawn from current models (appraisal, general descriptors and emotional reactions). 254 students participated in the study. They first identified an obsession-like intrusion and a worry and then evaluated them with the Cognitive Intrusion Questionnaire. Within-subject comparisons demonstrated significant differences on several variables: frequency, duration, percentage of verbal and image content, interference, egodystonic nature, stimuli awareness, emotions, etc. Most of these differences remained significant after controlling for frequency of thought. Discriminant analysis demonstrated a low classification error rate when using nine variables to categorize thoughts as obsessions or worries. Results generally support the differences postulated in the literature with the exception that obsessive intrusive thoughts are better controlled. The egodystonic/egosyntonic dimension emerged as an important variable in understanding obsessions and worry. PMID:10661001

  6. Impact of adolescent sucrose access on cognitive control, recognition memory, and parvalbumin immunoreactivity

    PubMed Central

    Killcross, Simon; Hambly, Luke D.; Morris, Margaret J.; Westbrook, R. Fred

    2015-01-01

    In this study we sought to determine the effect of daily sucrose consumption in young rats on their subsequent performance in tasks that involve the prefrontal cortex and hippocampus. High levels of sugar consumption have been associated with the development of obesity, however less is known about how sugar consumption influences behavioral control and high-order cognitive processes. Of particular concern is the fact that sugar intake is greatest in adolescence, an important neurodevelopmental period. We provided sucrose to rats when they were progressing through puberty and adolescence. Cognitive performance was assessed in adulthood on a task related to executive function, a rodent analog of the Stroop task. We found that sucrose-exposed rats failed to show context-appropriate responding during incongruent stimulus compounds presented at test, indicative of impairments in prefrontal cortex function. Sucrose exposed rats also showed deficits in an on object-in-place recognition memory task, indicating that both prefrontal and hippocampal function was impaired. Analysis of brains showed a reduction in expression of parvalbumin-immunoreactive GABAergic interneurons in the hippocampus and prefrontal cortex, indicating that sucrose consumption during adolescence induced long-term pathology, potentially underpinning the cognitive deficits observed. These results suggest that consumption of high levels of sugar-sweetened beverages by adolescents may also impair neurocognitive functions affecting decision-making and memory, potentially rendering them at risk for developing mental health disorders. PMID:25776039

  7. TRMM On-Orbit Performance Re-Accessed After Control Change

    NASA Technical Reports Server (NTRS)

    Bilanow, Steve

    2006-01-01

    The Tropical Rainfall Measuring Mission (TRMM) spacecraft, a joint mission between the U.S. and Japan, launched onboard an HI1 rocket on November 27,1997 and transitioned in August, 2001 from an average operating altitude of 350 kilometers to 402.5 kilometers. Due to problems using the Earth Sensor Assembly (ESA) at the higher altitude, TRMM switched to a backup attitude control mode. Prior to the orbit boost TRMM controlled pitch and roll to the local vertical using ESA measurements while using gyro data to propagate yaw attitude between yaw updates from the Sun sensors. After the orbit boost, a Kalman filter used 3-axis gyro data with Sun sensor and magnetometers to estimate onboard attitude. While originally intended to meet a degraded attitude accuracy of 0.7 degrees, the new control mode met the original 0.2 degree attitude accuracy requirement after improving onboard ephemeris prediction and adjusting the magnetometer calibration onboard. Independent roll attitude checks using a science instrument, the Precipitation Radar (PR) which was built in Japan, provided a novel insight into the pointing performance. The PR data helped identify the pointing errors after the orbit boost, track the performance improvements, and show subtle effects from ephemeris errors and gyro bias errors. It also helped identify average bias trends throughout the mission. Roll errors tracked by the PR from sample orbits pre-boost and post-boost are shown in Figure 1. Prior to the orbit boost the largest attitude errors were due to occasional interference in the ESA. These errors were sometime larger than 0.2 degrees in pitch and roll, but usually less, as estimated from a comprehensive review of the attitude excursions using gyro data. Sudden jumps in the onboard roll show up as spikes in the reported attitude since the control responds within tens of seconds to null the pointing error. The PR estimated roll tracks well with an estimate of the roll history propagated using gyro data

  8. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  9. Achieving fertility control through woman’s autonomy and access to maternal healthcare: Are we on track? In-depth analysis of PDHS-2012-13

    PubMed Central

    Hassan, Sehar-un-Nisa; Siddiqui, Salma; Mahmood, Ayeshah

    2015-01-01

    Background and Objective: Fertility control preferences and maternal healthcare have recently become a major concern for developing nations with evidence suggesting that low fertility control rates and poor maternal healthcare are among major obstructions in ensuring health and social status for women. Our objective was toanalyze the factors that influence women’s autonomy, access to maternal healthcare, and fertility control preferences in Pakistan. Methods: Data consisted of 11,761 ever-married women of ages 15-49 years from PDHS, 2012-13. Variables included socio-demographics, women’s autonomy, fertility control preferences and access to maternal healthcare. Results: Findings from multivariate analysis showed that women’s younger age, having less than three number of children and independent or joint decision-making (indicators of high autonomy) remained the most significant predictors for access to better quality maternal healthcare and better fertility control preferences when other variables were controlled. Conclusion: Women’s access to good quality maternal health care and fertility control preferences are directly and indirectly influenced by their demographic characteristics and decision-making patterns in domestic affairs. PMID:26870096

  10. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  11. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  12. Central venous Access device SeCurement And Dressing Effectiveness (CASCADE) in paediatrics: protocol for pilot randomised controlled trials

    PubMed Central

    Gibson, Victoria; Long, Debbie A; Williams, Tara; Hallahan, Andrew; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2016-01-01

    Introduction Paediatric central venous access devices (CVADs) are associated with a 25% incidence of failure. Securement and dressing are strategies used to reduce failure and complication; however, innovative technologies have not been evaluated for their effectiveness across device types. The primary aim of this research is to evaluate the feasibility of launching a full-scale randomised controlled efficacy trial across three CVAD types regarding CVAD securement and dressing, using predefined feasibility criteria. Methods and analysis Three feasibility randomised, controlled trials are to be undertaken at the Royal Children's Hospital and the Lady Cilento Children's Hospital, Brisbane, Australia. CVAD securement and dressing interventions under examination compare current practice with sutureless securement devices, integrated securement dressings and tissue adhesive. In total, 328 paediatric patients requiring a peripherally inserted central catheter (n=100); non-tunnelled CVAD (n=180) and tunnelled CVAD (n=48) to be inserted will be recruited and randomly allocated to CVAD securement and dressing products. Primary outcomes will be study feasibility measured by eligibility, recruitment, retention, attrition, missing data, parent/staff satisfaction and effect size. CVAD failure and complication (catheter-associated bloodstream infection, local infection, venous thrombosis, occlusion, dislodgement and breakage) will be compared between groups. Ethics and dissemination Ethical approval to conduct the research has been obtained. All dissemination will be undertaken using the CONSORT Statement recommendations. Additionally, the results will be sent to the relevant organisations which lead CVAD focused clinical practice guidelines development. Trial registration numbers ACTRN12614001327673; ACTRN12615000977572; ACTRN12614000280606. PMID:27259529

  13. Sustained attention in mice: expanding the translational utility of the SAT by incorporating the Michigan Controlled Access Response Port (MICARP).

    PubMed

    St Peters, Megan; Cherian, Ajeesh Koshy; Bradshaw, Marc; Sarter, Martin

    2011-12-01

    Advances in mouse genetic technology have spurred increasing interest in the development of cognitive tasks for mice. Here, we describe and discuss the modifications necessary to adapt a task for the assessment of sustained attention performance for use in mice, including for taxing the top-down control of such performance. The validity of the Sustained Attention Task (SAT), including the distractor version (dSAT), has previously been demonstrated in rats and humans. This task requires moveable or retractable operanda; insertion of operanda into the operant chambers cues animals to respond to a prior signal or non-signal event, reporting either a hit or a miss, or a correct rejection or false alarm, respectively. Retractable levers did not support sufficiently high and stable levels of performance in mice. Given the widespread use of static nose-poke devices for testing operant performance in mice, we therefore designed and fabricated a retractable nose-poke device. As this device extends into chambers, a hole for nose-poking is slowly opened and closed again as the device retracts (termed the "Michigan Controlled Access Response Port", MICARP). Results describe the effects of variation of signal duration and event rate, trial outcome and trial type probability, effects of mice deprivation levels, and the reliability of SAT and dSAT performance. Mice perform the SAT and dSAT at levels comparable to those observed in rats. This task will be of assistance in expanding the translational usefulness of the SAT and dSAT. PMID:21888929

  14. Fine Mapping and Characterization of Candidate Genes that Control Resistance to Cercospora sojina K. Hara in Two Soybean Germplasm Accessions

    PubMed Central

    Pham, Anh-Tung; Harris, Donna K.; Buck, James; Hoskins, Aaron; Serrano, Jonathan; Abdel-Haleem, Hussein; Cregan, Perry; Song, Qijian; Boerma, H. Roger; Li, Zenglu

    2015-01-01

    Frogeye leaf spot (FLS), caused by the fungus Cercospora sojina K. Hara, may cause a significant yield loss to soybean growers in regions with a warm and humid climate. Two soybean accessions, PI 594891 and PI 594774, were identified to carry a high level of resistance similar to that conditioned by the Rcs3 gene in 'Davis'. Previously, we reported that the resistance to FLS in these two plant introductions (PIs) was controlled by a novel gene (s) on chromosome 13 that is different from Rcs3. To fine-map the novel FLS resistance gene(s) in these two PIs, F2: 3 seeds from the crosses between PI 594891 and PI 594774, and the FLS susceptible genotype 'Blackhawk' were genotyped with SNP markers that were designed based on the SoySNP50k iSelect BeadChip data to identify recombinant events and locate candidate genes. Analysis of lines possessing key recombination events helped narrow down the FLS-resistance genomic region in PI 594891 from 3.3 Mb to a 72.6 kb region with five annotated genes. The resistance gene in PI 594774 was fine-mapped into a 540 kb region that encompasses the 72.6 kb region found in PI 594891. Sequencing five candidate genes in PI 594891 identified three genes that have several mutations in the promoter, intron, 5', and 3' UTR regions. qPCR analysis showed a difference in expression levels of these genes in both lines compared to Blackhawk in the presence of C. sojina. Based on phenotype, genotype and haplotype analysis results, these two soybean accessions might carry different resistance alleles of the same gene or two different gene(s). The identified SNPs were used to develop Kompetitive Allele Specific PCR (KASP) assays to detect the resistance alleles on chromosome 13 from the two PIs for marker-assisted selection. PMID:25993056

  15. Optimization of detection sensitivity for a Fiber Optic Intrusion Detection System (FOIDS) using design of experiments.

    SciTech Connect

    Miller, Larry D.; Mack, Thomas Kimball; Mitchiner, Kim W.; Varoz, Carmella A.

    2010-06-01

    The Fiber Optic Intrusion Detection System (FOIDS)1 is a physical security sensor deployed on fence lines to detect climb or cut intrusions by adversaries. Calibration of detection sensitivity can be time consuming because, for example, the FiberSenSys FD-332 has 32 settings that can be adjusted independently to provide a balance between a high probability of detection and a low nuisance alarm rate. Therefore, an efficient method of calibrating the FOIDS in the field, other than by trial and error, was needed. This study was conducted to: x Identify the most significant settings for controlling detection x Develop a way of predicting detection sensitivity for given settings x Develop a set of optimal settings for validation The Design of Experiments (DoE) 2-4 methodology was used to generate small, planned test matrixes, which could be statistically analyzed to yield more information from the test data. Design of Experiments is a statistical methodology for quickly optimizing performance of systems with measurable input and output variables. DoE was used to design custom screening experiments based on 11 FOIDS settings believed to have the most affect on WKH types of fence perimeter intrusions were evaluated: simulated cut intrusions and actual climb intrusions. Two slightly different two-level randomized fractional factorial designed experiment matrixes consisting of 16 unique experiments were performed in the field for each type of intrusion. Three repetitions were conducted for every cut test; two repetitions were conducted for every climb test. Total number of cut tests analyzed was 51; the total number of climb tests was 38. This paper discusses the results and benefits of using Design of Experiments (DoE) to calibrate and optimize the settings for a FOIDS sensor

  16. Monitoring and Assessment of Saltwater Intrusion using Geographic Information Systems (GIS), Remote Sensing and Geophysical measurements of Guimaras Island, Philippines

    NASA Astrophysics Data System (ADS)

    Hernandez, B. C. B.

    2015-12-01

    Degrading groundwater quality due to saltwater intrusion is one of the key challenges affecting many island aquifers. These islands hold limited capacity for groundwater storage and highly dependent on recharge due to precipitation. But its ease of use, natural storage and accessibility make it more vulnerable to exploitation and more susceptible to encroachment from its surrounding oceanic waters. Estimating the extent of saltwater intrusion and the state of groundwater resources are important in predicting and managing water supply options for the community. In Guimaras island, central Philippines, increasing settlements, agriculture and tourism are causing stresses on its groundwater resource. Indications of saltwater intrusion have already been found at various coastal areas in the island. A Geographic Information Systems (GIS)-based approach using the GALDIT index was carried out. This includes six parameters assessing the seawater intrusion vulnerability of each hydrogeologic setting: Groundwater occurrence, Aquifer hydraulic conductivity, Groundwater Level above sea, Distance to shore, Impact of existing intrusion and Thickness of Aquifer. To further determine the extent of intrusion, Landsat images of various thematic layers were stacked and processed for unsupervised classification and electrical resistivity tomography using a 28-electrode system with array lengths of 150 and 300 meters was conducted. The GIS index showed where the vulnerable areas are located, while the geophysical measurements and images revealed extent of seawater encroachment along the monitoring wells. These results are further confirmed by the measurements collected from the monitoring wells. This study presents baseline information on the state of groundwater resources and increase understanding of saltwater intrusion dynamics in island ecosystems by providing a guideline for better water resource management in the Philippines.

  17. Increasing access to care for sick newborns: evidence from the Ghana Newhints cluster-randomised controlled trial

    PubMed Central

    Manu, Alexander; Hill, Zelee; ten Asbroek, Augustinus HA; Soremekun, Seyi; Weobong, Benedict; Gyan, Thomas; Tawiah-Agyemang, Charlotte; Danso, Samuel; Amenga-Etego, Seeba; Owusu-Agyei, Seth; Kirkwood, Betty R

    2016-01-01

    Objectives To evaluate the impact of Newhints community-based surveillance volunteer (CBSV) assessments and referrals on access to care for sick newborns and on existing inequities in access. Design We evaluated a prospective cohort nested within the Newhints cluster-randomised controlled trial. Setting Community-based intervention involving more than 750 000, predominantly rural, population in seven contiguous districts in the Brong-Ahafo Region, Ghana. Participants Participants were recently delivered women (from more than 120 000 women under surveillance) and their 16 168 liveborn babies. Qualitative in-depth interviews with referral narratives (IDIs) were conducted with 92 mothers, CBSVs and health facility front-desk and maternity/paediatrics ward staff. Interventions Newhints trained and effectively supervised 475 CBSVs (existing within the Ghana Health Service) in 49 of 98 supervisory zones (clusters) to assess and refer newborns with any of the 10-key-danger signs to health facilities within the first week after birth; promote independent care seeking for sick newborns and problem-solve around barriers between November 2008 and December 2009. Primary outcomes The main evaluation outcomes were rates of compliance with referrals and independent care seeking for newborn illnesses. Results Of 4006 sampled, 2795 (69.8%) recently delivered women received CBSV assessment visits and 279 (10.0%) newborns were referred with danger signs. Compliance with referrals was unprecedentedly high (86.0%) with women in the poorest quintile (Q1) complying better than the least poor (Q5):87.5%(Q1) vs 69.7%(Q5); p=0.038. Three-quarters went to hospitals; 18% were admitted and 58% received outpatient treatment. Some (24%) mothers were turned away at facilities and follow-on IDIs showed that some of these untreated babies subsequently died. Independent care seeking for severe newborn illness increased from 55.4% in control to 77.3% in Newhints zones, especially among Q1 where

  18. Periodontal changes following molar intrusion with miniscrews

    PubMed Central

    Bayani, Shahin; Heravi, Farzin; Radvar, Mehrdad; Anbiaee, Najmeh; Madani, Azam Sadat

    2015-01-01

    Background: With the introduction of skeletal anchorage system, recently it is possible to successfully intrude molar teeth. On the other hand, there have been concerns about periodontal changes associated with intrusion and there are few studies on this topic, especially for posterior teeth. Materials and Methods: Ten female patients were enrolled in this study. Maxillary molar intrusion was achieved by inserting two miniscrews and a 17 × 25 titanium molybdenum alloy spring. Crestal height changes were evaluated at three intervals including: Baseline (T0), end of active treatment (T1) and 6 months after retention (T2). Other variables including probing depth, gingival recession, attachment level and bleeding on probing were evaluated by clinical measurements in the three above mentioned intervals. One-sample Kolmogrov-Smirnov test ascertained the normality of the data. For all patients, the changes in tooth position and crestal height were evaluated using one-sample t-test. (P < 0.05) Results: Supra-erupted molars were successfully intruded a mean of 2.1 ± 0.9 mm during active treatment (T0-T1). A mean bone resorption of 0.9 ± 0.9 mm in mesial crest and 1 ± 0.8 mm in distal crest had occurred in total treatment (T0-T2). A mean of 0.6 ± 1.4 mm bone was deposited on mesial crest during the retention period (T1-T2) following tooth relapse. On average, 0.8 ± 0.4 mm attachment gain was obtained. Gingival margin coronalized a mean of 0.8 ± 0.6 mm throughout the entire treatment. Probing depth showed no significant change during treatment. Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height. PMID:26288629

  19. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    PubMed

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression. PMID:27069381

  20. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    PubMed Central

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression. PMID:27069381