Science.gov

Sample records for access control layer

  1. Layered Multicast Encryption of Motion JPEG2000 Code Streams for Flexible Access Control

    NASA Astrophysics Data System (ADS)

    Nakachi, Takayuki; Toyoshima, Kan; Tonomura, Yoshihide; Fujii, Tatsuya

    In this paper, we propose a layered multicast encryption scheme that provides flexible access control to motion JPEG2000 code streams. JPEG2000 generates layered code streams and offers flexible scalability in characteristics such as resolution and SNR. The layered multicast encryption proposal allows a sender to multicast the encrypted JPEG2000 code streams such that only designated groups of users can decrypt the layered code streams. While keeping the layering functionality, the proposed method offers useful properties such as 1) video quality control using only one private key, 2) guaranteed security, and 3) low computational complexity comparable to conventional non-layered encryption. Simulation results show the usefulness of the proposed method.

  2. ISDC Data Access Layer

    NASA Astrophysics Data System (ADS)

    Jennings, D.; Borkowski, J.; Contessi, T.; Lock, T.; Rohlfs, R.; Walter, R.

    The ISDC Data Access Layer (DAL) is an ANSI C and \\fortran 90 compatible library under development in support of the ESA INTEGRAL mission data analysis software. DALs primary purpose is to isolate the analysis software from the specifics of the data formats while at the same time providing new data abstraction and access capabilities. DAL supports the creation and manipulation of hierarchical data sets which may span multiple files and, in theory, multiple computer systems. A number of Application Programming Interfaces (APIs) are supported by DAL that allow software to view and access data at different levels of complexity. DAL also allows data sets to reside on disk, in conventional memory or in shared memory in a way that is transparent to the user/application.

  3. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  4. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    PubMed

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems. PMID:22616194

  5. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  6. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  7. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  8. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  9. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  10. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  11. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  12. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    DOEpatents

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  13. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  14. Bibliographic Access and Control System.

    ERIC Educational Resources Information Center

    Kelly, Betsy; And Others

    1982-01-01

    Presents a brief summary of the functions of the Bibliographic Access & Control System (BACS) implemented at the Washington University School of Medicine Library, and outlines the design, development, and uses of the system. Bibliographic control of books and serials and user access to the system are also discussed. (Author/JL)

  15. Controlling Access to Suicide Means

    PubMed Central

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  16. Boundary Layer Control on Airfoils.

    ERIC Educational Resources Information Center

    Gerhab, George; Eastlake, Charles

    1991-01-01

    A phenomena, boundary layer control (BLC), produced when visualizing the fluidlike flow of air is described. The use of BLC in modifying aerodynamic characteristics of airfoils, race cars, and boats is discussed. (KR)

  17. ACCESS: Detector Control and Performance

    NASA Astrophysics Data System (ADS)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  18. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  19. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  20. The Application of Layer Theory to Design: The Control Layer

    ERIC Educational Resources Information Center

    Gibbons, Andrew S.; Langton, Matthew B.

    2016-01-01

    A theory of design layers proposed by Gibbons ("An Architectural Approach to Instructional Design." Routledge, New York, 2014) asserts that each layer of an instructional design is related to a body of theory closely associated with the concerns of that particular layer. This study focuses on one layer, the control layer, examining…

  1. Boundary layer control for airships

    NASA Technical Reports Server (NTRS)

    Pake, F. A.; Pipitone, S. J.

    1975-01-01

    An investigation is summarized of the aerodynamic principle of boundary layer control for nonrigid LTA craft. The project included a wind tunnel test on a BLC body of revolution at zero angle of attack. Theoretical analysis is shown to be in excellent agreement with the test data. Methods are evolved for predicting the boundary layer development on a body of revolution and the suction pumping and propulsive power requirements. These methods are used to predict the performance characteristics of a full-scale airship. The analysis indicates that propulsive power reductions of 15 to 25 percent and endurance improvements of 20 to 40 percent may be realized in employing boundary-layer control to nonrigid airships.

  2. SAGA: A standardized access layer to heterogeneous Distributed Computing Infrastructure

    NASA Astrophysics Data System (ADS)

    Merzky, Andre; Weidner, Ole; Jha, Shantenu

    2015-09-01

    Distributed Computing Infrastructure is characterized by interfaces that are heterogeneous-syntactically and semantically. SAGA represents the most comprehensive community effort to date to address the heterogeneity by defining a simple, uniform access layer. In this paper, we describe the basic concepts underpinning its design and development. We also discuss RADICAL-SAGA which is the most widely used implementation of SAGA.

  3. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  4. Boundary layer receptivity and control

    NASA Technical Reports Server (NTRS)

    Hill, D. C.

    1993-01-01

    Receptivity processes initiate natural instabilities in a boundary layer. The instabilities grow and eventually break down to turbulence. Consequently, receptivity questions are a critical element of the analysis of the transition process. Success in modeling the physics of receptivity processes thus has a direct bearing on technological issues of drag reduction. The means by which transitional flows can be controlled is also a major concern: questions of control are tied inevitably to those of receptivity. Adjoint systems provide a highly effective mathematical method for approaching many of the questions associated with both receptivity and control. The long term objective is to develop adjoint methods to handle increasingly complex receptivity questions, and to find systematic procedures for deducing effective control strategies. The most elementary receptivity problem is that in which a parallel boundary layer is forced by time-harmonic sources of various types. The characteristics of the response to such forcing form the building blocks for more complex receptivity mechanisms. The first objective of this year's research effort was to investigate how a parallel Blasius boundary layer responds to general direct forcing. Acoustic disturbances in the freestream can be scattered by flow non-uniformities to produce Tollmien-Schlichting waves. For example, scattering by surface roughness is known to provide an efficient receptivity path. The present effort is directed towards finding a solution by a simple adjoint analysis, because adjoint methods can be extended to more complex problems. In practice, flows are non-parallel and often three-dimensional. Compressibility may also be significant in some cases. Recent developments in the use of Parabolized Stability Equations (PSE) offer a promising possibility. By formulating and solving a set of adjoint parabolized equations, a method for mapping the efficiency with which external forcing excites the three

  5. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Design and Performance Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic irradiator must have a door or other...

  6. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  7. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  8. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  9. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  10. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    PubMed Central

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  11. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  12. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  13. An Accelerator Control Middle Layer Using MATLAB

    SciTech Connect

    Portmann, Gregory J.; Corbett, Jeff; Terebilo, Andrei

    2005-03-15

    Matlab is a matrix manipulation language originally developed to be a convenient language for using the LINPACK and EISPACK libraries. What makes Matlab so appealing for accelerator physics is the combination of a matrix oriented programming language, an active workspace for system variables, powerful graphics capability, built-in math libraries, and platform independence. A number of software toolboxes for accelerators have been written in Matlab--the Accelerator Toolbox (AT) for machine simulations, LOCO for accelerator calibration, Matlab Channel Access Toolbox (MCA) for EPICS connections, and the Middle Layer. This paper will describe the ''middle layer'' software toolbox that resides between the high-level control applications and the low-level accelerator control system. This software was a collaborative effort between ALS (LBNL) and SPEAR3 (SSRL) but easily ports to other machines. Five accelerators presently use this software. The high-level Middle Layer functionality includes energy ramp, configuration control (save/restore), global orbit correction, local photon beam steering, insertion device compensation, beam-based alignment, tune correction, response matrix measurement, and script-based programs for machine physics studies.

  14. An Accelerator Control Middle Layer Using MATLAB

    SciTech Connect

    Portmann, Gregory J.; Corbett, Jeff; Terebilo, Andrei

    2005-05-15

    Matlab is an interpretive programming language originally developed for convenient use with the LINPACK and EISPACK libraries. Matlab is appealing for accelerator physics because it is matrix-oriented, provides an active workspace for system variables, powerful graphics capabilities, built-in math libraries, and platform independence. A number of accelerator software toolboxes have been written in Matlab -- the Accelerator Toolbox (AT) for model-based machine simulations, LOCO for on-line model calibration, and Matlab Channel Access (MCA) to connect with EPICS. The function of the MATLAB ''MiddleLayer'' is to provide a scripting language for machine simulations and on-line control, including non-EPICS based control systems. The MiddleLayer has simplified and streamlined development of high-level applications including configuration control, energy ramp, orbit correction, photon beam steering, ID compensation, beam-based alignment, tune correction and response matrix measurement. The database-driven Middle Layer software is largely machine-independent and easy to port. Six accelerators presently use the software package with more scheduled to come on line soon.

  15. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  16. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  17. VODance: VO Data Access Layer Service Creation Made Easy

    NASA Astrophysics Data System (ADS)

    Smareglia, R.; Laurino, O.; Knapic, C.

    2011-07-01

    We present a tool for rapid deployment of Virtual Observatory compliant services. Users who want to publish their datasets to the Virtual Observatory can achieve this goal without having to deal with the technical details of standard services development and without having to move their data. With VODance users just have to provide a database connection to our center that points to their available data and fill out a metadata description form without having to export their data. Data Access Layer services are created on the fly and published, through the Italian Astronomical Archive Center (IA2), to the Virtual Observatory. VODance has been successfully used to publish Cone Search and Simple Image Access Protocol services out of MySQL and Oracle database management systems.

  18. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  19. A physical layer perspective on access network sharing

    NASA Astrophysics Data System (ADS)

    Pfeiffer, Thomas

    2015-12-01

    Unlike in copper or wireless networks, there is no sharing of resources in fiber access networks yet, other than bit stream access or cable sharing, in which the fibers of a cable are let to one or multiple operators. Sharing optical resources on a single fiber among multiple operators or different services has not yet been applied. While this would allow for a better exploitation of installed infrastructures, there are operational issues which still need to be resolved, before this sharing model can be implemented in networks. Operating multiple optical systems and services over a common fiber plant, autonomously and independently from each other, can result in mutual distortions on the physical layer. These distortions will degrade the performance of the involved systems, unless precautions are taken in the infrastructure hardware to eliminate or to reduce them to an acceptable level. Moreover, the infrastructure needs to be designed such as to support different system technologies and to ensure a guaranteed quality of the end-to-end connections. In this paper, suitable means are proposed to be introduced in fiber access infrastructures that will allow for shared utilization of the fibers while safeguarding the operational needs and business interests of the involved parties.

  20. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  1. Implementing context and team based access control in healthcare intranets.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users. PMID:12507264

  2. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  3. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2010-01-01 2010-01-01 false Access control. 36.23 Section 36.23 Energy...

  4. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy...

  5. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy...

  6. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the posting requirements of 10 CFR 20.1902, except that signs may be removed, covered, or otherwise made inoperative when... 10 Energy 1 2014-01-01 2014-01-01 false Access control. 36.23 Section 36.23 Energy...

  7. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  8. Speed control system for an access gate

    SciTech Connect

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  9. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  10. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  11. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  12. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  13. Boundary-layer control for drag reduction

    NASA Technical Reports Server (NTRS)

    Harvey, William D.

    1988-01-01

    Although the number of possible applications of boundary-layer control is large, a discussion is given only of those that have received the most attention recently at NASA Langley Research Center to improve airfoil drag characteristics. This research concerns stabilizing the laminar boundary layer through geometric shaping (natural laminar flow, NLF) and active control involving the removal of a portion of the laminar boundary layer (laminar flow control, LFC) either through discrete slots or a perforated surface. At low Reynolds numbers, a combination of shaping and forced transition has been used to achieve the desired run of laminar flow and control of laminar separation. In the design of both natural laminar flow and laminar flow control airfoils and wings, boundary layer stability codes play an important role. A discussion of some recent stability calculations using both incompressible and compressible codes is given.

  14. Cyclone separator having boundary layer turbulence control

    DOEpatents

    Krishna, Coimbatore R.; Milau, Julius S.

    1985-01-01

    A cyclone separator including boundary layer turbulence control that is operable to prevent undue build-up of particulate material at selected critical areas on the separator walls, by selectively varying the fluid pressure at those areas to maintain the momentum of the vortex, thereby preventing particulate material from inducing turbulence in the boundary layer of the vortical fluid flow through the separator.

  15. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Control of public access. 420.53 Section....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and unauthorized, unescorted access to explosive hazard facilities or other hazard areas not otherwise...

  16. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  17. Controlled Layer-by-Layer Etching of MoS₂.

    PubMed

    Lin, TaiZhe; Kang, BaoTao; Jeon, MinHwan; Huffman, Craig; Jeon, JeaHoo; Lee, SungJoo; Han, Wei; Lee, JinYong; Lee, SeHan; Yeom, GeunYoung; Kim, KyongNam

    2015-07-29

    Two-dimensional (2D) metal dichalcogenides like molybdenum disulfide (MoS2) may provide a pathway to high-mobility channel materials that are needed for beyond-complementary metal-oxide-semiconductor (CMOS) devices. Controlling the thickness of these materials at the atomic level will be a key factor in the future development of MoS2 devices. In this study, we propose a layer-by-layer removal of MoS2 using the atomic layer etching (ALET) that is composed of the cyclic processing of chlorine (Cl)-radical adsorption and argon (Ar)(+) ion-beam desorption. MoS2 etching was not observed with only the Cl-radical adsorption or low-energy (<20 eV) Ar(+) ion-beam desorption steps; however, the use of sequential etching that is composed of the Cl-radical adsorption step and a subsequent Ar(+) ion-beam desorption step resulted in the complete etching of one monolayer of MoS2. Raman spectroscopy, X-ray photoelectron spectroscopy (XPS), and atomic force microscopy (AFM) indicated the removal of one monolayer of MoS2 with each ALET cycle; therefore, the number of MoS2 layers could be precisely controlled by using this cyclical etch method. In addition, no noticeable damage or etch residue was observed on the exposed MoS2. PMID:26091282

  18. Segmented proportional spacing medium access control protocol for APONs

    NASA Astrophysics Data System (ADS)

    Wang, Hongbin; Yu, Yiqing; Zhou, Dongru; Meng, Bo

    2004-04-01

    Combining asynchronous transfer mode (ATM) over a passive optical network (APON) can provide broadband services as defined by the international telecommunications union (ITU). The medium access control (MAC) layer is of primary importance to the access scheme as in controls the flow of traffic in the access network. This paper presents a novel MAC protocol-segmented proportional spacing MAC protocol, which complies with ITU-T recommendations, is firstly designed for APON system based on the analysis of different type of bandwidth allocation algorithms. The main idea of protocol is: frame structure adopts the structure regulated by ITU; fine time division for the optical network unit (ONU) to apply bandwidth; the bandwidth"s application is not based on the T-interface but ONU, the bandwidth allocation algorithm uses segmented proportional spacing algorithm. At last, we compare our protocol to other MAC protocols, the results show that proportional spacing and segmented bandwidth allocation control the cell jitter with satisfactory and improve the system bandwidth efficiency at same time, the correlative conclusions are given finally.

  19. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    NASA Astrophysics Data System (ADS)

    Kotikalapudi, Sriram; Li, Chia-Chang; Magill, Peter D.; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A., Jr.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  20. Boundary-Layer-Ingesting Inlet Flow Control

    NASA Technical Reports Server (NTRS)

    Owens, Lewis R.; Allan, Brian G.; Gorton, Susan A.

    2008-01-01

    An experimental study was conducted to provide the first demonstration of an active flow control system for a flush-mounted inlet with significant boundary-layer-ingestion in transonic flow conditions. The effectiveness of the flow control in reducing the circumferential distortion at the engine fan-face location was assessed using a 2.5%-scale model of a boundary-layer-ingesting offset diffusing inlet. The inlet was flush mounted to the tunnel wall and ingested a large boundary layer with a boundary-layer-to-inlet height ratio of 35%. Different jet distribution patterns and jet mass flow rates were used in the inlet to control distortion. A vane configuration was also tested. Finally a hybrid vane/jet configuration was tested leveraging strengths of both types of devices. Measurements were made of the onset boundary layer, the duct surface static pressures, and the mass flow rates through the duct and the flow control actuators. The distortion and pressure recovery were measured at the aerodynamic interface plane. The data show that control jets and vanes reduce circumferential distortion to acceptable levels. The point-design vane configuration produced higher distortion levels at off-design settings. The hybrid vane/jet flow control configuration reduced the off-design distortion levels to acceptable ones and used less than 0.5% of the inlet mass flow to supply the jets.

  1. Context-Based E-Health System Access Control Mechanism

    NASA Astrophysics Data System (ADS)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  2. Application-Defined Decentralized Access Control.

    PubMed

    Xu, Yuanzhong; Dunn, Alan M; Hofmann, Owen S; Lee, Michael Z; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%-9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications' security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  3. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  4. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  5. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... individuals authorized to have unescorted access to the secured area are able to gain entry; (2) Ensure...

  6. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site,...

  7. Boundary layer control device for duct silencers

    NASA Technical Reports Server (NTRS)

    Schmitz, Fredric H. (Inventor); Soderman, Paul T. (Inventor)

    1993-01-01

    A boundary layer control device includes a porous cover plate, an acoustic absorber disposed under the porous cover plate, and a porous flow resistive membrane interposed between the porous cover plate and the acoustic absorber. The porous flow resistive membrane has a flow resistance low enough to permit sound to enter the acoustic absorber and high enough to damp unsteady flow oscillations.

  8. Boundary-Layer-Ingesting Inlet Flow Control

    NASA Technical Reports Server (NTRS)

    Owens, Lewis R.; Allan, Brian G.; Gorton, Susan A.

    2006-01-01

    This paper gives an overview of a research study conducted in support of the small-scale demonstration of an active flow control system for a boundary-layer-ingesting (BLI) inlet. The effectiveness of active flow control in reducing engine inlet circumferential distortion was assessed using a 2.5% scale model of a 35% boundary-layer-ingesting flush-mounted, offset, diffusing inlet. This experiment was conducted in the NASA Langley 0.3-meter Transonic Cryogenic Tunnel at flight Mach numbers with a model inlet specifically designed for this type of testing. High mass flow actuators controlled the flow through distributed control jets providing the active flow control. A vortex generator point design configuration was also tested for comparison purposes and to provide a means to examine a hybrid vortex generator and control jets configuration. Measurements were made of the onset boundary layer, the duct surface static pressures, and the mass flow through the duct and the actuators. The distortion and pressure recovery were determined by 40 total pressure measurements on 8 rake arms each separated by 45 degrees and were located at the aerodynamic interface plane. The test matrix was limited to a maximum free-stream Mach number of 0.85 with scaled mass flows through the inlet for that condition. The data show that the flow control jets alone can reduce circumferential distortion (DPCP(sub avg)) from 0.055 to about 0.015 using about 2.5% of inlet mass flow. The vortex generators also reduced the circumferential distortion from 0.055 to 0.010 near the inlet mass flow design point. Lower inlet mass flow settings with the vortex generator configuration produced higher distortion levels that were reduced to acceptable levels using a hybrid vortex generator/control jets configuration that required less than 1% of the inlet mass flow.

  9. Boundary-Layer-Ingesting Inlet Flow Control

    NASA Technical Reports Server (NTRS)

    Owens, Lewis R.; Allan, Brian G.; Gorton, Susan A.

    2006-01-01

    This paper gives an overview of a research study conducted in support of the small-scale demonstration of an active flow control system for a boundary-layer-ingesting (BLI) inlet. The effectiveness of active flow control in reducing engine inlet circumferential distortion was assessed using a 2.5% scale model of a 35% boundary-layer-ingesting flush-mounted, offset, diffusing inlet. This experiment was conducted in the NASA Langley 0.3-meter Transonic Cryogenic Tunnel at flight Mach numbers with a model inlet specifically designed for this type of testing. High mass flow actuators controlled the flow through distributed control jets providing the active flow control. A vortex generator point design configuration was also tested for comparison purposes and to provide a means to examine a hybrid vortex generator and control jets configuration. Measurements were made of the onset boundary layer, the duct surface static pressures, and the mass flow through the duct and the actuators. The distortion and pressure recovery were determined by 40 total pressure measurements on 8 rake arms each separated by 45 degrees and were located at the aerodynamic interface plane. The test matrix was limited to a maximum free-stream Mach number of 0.85 with scaled mass flows through the inlet for that condition. The data show that the flow control jets alone can reduce circumferential distortion (DPCPavg) from 0.055 to about 0.015 using about 2.5% of inlet mass flow. The vortex generators also reduced the circumferential distortion from 0.055 to 0.010 near the inlet mass flow design point. Lower inlet mass flow settings with the vortex generator configuration produced higher distortion levels that were reduced to acceptable levels using a hybrid vortex generator/control jets configuration that required less than 1% of the inlet mass flow.

  10. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  11. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  12. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured...

  13. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  14. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A...

  15. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  16. Boundary Layer Control for Hypersonic Airbreathing Vehicles

    NASA Technical Reports Server (NTRS)

    Berry, Scott A.; Nowak, Robert J.; Horvath, Thomas J.

    2004-01-01

    Active and passive methods for tripping hypersonic boundary layers have been examined in NASA Langley Research Center wind tunnels using a Hyper-X model. This investigation assessed several concepts for forcing transition, including passive discrete roughness elements and active mass addition (or blowing), in the 20-Inch Mach 6 Air and the 31-Inch Mach 10 Air Tunnels. Heat transfer distributions obtained via phosphor thermography, shock system details, and surface streamline patterns were measured on a 0.333-scale model of the Hyper-X forebody. The comparisons between the active and passive methods for boundary layer control were conducted at test conditions that nearly match the Hyper-X nominal Mach 7 flight test-point of an angle-of-attack of 2-deg and length Reynolds number of 5.6 million. For passive roughness, the primary parametric variation was a range of trip heights within the calculated boundary layer thickness for several trip concepts. The passive roughness study resulted in a swept ramp configuration, scaled to be roughly 0.6 of the calculated boundary layer thickness, being selected for the Mach 7 flight vehicle. For the active blowing study, the manifold pressure was systematically varied (while monitoring the mass flow) for each configuration to determine the jet penetration height, with schlieren, and transition movement, with the phosphor system, for comparison to the passive results. All the blowing concepts tested, which included various rows of sonic orifices (holes), two- and three-dimensional slots, and random porosity, provided transition onset near the trip location with manifold stagnation pressures on the order of 40 times the model surface static pressure, which is adequate to ensure sonic jets. The present results indicate that the jet penetration height for blowing was roughly half the height required with passive roughness elements for an equivalent amount of transition movement.

  17. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed. PMID:21751015

  18. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  19. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  20. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  1. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  2. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  3. Role Based Access Control system in the ATLAS experiment

    NASA Astrophysics Data System (ADS)

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  4. Access control within military C4ISR systems

    NASA Astrophysics Data System (ADS)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  5. Improvement of Resistive Random Access Memory Device Performance via Embedding of Low-K Dielectric Layer.

    PubMed

    Jang, Sung Hwan; Ryu, Ju Tae; Jung, Hyun Soo; Kim, Tae Whan

    2016-02-01

    The switching mechanisms of resistive random access memories (ReRAMs) were strongly related to the formation and rupture of conduction filaments (CFs) in the transition metal oxide (TMO) layer. The novel method approached to enhance the electrical characteristics of ReRAMs by introducing of the local insertion of the low-k dielectric layer inside the TMO layer. Simulation results showed that the insertion of the low-k dielectric layer in the TMO layer reduced the switching volume and the generation of CFs. The large variation of resistive switching properties was caused by the stochastic characteristics of the CFs, which was involved in switching by generation and rupture. The electrical characteristics of the novel ReRAMs exhibited a low reset current of below 20 microA, the high uniformity of the resistive switching, and the narrow variation of the resistance for the high resistance state. PMID:27433626

  6. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  7. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  8. Concurrency control and recovery on lightweight directory access protocol

    NASA Astrophysics Data System (ADS)

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  9. High-Performance Pattern Placement Metrology on Dynamic Random Access Memory Layers of 0.25 μm Technology

    NASA Astrophysics Data System (ADS)

    Trube, Jutta; Huber, Hans-Ludwig; Bangert, Carola Bläsing-; Rinn, Klaus; Röth, Klaus-Dieter

    1993-12-01

    Pattern placement metrology is a key function in the evaluation of new manufacturing technology and processes. For future dynamic random access memory (DRAM) generations, ground rules of less than 0.25 μm must be achieved. This paper presents the results of an investigation of the Leitz LMS 2020 laser metrology system from Leica for pattern placement metrology for different layers of DRAM and X-ray mask fabrication processes. The results demonstrate clearly that the new Leitz LMS 2020 tool is well suited for pattern placement control of typical CMOS process wafers and X-ray masks with 30 nm accuracy.

  10. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  11. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  12. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  13. Analysis of physical layer performance of hybrid optical-wireless access network

    NASA Astrophysics Data System (ADS)

    Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.

    2011-09-01

    The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.

  14. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    PubMed Central

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  15. Access control in healthcare: the methodology from legislation to practice.

    PubMed

    Ferreira, Ana; Correia, Ricardo; Chadwick, David; Antunes, Luis

    2010-01-01

    Translating legislation and regulations into access control systems in healthcare is, in practice, not a straightforward task. Excessive regulation can create barriers to appropriate patient treatment. The main objective of this paper is to present a new methodology that can define, from legislation to practice, an access control policy as well as a RBAC model, in order to comprise generic legislation and regulation issues together with the access control needs from the ends users of a healthcare information system. The methodology includes the use of document analysis as well as grounded theory and mixed methods research. This methodology can be easily applied within a healthcare practice or any other domain with similar requirements. It helps to bridge the gap between legislation and end users' needs, while integrating information security into the healthcare processes in a more meaningful way. PMID:20841770

  16. Emergency access authorization for personally controlled online health care data.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2012-02-01

    Personally controlled health records (PCHR) systems have emerged to allow patients to control their own medical data. In a PCHR system, all the access privileges to a patient's data are granted by the patient. However, in many emergency cases, it is impossible for the patient to participate in access authorization on site when immediate medical treatment is needed. To solve the emergency access authorization problem in the absence of patients, we consider two cases: a) the requester is already in the PCHR system but has not obtained the access privilege of the patient's health records, and b) the requester does not even have an account in the PCHR system to submit its request. For each of the two cases, we present a method for emergency access authorization, utilizing the weighted voting and source authentication cryptographic techniques. Our methods provide an effective, secure and private solution for emergency access authorization, that makes the existing PCHR system frameworks more practical and thus improves the patients' experiences of health care when using PCHR systems. We have implemented a prototype system as a proof of concept. PMID:20703719

  17. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  18. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  19. Efficient Service Delivery for High-speed Railway Communications Using MIMO and Access Control Technique

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2014-07-01

    In order to realize the notion of "anytime, anywhere" communication for high-speed train passengers, the Long Term Evolution for Railway is designed to provide broadband accesses and reliable communications for high-speed train passengers. However, with the increase of train speed, the system is subject to high bit error rate, Doppler frequency shift, and call drops. This paper is trying to solve these problems by employing the Multiple-Input Multiple-Output technique and access control schemes. The goal is to provide higher quality of services such as data rate, reliability, and delay for train passengers. Physical layer performance analysis and access control schemes are proposed in a two-hop model. Handovers and service types are also considered. Simulation results show that proposed models and schemes perform better in improving the quality of services.

  20. Controlling user access to electronic resources without password

    SciTech Connect

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  1. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  2. Layered superhydrophobic meshes for controlled drug release.

    PubMed

    Falde, Eric J; Freedman, Jonathan D; Herrera, Victoria L M; Yohe, Stefan T; Colson, Yolonda L; Grinstaff, Mark W

    2015-09-28

    Layered superhydrophobic electrospun meshes composed of poly(ε-caprolactone) (PCL) and poly(glycerol monostearate-co-ε-caprolactone) (PGC-C18) are described as a local source of chemotherapeutic delivery. Specifically, the chemotherapeutic agent SN-38 is incorporated into a central 'core' layer, between two 'shield' layers of mesh without drug. This mesh is resistant to wetting of the surface and throughout the bulk due to the pronounced hydrophobicity imparted by the high roughness of a hydrophobic polymer, PGC-C18. In serum solution, these meshes exhibit slow initial drug release over 10days corresponding to media infiltrating the shield layer, followed by steady release over >30days, as the drug-loaded core layer is wetted. This sequence of events is supported by X-ray computed tomography imaging of a contrast agent solution infiltrating the mesh. In vitro cytotoxicity data collected with Lewis Lung Carcinoma (LLC) cells are consistent with this release profile, remaining cytotoxic for over 20days, longer than the unlayered version. Finally, after subcutaneous implantation in rats, histology of meshes with and without drug demonstrated good integration and lack of adverse reaction over 28days. The drug release rates, robust superhydrophobicity, in vitro cytotoxicity of SN-38 loaded meshes, and compatibility provide key design parameters for the development of an implantable chemotherapeutic-loaded device for the prevention of local lung cancer recurrence following surgical resection. PMID:26160309

  3. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  4. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  5. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  6. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  7. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  8. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  9. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  10. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  11. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  12. Access control and interlock system at the Advanced Photon Source

    SciTech Connect

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  13. Error Control with Perfectly Matched Layer or Damping Layer Treatments for Computational Aeroacoustics with Jet Flows

    NASA Technical Reports Server (NTRS)

    Goodrich, John W.

    2009-01-01

    In this paper we show by means of numerical experiments that the error introduced in a numerical domain because of a Perfectly Matched Layer or Damping Layer boundary treatment can be controlled. These experimental demonstrations are for acoustic propagation with the Linearized Euler Equations with both uniform and steady jet flows. The propagating signal is driven by a time harmonic pressure source. Combinations of Perfectly Matched and Damping Layers are used with different damping profiles. These layer and profile combinations allow the relative error introduced by a layer to be kept as small as desired, in principle. Tradeoffs between error and cost are explored.

  14. Accessibility

    MedlinePlus

    ... www.nlm.nih.gov/medlineplus/accessibility.html MedlinePlus Accessibility To use the sharing features on this page, ... Subscribe to RSS Follow us Disclaimers Copyright Privacy Accessibility Quality Guidelines Viewers & Players MedlinePlus Connect for EHRs ...

  15. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  16. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  17. RDFacl: A Secure Access Control Model Based on RDF Triple

    NASA Astrophysics Data System (ADS)

    Kim, Jaehoon; Park, Seog

    An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.

  18. Numerical experiments on the stability of controlled boundary layers

    NASA Technical Reports Server (NTRS)

    Zang, Thomas A.; Hussaini, M. Y.

    1988-01-01

    Nonlinear simulations are presented for instability and transition in parallel water boundary layers subjected to pressure gradient, suction, or heating control. In the nonlinear regime, finite amplitude, 2-D Tollmein-Schlichting waves grow faster than is predicted by linear theory. Moreover, this discrepancy is greatest in the case of heating control. Likewise, heating control is found to be the least effective in delaying secondary instabilities of both the fundamental and subharmonic type. Flow field details (including temperature profiles) are presented for both the uncontrolled boundary layer and the heated boundary layer.

  19. Current status of link access control and encryption system

    SciTech Connect

    Springer, E.

    1984-01-01

    The purpose of this project is to develop necessary technologies for the secure protection of data communication networks. Data encryption equipment, using the federal government's Data Encryption Standard (DES) algorithm, was designed and developed. This equipment is the Link Access Control and Encryption (Link ACE) system. It protects unclassified sensitive data transmissions over unprotected lines between central computers and remote terminals. Link ACE units have been installed and are operational in the Department of Energy's Central Personnel Clearance Index (CPCI) system.

  20. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  1. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  2. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  3. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control. PMID:20703920

  4. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  5. Global Access-controlled Transfer e-frame (GATe)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, asmore » well as provides reporting capabilities.« less

  6. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  7. In situ imaging and control of layer-by-layer femtosecond laser thinning of graphene

    NASA Astrophysics Data System (ADS)

    Li, D. W.; Zhou, Y. S.; Huang, X.; Jiang, L.; Silvain, J.-F.; Lu, Y. F.

    2015-02-01

    Although existing methods (chemical vapor deposition, mechanical exfoliation, etc.) are available to produce graphene, the lack of thickness control limits further graphene applications. In this study, we demonstrate an approach to precisely thin graphene films to a specific thickness using femtosecond (fs) laser raster scanning. By using appropriate laser fluence and scanning times, graphene thinning with an atomic layer precision, namely layer-by-layer graphene removal, has been realized. The fs laser used was configured in a four-wave mixing (FWM) system which can be used to distinguish graphene layer thickness and count the number of layers using the linear relationship between the FWM signal intensity and the graphene thickness. Furthermore, FWM imaging has been successfully applied to achieve in situ, real-time monitoring of the fs laser graphene thinning process. This method can not only realize the large-scale thinning of graphene with atomic layer precision, but also provide in situ, rapid imaging capability of graphene for an accurate assessment of the number of layers.Although existing methods (chemical vapor deposition, mechanical exfoliation, etc.) are available to produce graphene, the lack of thickness control limits further graphene applications. In this study, we demonstrate an approach to precisely thin graphene films to a specific thickness using femtosecond (fs) laser raster scanning. By using appropriate laser fluence and scanning times, graphene thinning with an atomic layer precision, namely layer-by-layer graphene removal, has been realized. The fs laser used was configured in a four-wave mixing (FWM) system which can be used to distinguish graphene layer thickness and count the number of layers using the linear relationship between the FWM signal intensity and the graphene thickness. Furthermore, FWM imaging has been successfully applied to achieve in situ, real-time monitoring of the fs laser graphene thinning process. This method can not

  8. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  9. Boundary-layer transition effects on airplane stability and control

    NASA Technical Reports Server (NTRS)

    Van Dam, C. P.; Holmes, B. J.

    1986-01-01

    Surface contamination of laminar-flow airfoils can significantly modify the location of transition from laminar-to-turbulent boundary-layer flow. The contamination can be the result of insect debris, environmental effects such as ice crystals and moisture due to mist or rain, surface damage, or other contamination adhering to the surface. Location and mode of transition have a dominant effect on the lift-and-drag characteristics of a lifting surface. The influences of laminar boundary-layer flow behavior on airplane stability and control are examined through theoretical results and experimental (wind-tunnel and free-flight) data. For certain airfoils with a relatively steep pressure recovery it is shown that loss of laminar flow near the leading edge can result in premature separation of the turbulent boundary layer and, consequently, in loss of lift and control effectiveness. Aerodynamic modifications which minimize boundary-layer transition effects on airplane stability and control are also discussed.

  10. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  11. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  12. Access Control of Cloud Service Based on UCON

    NASA Astrophysics Data System (ADS)

    Danwei, Chen; Xiuli, Huang; Xunyi, Ren

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. This paper introduces cloud computing and cloud service firstly, and then gives cloud services access control model based on UCON and negotiation technologies, and also designs the negotiation module.

  13. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    NASA Astrophysics Data System (ADS)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  14. Control of turbulent boundary layer flows by sound

    NASA Astrophysics Data System (ADS)

    Ahuja, K. K.; Whipkey, R. R.; Jones, G. S.

    1983-04-01

    The effects of acoustic excitation on the turbulent boundary-layer characteristics over an airfoil were examined as a function of excitation frequency and level and also flow velocity. The measured data primarily consisted of: (1) lift coefficients, (2) mean velocities and turbulence intensities as measured by a laser velocimeter, and (3) flow visualization. The experiments successfully demonstrated that separation of turbulent boundary layer flows can be controlled by sound in both pre- and post-stall regions. In addition, it was shown that, with high-frequency acoustic excitation, the turbulence levels in the boundary layer at a fixed measurement point can be reduced considerably.

  15. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  16. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal Register... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published...

  17. Chemical control of Ornithonyssus sylviarum on caged layer hens.

    PubMed

    Levot, G W

    1992-04-01

    Manual application of aqueous solutions of malathion, carbaryl and permethrin controlled northern fowl mite, Ornithonyssus sylviarum Canestrini and Fanzago, on caged layer hens for at least 118 days. Azamethiphos sprayed manually provided acceptable control for a shorter period. Machine application, particularly of azamethiphos, but also malathion, provided lesser control. The addition of surfactant increased the wetting ability of the sprays but interfered with the efficacy of azamethiphos. PMID:1421482

  18. Programmable light-controlled shape changes in layered polymer nanocomposites.

    PubMed

    Zhu, Zhichen; Senses, Erkan; Akcora, Pinar; Sukhishvili, Svetlana A

    2012-04-24

    We present soft, layered nanocomposites that exhibit controlled swelling anisotropy and spatially specific shape reconfigurations in response to light irradiation. The use of gold nanoparticles grafted with a temperature-responsive polymer (poly(N-isopropylacrylamide), PNIPAM) with layer-by-layer (LbL) assembly allowed placement of plasmonic structures within specific regions in the film, while exposure to light caused localized material deswelling by a photothermal mechanism. By layering PNIPAM-grafted gold nanoparticles in between nonresponsive polymer stacks, we have achieved zero Poisson's ratio materials that exhibit reversible, light-induced unidirectional shape changes. In addition, we report rheological properties of these LbL assemblies in their equilibrium swollen states. Moreover, incorporation of dissimilar plasmonic nanostructures (solid gold nanoparticles and nanoshells) within different material strata enabled controlled shrinkage of specific regions of hydrogels at specific excitation wavelengths. The approach is applicable to a wide range of metal nanoparticles and temperature-responsive polymers and affords many advanced build-in options useful in optically manipulated functional devices, including precise control of plasmonic layer thickness, tunability of shape variations to the excitation wavelength, and programmable spatial control of optical response. PMID:22452351

  19. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  20. Controlled Access under Review: Improving the Governance of Genomic Data Access.

    PubMed

    Shabani, Mahsa; Dyke, Stephanie O M; Joly, Yann; Borry, Pascal

    2015-12-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  1. Controlled Access under Review: Improving the Governance of Genomic Data Access

    PubMed Central

    Shabani, Mahsa; Dyke, Stephanie O. M.; Joly, Yann; Borry, Pascal

    2015-01-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  2. Controllable preparation of multishelled NiO hollow nanospheres via layer-by-layer self-assembly for supercapacitor application

    NASA Astrophysics Data System (ADS)

    Yang, Zeheng; Xu, Feifei; Zhang, Weixin; Mei, Zhousheng; Pei, Bo; Zhu, Xiao

    2014-01-01

    In this work, we demonstrate a facile layer-by-layer (LBL) self-assembly method for controllable preparation of single-, double-, and triple-shelled NiO hollow nanospheres by calcining Ni(OH)2/C precursors formed at different stage. It is observed that the external nanoflakes of the NiO hollow nanospheres are inherited from the Ni(OH)2 precursors organized on the surface of carbon spheres via a self-assembly growth process and the inner shells result from the formation of different Ni(OH)2 layers within the carbon spheres during different preparation cycles. Supercapacitive performance of the three types of NiO hollow nanospheres as active electrode materials has been evaluated by cyclic voltammetry (CV) and galvanostatic charge-discharge. The results indicate that double-shelled NiO hollow nanosphere sample with largest surface area (92.99 m2 g-1) exhibits the best electrochemical properties among the three NiO hollow nanosphere samples. It delivers a high capacitance of 612.5 F g-1 at 0.5 A g-1 and demonstrates a superior long-term cyclic stability, with over 90% specific capacitance retention after 1000 charge-discharge cycles. This excellent performance is ascribed to the short diffusion path and large surface area of the unique hollow structure with nanoflake building blocks for bulk accessibility of faradaic reaction.

  3. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  4. Acoustic excitation: A promising new means of controlling shear layers

    NASA Technical Reports Server (NTRS)

    Stone, J. R.; Mckinzie, D. J., Jr.

    1984-01-01

    Techniques have long been sought for the controlled modification of turbulent shear layers, such as in jets, wakes, boundary layers, and separated flows. Relatively recently published results of laboratory experiments have established that coherent structures exist within turbulent flows. These results indicate that even apparently chaotic flow fields can contain deterministic, nonrandom elements. Even more recently published results show that deliberate acoustic excitation of these coherent structures has a significant effect on the mixing characteristics of shear layers. Therefore, we have initiated a research effort to develop both an understanding of the interaction mechanisms and the ability to use it to favorably modify various shear layers. Acoustic excitation circumvents the need for pumping significant flow rates, as required by suction or blowing. Control of flows by intentional excitation of natural flow instabilities involves new and largely unexplored phenomena and offers considerable potential for improving component performance. Nonintrusive techniques for flow field control may permit much more efficient, flexible propulsion systems and aircraft designs, including means of stall avoidance and recovery. The techniques developed may also find application in many other areas where mixing is important, such as reactors, continuous lasers, rocket engines, and fluidic devices. It is the objective of this paper to examine some potential applications of the acoustic excitation technique to various shear layer flows of practical aerospace systems.

  5. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  6. Blow-up and control of marginally separated boundary layers.

    PubMed

    Braun, Stefan; Kluwick, Alfred

    2005-05-15

    Interactive solutions for steady two-dimensional laminar marginally separated boundary layers are known to exist up to a critical value Gamma(c) of the controlling parameter (e.g. the angle of attack of a slender airfoil) Gamma only. Here, we investigate three-dimensional unsteady perturbations of such boundary layers, assuming that the basic flow is almost critical, i.e. in the limit Gamma(c)-Gamma-->0. It is then shown that the interactive equations governing such perturbations simplify significantly, allowing, among others, a systematic study of the blow-up phenomenon observed in earlier investigations and the optimization of devices used in boundary-layer control. PMID:16105768

  7. Safety systems and access control in the National Ignition Facility.

    PubMed

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  8. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  9. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  10. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  11. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  12. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  13. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  14. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  15. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  16. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  17. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  18. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  19. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  20. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  1. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  2. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  3. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  4. Emergent Functionality and Controllability in Few-Layer Metasurfaces.

    PubMed

    Cheng, Hua; Liu, Zhaocheng; Chen, Shuqi; Tian, Jianguo

    2015-09-23

    Recent progress in metamaterial research has successfully exceeded the limitations imposed by conventional materials and optical devices, enabling the manipulation of electromagnetic waves as desired. The distinct characteristics and controlling abilities of metamaterials make them ideal candidates for novel photonics devices not only in traditional optics but also for biological detection, medical science, and metrology. However, the controllability and functionality of both single-layer metasurfaces and bulk metamaterials are not sufficient to meet the requirements of emerging technologies; hence, new solutions must be found. As such technologies advance, new functionalities will emerge as different or identical single-layer metasurfaces are combined. Thus, innovation in few-layer metasurfaces will become an increasingly important line of research. Here, these metasurfaces are classified according to their functionalities and the few-layer metasurfaces that have been proposed up to now are presented in a clear sequence. It is expected that, with further development in this area, few-layer metasurfaces will play an important role in the family of optical materials. PMID:26265505

  5. Energy management and multi-layer control of networked microgrids

    NASA Astrophysics Data System (ADS)

    Zamora, Ramon

    Networked microgrids is a group of neighboring microgrids that has ability to interchange power when required in order to increase reliability and resiliency. Networked microgrid can operate in different possible configurations including: islanded microgrid, a grid-connected microgrid without a tie-line converter, a grid-connected microgrid with a tie-line converter, and networked microgrids. These possible configurations and specific characteristics of renewable energy offer challenges in designing control and management algorithms for voltage, frequency and power in all possible operating scenarios. In this work, control algorithm is designed based on large-signal model that enables microgrid to operate in wide range of operating points. A combination between PI controller and feed-forward measured system responses will compensate for the changes in operating points. The control architecture developed in this work has multi-layers and the outer layer is slower than the inner layer in time response. The main responsibility of the designed controls are to regulate voltage magnitude and frequency, as well as output power of the DG(s). These local controls also integrate with a microgrid level energy management system or microgrid central controller (MGCC) for power and energy balance for. the entire microgrid in islanded, grid-connected, or networked microgid mode. The MGCC is responsible to coordinate the lower level controls to have reliable and resilient operation. In case of communication network failure, the decentralized energy management will operate locally and will activate droop control. Simulation results indicate the superiority of designed control algorithms compared to existing ones.

  6. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  7. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  8. Vibration control of cylindrical shells using active constrained layer damping

    NASA Astrophysics Data System (ADS)

    Ray, Manas C.; Chen, Tung-Huei; Baz, Amr M.

    1997-05-01

    The fundamentals of controlling the structural vibration of cylindrical shells treated with active constrained layer damping (ACLD) treatments are presented. The effectiveness of the ACLD treatments in enhancing the damping characteristics of thin cylindrical shells is demonstrated theoretically and experimentally. A finite element model (FEM) is developed to describe the dynamic interaction between the shells and the ACLD treatments. The FEM is used to predict the natural frequencies and the modal loss factors of shells which are partially treated with patches of the ACLD treatments. The predictions of the FEM are validated experimentally using stainless steel cylinders which are 20.32 cm in diameter, 30.4 cm in length and 0.05 cm in thickness. The cylinders are treated with ACLD patches of different configurations in order to target single or multi-modes of lobar vibrations. The ACLD patches used are made of DYAD 606 visco-elastic layer which is sandwiched between two layers of PVDF piezo-electric films. Vibration attenuations of 85% are obtained with maximum control voltage of 40 volts. Such attenuations are attributed to the effectiveness of the ACLD treatment in increasing the modal damping ratios by about a factor of four over those of conventional passive constrained layer damping (PCLD) treatments. The obtained results suggest the potential of the ACLD treatments in controlling the vibration of cylindrical shells which constitute the major building block of many critical structures such as cabins of aircrafts, hulls of submarines and bodies of rockets and missiles.

  9. TCP flow control using link layer information in mobile networks

    NASA Astrophysics Data System (ADS)

    Koga, Hiroyuki; Kawahara, Kenji; Oie, Yuji

    2002-07-01

    Mobile Networks have been expanding and IMT-2000 further increases their available bandwidth over wireless links. However, TCP, which is a reliable end-to-end transport protocol, is tuned to perform well in wired networks where bit error rates are very low and packet loss occurs mostly because of congestion. Although a TCP sender can execute flow control to utilize as much available bandwidth as possible in wired networks, it cannot work well in wireless networks characterized by high bit error rates. In the next generation mobile systems, sophisticated error recovery technologies of FEC and ARQ are indeed employed over wireless links, i.e., over Layer 2, to avoid performance degradation of upper layers. However, multiple retransmissions by Layer 2 ARQ can adversely increase transmission delay of TCP segments, which will further make TCP unnecessarily increase RTO (Retransmission TimeOut). Furthermore, a link bandwidth assigned to TCP flows can change in response to changing air conditions to use wireless links efficiently. TCP thus has to adapt its transmission rate according to the changing available bandwidth. The major goal of this study is to develop a receiver-based effective TCP flow control without any modification on TCP senders, which are probably connected with wired networks. For this end, we propose a TCP flow control employing some Layer 2 information on a wireless link at the mobile station. Our performance evaluation of the proposed TCP shows that the receiver-based TCP flow control can moderate the performance degradation very well even if FER on Layer 2 is high.

  10. Experiments on the active control of transitional boundary layers

    NASA Astrophysics Data System (ADS)

    Nelson, P. A.; Rioual, J.-L.; Fisher, M. J.

    Experimental results are presented which demonstrate that the streamwise position of the transition region of a flat plate boundary layer can be actively controlled. The means of control is through the application of suction through the surface of the plate, a progressive increase in suction rate being capable of producing transition at progressively larger distances downstream from the plate leading edge. A simple digital feedback regulator based on an integral control law is shown to be most effective in regulating the position of transition, an error signal being derived from measurements of pressure fluctuations on the surface of the plate.

  11. Persistence Length Control of the Polyelectrolyte Layer-by-Layer Self-Assembly on Carbon Nanotubes

    SciTech Connect

    Huang, S J; Artyukhin, A B; Wang, Y; Ju, J; Stroeve, P; Noy, A

    2005-04-30

    considered only nano-particles with radius 5 nanometer and larger. One-dimensional materials, such as carbon nanotubes, provide an even more interesting template for studying self-assembly mechanisms, since they give us access to even smaller surface curvatures down to 1 nm. We have examined the role of the polymer persistence length in layer-by-layer self-assembly process on carbon nanotubes by observing formation of multilayer polyelectrolyte shells around carbon nanotubes at different ionic strength. Persistence length of polyelectrolytes varies with solution ionic strength, due to screening of the electrostatic repulsion between the polymer Figure 1. TEM images of single-walled carbon nanotubes after polymer deposition for ionic strengths of (A) 0.05M, (B) 0.1M, (C) 0.2M, (D) 0.4M, (E) 0.65M, and (F) 1.05M. Scale bar corresponds to 10 nm. backbone charges; therefore changing ionic strength is a convenient way to alter the configuration of the polymer molecule systematically. We have used the layer-by-layer self-assembly technique to form 5-layer thick coating of the alternating polyallylamine hydrochloride (PAH) and sodium poly(styrenesulfonate) (PSS) layers on the surfaces of the pristine single-wall carbon nanotubes. For our experiments, we grew the nanotubes across copper TEM grid openings using catalytic chemical vapor deposition. The deposition solutions contained different amounts of NaCl to vary the ionic strength. After polymer multilayer formation we examined the resulting coating in high-resolution TEM.

  12. Boundary-Layer Control: In Memory of Bill Reynolds

    NASA Astrophysics Data System (ADS)

    Kim, John

    2004-11-01

    Professor Bill Reynolds (1933-2004) inspired many students and colleagues with his never-ending curiosity and thought-provoking ideas. Bill's relentless energy, together with his hallmark can-do character and do-it-yourself attitude, led to many seminal contributions to mechanical engineering in general, and fluid mechanics in particular. He has left a lasting impact on many of us, especially for those who had the privilege of working closely with him. Some of my current work on boundary-layer control, the use of neural networks in particular, were inspired by many discussions with Bill. He was among the first to see the potential of control-theoretic approaches for flow control, which has become the main thrust of my current research. Without his continued encouragement, I would not have been deeply involved in this line of research; and perhaps, we would not have seen the current flurry of research activities in applying modern control theories to flow control. In memory of Bill Reynolds, who himself has contributed much to flow control, an analysis of boundary-layer control from a linear system perspective will be presented.

  13. Arctic layer salinity controls heat loss from deep Atlantic layer in seasonally ice-covered areas of the Barents Sea

    NASA Astrophysics Data System (ADS)

    Lind, Sigrid; Ingvaldsen, Randi B.; Furevik, Tore

    2016-05-01

    In the seasonally ice-covered northern Barents Sea an intermediate layer of cold and relatively fresh Arctic Water at ~25-110 m depth isolates the sea surface and ice cover from a layer of warm and saline Atlantic Water below, a situation that resembles the cold halocline layer in the Eurasian Basin. The upward heat flux from the Atlantic layer is of major concern. What causes variations in the heat flux and how is the Arctic layer maintained? Using observations, we found that interannual variability in Arctic layer salinity determines the heat flux from the Atlantic layer through its control of stratification and vertical mixing. A relatively fresh Arctic layer effectively suppresses the upward heat flux, while a more saline Arctic layer enhances the heat flux. The corresponding upward salt flux causes a positive feedback. The Arctic layer salinity and the water column structures have been remarkably stable during 1970-2011.

  14. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  15. Boundary-layer-ingesting inlet flow control system

    NASA Technical Reports Server (NTRS)

    Owens, Lewis R. (Inventor); Allan, Brian G. (Inventor)

    2010-01-01

    A system for reducing distortion at the aerodynamic interface plane of a boundary-layer-ingesting inlet using a combination of active and passive flow control devices is disclosed. Active flow control jets and vortex generating vanes are used in combination to reduce distortion across a range of inlet operating conditions. Together, the vortex generating vanes can reduce most of the inlet distortion and the active flow control jets can be used at a significantly reduced control jet mass flow rate to make sure the inlet distortion stays low as the inlet mass flow rate varies. Overall inlet distortion, measured and described as average SAE circumferential distortion descriptor, was maintained at a value of 0.02 or less. Advantageous arrangements and orientations of the active flow control jets and the vortex generating vanes were developed using computational fluid dynamics simulations and wind tunnel experimentations.

  16. [Co/Ni]-CoFeB hybrid free layer stack materials for high density magnetic random access memory applications

    NASA Astrophysics Data System (ADS)

    Liu, E.; Swerts, J.; Couet, S.; Mertens, S.; Tomczak, Y.; Lin, T.; Spampinato, V.; Franquet, A.; Van Elshocht, S.; Kar, G.; Furnemont, A.; De Boeck, J.

    2016-03-01

    Alternative free layer materials with high perpendicular anisotropy are researched to provide spin-transfer-torque magnetic random access memory stacks' sufficient thermal stability at critical dimensions of 20 nm and below. We demonstrate a high tunnel magetoresistance (TMR) MgO-based magnetic tunnel junction stack with a hybrid free layer design made of a [Co/Ni] multilayer and CoFeB. The seed material on which the [Co/Ni] multilayer is deposited determines its switching characteristics. When deposited on a Pt seed layer, soft magnetic switching behavior with high squareness is obtained. When deposited on a NiCr seed, the perpendicular anisotropy remains high, but the squareness is low and coercivity exceeds 1000 Oe. Interdiffusion of the seed material with the [Co/Ni] multilayers is found to be responsible for the different switching characteristics. In optimized stacks, a TMR of 165% and low resistance-area (RA) product of 7.0 Ω μm2 are attained for free layers with an effective perpendicular magnetic anisotropy energy of 1.25 erg/cm2, which suggests that the hybrid free layer materials may be a viable candidate for high density magnetic random access memory applications.

  17. Simulation and optimal control of wind-farm boundary layers

    NASA Astrophysics Data System (ADS)

    Meyers, Johan; Goit, Jay

    2014-05-01

    In large wind farms, the effect of turbine wakes, and their interaction leads to a reduction in farm efficiency, with power generated by turbines in a farm being lower than that of a lone-standing turbine by up to 50%. In very large wind farms or `deep arrays', this efficiency loss is related to interaction of the wind farms with the planetary boundary layer, leading to lower wind speeds at turbine level. Moreover, for these cases it has been demonstrated both in simulations and wind-tunnel experiments that the wind-farm energy extraction is dominated by the vertical turbulent transport of kinetic energy from higher regions in the boundary layer towards the turbine level. In the current study, we investigate the use of optimal control techniques combined with Large-Eddy Simulations (LES) of wind-farm boundary layer interaction for the increase of total energy extraction in very large `infinite' wind farms. We consider the individual wind turbines as flow actuators, whose energy extraction can be dynamically regulated in time so as to optimally influence the turbulent flow field, maximizing the wind farm power. For the simulation of wind-farm boundary layers we use large-eddy simulations in combination with actuator-disk and actuator-line representations of wind turbines. Simulations are performed in our in-house pseudo-spectral code SP-Wind that combines Fourier-spectral discretization in horizontal directions with a fourth-order finite-volume approach in the vertical direction. For the optimal control study, we consider the dynamic control of turbine-thrust coefficients in an actuator-disk model. They represent the effect of turbine blades that can actively pitch in time, changing the lift- and drag coefficients of the turbine blades. Optimal model-predictive control (or optimal receding horizon control) is used, where the model simply consists of the full LES equations, and the time horizon is approximately 280 seconds. The optimization is performed using a

  18. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  19. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  20. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  1. Insertion of a Si layer to reduce operation current for resistive random access memory applications

    NASA Astrophysics Data System (ADS)

    Chen, Yu-Ting; Chang, Ting-Chang; Peng, Han-Kuang; Tseng, Hsueh-Chih; Huang, Jheng-Jie; Yang, Jyun-Bao; Chu, Ann-Kuo; Young, Tai-Fa; Sze, Simon M.

    2013-06-01

    In this study, a reduction of low resistive state (LRS) current is discovered in a V:SiO2/Si bi-layer structure with the addition of a Si layer. A Pt/V:SiO2/TiN structure is fabricated as the standard sample. The results of conduction mechanism analyses for LRS indicate that a SiO2 interfacial layer forms through oxidation of the inserted Si layer after the set process. The LRS current reduction can be attributed to the formation of this SiO2 layer. In addition, self-compliance behavior for the bi-layer structure during the set process further proves the existence of this SiO2 buffer layer in LRS.

  2. Boundary Layer Control by Means of Plasma Actuators

    SciTech Connect

    Quadros, R.

    2007-09-06

    The development of controlled transition in a flat-plate boundary layer is investigated using Large Eddy Simulations (LES) with the dynamic Smagorinsky model. The analysis of flow control with the objective to optimize the effects of Tollmien-Schlichting waves on a flat plate by means of plasma actuators was studied. The plasma effect is modeled as a body force in the momentum equations. These equations are solved in a uniform grid using a 2nd-order finite difference scheme in time and space. The response of plasma actuators operating in different time-dependent conditions, produced by transient or periodic inputs at different frequencies, is also analyzed.

  3. Numerical simulation of transition control in boundary layers

    NASA Astrophysics Data System (ADS)

    Laurien, E.; Kleiser, L.

    The transition process from laminar to turbulent boundary layers is simulated by numerical integration of the 3D incompressible Navier-Stokes equations. Spatially periodic wave disturbances in a parallel Blasius flow are assumed. A spectral method with real-space Chebyshev collocation in the normal direction is employed. Both the classical K-type and the subharmonic type of transition are investigated. Good agreement with measurements and flow visualizations of transition experiments is obtained. Control of transition by wave superposition is simulated using periodic wall suction/blowing. It is shown that 2D control works well at an early stage but fails after significant 3D disturbances have developed.

  4. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas. In addition to the requirements in...

  5. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a) The licensee shall ensure that...

  6. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  7. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  8. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  9. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  10. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  11. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  13. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  14. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for establishing logical access... Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional practitioner. (a... practitioner that enters permissions for logical access controls into the application. The...

  15. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  16. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  17. Passive Control of Supersonic Rectangular Jets through Boundary Layer Swirl

    NASA Astrophysics Data System (ADS)

    Han, Sang Yeop; Taghavi, Ray R.; Farokhi, Saeed

    2013-06-01

    Mixing characteristics of under-expanded supersonic jets emerging from plane and notched rectangular nozzles are computationally studied using nozzle exit boundary layer swirl as a mean of passive flow control. The coupling of the rectangular jet instability modes, such as flapping, and the swirl is investigated. A three-dimensional unsteady Reynolds-Averaged Navier-Stokes (RANS) code with shock adaptive grids is utilized. For plane rectangular nozzle with boundary layer swirl, the flapping and spanwise oscillations are captured in the jet's small and large dimensions at twice the frequencies of the nozzles without swirl. A symmetrical oscillatory mode is also observed in the jet with double the frequency of spanwise oscillation mode. For the notched rectangular nozzle with boundary layer swirl, the flapping oscillation in the small jet dimension and the spanwise oscillation in the large jet dimension are observed at the same frequency as those without boundary layer swirl. The mass flow rates in jets at 11 and 8 nozzle heights downstream of the nozzles increased by nearly 25% and 41% for the plane and notched rectangular nozzles respectively, due to swirl. The axial gross thrust penalty due to induced swirl was 5.1% for the plane and 4.9% for the notched rectangular nozzle.

  18. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  19. The role of the inserted layer in resistive random access memory device

    NASA Astrophysics Data System (ADS)

    Zhang, Dainan; Ma, Guokun; Zhang, Huaiwu; Tang, Xiaoli; Zhong, Zhiyong; Jie, Li; Su, Hua

    2016-07-01

    NiO resistive switching devices were fabricated by reactive DC magnetron sputtering at room temperature containing different inserted layers. From measurements, we demonstrated the filaments were made up by metal Co rather than the oxygen defect or other metal. A current jumping phenomenon in the SET process was observed, evidencing that the filament generating procedure was changed due to the inserted layers. In this process, we demonstrate the current jumping appeared in higher voltage region when the position of inserted layer was close to the bottom electrode. The I–V curves shifted to the positive direction as the thickness of inserted layer increasing. With the change of the number of inserted layers, SET voltages varied while the RESET voltage kept stable. According to the electrochemical metallization memory mechanism, detailed explanations on all the phenomena were addressed. This discovery is supposed of great potentials in the use of designing multi-layer RRAM devices.

  20. Morphology control of layer-structured gallium selenide nanowires.

    PubMed

    Peng, Hailin; Meister, Stefan; Chan, Candace K; Zhang, Xiao Feng; Cui, Yi

    2007-01-01

    Layer-structured group III chalcogenides have highly anisotropic properties and are attractive materials for stable photocathodes and battery electrodes. We report the controlled synthesis and characterization of layer-structured GaSe nanowires via a catalyst-assisted vapor-liquid-solid (VLS) growth mechanism during GaSe powder evaporation. GaSe nanowires consist of Se-Ga-Ga-Se layers stacked together via van der Waals interactions to form belt-shaped nanowires with a growth direction along the [11-20], width along the [1-100], and height along the [0001] direction. Nanobelts exhibit a variety of morphologies including straight, zigzag, and saw-tooth shapes. These morphologies are realized by controlling the growth temperature and time so that the actual catalysts have a chemical composition of Au, Au-Ga alloy, or Ga. The participation of Ga in the VLS catalyst is important for achieving different morphologies of GaSe. In addition, GaSe nanotubes are also prepared by a slow growth process. PMID:17212464

  1. Dynamic Control of Optical Response in Layered Metal Chalcogenide Nanoplates.

    PubMed

    Liu, Yanping; Tom, Kyle; Wang, Xi; Huang, Chunming; Yuan, Hongtao; Ding, Hong; Ko, Changhyun; Suh, Joonki; Pan, Lawrence; Persson, Kristin A; Yao, Jie

    2016-01-13

    Tunable optical transitions in ultrathin layered 2-dimensional (2D) materials unveil the electronic structures of materials and provide exciting prospects for potential applications in optics and photonics. Here, we present our realization of dynamic optical modulation of layered metal chalcogenide nanoplates using ionic liquid (IL) gating over a wide spectral range. The IL gating significantly increased the tuning range of the Fermi level and, as a result, substantially altered the optical transitions in the nanoplates. Using heavily n-doped Bi2Se3 nanoplates, we substantially modulated the light transmission through the ultrathin layer. A tunable, high-transmission spectral window in the visible to near-infrared region has been observed due to simultaneous shifts of both the plasma edge and absorption edge of the material. On the other hand, optical response of multilayer MoSe2 flakes gated by IL has shown enhanced transmission in both positive and negative biases, which is consistent with their ambipolar electrical behavior. The electrically controlled optical property tuning in metal chalcogenide material systems provides new opportunities for potential applications, such as wide spectral range optical modulators, optical filters, and electrically controlled smart windows with extremely low material consumption. PMID:26599063

  2. Possibilities for drag reduction by boundary layer control

    NASA Technical Reports Server (NTRS)

    Naiman, I.

    1946-01-01

    The mechanics of laminar boundary layer transition are reviewed. Drag possibilities for boundary layer control are analyzed using assumed conditions of transition Reynolds number, inlet loss, number of slots, blower efficiency, and duct losses. Although the results of such analysis are highly favorable, those obtained by experimental investigations yield conflicting results, showing only small gains, and sometimes losses. Reduction of this data indicates that there is a lower limit to the quantity of air which must be removed at the slot in order to stabilize the laminar flow. The removal of insufficient air permits transition to occur while the removal of excessive amounts of air results in high power costs, with a net drag increases. With the estimated value of flow coefficient and duct losses equal to half the dynamic pressure, drag reductions of 50% may be obtained; with twice this flow coefficient, the drag saving is reduced to 25%.

  3. A Quality of Context-Aware Approach to Access Control in Pervasive Environments

    NASA Astrophysics Data System (ADS)

    Toninelli, Alessandra; Corradi, Antonio; Montanari, Rebecca

    The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users to share resources anywhere and anytime, but makes access control a crucial issue. User/device mobility and heterogeneity, together with network topology and conditions variability, complicate access control and call for novel solutions to dynamically adapt access decisions to the different operating conditions. Several research efforts have emerged in recent years that propose to exploit context-awareness to control access to resources based on context visibility and changes. Context-based access control requires, however, to take into account the quality of context information used to drive access decisions (QoC). Quality of context has in fact a profound impact on the correct behavior of any context-aware access control framework. Using context information with insufficient quality might increase the risk of incorrect access control decisions, thus leading to dangerous security breaches in resource sharing. In this paper we propose a QoC-aware approach to access control for anywhere, anytime resource sharing. The paper describes the design, implementation and evaluation of the Proteus policy framework, which combines two design guidelines to enable dynamic adaptation of policies depending on context changes: context-awareness with QoC guarantees and semantic technologies to allow high-level description of context/policy specification and reasoning about context/policies.

  4. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  5. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  6. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  7. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  8. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  9. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  10. Performance and characteristics of double layer porous silicon oxide resistance random access memory

    NASA Astrophysics Data System (ADS)

    Tsai, Tsung-Ming; Chang, Kuan-Chang; Zhang, Rui; Chang, Ting-Chang; Lou, J. C.; Chen, Jung-Hui; Young, Tai-Fa; Tseng, Bae-Heng; Shih, Chih-Cheng; Pan, Yin-Chih; Chen, Min-Chen; Pan, Jhih-Hong; Syu, Yong-En; Sze, Simon M.

    2013-06-01

    A bilayer resistive switching memory device with an inserted porous silicon oxide layer is investigated in this letter. Compared with single Zr:SiOx layer structure, Zr:SiOx/porous SiOx structure outperforms from various aspects, including low operating voltages, tighter distributions of set voltage, higher stability of both low resistance state and high resistance state, and satisfactory endurance characteristics. Electric field simulation by comsolTM Multiphysics is applied, which corroborates that intensive electric field around the pore in porous SiOx layer guides the conduction of electrons. The constraint of conduction path leads to better stabilization and prominent performance of bilayer resistive switching devices.

  11. Control of Thermal Convection in Layered Fluids Using Magnetic fields

    NASA Technical Reports Server (NTRS)

    Ramachandran, N.; Leslie, F. W.

    2003-01-01

    Immiscible fluid layers are found in a host of applications ranging from materials processing, for example the use of encapsulants in float zone crystal growth technique and a buffer layer in industrial Czochralski growth of crystals to prevent Marangoni convection, to heat transfer phenomena in day-to-day processes like the presence of air pockets in heat exchangers. In the microgravity and space processing realm, the exploration of other planets requires the development of enabling technologies in several fronts. The reduction in the gravity level poses unique challenges for fluid handling and heat transfer applications. The present work investigates the efficacy of controlling thermal convective flow using magnetic fluids and magnetic fields. The setup is a two-layer immiscible liquids system with one of the fluids being a diluted ferrofluid (super paramagnetic nano particles dispersed in carrier fluid). Using an external magnetic field one can essentially dial in a volumetric force - gravity level, on the magnetic fluid and thereby affect the system thermo-fluid behavior. The paper will describe the experimental and numerical modeling approach to the problem and discuss results obtained to date.

  12. Active Flow Control on a Boundary-Layer-Ingesting Inlet

    NASA Technical Reports Server (NTRS)

    Gorton, Susan Althoff; Owens, Lewis R.; Jenkins, Luther N.; Allan, Brian G.; Schuster, Ernest P.

    2004-01-01

    Boundary layer ingestion (BLI) is explored as means to improve overall system performance for Blended Wing Body configuration. The benefits of BLI for vehicle system performance benefit are assessed with a process derived from first principles suitable for highly-integrated propulsion systems. This performance evaluation process provides framework within which to assess the benefits of an integrated BLI inlet and lays the groundwork for higher-fidelity systems studies. The results of the system study show that BLI provides a significant improvement in vehicle performance if the inlet distortion can be controlled, thus encouraging the pursuit of active flow control (AFC) as a BLI enabling technology. The effectiveness of active flow control in reducing engine inlet distortion was assessed using a 6% scale model of a 30% BLI offset, diffusing inlet. The experiment was conducted in the NASA Langley Basic Aerodynamics Research Tunnel with a model inlet designed specifically for this type of testing. High mass flow pulsing actuators provided the active flow control. Measurements were made of the onset boundary layer, the duct surface static pressures, and the mass flow through the duct and the actuators. The distortion was determined by 120 total pressure measurements located at the aerodynamic interface plane. The test matrix was limited to a maximum freestream Mach number of 0.15 with scaled mass flows through the inlet for that condition. The data show that the pulsed actuation can reduce distortion from 29% to 4.6% as measured by the circumferential distortion descriptor DC60 using less than 1% of inlet mass flow. Closed loop control of the actuation was also demonstrated using a sidewall surface static pressure as the response sensor.

  13. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  14. A Parallel Controls Software Approach for PEP II: AIDA & Matlab Middle Layer

    SciTech Connect

    Wittmer, W.; Colocho, W.; White, G.; /SLAC

    2007-11-06

    The controls software in use at PEP II (Stanford Control Program - SCP) had originally been developed in the eighties. It is very successful in routine operation but due to its internal structure it is difficult and time consuming to extend its functionality. This is problematic during machine development and when solving operational issues. Routinely, data has to be exported from the system, analyzed offline, and calculated settings have to be reimported. Since this is a manual process, it is time consuming and error-prone. Setting up automated processes, as is done for MIA (Model Independent Analysis), is also time consuming and specific to each application. Recently, there has been a trend at light sources to use MATLAB as the platform to control accelerators using a 'MATLAB Middle Layer' (MML), and so called channel access (CA) programs to communicate with the low level control system (LLCS). This has proven very successful, especially during machine development time and trouble shooting. A special CA code, named AIDA (Accelerator Independent Data Access), was developed to handle the communication between MATLAB, modern software frameworks, and the SCP. The MML had to be adapted for implementation at PEP II. Colliders differ significantly in their designs compared to light sources, which poses a challenge. PEP II is the first collider at which this implementation is being done. We will report on this effort, which is still ongoing.

  15. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  16. Tandem Solar Cells from Accessible Low Band-Gap Polymers Using an Efficient Interconnecting Layer.

    PubMed

    Bag, Santanu; Patel, Romesh J; Bunha, Ajaykumar; Grand, Caroline; Berrigan, J Daniel; Dalton, Matthew J; Leever, Benjamin J; Reynolds, John R; Durstock, Michael F

    2016-01-13

    Tandem solar cell architectures are designed to improve device photoresponse by enabling the capture of wider range of solar spectrum as compared to single-junction device. However, the practical realization of this concept in bulk-heterojunction polymer systems requires the judicious design of a transparent interconnecting layer compatible with both polymers. Moreover, the polymers selected should be readily synthesized at large scale (>1 kg) and high performance. In this work, we demonstrate a novel tandem polymer solar cell that combines low band gap poly isoindigo [P(T3-iI)-2], which is easily synthesized in kilogram quantities, with a novel Cr/MoO3 interconnecting layer. Cr/MoO3 is shown to be greater than 80% transparent above 375 nm and an efficient interconnecting layer for P(T3-iI)-2 and PCDTBT, leading to 6% power conversion efficiencies under AM 1.5G illumination. These results serve to extend the range of interconnecting layer materials for tandem cell fabrication by establishing, for the first time, that a thin, evaporated layer of Cr/MoO3 can work as an effective interconnecting layer in a tandem polymer solar cells made with scalable photoactive materials. PMID:26699653

  17. Discretionary access control in a heterogeneous distributed data base management system

    SciTech Connect

    Wang, C.Y.

    1986-01-01

    An important technical problem in building a distributed database management system (DDBMS) is access control which prevents unauthorized access or malicious destruction of a database. Consider a DDBMS that uses a uniform global data model to integrate the local schemes of existing DBMSs at the sites of a network. The local DBMSs are unchanged, and the DDBMS is implemented as a module on top of the existing DBMSs at each site. The DBMS at each site is expected to retain its autonomy. That is, the local DBMS at each site maintains control of the data stored at that site. Each local DBMS decides for itself if a user (of the local DBMS or of the DDBMS) may access the data it manages. The design of the access control system for the database in such an environment presents several problems. First, the DBMSs at different sites may have different and incompatible access control mechanisms. Second, queries involving data from multiple sites must be processed by the access control mechanisms of multiple and possible different local DBMSs. Coordinating the access control mechanisms of these DBMSs to provide a consistent access control facility to the users of the heterogeneous DDBMS is a difficult task. This research discusses the problem described above. A general architecture for a DDBMS was developed. Data abstraction techniques were adapted to specify the architecture. A formal verification for the specification was completed.

  18. Control of flow separation in a turbulent boundary layer

    NASA Astrophysics Data System (ADS)

    Cho, Minjeong; Choi, Sangho; Choi, Haecheon

    2015-11-01

    Towards the development of successful control methods for separation delay in a turbulent boundary layer, we adopt a model flow field, in which a turbulent separation occurs above a flat plate (Na and Moin 1998 JFM), and apply controls to this flow for reducing the size of the separation bubble and investigating the interaction between the forcing and flow near the separation bubble. We provide a single-frequency forcing with zero net mass flow rate at the upstream of the separation bubble. At low forcing frequencies, spanwise vortices are generated and travel downstream, bringing high momentum toward the wall and reducing the size of the separation bubble. Also, these vortices cause the separation and reattachment points to travel downstream. On the other hand, at high forcing frequencies, the size of the separation bubble becomes smaller and larger in time, respectively, due to the pressure gradient alternating favorably and adversely in time. Supported by NRF-2011-0028032 and 2014048162.

  19. Computer-controlled preparation of thin tungsten layers

    NASA Astrophysics Data System (ADS)

    Folger, Helmut; Hartmann, Willi; Klemm, Josef; Lommel, Bettina; Thalheimer, Werner

    1997-02-01

    Tungsten layers of 1-6 mg/cm 2 with diameters of 10 mm are needed as heavy-ion targets and as flat or domed windows for in-beam ion sources. They are prepared by a high-vacuum evaporation-deposition process carried out in a computer-controlled apparatus. The tungsten, placed in the water-cooled crucible of an electron-beam gun, is gradually heated and evaporates at about its melting point ( Tm = 3643 K). The tungsten is deposited onto 9 mg/cm 2 copper backings which are preheated by the thermal radiation from the evaporant. The deposition rate is controlled by a quartz crystal monitor. After the high-vacuum deposition process, the copper backings are removed by selective etching and the self-supported tungsten foils are characterized by their areal mass. The features of the commercially available evaporation unit used are discussed by way of this deposition process.

  20. Perspectives on open access high resolution digital elevation models to produce global flood hazard layers

    NASA Astrophysics Data System (ADS)

    Sampson, Christopher; Smith, Andrew; Bates, Paul; Neal, Jeffrey; Trigg, Mark

    2015-12-01

    Global flood hazard models have recently become a reality thanks to the release of open access global digital elevation models, the development of simplified and highly efficient flow algorithms, and the steady increase in computational power. In this commentary we argue that although the availability of open access global terrain data has been critical in enabling the development of such models, the relatively poor resolution and precision of these data now limit significantly our ability to estimate flood inundation and risk for the majority of the planet's surface. The difficulty of deriving an accurate 'bare-earth' terrain model due to the interaction of vegetation and urban structures with the satellite-based remote sensors means that global terrain data are often poorest in the areas where people, property (and thus vulnerability) are most concentrated. Furthermore, the current generation of open access global terrain models are over a decade old and many large floodplains, particularly those in developing countries, have undergone significant change in this time. There is therefore a pressing need for a new generation of high resolution and high vertical precision open access global digital elevation models to allow significantly improved global flood hazard models to be developed.

  1. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  2. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  3. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  4. Predetermined control of turbulent boundary layer with a piezoelectric oscillator

    NASA Astrophysics Data System (ADS)

    Xiao-Bo, Zheng; Nan, Jiang; Hao, Zhang

    2016-01-01

    With a piezoelectric (PZT) oscillator, the predetermined controls of the turbulent boundary layer (TBL) are effective in reducing the drag force. The stream-wise velocities in the TBL are accurately measured downstream of the oscillator driven by an adjustable power source. The mean velocity profiles in the inner and outer scales are reported and the skin friction stresses with different voltage parameters are compared. Reduction of integral spatial scales in the inner region below y+ of 30 suggests that the oscillator at work breaks up the near-wall stream-wise vortices responsible for high skin friction. For the TBL at Reθ of 2183, the controls with a frequency of 160 Hz are superior among our experiments and a relative drag reduction rate of 26.83% is exciting. Wavelet analyses provide a reason why the controls with this special frequency perform best. Project supported by the National Natural Science Foundation of China (Grant Nos. 11332006, 11272233, and 11411130150) and the National Basic Research Program of China (Grant Nos. 2012CB720101 and 2012CB720103).

  5. Controlled sound field with a dual layer loudspeaker array

    NASA Astrophysics Data System (ADS)

    Shin, Mincheol; Fazi, Filippo M.; Nelson, Philip A.; Hirono, Fabio C.

    2014-08-01

    Controlled sound interference has been extensively investigated using a prototype dual layer loudspeaker array comprised of 16 loudspeakers. Results are presented for measures of array performance such as input signal power, directivity of sound radiation and accuracy of sound reproduction resulting from the application of conventional control methods such as minimization of error in mean squared pressure, maximization of energy difference and minimization of weighted pressure error and energy. Procedures for selecting the tuning parameters have also been introduced. With these conventional concepts aimed at the production of acoustically bright and dark zones, all the control methods used require a trade-off between radiation directivity and reproduction accuracy in the bright zone. An alternative solution is proposed which can achieve better performance based on the measures presented simultaneously by inserting a low priority zone named as the “gray” zone. This involves the weighted minimization of mean-squared errors in both bright and dark zones together with the gray zone in which the minimization error is given less importance. This results in the production of directional bright zone in which the accuracy of sound reproduction is maintained with less required input power. The results of simulations and experiments are shown to be in excellent agreement.

  6. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  7. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  8. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  9. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    ERIC Educational Resources Information Center

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  10. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings, and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  11. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings, and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  12. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  13. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  14. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  15. Controllable Curved Mirrors Made from Single-Layer EAP Films

    NASA Technical Reports Server (NTRS)

    Bao, Xiaoqi; Bar-Cohen, Yoseph; Sherrit, Stewart

    2004-01-01

    A document proposes that lightweight, deployable, large-aperture, controllable curved mirrors made of reflectively coated thin electroactive-polymer (EAP) films be developed for use in spaceborne microwave and optical systems. In these mirrors, the EAP films would serve as both structures and actuators. EAPs that are potentially suitable for such use include piezoelectric, electrostrictive, ferroelectric, and dielectric polymers. These materials exhibit strains proportional to the squares of applied electric fields. Utilizing this phenomenon, a curved mirror according to the proposal could be made from a flat film, upon which a nonuniform electrostatic potential (decreasing from the center toward the edge) would be imposed to obtain a required curvature. The effect would be analogous to that of an old-fashioned metalworking practice in which a flat metal sheet is made into a bowl by hammering it repeatedly, the frequency of hammer blows decreasing with distance from the center. In operation, the nonuniform electrostatic potential could be imposed by use of an electron gun. Calculations have shown that by use of a single- layer film made of a currently available EAP, it would be possible to control the focal length of a 2-m-diameter mirror from infinity to 1.25 m.

  16. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ...The Librarian of Congress announces that the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted...

  17. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  18. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  19. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... controlled substances are current and in good standing. (c) After one individual designated under paragraph... required by the two-factor authentication protocol is lost, stolen, or compromised. Such access must...

  20. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ...The Copyright Office makes a nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted...

  1. Increasing software testability with standard access and control interfaces

    NASA Technical Reports Server (NTRS)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  2. Control System For Cryogenic THD Layering At The National Ignition Facility

    SciTech Connect

    Fedorov, M; Blubaugh, J; Edwards, O; Mauvais, M; Sanchez, R; Wilson, B

    2011-03-18

    The National Ignition Facility (NIF) is the world largest and most energetic laser system for Inertial Confinement Fusion (ICF). In 2010, NIF began ignition experiments using cryogenically cooled targets containing layers of the tritium-hydrogen-deuterium (THD) fuel. The 75 {micro}m thick layer is formed inside of the 2 mm target capsule at temperatures of approximately 18 K. The ICF target designs require sub-micron smoothness of the THD ice layers. Formation of such layers is still an active research area, requiring a flexible control system capable of executing the evolving layering protocols. This task is performed by the Cryogenic Target Subsystem (CTS) of the NIF Integrated Computer Control System (ICCS). The CTS provides cryogenic temperature control with the 1 mK resolution required for beta-layering and for the thermal gradient fill of the capsule. The CTS also includes a 3-axis x-ray radiography engine for phase contrast imaging of the ice layers inside of the plastic and beryllium capsules. In addition to automatic control engines, CTS is integrated with the Matlab interactive programming environment to allow flexibility in experimental layering protocols. The CTS Layering Matlab Toolbox provides the tools for layer image analysis, system characterization and cryogenic control. The CTS Layering Report tool generates qualification metrics of the layers, such as concentricity of the layer and roughness of the growth boundary grooves. The CTS activities are automatically coordinated with other NIF controls in the carefully orchestrated NIF Shot Sequence.

  3. Biodegradable, multi-layered coatings for controlled release of small molecules†

    PubMed Central

    Amir, Elizabeth; Antoni, Per; Campos, Luis M.; Damiron, Denis; Gupta, Nalini; Amir, Roey J.; Pesika, Noshir; Drockenmuller, Eric

    2014-01-01

    Incorporation of orthogonal functional groups into biodegradable polymers permits the fabrication of multi-layered thin films with improved adhesion and tunable degradation profiles. The bi-layer structure also allows for accurate control over small molecule release. PMID:22499161

  4. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  5. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  6. An active control system for the turbulent boundary layer

    NASA Astrophysics Data System (ADS)

    Lew, James

    This thesis presents the development process and the experimental results of a system constructed to apply real-time control to the structures of the turbulent boundary layer region in order to reduce surface shear stress. The system is composed of three main components: an array of MEMS surface shear stress, tauw sensors; a MEMS flap actuator; and a control logic which integrates the hardware components together into a closed system. The objective of this system is to reduce the stress contained in streak-like regions of high tauw. The sensor array, used to image the tauw distribution, is an extension of the thermal based tauw sensor developed by Jiang. Numerous studies have been performed using this device, the results of which have validated its performance. For this study, a new temperature compensation methodology, based on the surface temperature of the sensor chip, was employed in order to account for possible temperature variations at the wall surface. The actuator, a pneumatically driven flap, is developed as part of the present research. The device is, in essence, a 3 mm x 1 mm cantilever beam that sits on top of an inflatable diaphragm and is capable of actuation frequencies of over 200 Hz and amplitudes of over .11 mm. When it is oscillated in the open loop mode, the effect over one cycle of motion is an average reduction by as much as 2.5% in tauw in the region immediately downstream. A neural network is employed to identify the streak-like regions of interest. Results have shown that this network is successful in identifying the streak-like regions of interest. The control logic employs this network in a predictive, feed-forward scheme to determine the appropriate actuator response. Offline studies have shown that under optimal conditions, the signature of the streak-like regions can be eliminated. Online results conform well to the offline predictions. While unable to achieve the optimal conditions, online experiments show that the system is capable

  7. Morphology Control of Zinc Oxide Nanostructure on Single Layer Graphene.

    PubMed

    Ahn, Seungbae; Vijayarangamuthu, K; Jeon, Ki-Jeon

    2016-05-01

    Various morphologies of zinc oxide (ZnO) nanostructures on single layer graphene were synthesized by electrodeposition method. The current density was utilized to control the morphology of the ZnO. The Scanning Electron Microscope (SEM) was used to examine the surface morphology of the samples. SEM analysis shows morphology changes to nanorod, flower, and flakes with increase in the current density from 0.1, 0.2, and 0.3 mA/cm(-1) respectively. The XRD, XPS, and Raman spectroscopy were adopted to characterize the ZnO nanostructure and to understand the formation of various morphologies. The Raman result clearly shows extra modes due to for flakes structure caused by c-axis orientation along the substrate direction. Further, XPS data also supports formation of ZnO without any other intermediate compound such as Zn(OH)2. The formation of various morphologies was correlated to the formation different ratio of Zn2+ and OH- ions and the change in growth direction due to various current densities. PMID:27483766

  8. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  9. Generalized access control strategies for integrated services token passing systems

    NASA Astrophysics Data System (ADS)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  10. Accessing the biocompatibility of layered double hydroxide by intramuscular implantation: histological and microcirculation evaluation

    PubMed Central

    Cunha, Vanessa Roberta Rodrigues; de Souza, Rodrigo Barbosa; da Fonseca Martins, Ana Maria Cristina Rebello Pinto; Koh, Ivan Hong Jun; Constantino, Vera Regina Leopoldo

    2016-01-01

    Biocompatibility of layered double hydroxides (LDHs), also known as hydrotalcite-like materials or double metal hydroxides, was investigated by in vivo assays via intramuscular tablets implantation in rat abdominal wall. The tablets were composed by chloride ions intercalated into LDH of magnesium/aluminum (Mg2Al-Cl) and zinc/aluminum (Zn2Al-Cl). The antigenicity and tissue integration capacity of LDHs were assessed histologically after 7 and 28 days post-implantation. No fibrous capsule nearby the LDH was noticed for both materials as well any sign of inflammatory reactions. Sidestream Dark Field imaging, used to monitor in real time the microcirculation in tissues, revealed overall integrity of the microcirculatory network neighboring the tablets, with no blood flow obstruction, bleeding and/or increasing of leukocyte endothelial adhesion. After 28 days Mg2Al-Cl promoted multiple collagen invaginations (mostly collagen type-I) among its fragments while Zn2Al-Cl induced predominantly collagen type–III. This work supports previous results in the literature about LDHs compatibility with living matter, endorsing them as functional materials for biomedical applications. PMID:27480483

  11. Accessing the biocompatibility of layered double hydroxide by intramuscular implantation: histological and microcirculation evaluation.

    PubMed

    Cunha, Vanessa Roberta Rodrigues; de Souza, Rodrigo Barbosa; da Fonseca Martins, Ana Maria Cristina Rebello Pinto; Koh, Ivan Hong Jun; Constantino, Vera Regina Leopoldo

    2016-01-01

    Biocompatibility of layered double hydroxides (LDHs), also known as hydrotalcite-like materials or double metal hydroxides, was investigated by in vivo assays via intramuscular tablets implantation in rat abdominal wall. The tablets were composed by chloride ions intercalated into LDH of magnesium/aluminum (Mg2Al-Cl) and zinc/aluminum (Zn2Al-Cl). The antigenicity and tissue integration capacity of LDHs were assessed histologically after 7 and 28 days post-implantation. No fibrous capsule nearby the LDH was noticed for both materials as well any sign of inflammatory reactions. Sidestream Dark Field imaging, used to monitor in real time the microcirculation in tissues, revealed overall integrity of the microcirculatory network neighboring the tablets, with no blood flow obstruction, bleeding and/or increasing of leukocyte endothelial adhesion. After 28 days Mg2Al-Cl promoted multiple collagen invaginations (mostly collagen type-I) among its fragments while Zn2Al-Cl induced predominantly collagen type-III. This work supports previous results in the literature about LDHs compatibility with living matter, endorsing them as functional materials for biomedical applications. PMID:27480483

  12. Thalamic control of layer 1 circuits in prefrontal cortex

    PubMed Central

    Cruikshank, Scott J.; Ahmed, Omar J.; Stevens, Tanya R.; Patrick, Saundra L.; Gonzalez, Amalia N.; Elmaleh, Margot; Connors, Barry W.

    2012-01-01

    Knowledge of thalamocortical (TC) processing comes mainly from studying core thalamic systems that project to middle layers of primary sensory cortices. However, most thalamic relay neurons comprise a matrix of cells that are densest in the “nonspecific” thalamic nuclei and usually target layer 1 of multiple cortical areas. A longstanding hypothesis is that matrix TC systems are crucial for regulating neocortical excitability during changing behavioral states, yet we know almost nothing about the mechanisms of such regulation. It is also unclear whether synaptic and circuit mechanisms that are well established for core sensory TC systems apply to matrix TC systems. Here we describe studies of thalamic matrix influences on mouse prefrontal cortex using optogenetic and in vitro electrophysiology techniques. Channelrhodopsin-2 was expressed in midline and paralaminar (matrix) thalamic neurons, and their layer 1-projecting TC axons were activated optically. Contrary to conventional views, we found that matrix TC projections to layer 1 could transmit relatively strong, fast, high-fidelity synaptic signals. Layer 1 TC projections preferentially drove inhibitory interneurons of layer 1, especially those of the late-spiking subtype, and often triggered feedforward inhibition in both layer 1 interneurons and pyramidal cells of layers 2/3. Responses during repetitive stimulation were far more sustained for matrix than for core sensory TC pathways. Thus, matrix TC circuits appear to be specialized for robust transmission over relatively extended periods, consistent with the sort of persistent activation observed during working memory and potentially applicable to state-dependent regulation of excitability. PMID:23223300

  13. Direct intervention of hairpin structures for turbulent boundary-layer control

    NASA Astrophysics Data System (ADS)

    Kang, Yong-Duck; Choi, Kwing-So; Chun, Ho Hwan

    2008-10-01

    Direct intervention of large-scale, outer-layer structures of a turbulent boundary layer has been carried out by counteracting the upwash motion of hairpin vortices with jets issued from a nozzle placed outside the boundary layer. The methodology of this turbulent boundary-layer control is similar in concept to the opposition control of near-wall turbulence, where the induced velocity field of vortical motion during the turbulence activities is opposed by suction and blowing at the wall. Unlike wall-based turbulence control techniques whose time and length scales reduce with an increase in the Reynolds number, scales of the proposed control are those of the outer layer, making this control technique highly practical. Here we show some results from a direct intervention of hairpin structures in a turbulent boundary layer, demonstrating that this is a promising technique for turbulence control.

  14. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  15. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  16. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  17. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  18. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  19. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  20. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... reports.\\10\\ \\1\\ See Exchange Act Release No. 63241 (Nov. 3, 2010), 75 FR 69792 (Nov. 15, 2010) (``Rule... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures...

  1. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Effort-control program for NE...-control program for NE multispecies limited access vessels. (a) Except as provided in §§ 648.17 and 648.82... program described in this section, unless otherwise provided elsewhere in this part. (1) End-of-year...

  2. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    .... 40354 (August 24, 1998), 63 FR 46264 (August 31, 1998) (NASD NTM-98-66). Certain market participants may... subscribers to ATSs, appropriately control the risks associated with market access, so as not to jeopardize... unaware of the trading activity occurring under its market identifier and have no mechanism to control...

  3. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  4. Layered mode selection logic control for border security

    NASA Astrophysics Data System (ADS)

    Born, T.; Ferrer, G.; Wright, A. M.; Wright, A. B.

    2007-04-01

    Challenges in border security may be resolved through a team of autonomous mobile robots configured as a flexible sensor array. The robots will have a prearranged formation along a section of a border, and each robot will attempt to maintain a uniform distance with its nearest neighbors. The robots will carry sensor packages which can detect a signature that is representative of a human (for instance, a thermal signature). When a robot detects an intruder, it will move away such that it attempts to maintain a constant distance from the intruder and move away from the border (i.e. into its home territory). As the robot moves away from the border, its neighbors will move away from the border to maintain a uniform distance with the moving robot and with their fixed neighbors. The pattern of motion in the team of robots can be identified, either algorithmically by a computer or by a human monitor of a display. Unique patterns are indicative of animal movement, human movement, and mass human movement. To realize such a scheme, a new control architecture must be developed. This architecture must be fault tolerant to sensor and manipulator failures, scalable in number of agents, and adaptable to different robotic base platforms (for instance, a UGV may be appropriate at the southern border and a UAV may be appropriate at the northern border). The Central Arkansas Robotics Consortium has developed an architecture, called Layered Mode Selection Logic (LMSL), which addresses all of these concerns. The overall LMSL scheme as applied to a multi-agent flexible sensor array is described in this paper.

  5. Polarizer-free liquid crystal display with double microlens array layers and polarization-controlling liquid crystal layer.

    PubMed

    Lee, You-Jin; Yu, Chang-Jae; Kim, Jae-Hoon

    2015-10-19

    We propose a polarizer-free liquid crystal display (LCD) consisting of two microlens array (MLA) layers, a twisted nematic (TN) LC layer, and two light-blocking masks. By changing the polarization state, focal length of the LCD can be controlled. Since two light-blocking masks have a circular stop pattern and a complementary open pattern, entire gray-scale spectrum may be realized by controlling the intensity of light passing through masks. Ultimately, fast response time characteristics could be achieved due to the alignment of LC molecules on the flat MLA surface. PMID:26480423

  6. Control of magnetic direction in multi-layer ferromagnetic devices by bias voltage

    DOEpatents

    You, Chun-Yeol; Bader, Samuel D.

    2001-01-01

    A system for controlling the direction of magnetization of materials comprising a ferromagnetic device with first and second ferromagnetic layers. The ferromagnetic layers are disposed such that they combine to form an interlayer with exchange coupling. An insulating layer and a spacer layer are located between the first and second ferromagnetic layers. A direct bias voltage is applied to the interlayer exchange coupling, causing the direction of magnetization of the second ferromagnetic layer to change. This change of magnetization direction occurs in the absence of any applied external magnetic field.

  7. A multi-layer robust adaptive fault tolerant control system for high performance aircraft

    NASA Astrophysics Data System (ADS)

    Huo, Ying

    Modern high-performance aircraft demand advanced fault-tolerant flight control strategies. Not only the control effector failures, but the aerodynamic type failures like wing-body damages often result in substantially deteriorate performance because of low available redundancy. As a result the remaining control actuators may yield substantially lower maneuvering capabilities which do not authorize the accomplishment of the air-craft's original specified mission. The problem is to solve the control reconfiguration on available control redundancies when the mission modification is urged to save the aircraft. The proposed robust adaptive fault-tolerant control (RAFTC) system consists of a multi-layer reconfigurable flight controller architecture. It contains three layers accounting for different types and levels of failures including sensor, actuator, and fuselage damages. In case of the nominal operation with possible minor failure(s) a standard adaptive controller stands to achieve the control allocation. This is referred to as the first layer, the controller layer. The performance adjustment is accounted for in the second layer, the reference layer, whose role is to adjust the reference model in the controller design with a degraded transit performance. The upmost mission adjust is in the third layer, the mission layer, when the original mission is not feasible with greatly restricted control capabilities. The modified mission is achieved through the optimization of the command signal which guarantees the boundedness of the closed-loop signals. The main distinguishing feature of this layer is the the mission decision property based on the current available resources. The contribution of the research is the multi-layer fault-tolerant architecture that can address the complete failure scenarios and their accommodations in realities. Moreover, the emphasis is on the mission design capabilities which may guarantee the stability of the aircraft with restricted post

  8. Controlling interlayer diffusion to achieve sustained, multiagent delivery from layer-by-layer thin films

    PubMed Central

    Wood, Kris C.; Chuang, Helen F.; Batten, Robert D.; Lynn, David M.; Hammond, Paula T.

    2006-01-01

    We present the fabrication of conformal, hydrolytically degradable thin films capable of administering sustained, multiagent release profiles. Films are constructed one molecular layer at a time by using the layer-by-layer, directed-deposition technique; the subsequent hydrolytic surface erosion of these systems results in the release of incorporated materials in a sequence that reflects their relative positions in the film. The position of each species is determined by its ability to diffuse throughout the film architecture, and, as such, the major focus of this work is to define strategies that physically block interlayer diffusion during assembly to create multicomponent, stratified films. By using a series of radiolabeled polyelectrolytes as experimental probes, we show that covalently crosslinked barriers can effectively block interlayer diffusion, leading to compartmentalized structures, although even very large numbers of ionically crosslinked (degradable or nondegradable) barrier layers cannot block interlayer diffusion. By using these principles, we designed degradable films capable of extended release as well as both parallel and serial multiagent release. The ability to fabricate multicomponent thin films with nanoscale resolution may lead to a host of new materials and applications. PMID:16801543

  9. Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users

    NASA Astrophysics Data System (ADS)

    Long, Chengnian; Guan, Xinping

    We consider a distributed joint random access and power control scheme for interference management in wireless ad hoc networks. To derive decentralized solutions that do not require any cooperation among the users, we formulate this problem as non-cooperative joint random access and power control game, in which each user minimizes its average transmission cost with a given rate constraint. Using supermodular game theory, the existence and uniqueness of Nash equilibrium are established. Furthermore, we present an asynchronous distributed algorithm to compute the solution of the game based on myopic best response updates, which converges to Nash equilibrium globally.

  10. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  11. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  12. Nonorthogonal CSK/CDMA with Received-Power Adaptive Access Control Scheme

    NASA Astrophysics Data System (ADS)

    Komuro, Nobuyoshi; Habuchi, Hiromasa; Tsuboi, Toshinori

    The measurements for Multiple Access Interference (MAI) problems and the improvement of the data rate are key issues on the advanced wireless networks. In this paper, the nonorthogonal Code Shift Keying Code Division Multiple Access (CSK/CDMA) with received-power adaptive access control scheme is proposed. In our system, a user who is ready to send measures the received power from other users, and then the user decides whether to transmit or refrain from transmission according to the received power and a pre-decided threshold. Not only overcoming the MAI problems, but our system also improve the throughput performance. The throughput performance of the proposed system is evaluated by theoretical analysis. Consequently, the nonorthogonal CSK/CDMA system improves by applying received-power adaptive access control. It was also found that the throughput performance of the nonorthogonal CSK/CDMA system is better than that of the orthogonal CSK/CDMA system at any Eb/N0. We conclude that the nonorthogonal CSK/CDMA system with received-power adaptive access control scheme is expected to be effective in advanced wireless networks.

  13. Toward Federated Security and Data Access Control within a Services Oriented Architecture for Publishing Hydrologic Data

    NASA Astrophysics Data System (ADS)

    Horsburgh, J. S.; Tarboton, D. G.; Schreuders, K.; Patil, K. S.

    2010-12-01

    Academic researchers who manage experimental watersheds, observatories, and research sites need the ability to effectively collect, manage, and publish hydrologic data. This often requires the ability to control and document access to the data. One current mechanism for publishing data from experimental sites uses the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) Hydrologic Information System (HIS). The CUAHSI HIS Project has developed a software stack called HydroServer for publishing hydrologic data. HydroServer relies on a standard relational database schema for storing hydrologic observations, called the Observations Data Model (ODM), a standard set of web services for publishing observations stored in an ODM database, called WaterOneFlow, and a standard XML schema for exchanging hydrologic observations data, called Water Markup Language (WaterML). These standards make is possible for disparate investigators to publish their data as web services within a federated network of HydroServers. Once a HydroServer is operational, all Internet users can access all of the data on the server, with no requirement for users to identify themselves, or restriction on what can be accessed. There are a number of situations where data producers want to take advantage of the organization and functionality that ODM and the HydroServer software stack provides, but without providing unrestricted and unlogged access to all of the data that they are putting on their server. These include the desire of academic data collectors to: 1) control who can access/download data; 2) publish research results based on data before the data are released to the general public; 3) keep track of who is downloading and using their data to evaluate and document its impact on the community; 4) have and use a data use/access agreement and ensure that they get credit and appropriate citation for the data that they publish; 5) expose the best or highest quality data

  14. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  15. Mechanism of power consumption inhibitive multi-layer Zn:SiO2/SiO2 structure resistance random access memory

    NASA Astrophysics Data System (ADS)

    Zhang, Rui; Tsai, Tsung-Ming; Chang, Ting-Chang; Chang, Kuan-Chang; Chen, Kai-Huang; Lou, Jen-Chung; Young, Tai-Fa; Chen, Jung-Hui; Huang, Syuan-Yong; Chen, Min-Chen; Shih, Chih-Cheng; Chen, Hsin-Lu; Pan, Jhih-Hong; Tung, Cheng-Wei; Syu, Yong-En; Sze, Simon M.

    2013-12-01

    In this paper, multi-layer Zn:SiO2/SiO2 structure is introduced to reduce the operation power consumption of resistive random access memory (RRAM) device by modifying the filament formation process. And the configuration of multi-layer Zn:SiO2/SiO2 structure is confirmed and demonstrated by auger electron spectrum. Material analysis together with conduction current fitting is applied to qualitatively evaluate the carrier conduction mechanism on both low resistance state and high resistance state. Finally, single layer and multilayer conduction models are proposed, respectively, to clarify the corresponding conduction characteristics of two types of RRAM devices.

  16. Mechanism of power consumption inhibitive multi-layer Zn:SiO{sub 2}/SiO{sub 2} structure resistance random access memory

    SciTech Connect

    Zhang, Rui; Lou, Jen-Chung; Tsai, Tsung-Ming E-mail: tcchang@mail.phys.nsysu.edu.tw; Chang, Kuan-Chang; Huang, Syuan-Yong; Shih, Chih-Cheng; Pan, Jhih-Hong; Tung, Cheng-Wei; Chang, Ting-Chang E-mail: tcchang@mail.phys.nsysu.edu.tw; Chen, Kai-Huang; Young, Tai-Fa; Chen, Hsin-Lu; Chen, Jung-Hui; Chen, Min-Chen; Syu, Yong-En; Sze, Simon M.

    2013-12-21

    In this paper, multi-layer Zn:SiO{sub 2}/SiO{sub 2} structure is introduced to reduce the operation power consumption of resistive random access memory (RRAM) device by modifying the filament formation process. And the configuration of multi-layer Zn:SiO{sub 2}/SiO{sub 2} structure is confirmed and demonstrated by auger electron spectrum. Material analysis together with conduction current fitting is applied to qualitatively evaluate the carrier conduction mechanism on both low resistance state and high resistance state. Finally, single layer and multilayer conduction models are proposed, respectively, to clarify the corresponding conduction characteristics of two types of RRAM devices.

  17. Sustained, Controlled and Stimuli-Responsive Drug Release Systems Based on Nanoporous Anodic Alumina with Layer-by-Layer Polyelectrolyte.

    PubMed

    Porta-I-Batalla, Maria; Eckstein, Chris; Xifré-Pérez, Elisabet; Formentín, Pilar; Ferré-Borrull, J; Marsal, Lluis F

    2016-12-01

    Controlled drug delivery systems are an encouraging solution to some drug disadvantages such as reduced solubility, deprived biodistribution, tissue damage, fast breakdown of the drug, cytotoxicity, or side effects. Self-ordered nanoporous anodic alumina is an auspicious material for drug delivery due to its biocompatibility, stability, and controllable pore geometry. Its use in drug delivery applications has been explored in several fields, including therapeutic devices for bone and dental tissue engineering, coronary stent implants, and carriers for transplanted cells. In this work, we have created and analyzed a stimuli-responsive drug delivery system based on layer-by-layer pH-responsive polyelectrolyte and nanoporous anodic alumina. The results demonstrate that it is possible to control the drug release using a polyelectrolyte multilayer coating that will act as a gate. PMID:27550052

  18. Basic Performance of a Logic Intellectual Property Compatible Embedded Dynamic Random Access Memory with Cylinder Capacitors in Low-k/Cu Back End on the Line Layers

    NASA Astrophysics Data System (ADS)

    Kume, Ippei; Inoue, Naoya; Hijioka, Ken'ichiro; Kawahara, Jun; Takeda, Kouichi; Furutake, Naoya; Shirai, Hiroki; Kazama, Kenya; Kuwabara, Shin'ichi; Watarai, Msasatoshi; Sakoh, Takashi; Takahashi, Takafumi; Ogura, Takashi; Taiji, Toshiji; Kasama, Yoshiko; Sakamoto, Misato; Hane, Masami; Hayashi, Yoshihiro

    2012-02-01

    We have confirmed the basic performance of a new logic intellectual property (IP) compatible (LIC) embedded dynamic random access memory (eDRAM) with cylinder capacitors in the low-k/Cu back end on the line (BEOL) layers. The LIC-eDRAM reduces the contact (CT) height, or essentially the RC delays due to the parasitic component to the contact. By circuit simulation, a 28-nm-node LIC-eDRAM with the reduced CT height controls the logic delay with Δτd < 5% to that of 28-nm-node standard complementary metal oxide semiconductor (CMOS) logics, enabling us ensure the logic IP compatibility. This was confirmed also by a 40-nm-node LIC-eDRAM test-chip fabricated. The 40-nm-node inverter delays in the test-chip were controlled actually within Δτd < 5%, referred to those of a pure-CMOS logic LSI. Meanwhile the retention time of the DRAM macro was in the range of milliseconds, which has no difference to that of a conventional eDRAM with a capacitor-on-bitline (COB) structure. The LIC-eDRAM is one type of BEOL memory on standard CMOS devices, and is sustainable for widening eDRAM applications combined with a variety of leading-edge CMOS logic IPs, especially beyond 28-nm-nodes.

  19. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  20. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  1. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  2. Resistance switching behavior of ZnO resistive random access memory with a reduced graphene oxide capping layer

    NASA Astrophysics Data System (ADS)

    Lin, Cheng-Li; Chang, Wei-Yi; Huang, Yen-Lun; Juan, Pi-Chun; Wang, Tse-Wen; Hung, Ke-Yu; Hsieh, Cheng-Yu; Kang, Tsung-Kuei; Shi, Jen-Bin

    2015-04-01

    In this work, we investigate the characteristics of ZnO resistive random access memory (RRAM) with a reduced graphene oxide (rGO) capping layer and the polarity effect of the SET/RESET bias on the RRAM. The rGO film insertion enhances the stability of the current-voltage (I-V) switching curve and the superior resistance ratio (˜105) of high-resistance state (HRS) to low-resistance state (LRS). Using the appropriate polarity of the SET/RESET bias applied to the rGO-capped ZnO RRAM enables the oxygen ions to move mainly at the interface of the rGO and ZnO films, resulting in the best performance. Presumably, the rGO film acts as an oxygen reservoir and enhances the easy in and out motion of the oxygen ions from the rGO film. The rGO film also prevents the interaction of oxygen ions and the Al electrode, resulting in excellent performance. In a pulse endurance test, the rGO-capped ZnO RRAM reveals superior endurance of up to 108 cycles over that of the ZnO RRAM without rGO insertion (106 cycles).

  3. Reproductive performance of layer chickens reared on deep litter system with or without access to grass or legume pasture.

    PubMed

    Oke, O E; Ladokun, A O; Onagbesan, O M

    2016-04-01

    Despite several studies carried out to investigate the effects of access to pasture on poultry performance, there is a dearth of information on the comparative benefit of grass and legumes. This study investigated the effects of rearing systems [deep litter system (DL), deep litter with access to legumes (LP) or grass (GP) pastures] on the performance of ISA Brown layers. Two hundred and forty 12-week-old pullets were housed for this study. They were reared until 60 weeks of age. Eighty birds were assigned to each treatment; each treatment had four replicates of 20 birds each. Two birds per replicate were slaughtered at weeks 20, 35 and 58 for determination of the weights of liver, ovary, oviduct and the number of follicles. Daily egg production records were kept from the day of first egg to 42 weeks in lay. Body weights were recorded weekly. Results indicated that at 20 weeks of age, the hens kept in the LP had higher (p < 0.05) ovary weight (g) (34.98 ± 1.4), oviduct weight (52.55 ± 2.28) and oviduct length (cm) (49.73 ± 11.34), and higher number of large yellow follicles (3.75 ± 1.31) and small yellow follicles (12.75 ± 5.17) than those in the GP (0.83 ± 0.02, 1.68 ± 0.19, 16.38 ± 1.14, 0.00 and 0.00), and DL (1.03 ± 0.11, 1.48 ± 0.48, 14.43 ± 0.58, 0.00 and 0.00) respectively. The age (days) at first oviposition was earlier (p < 0.05) in the LP (139.25 ± 0.85) than that in the GP (146.75 ± 0.48) and DL (146.75 ± 0.48). The hen-day egg production was lower (p < 0.05) in GP (74.19 ± 1.25) than that in the DL (78.82 ± 0.78) and LP (79.93 ± 1.13) at mid-laying phase. Concentrate feed intake was lower (p < 0.05) in LP and GP than DL suggesting economic benefit. It was concluded that access to LP enhanced the performance of layers than DL and GP as indicated by the parameters measured. PMID:26122426

  4. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  5. Kinetically Controlled Chemoselective Cyclization Simplifies the Access to Cyclic and Branched Peptides.

    PubMed

    Boll, Emmanuelle; Drobecq, Hervé; Lissy, Elizabeth; Cantrelle, François-Xavier; Melnyk, Oleg

    2016-08-01

    A bis(2-sulfanylethyl)amido group reacts significantly faster with cysteinyl peptides when installed on the C-terminal end of a peptide in comparison with the side-chain of Asp and Glu. This property enabled the design of a kinetically controlled chemoselective peptide cyclization reaction, giving straightforward access to cyclic and branched peptides in one pot. PMID:27398649

  6. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Effort-control program for NE multispecies limited access vessels. 648.82 Section 648.82 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES Management Measures...

  7. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... violation of section 337 in the infringement of certain patents. 73 FR 75131. The principal respondent was... order. 75 FR 44989-90 (July 30, 2010). The Commission also issued cease and desist orders against those... COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers...

  8. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  9. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  10. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  11. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings, and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PERMANENT PROGRAM PERFORMANCE STANDARDS PERMANENT PROGRAM...

  12. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings, and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PERMANENT PROGRAM PERFORMANCE STANDARDS PERMANENT PROGRAM...

  13. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  14. An Application Instance of Fingerprint Identification in the School Office Access Control System

    NASA Astrophysics Data System (ADS)

    Yu, Lijun

    This paper designs the school office access control system by using the fingerprint identification method, and introduces the software design and the adopted hardware modules. These include fingerprint collection, fingerprint image processing, and fingerprint identification and verification. As proved in the experimental results, this design can fully meet the expectation.

  15. Control of Access to Memory: The Use of Task Interference as a Behavioral Probe

    ERIC Educational Resources Information Center

    Loft, Shayne; Humphreys, Michael S.; Whitney, Susannah J.

    2008-01-01

    Directed forgetting and prospective memory methods were combined to examine differences in the control of memory access. Between studying two lists of target words, participants were either instructed to forget the first list, or to continue remembering the first list. After study participants performed a lexical decision task with an additional…

  16. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  17. Longitudinal occupancy of controlled access right-of-way by utilities. A synthesis of highway practice

    SciTech Connect

    Williams, R.L.

    1996-06-01

    This synthesis will be of interest to transportation agency administrators, design engineers, maintenance engineers and maintenance staff, traffic engineers, and safety officials. It will also provide useful information to the utilities and telecommunications industries. Information is presented on the state transportation agencies` policies, practices, and experience associated with occupancy of the rights-of-way on controlled- (or Limited-) access highways.

  18. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  19. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  20. Assembly-Controlled Permeability of Layer-by-Layer Polymeric Microcapsules Using a Tapered Fluidized Bed.

    PubMed

    Noi, Ka Fung; Roozmand, Ali; Björnmalm, Mattias; Richardson, Joseph J; Franks, George V; Caruso, Frank

    2015-12-23

    Nano- and microcapsules engineered through layer-by-layer (LbL) assembly are finding an increasingly large number of applications as catalysts, electrochemical biosensors, bioreactors, artificial cells and drug delivery vehicles. While centrifugation-based LbL assembly is the most common method for coating template particles and preparing capsules, it is a batch process and requires frequent intervention that renders the system challenging to automate and scale up. Here, we report the use of a tapered fluidized bed (TFB) for the preparation of multilayered polymer capsules. This is a significant improvement over our recent approach of fluidizing particles in cylindrical fluidized beds (CFB) for LbL assembly. We demonstrate that TFB is compatible with particles <3 μm in diameter (an order-of-magnitude improvement compared with CFB), which can be fluidized with minimal entrainment. Additionally, layering materials were expanded to include both electrostatic and hydrogen-bonding polymer pairs (e.g., poly(allylamine hydrochloride) (PAH) and poly(styrenesulfonate) (PSS), and thiol-modified poly(methacrylic acid) (PMASH) and poly(N-vinylpyrrolidone) (PVPON), respectively). Finally, differences between capsules prepared via centrifugation-based and TFB LbL assembly were investigated. The obtained TFB microcapsules demonstrate increased film thickness and roughness compared with those prepared using centrifugation-based LbL assembly. Furthermore, PMASH microcapsules exhibit lower swelling and permeability when prepared via TFB LbL assembly compared with centrifugation-based LbL assembly due to enhanced multilayer deposition, entanglement, and cross-linking. Therefore, polymeric capsules fabricated via TFB LbL assembly may be useful for encapsulation and retention of relatively low molecular weight (∼20 kDa) hydrophilic biomacromolecules to passively or responsively release the payload for drug delivery applications. PMID:26651354

  1. Controlled surface functionality of magnetic nanoparticles by layer-by-layer assembled nano-films

    NASA Astrophysics Data System (ADS)

    Choi, Daheui; Son, Boram; Park, Tai Hyun; Hong, Jinkee

    2015-04-01

    Over the past several years, the preparation of functionalized nanoparticles has been aggressively pursued in order to develop desired structures, compositions, and structural order. Among the various nanoparticles, iron oxide magnetic nanoparticles (MNPs) have shown great promise because the material generated using these MNPs can be used in a variety of biomedical applications and possible bioactive functionalities. In this study, we report the development of various functionalized MNPs (F-MNPs) generated using the layer-by-layer (LbL) self-assembly method. To provide broad functional opportunities, we fabricated F-MNP bio-toolbox by using three different materials: synthetic polymers, natural polymers, and carbon materials. Each of these F-MNPs displays distinct properties, such as enhanced thickness or unique morphologies. In an effort to explore their biomedical applications, we generated basic fibroblast growth factor (bFGF)-loaded F-MNPs. The bFGF-loaded F-MNPs exhibited different release mechanisms and loading amounts, depending on the film material and composition order. Moreover, bFGF-loaded F-MNPs displayed higher biocompatibility and possessed superior proliferation properties than the bare MNPs and pure bFGF, respectively. We conclude that by simply optimizing the building materials and the nanoparticle's film composition, MNPs exhibiting various bioactive properties can be generated.Over the past several years, the preparation of functionalized nanoparticles has been aggressively pursued in order to develop desired structures, compositions, and structural order. Among the various nanoparticles, iron oxide magnetic nanoparticles (MNPs) have shown great promise because the material generated using these MNPs can be used in a variety of biomedical applications and possible bioactive functionalities. In this study, we report the development of various functionalized MNPs (F-MNPs) generated using the layer-by-layer (LbL) self-assembly method. To provide

  2. Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    SciTech Connect

    Lehman, Tom; Ghani, Nasir; Boyd, Eric

    2010-08-31

    At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including OSCARS layer2 and InterDomain Adaptation, Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, Control plane software release, Scheduling, AAA, security architecture, Network Virtualization architecture, Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

  3. Tailoring polarity in a layered nickelate with single atomic layer control

    NASA Astrophysics Data System (ADS)

    Bhattacharya, Anand; Nelson-Cheeseman, Brittany; Zhou, Hua; Balachandran, Prasanna; Fabbris, Gilberto; Hoffman, Jason; Haskel, Daniel; Rondinelli, James

    2014-03-01

    Many of the 3d transition metal oxides share a common structural MO6 building unit--a central transition metal (TM) cation octahedrally coordinated with oxygen nearest neighbors. The electronic states in these materials can be modified by tailoring the M-O bonds, which typically include the application of epitaxial strain in thin films, or pressure and isovalent cation substitution in bulk samples. Here, we present a new route to tailor the M-O bonds without changes to the strain state or stoichiometry in two-dimensional perovskite nickelate (n =1 in the Ruddlesden Popper series). We do this by tailoring the dipolar electrostatic interactions at the unit cell level in nominally non-polar LaSrNiO4 via single atomic layer-by-layer synthesis using oxide-MBE. We reconstruct the response of the crystal lattice to the induced polarity using a x-ray phase retrieval technique (COBRA). We find that the response of the O anions to the resulting local electric fields distorts the M-O bonds, being largest for the apical oxygens (Oap) . It also alters the Ni valence.

  4. Distributed data access in the LAMPF (Los Alamos Meson Physics Facility) control system

    SciTech Connect

    Schaller, S.C.; Bjorklund, E.A.

    1987-01-01

    We have extended the Los Alamos Meson Physics Facility (LAMPF) control system software to allow uniform access to data and controls throughout the control system network. Two aspects of this work are discussed here. Of primary interest is the use of standard interfaces and standard messages to allow uniform and easily expandable inter-node communication. A locally designed remote procedure call protocol will be described. Of further interest is the use of distributed databases to allow maximal hardware independence in the controls software. Application programs use local partial copies of the global device description database to resolve symbolic device names.

  5. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  6. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  7. The Virtual Jason Control Van: A GeoBrowser Application for Automatic Data Cataloging and Access

    NASA Astrophysics Data System (ADS)

    Lerner, S.

    2001-12-01

    Today's scientific underwater remotely operated vehicles (ROVs) generate a tremendous amount of data collected from a variety of sensors in real-time. Often integrated information such as multiple video streams, vehicle telemetry, and scientific data are only available to the users in the ROV control-van during real-time operations. Although all the data is logged, it is extremely difficult for scientists to re-create this integrated information and have the ability to view and access an entire cruise dataset in an integrated fashion. We introduce a methodology of taking real-time information snapshots during events that occur within the ROV control-van and using these snapshots for data access and analysis. We take control-van snapshots during "interesting" events as defined whenever a scientist enters an event via a computer, and we also take snapshots at regular time intervals such as once a minute to ensure complete data coverage. As part of the JasonII ROV upgrade, we have developed a prototype system that automatically captures the information in the control-van during ROV operations including up to four simultaneous video sources, vehicle data, scientific instrument data, and event data. These control-van snapshots are automatically cataloged and immediately accessible and searchable via a web-browser. The system is designed for both scientific and public outreach needs and will be integrated with the SeaNet system to provide remote access on-shore for scientific collaboration and public outreach. During this past year, the prototype system has been deployed on four Jason cruises and has captured over 40,000 control-van snapshots, containing more than 160,000 images. Each control-van snapshot seamlessly integrates the four simultaneous video snapshots with vehicle data such as navigation, depth, and heading, scientific instrument data from instruments such as a ctd and a magnetometer, and event data as entered by scientists. All this information is

  8. Controllable layer-by-layer assembly of PVA and phenylboronic acid-derivatized chitosan.

    PubMed

    Zhang, Dan; Yu, Guanghua; Long, Zhu; Yang, Guihua; Wang, Bin

    2016-04-20

    Phenylboronic acid-derivatized chitosan (chitosan-PBA) were prepared by grafting small molecules bearing phenylboronic acid groups onto chitosan with N-hydroxysuccinimide (NHS) and N-(3-dimethylaminopropyl)-N'-ethylcarbodiimide hydrochloride (EDC) as a coupling reagent pair. Self-assembly multilayer thin films of chitosan-PBA and poly(vinyl alcohol) were subsequently produced under pH control on supporting surfaces, either a silicon wafer or polystyrene latex particles. The driving force of the self-assembly was the ester formation of phenylboronic acid containing polymers with PVA, which can be "turned off" by simple pH control. PMID:26876848

  9. Controlled Substances Add New Layer to E-Prescribing.

    PubMed

    Kaldy, Joanne

    2016-01-01

    The Electronic Prescriptions for Controlled Substances (EPCS) program was established by the Drug Enforcement Administration to allow health facilities to use electronic transmission and other modern technology for prescribing controlled substances and replacing old technology such as fax. Its goal is to eliminate fraud, abuse, and diversion of controlled medications while streamlining the processes of making them more easily available to patients in need. While rules regarding EPCS have the potential to improve care and give practitioners more data for quality improvement, they also may create new challenges for practitioners, facilities, and vendors alike. All stakeholders need to work together to ensure effective, efficient EPCS systems. PMID:27056356

  10. Active/Passive Control of Sound Radiation from Panels using Constrained Layer Damping

    NASA Technical Reports Server (NTRS)

    Gibbs, Gary P.; Cabell, Randolph H.

    2003-01-01

    A hybrid passive/active noise control system utilizing constrained layer damping and model predictive feedback control is presented. This system is used to control the sound radiation of panels due to broadband disturbances. To facilitate the hybrid system design, a methodology for placement of constrained layer damping which targets selected modes based on their relative radiated sound power is developed. The placement methodology is utilized to determine two constrained layer damping configurations for experimental evaluation of a hybrid system. The first configuration targets the (4,1) panel mode which is not controllable by the piezoelectric control actuator, and the (2,3) and (5,2) panel modes. The second configuration targets the (1,1) and (3,1) modes. The experimental results demonstrate the improved reduction of radiated sound power using the hybrid passive/active control system as compared to the active control system alone.

  11. Control and reduction of unsteady pressure loads in separated shock wave turbulent boundary layer interaction

    NASA Technical Reports Server (NTRS)

    Dolling, David S.; Barter, John W.

    1995-01-01

    The focus was on developing means of controlling and reducing unsteady pressure loads in separated shock wave turbulent boundary layer interactions. Section 1 describes how vortex generators can be used to effectively reduce loads in compression ramp interaction, while Section 2 focuses on the effects of 'boundary-layer separators' on the same interaction.

  12. Demonstration of Symmetry Control of Infrared Heated Deuterium Layers in Hohlraums

    SciTech Connect

    Koziozieski, B J; London, R A; McEachern, R L; Bittner, D N

    2003-08-22

    Infrared smoothed deuterium ice layers inside capsules have been successfully demonstrated for capsules inside cylindrical hohlraums. Improved characterization methods and infrared illumination enables low mode control in both the axial and azimuthal directions. Experimental results agree well with computer models. Results of these experiments will be used to derive accuracy requirements for an infrared heating system for ice layers in hohlraums on NIF.

  13. Multi-layer neural networks for robot control

    NASA Technical Reports Server (NTRS)

    Pourboghrat, Farzad

    1989-01-01

    Two neural learning controller designs for manipulators are considered. The first design is based on a neural inverse-dynamics system. The second is the combination of the first one with a neural adaptive state feedback system. Both types of controllers enable the manipulator to perform any given task very well after a period of training and to do other untrained tasks satisfactorily. The second design also enables the manipulator to compensate for unpredictable perturbations.

  14. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  15. Controlled-release fertilizer composition substantially coated with an impermeable layer

    DOEpatents

    Ankeny, Mark

    2016-03-29

    A controlled-release fertilizer composition is provided that is substantially coated with an impermeable layer. The fertilizer composition may further include one or more hollow sections to allow for root penetration and efficient delivery of nutrients.

  16. Scalable control program for multiprecursor flow-type atomic layer deposition system

    SciTech Connect

    Selvaraj, Sathees Kannan; Takoudis, Christos G.

    2015-01-01

    The authors report the development and implementation of a scalable control program to control flow type atomic layer deposition (ALD) reactor with multiple precursor delivery lines. The program logic is written and tested in LABVIEW environment to control ALD reactor with four precursor delivery lines to deposit up to four layers of different materials in cyclic manner. The programming logic is conceived such that to facilitate scale up for depositing more layers with multiple precursors and scale down for using single layer with any one precursor in the ALD reactor. The program takes precursor and oxidizer exposure and purging times as input and controls the sequential opening and closing of the valves to facilitate the complex ALD process in cyclic manner. The program could be used to deposit materials from any single line or in tandem with other lines in any combination and in any sequence.

  17. A Simple Approach for Molecular Controlled Release based on Atomic Layer Deposition Hybridized Organic-Inorganic Layers

    NASA Astrophysics Data System (ADS)

    Boehler, Christian; Güder, Firat; Kücükbayrak, Umut M.; Zacharias, Margit; Asplund, Maria

    2016-01-01

    On-demand release of bioactive substances with high spatial and temporal control offers ground-breaking possibilities in the field of life sciences. However, available strategies for developing such release systems lack the possibility of combining efficient control over release with adequate storage capability in a reasonably compact system. In this study we present a new approach to target this deficiency by the introduction of a hybrid material. This organic-inorganic material was fabricated by atomic layer deposition of ZnO into thin films of polyethylene glycol, forming the carrier matrix for the substance to be released. Sub-surface growth mechanisms during this process converted the liquid polymer into a solid, yet water-soluble, phase. This layer permits extended storage for various substances within a single film of only a few micrometers in thickness, and hence demands minimal space and complexity. Improved control over release of the model substance Fluorescein was achieved by coating the hybrid material with a conducting polymer film. Single dosage and repetitive dispensing from this system was demonstrated. Release was controlled by applying a bias potential of ±0.5 V to the polymer film enabling or respectively suppressing the expulsion of the model drug. In vitro tests showed excellent biocompatibility of the presented system.

  18. A Simple Approach for Molecular Controlled Release based on Atomic Layer Deposition Hybridized Organic-Inorganic Layers

    PubMed Central

    Boehler, Christian; Güder, Firat; Kücükbayrak, Umut M.; Zacharias, Margit; Asplund, Maria

    2016-01-01

    On-demand release of bioactive substances with high spatial and temporal control offers ground-breaking possibilities in the field of life sciences. However, available strategies for developing such release systems lack the possibility of combining efficient control over release with adequate storage capability in a reasonably compact system. In this study we present a new approach to target this deficiency by the introduction of a hybrid material. This organic-inorganic material was fabricated by atomic layer deposition of ZnO into thin films of polyethylene glycol, forming the carrier matrix for the substance to be released. Sub-surface growth mechanisms during this process converted the liquid polymer into a solid, yet water-soluble, phase. This layer permits extended storage for various substances within a single film of only a few micrometers in thickness, and hence demands minimal space and complexity. Improved control over release of the model substance Fluorescein was achieved by coating the hybrid material with a conducting polymer film. Single dosage and repetitive dispensing from this system was demonstrated. Release was controlled by applying a bias potential of ±0.5 V to the polymer film enabling or respectively suppressing the expulsion of the model drug. In vitro tests showed excellent biocompatibility of the presented system. PMID:26791399

  19. A Simple Approach for Molecular Controlled Release based on Atomic Layer Deposition Hybridized Organic-Inorganic Layers.

    PubMed

    Boehler, Christian; Güder, Firat; Kücükbayrak, Umut M; Zacharias, Margit; Asplund, Maria

    2016-01-01

    On-demand release of bioactive substances with high spatial and temporal control offers ground-breaking possibilities in the field of life sciences. However, available strategies for developing such release systems lack the possibility of combining efficient control over release with adequate storage capability in a reasonably compact system. In this study we present a new approach to target this deficiency by the introduction of a hybrid material. This organic-inorganic material was fabricated by atomic layer deposition of ZnO into thin films of polyethylene glycol, forming the carrier matrix for the substance to be released. Sub-surface growth mechanisms during this process converted the liquid polymer into a solid, yet water-soluble, phase. This layer permits extended storage for various substances within a single film of only a few micrometers in thickness, and hence demands minimal space and complexity. Improved control over release of the model substance Fluorescein was achieved by coating the hybrid material with a conducting polymer film. Single dosage and repetitive dispensing from this system was demonstrated. Release was controlled by applying a bias potential of ± 0.5 V to the polymer film enabling or respectively suppressing the expulsion of the model drug. In vitro tests showed excellent biocompatibility of the presented system. PMID:26791399

  20. Controlled Access Headings in EAD Finding Aids: Current Practices in Number of and Types of Headings Assigned

    ERIC Educational Resources Information Center

    Mascaro, Michelle

    2011-01-01

    This article presents the findings from a study of controlled access headings assigned to encoded archival description finding aids in the Ohio Library and Information Network Finding Aid Repository, focusing on the number of headings per finding aid and the category of terms assigned. Assigning multiple controlled access headings was widely…

  1. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  2. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  3. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  4. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  5. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    NASA Astrophysics Data System (ADS)

    Gibbon, T. B.; Osadchiy, A. V.; Kjær, R.; Jensen, J. B.; Monroy, I. Tafur

    2009-06-01

    Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 2 31-1 PRBS pattern. The results suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient control in WDM access networks.

  6. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  7. Reducing operation voltages by introducing a low-k switching layer in indium–tin-oxide-based resistance random access memory

    NASA Astrophysics Data System (ADS)

    Jin, Fu-Yuan; Chang, Kuan-Chang; Chang, Ting-Chang; Tsai, Tsung-Ming; Pan, Chih-Hung; Lin, Chih-Yang; Chen, Po-Hsun; Chen, Min-Chen; Huang, Hui-Chun; Lo, Ikai; Zheng, Jin-Cheng; Sze, Simon M.

    2016-06-01

    In this letter, we inserted a low dielectric constant (low-k) or high dielectric constant (high-k) material as a switching layer in indium–tin-oxide-based resistive random-access memory. After measuring the two samples, we found that the low-k material device has very low operating voltages (‑80 and 110 mV for SET and RESET operations, respectively). Current fitting results were then used with the COMSOL software package to simulate electric field distribution in the layers. After combining the electrical measurement results with simulations, a conduction model was proposed to explain resistance switching behaviors in the two structures.

  8. Layer-specific cholinergic control of human and mouse cortical synaptic plasticity.

    PubMed

    Verhoog, Matthijs B; Obermayer, Joshua; Kortleven, Christian A; Wilbers, René; Wester, Jordi; Baayen, Johannes C; De Kock, Christiaan P J; Meredith, Rhiannon M; Mansvelder, Huibert D

    2016-01-01

    Individual cortical layers have distinct roles in information processing. All layers receive cholinergic inputs from the basal forebrain (BF), which is crucial for cognition. Acetylcholinergic receptors are differentially distributed across cortical layers, and recent evidence suggests that different populations of BF cholinergic neurons may target specific prefrontal cortical (PFC) layers, raising the question of whether cholinergic control of the PFC is layer dependent. Here we address this issue and reveal dendritic mechanisms by which endogenous cholinergic modulation of synaptic plasticity is opposite in superficial and deep layers of both mouse and human neocortex. Our results show that in different cortical layers, spike timing-dependent plasticity is oppositely regulated by the activation of nicotinic acetylcholine receptors (nAChRs) either located on dendrites of principal neurons or on GABAergic interneurons. Thus, layer-specific nAChR expression allows functional layer-specific control of cortical processing and plasticity by the BF cholinergic system, which is evolutionarily conserved from mice to humans. PMID:27604129

  9. Dramatic reduction of read disturb through pulse width control in spin torque random access memory

    NASA Astrophysics Data System (ADS)

    Wang, Zihui; Wang, Xiaobin; Gan, Huadong; Jung, Dongha; Satoh, Kimihiro; Lin, Tsann; Zhou, Yuchen; Zhang, Jing; Huai, Yiming; Chang, Yao-Jen; Wu, Te-ho

    2013-09-01

    Magnetizations dynamic effect in low current read disturb region is studied both experimentally and theoretically. Dramatic read error rate reduction through read pulse width control is theoretically predicted and experimentally observed. The strong dependence of read error rate upon pulse width contrasts conventional energy barrier approach and can only be obtained considering detailed magnetization dynamics at long time thermal magnetization reversal region. Our study provides a design possibility for ultra-fast low current spin torque random access memory.

  10. Photoluminescence-based quality control for thin film absorber layers of photovoltaic devices

    DOEpatents

    Repins, Ingrid L.; Kuciauskas, Darius

    2015-07-07

    A time-resolved photoluminescence-based system providing quality control during manufacture of thin film absorber layers for photovoltaic devices. The system includes a laser generating excitation beams and an optical fiber with an end used both for directing each excitation beam onto a thin film absorber layer and for collecting photoluminescence from the absorber layer. The system includes a processor determining a quality control parameter such as minority carrier lifetime of the thin film absorber layer based on the collected photoluminescence. In some implementations, the laser is a low power, pulsed diode laser having photon energy at least great enough to excite electron hole pairs in the thin film absorber layer. The scattered light may be filterable from the collected photoluminescence, and the system may include a dichroic beam splitter and a filter that transmit the photoluminescence and remove scattered laser light prior to delivery to a photodetector and a digital oscilloscope.

  11. Effect of Opaque Layer Application on the Color of Resin Composites Used to Fill Access Openings of Screw-Retained Implant Restorations.

    PubMed

    Cakan, Umut; Kara, Haluk Baris

    2015-01-01

    The purpose of this preliminary in vitro study was to evaluate the effect of an opaque layer and application of resin composite in dual colors on the ΔE values of resin composites used to fill access openings of screw-retained implant restorations. Sixty cylindrical nickel-chromium metal molds with a central channel simulating a posterior screw-retained, implant-supported, porcelain-fused-to-metal crown were cast. Access openings were filled with combinations of opaquer, enamel composite (A2E), dentin composite (A2B and A3B), and resilient composite. ΔE values differed significantly among the groups (P<.01). The combination of opaque layer and dual color resin composites of shades A2E and A3B resulted in significantly lower ΔE values than the other groups (P<.01). PMID:26218028

  12. Design and analysis of a new AUV's sliding control system based on dynamic boundary layer

    NASA Astrophysics Data System (ADS)

    Gao, Fudong; Pan, Cunyun; Han, Yanyan

    2013-01-01

    The new AUV driven by multi-vectored thrusters not only has unique kinematic characteristics during the actual cruise but also exists uncertain factors such as hydrodynamic coefficients perturbation and unknown interference of tail fluid, which bring difficult to the stability of the AUV's control system. In order to solve the nonlinear term and unmodeled dynamics existing in the new AUV's attitude control and the disturbances caused by the external marine environment, a second-order sliding mode controller with double-loop structure that considering the dynamic characteristics of the rudder actuators is designed, which improves the robustness of the system and avoids the control failure caused by the problem that the design theory of the sliding mode controller does not match with the actual application conditions. In order to avoid the loss of the sliding mode caused by the amplitude and rate constraints of the rudder actuator in the new AUV's attitude control, the dynamic boundary layer method is used to adjust the sliding boundary layer thickness so as to obtain the best anti-chattering effects. Then the impacts of system parameters, rudder actuator's constraints and boundary layer on the sliding mode controller are computed and analyzed to verify the effectiveness and robustness of the sliding mode controller based on dynamic boundary layer. The computational results show that the original divergent second-order sliding mode controller can still effectively implement the AUV's attitude control through dynamically adjusting the sliding boundary layer thickness. The dynamic boundary layer method ensures the stability of the system and does not exceed the amplitude constraint of the rudder actuator, which provides a theoretical guidance and technical support for the control system design of the new AUV in real complex sea conditions.

  13. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    PubMed

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care. PMID:22732236

  14. MPEG-21 as an access control tool for the National Health Service Care Records Service.

    PubMed

    Brox, Georg A

    2005-01-01

    Since the launch of the National Health Service (NHS) Care Records Service with plans to share patient information across England, there has been an emphasis on the need for manageable access control methods. MPEG-21 is a structured file format which includes an Intellectual Property Management and Protection (IPMP) function using XML to present all digitally stored items in the patient record. Using DICreator software, patient records consisting of written text, audio-recordings, non-X-ray digital imaging and video sequences were linked up successfully. Audio records were created using Talk-Back 2002 to standardize and optimize recording quality. The recorded reports were then linked and archived using iTunes. A key was used each time the file was displayed to secure access to confidential patient data. The building of the correct file structure could be monitored during the entire creation of the file. The results demonstrated the ability to ensure secure access of the MPEG-21 file by both health-care professionals and patients by use of different keys and a specific MPEG-21 browser. The study also showed that the enabling of IPMP will provide accurate audit trails to authenticate appropriate access to medical information. PMID:16035983

  15. Differential domain accessibility to monoclonal antibodies in three different morphological assemblies built up by the S-layer protein of Thermus thermophilus HB8.

    PubMed Central

    Castón, J R; Olabarría, G; Lasa, I; Carrascosa, J L; Berenguer, J

    1996-01-01

    A collection of 27 monoclonal antibodies (MAbs) against the S-layer protein (P100) of Thermus thermophilus HB8 has been obtained. They have been classified according to their ability to recognize S-layer regions expressed in E. coli from plasmids containing different fragments of its coding gene, slpA. The accessibility of the binding sites in hexagonal, trigonal, or tetragonal assemblies of P100 was analyzed by enzyme-linked immunosorbent assays with six of these MAbs and their respective Fab fragments. When packed hexagonally as the native S-layer (S1 assemblies), only a small region located near the amino terminus of the P1OO was accessible. However, when P1OO was assembled into trigonal (pS2 assemblies) or tetragonal (S2 assemblies) arrays, most of the protein domains analyzed were easily detected, thus suggesting that P1OO is assembled in S2 and pS2 in a similar way and that these two arrangements are quite different from the S1 assembly. Relationships between accessibility and sequence predictions are discussed. PMID:8655568

  16. Improving the prediction accuracy of residue solvent accessibility and real-value backbone torsion angles of proteins by guided-learning through a two-layer neural network

    PubMed Central

    Faraggi, Eshel; Xue, Bin; Zhou, Yaoqi

    2008-01-01

    This paper attempts to increase the prediction accuracy of residue solvent accessibility and real-value backbone torsion angles of proteins through improved learning. Most methods developed for improving the backpropagation algorithm of artificial neural networks are limited to small neural networks. Here, we introduce a guided-learning method suitable for networks of any size. The method employs a part of the weights for guiding and the other part for training and optimization. We demonstrate this technique by predicting residue solvent accessibility and real-value backbone torsion angles of proteins. In this application, the guiding factor is designed to satisfy the intuitive condition that for most residues, the contribution of a residue to the structural properties of another residue is smaller for greater separation in the protein-sequence distance between the two residues. We show that the guided-learning method makes a 2-4% reduction in ten-fold cross-validated mean absolute errors (MAE) for predicting residue solvent accessibility and backbone torsion angles, regardless of the size of database, the number of hidden layers and the size of input windows. This together with introduction of two-layer neural network with a bipolar activation function leads to a new method that has a MAE of 0.11 for residue solvent accessibility, 36° for ψ, and 22° for ϕ. The method is available as a Real-SPINE 3.0 server in http://sparks.informatics.iupui.edu. PMID:18704931

  17. Controlled Exfoliation of Layered Silicate Heterostructures into Bilayers and Their Conversion into Giant Janus Platelets.

    PubMed

    Stöter, Matthias; Gödrich, Sebastian; Feicht, Patrick; Rosenfeldt, Sabine; Thurn, Herbert; Neubauer, Jens W; Seuss, Maximilian; Lindner, Peter; Kalo, Hussein; Möller, Michael; Fery, Andreas; Förster, Stephan; Papastavrou, Georg; Breu, Josef

    2016-06-20

    Ordered heterostructures of layered materials where interlayers with different reactivities strictly alternate in stacks offer predetermined slippage planes that provide a precise route for the preparation of bilayer materials. We use this route for the synthesis of a novel type of reinforced layered silicate bilayer that is 15 % stiffer than the corresponding monolayer. Furthermore, we will demonstrate that triggering cleavage of bilayers by osmotic swelling gives access to a generic toolbox for an asymmetrical modification of the two vis-à-vis standing basal planes of monolayers. Only two simple steps applying arbitrary commercial polycations are needed to obtain such Janus-type monolayers. The generic synthesis route will be applicable to many other layered compounds capable of osmotic swelling, rendering this approach interesting for a variety of materials and applications. PMID:27140654

  18. Hypertension Detection, Management, Control and Associated Factors Among Residents Accessing Community Health Services In Beijing

    PubMed Central

    JIANG, Bin; LIU, Hongmei; RU, Xiaojuan; ZHANG, Hui; WU, Shengping; WANG, Wenzhi

    2014-01-01

    The aim of this study was to analyse high blood pressure detection, management, control and associated factors among residents accessing community health services (CHSs) in Beijing. We screened for HBP in 9524 individuals aged 50 years or older who accessed care in four Beijing CHSs. Among the 9397 residents with questionnaire responses that qualified them for inclusion in the study, 5029 patients with HBP were identified, 1510 (i.e., 30% of the HBP patient group) of whom were newly identified cases. The rate of hypertension detection was 53.5%. Among the 5029 HBP patients, the rates of awareness, treatment and control of hypertension were 70.0%, 62.1% and 29.6%, respectively. In general, the rate of hypertension control was higher when the rates of hypertension awareness and treatment were higher in subgroups stratified by different sociodemographic and risk factors, except for the overweight and obesity subgroups. In conclusion, suboptimal HBP awareness, treatment, and control are still major problems confronting CHSs in Beijing. Control of hypertension in the population may be improved by increasing awareness and improving the treatment of hypertension in CHSs. PMID:24784167

  19. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  20. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    PubMed Central

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  1. Turbulent boundary-layer control with spanwise travelling waves

    NASA Astrophysics Data System (ADS)

    Whalley, Richard D.; Choi, Kwing-So

    2011-12-01

    It has been demonstrated through numerical simulations using Lorentz forcing that spanwise travelling waves on turbulent wall flows can lead to a skin-friction drag reduction on the order of 30%. As an aeronautical application of this innovative flow control technique, we have investigated into the use of Dielectric-Barrier-Discharge (DBD) plasma actuators to generate spanwise travelling waves in air. The near-wall structures modified by the spanwise travelling waves were studied using the PIV technique in a wind tunnel, while the associated turbulence statistics were carefully documented using hot-wire anemometry. We observed the spreading of low-speed fluid by the spanwise travelling streamwise vortices, which seems to have greatly attenuated the turbulence production process. This is very much in line with the finding of DNS studies, where wide low-speed ribbons replaced the low-speed streaks.

  2. Control of the morphology of lipid layers by substrate surface chemistry.

    PubMed

    Granqvist, Niko; Yliperttula, Marjo; Välimäki, Salla; Pulkkinen, Petri; Tenhu, Heikki; Viitala, Tapani

    2014-03-18

    In this study, surface coatings were used to control the morphology of the deposited lipid layers during vesicle spreading, i.e., to control if liposomes self-assemble on a surface into a supported lipid bilayer or a supported vesicular layer. The influence of the properties of the surface coating on formation of the deposited lipid layer was studied with quartz crystal microbalance and two-wavelength multiparametric surface plasmon resonance techniques. Control of lipid self-assembly on the surface was achieved by two different types of soft substrate materials, i.e., dextran and thiolated polyethylene glycol, functionalized with hydrophobic linkers for capturing the lipid layer. The low-molecular-weight dextran-based surface promoted formation of supported lipid bilayers, while the thiolated polyethylene glycol-based surface promoted supported vesicular layer formation. A silicon dioxide surface was used as a reference surface in both measurement techniques. In addition to promoting supported lipid bilayer formation of known lipid mixtures, the dextran surface also promoted supported lipid bilayer formation of vesicles containing the cell membrane extract of human hepatoblastoma cells. The new dextran-based surface was also capable of protecting the supported lipid bilayer against dehydration when exposed to a constant flow of air. The well-established quartz crystal microbalance technique was effective in determining the morphology of the formed lipid layer, while the two-wavelength surface plasmon resonance analysis enabled further complementary characterization of the adsorbed supported lipid bilayers and supported vesicular layers. PMID:24564782

  3. A network access control framework for 6LoWPAN networks.

    PubMed

    Oliveira, Luís M L; Rodrigues, Joel J P C; de Sousa, Amaro F; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  4. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  5. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  6. An interaction-based access control model (IBAC) for collaborative services

    SciTech Connect

    Altunay, Mine; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  7. Sensored Field Oriented Control of a Robust Induction Motor Drive Using a Novel Boundary Layer Fuzzy Controller

    PubMed Central

    Saghafinia, Ali; Ping, Hew Wooi; Uddin, Mohammad Nasir

    2013-01-01

    Physical sensors have a key role in implementation of real-time vector control for an induction motor (IM) drive. This paper presents a novel boundary layer fuzzy controller (NBLFC) based on the boundary layer approach for speed control of an indirect field-oriented control (IFOC) of an induction motor (IM) drive using physical sensors. The boundary layer approach leads to a trade-off between control performances and chattering elimination. For the NBLFC, a fuzzy system is used to adjust the boundary layer thickness to improve the tracking performance and eliminate the chattering problem under small uncertainties. Also, to eliminate the chattering under the possibility of large uncertainties, the integral filter is proposed inside the variable boundary layer. In addition, the stability of the system is analyzed through the Lyapunov stability theorem. The proposed NBLFC based IM drive is implemented in real-time using digital signal processor (DSP) board TI TMS320F28335. The experimental and simulation results show the effectiveness of the proposed NBLFC based IM drive at different operating conditions.

  8. New Large-scale Control Strategies for Turbulent Boundary Layers

    NASA Astrophysics Data System (ADS)

    Schoppa, Wade; Hussain, Fazle

    1997-11-01

    Using direct numerical simulations of turbulent channel flow, we present robust strategies for drag reduction by prevention of streamwise vortex formation near the wall. Instability of lifted, vortex-free low-speed streaks is shown to generate new streamwise vortices, which dominate near-wall turbulence phenomena. The newly-found instability mechanism initiates streak waviness in the (x,z) plane which leads to ωx sheets. Streak waviness induces positive partial u/partial x (i.e. positive VISA) which causes these sheets to then collapse via stretching (rather than roll up) into streamwise vortices. Significantly, the 3D features of the (instantaneous) instability-generated vortices agree well with the coherent structures educed (i.e. ensemble-averaged) from fully turbulent flow, suggesting the prevalence of this instability mechanism. The new control via large-scale streak manipulation exploits this crucial role of streak instability in vortex generation. An x-independent forcing with a z wavelength of 4 streak spacings, with an amplitude of only 5% of the centerline velocity, produces a significant sustained drag reduction: 20% for imposed counterrotating large-scale swirls and 50% for colliding spanwise wall jet-like forcing. These results suggest promising drag reduction strategies, involving large-scale (hence more durable) actuation and requiring no wall sensors or feedback logic.

  9. Ferroelectric control of magnetic domains in ultra-thin cobalt layers

    SciTech Connect

    Huang, Z.; Stolichnov, I.; Setter, N.; Bernand-Mantel, A.; Borrel, J.; Pizzini, S.; Ranno, L.; Herrera Diez, L.; Auffret, S.; Gaudin, G.; Boulle, O.

    2013-11-25

    Non-volatile ferroelectric control of magnetic domains has been demonstrated in ultra-thin cobalt layers at room temperature. The sensitivity of magnetic anisotropy energy to the electronic structure in a few atomic layers adjacent to the interface allows for ferroelectric control of coercivity and magnetic domain dynamics. These effects have been monitored and quantified using magneto-optical Kerr effect. In particular, the regimes, where the ferroelectric domains enhance/inhibit the magnetic domain nucleation or increase/reduce domain wall velocity, have been explored. Thus, non-destructive and reversible ferroelectric domain writing provides a tool to define the magnetic domain paths, create nucleation sites, or control domain movement.

  10. Controlling gas diffusion layer oxidation by homogeneous hydrophobic coating for polymer electrolyte fuel cells

    NASA Astrophysics Data System (ADS)

    Hiramitsu, Yusuke; Sato, Hitoshi; Kobayashi, Kenji; Hori, Michio

    Reduced production costs and enhanced durability are necessary for practical application of polymer electrolyte fuel cells. There has been a great deal of concern about degradation of the gas diffusion layer located outside the membrane electrode assembly. However, very few studies have been carried out on the degradation process, and no suitable methods for improving the durability of the cell have been found. In this work, the influence on the cell performance and factors involved in the degradation of the gas diffusion layer has been clarified through power generation tests. Long-term power generation tests on single cells for 6000 h were carried out under high humidity conditions with homogeneous and inhomogeneous hydrophobic coating gas diffusion layers. The results showed that the increase in the diffusion overvoltage from the gas diffusion layer could be controlled by the use of a homogeneous coating. Post-analyses indicated that this occurred by controlling oxidation of the carbon fiber.

  11. Control and optimization of sealing layer in films

    NASA Astrophysics Data System (ADS)

    Najarzadeh, Zahra

    Heat sealing is the process to achieve the hermetic closure of a package by applying heat and pressure on two polymer films for a specified dwell time. The heat sealing process has been used in packaging of a wide spectrum of products, in particular for food packaging. During the past two decades, heat sealing machinery has been developed for very high speed line production which requires very precise process condition and material optimization. Heat seal process conditions, including temperature, dwell time, and pressure as well as film characteristics such as molecular weight, molecular weight distribution, long and short chain branching are the key factors that control the final quality of the joint. In the first part of this study, we have investigated the interrelated influence of heat seal process parameters on the strengthening of the interface as well as the micro mechanisms involved. The effects of heat seal temperature, pressure, and dwell time on seal strength of LLDPE were illustrated in "time-temperature" and "pressure-temperature" 3D maps, a methodology that is easily applicable to other systems. The interfacial adhesion of semicrystalline polymers was not well understood. We thus studied the adhesion behaviour of LLDPE as a semicrystalline polymer. The results indicated that the time and temperature dependence of seal strength is a consequence of the fraction of amorphous phase available at the interface of films. The seal strength had a linear correlation with the square root of sealing time which was also supported by the welding models. The slope of this linear correlation increased with temperature. This work was followed concurrently by two main approaches: analysis of polymer chain behaviour from microscopic point of view based on reptation theory and conventional macroscopic analysis based on bulk properties of the polymer. Failure mechanisms and fractured surfaces were also analyzed after peeling. Moreover, the topography and morphology of

  12. Control of supersonic wind-tunnel noise by laminarization of nozzle-wall boundary layer

    NASA Technical Reports Server (NTRS)

    Beckwith, I. E.; Harvey, W. D.; Harris, J. E.; Holley, B. B.

    1973-01-01

    One of the principal design requirements for a quiet supersonic or hypersonic wind tunnel is to maintain laminar boundary layers on the nozzle walls and thereby reduce disturbance levels in the test flow. The conditions and apparent reasons for laminar boundary layers which have been observed during previous investigations on the walls of several nozzles for exit Mach numbers from 2 to 20 are reviewed. Based on these results, an analysis and an assessment of nozzle design requirements for laminar boundary layers including low Reynolds numbers, high acceleration, suction slots, wall temperature control, wall roughness, and area suction are presented.

  13. A stochastic control approach to Slotted-ALOHA random access protocol

    NASA Astrophysics Data System (ADS)

    Pietrabissa, Antonio

    2013-12-01

    ALOHA random access protocols are distributed protocols based on transmission probabilities, that is, each node decides upon packet transmissions according to a transmission probability value. In the literature, ALOHA protocols are analysed by giving necessary and sufficient conditions for the stability of the queues of the node buffers under a control vector (whose elements are the transmission probabilities assigned to the nodes), given an arrival rate vector (whose elements represent the rates of the packets arriving in the node buffers). The innovation of this work is that, given an arrival rate vector, it computes the optimal control vector by defining and solving a stochastic control problem aimed at maximising the overall transmission efficiency, while keeping a grade of fairness among the nodes. Furthermore, a more general case in which the arrival rate vector changes in time is considered. The increased efficiency of the proposed solution with respect to the standard ALOHA approach is evaluated by means of numerical simulations.

  14. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  15. Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect

    NASA Astrophysics Data System (ADS)

    von Helden, Josef; Bente, Ingo

    Network Access Control (NAC) is the most promising approach to provide protection against sophisticated attacks that first compromise endpoints to subsequently continue their evil work in networks accessible via the compromised endpoint. Trusted Network Connect (TNC) is a NAC approach featuring interoperability and unforgeability due to its openness, broad vendor support and integration of Trusted Computing functions.

  16. Optimal Control of Shock Wave Turbulent Boundary Layer Interactions Using Micro-Array Actuation

    NASA Technical Reports Server (NTRS)

    Anderson, Bernhard H.; Tinapple, Jon; Surber, Lewis

    2006-01-01

    The intent of this study on micro-array flow control is to demonstrate the viability and economy of Response Surface Methodology (RSM) to determine optimal designs of micro-array actuation for controlling the shock wave turbulent boundary layer interactions within supersonic inlets and compare these concepts to conventional bleed performance. The term micro-array refers to micro-actuator arrays which have heights of 25 to 40 percent of the undisturbed supersonic boundary layer thickness. This study covers optimal control of shock wave turbulent boundary layer interactions using standard micro-vane, tapered micro-vane, and standard micro-ramp arrays at a free stream Mach number of 2.0. The effectiveness of the three micro-array devices was tested using a shock pressure rise induced by the 10 shock generator, which was sufficiently strong as to separate the turbulent supersonic boundary layer. The overall design purpose of the micro-arrays was to alter the properties of the supersonic boundary layer by introducing a cascade of counter-rotating micro-vortices in the near wall region. In this manner, the impact of the shock wave boundary layer (SWBL) interaction on the main flow field was minimized without boundary bleed.

  17. Control of layer stacking in CVD graphene under quasi-static condition.

    PubMed

    Subhedar, Kiran M; Sharma, Indu; Dhakate, Sanjay R

    2015-09-14

    The type of layer stacking in bilayer graphene has a significant influence on its electronic properties because of the contrast nature of layer coupling. Herein, different geometries of the reaction site for the growth of bilayer graphene by the chemical vapor deposition (CVD) technique and their effects on the nature of layer stacking are investigated. Micro-Raman mapping and curve fitting analysis confirmed the type of layer stacking for the CVD grown bilayer graphene. The samples grown with sandwiched structure such as quartz/Cu foil/quartz along with a spacer, between the two quartz plates to create a sealed space, resulted in Bernal or AB stacked bilayer graphene while the sample sandwiched without a spacer produced the twisted bilayer graphene. The contrast difference in the layer stacking is a consequence of the difference in the growth mechanism associated with different geometries of the reaction site. The diffusion dominated process under quasi-static control is responsible for the growth of twisted bilayer graphene in sandwiched geometry while surface controlled growth with ample and continual supply of carbon in sandwiched geometry along with a spacer, leads to AB stacked bilayer graphene. Through this new approach, an efficient technique is presented to control the nature of layer stacking. PMID:26245487

  18. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  19. Layered reactive particles with controlled geometries, energies, and reactivities, and methods for making the same

    DOEpatents

    Fritz, Gregory M; Knepper, Robert Allen; Weihs, Timothy P; Gash, Alexander E; Sze, John S

    2013-04-30

    An energetic composite having a plurality of reactive particles each having a reactive multilayer construction formed by successively depositing reactive layers on a rod-shaped substrate having a longitudinal axis, dividing the reactive-layer-deposited rod-shaped substrate into a plurality of substantially uniform longitudinal segments, and removing the rod-shaped substrate from the longitudinal segments, so that the reactive particles have a controlled, substantially uniform, cylindrically curved or otherwise rod-contoured geometry which facilitates handling and improves its packing fraction, while the reactant multilayer construction controls the stability, reactivity and energy density of the energetic composite.

  20. Layered reactive particles with controlled geometries, energies, and reactivities, and methods for making the same

    DOEpatents

    Fritz, Gregory M.; Weihs, Timothy P.; Grzyb, Justin A.

    2016-07-05

    An energetic composite having a plurality of reactive particles each having a reactive multilayer construction formed by successively depositing reactive layers on a rod-shaped substrate having a longitudinal axis, dividing the reactive-layer-deposited rod-shaped substrate into a plurality of substantially uniform longitudinal segments, and removing the rod-shaped substrate from the longitudinal segments, so that the reactive particles have a controlled, substantially uniform, cylindrically curved or otherwise rod-contoured geometry which facilitates handling and improves its packing fraction, while the reactant multilayer construction controls the stability, reactivity and energy density of the energetic composite.

  1. Otto Laporte Award Lecture: Control of Turbulent Boundary Layers: State of the Art - 2001

    NASA Astrophysics Data System (ADS)

    Kim, John

    2001-11-01

    Control of turbulent boundary layers has been a subject of much interest because of its high potential payoffs. The control of turbulent boundary layers requires, however, a thorough understanding of the underlying physics of the turbulent flow and an efficient control algorithm, both of which have been less than satisfactory. Great strides on both fronts have been made through the recent advancement in computational fluid dynamics and control theories. New approaches to controller design are significantly different from existing approaches, which were mostly based on the investigator's physical insight into the flow, in that modern control theories are incorporated into the controller design. Examples include systems control-theoretic approaches such as H_2- and H_∞-control, and adjoint-based optimal/suboptimal controls. Some of these approaches explicitly exploit certain linear mechanisms present in the wall-bounded shear flow, and their success suggests the importance of linear mechanisms in the turbulent (and hence, nonlinear) flow. Although all of these new approaches have been thus far based on numerical experiments (and yet to be verified in laboratory experiments), they have shown great promise and present a new approach to flow control. The success and limitation of various new controllers and their implications will be discussed.

  2. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2010-01-01

    NASA s Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  3. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  4. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  5. Control of substrate access to the active site in methane monooxygenase.

    PubMed

    Lee, Seung Jae; McCormick, Michael S; Lippard, Stephen J; Cho, Uhn-Soo

    2013-02-21

    Methanotrophs consume methane as their major carbon source and have an essential role in the global carbon cycle by limiting escape of this greenhouse gas to the atmosphere. These bacteria oxidize methane to methanol by soluble and particulate methane monooxygenases (MMOs). Soluble MMO contains three protein components, a 251-kilodalton hydroxylase (MMOH), a 38.6-kilodalton reductase (MMOR), and a 15.9-kilodalton regulatory protein (MMOB), required to couple electron consumption with substrate hydroxylation at the catalytic diiron centre of MMOH. Until now, the role of MMOB has remained ambiguous owing to a lack of atomic-level information about the MMOH-MMOB (hereafter termed H-B) complex. Here we remedy this deficiency by providing a crystal structure of H-B, which reveals the manner by which MMOB controls the conformation of residues in MMOH crucial for substrate access to the active site. MMOB docks at the α(2)β(2) interface of α(2)β(2)γ(2) MMOH, and triggers simultaneous conformational changes in the α-subunit that modulate oxygen and methane access as well as proton delivery to the diiron centre. Without such careful control by MMOB of these substrate routes to the diiron active site, the enzyme operates as an NADH oxidase rather than a monooxygenase. Biological catalysis involving small substrates is often accomplished in nature by large proteins and protein complexes. The structure presented in this work provides an elegant example of this principle. PMID:23395959

  6. Privacy-aware access control for video data in intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Vagts, Hauke; Jakoby, Andreas

    2012-06-01

    Surveillance systems became powerful. Objects can be identified and intelligent surveillance services can generate events when a specific situation occurs. Such surveillance services can be organized in a Service Oriented Architecture (SOA) to fulfill surveillance tasks for specific purposes. Therefore the services process information on a high level, e.g., just the position of an object. Video data is still required to visualize a situation to an operator and is required as evidence in court. Processing of personal related and sensitive information threatens privacy. To protect the user and to be compliant with legal requirements it must be ensured that sensitive information can only be processed for a defined propose by specific users or services. This work proposes an architecture for Access Control that enforces the separation of data between different surveillance tasks. Access controls are enforced at different levels: for the users starting the tasks, for the services within the tasks processing data stored in central store or calculated by other services and for sensor related services that extract information out of the raw data and provide them.

  7. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  8. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  9. Gate controllable resistive random access memory devices using reduced graphene oxide

    NASA Astrophysics Data System (ADS)

    Hazra, Preetam; Resmi, A. N.; Jinesh, K. B.

    2016-04-01

    The biggest challenge in the resistive random access memory (ReRAM) technology is that the basic operational parameters, such as the set and reset voltages, the current on-off ratios (hence the power), and their operational speeds, strongly depend on the active and electrode materials and their processing methods. Therefore, for its actual technological implementations, the unification of the operational parameters of the ReRAM devices appears to be a difficult task. In this letter, we show that by fabricating a resistive memory device in a thin film transistor configuration and thus applying an external gate bias, we can control the switching voltage very accurately. Taking partially reduced graphene oxide, the gate controllable switching is demonstrated, and the possible mechanisms are discussed.

  10. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  11. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  12. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  13. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  14. Ligand Layer Engineering To Control Stability and Interfacial Properties of Nanoparticles.

    PubMed

    Schulz, Florian; Dahl, Gregor T; Besztejan, Stephanie; Schroer, Martin A; Lehmkühler, Felix; Grübel, Gerhard; Vossmeyer, Tobias; Lange, Holger

    2016-08-01

    The use of mixed ligand layers including poly(ethylene glycol)-based ligands for the functionalization of nanoparticles is a very popular strategy in the context of nanomedicine. However, it is challenging to control the composition of the ligand layer and maintain high colloidal and chemical stability of the conjugates. A high level of control and stability are crucial for reproducibility, upscaling, and safe application. In this study, gold nanoparticles with well-defined mixed ligand layers of α-methoxypoly(ethylene glycol)-ω-(11-mercaptoundecanoate) (PEGMUA) and 11-mercaptoundecanoic acid (MUA) were synthesized and characterized by ATR-FTIR spectroscopy and gel electrophoresis. The colloidal and chemical stability of the conjugates was tested by dynamic light scattering (DLS), small-angle X-ray scattering (SAXS), and UV/vis spectroscopy based experiments, and their interactions with cells were analyzed by elemental analysis. We demonstrate that the alkylene spacer in PEGMUA is the key feature for the controlled synthesis of mixed layer conjugates with very high colloidal and chemical stability and that a controlled synthesis is not possible using regular PEG ligands without the alkylene spacer. With the results of our stability tests, the molecular structure of the ligands can be clearly linked to the colloidal and chemical stabilization. We expect that the underlying design principle can be generalized to improve the level of control in nanoparticle surface chemistry. PMID:27458652

  15. Controllable synthesis of layered Co-Ni hydroxide hierarchical structures for high-performance hybrid supercapacitors

    NASA Astrophysics Data System (ADS)

    Yuan, Peng; Zhang, Ning; Zhang, Dan; Liu, Tao; Chen, Limiao; Ma, Renzhi; Qiu, Guanzhou; Liu, Xiaohe

    2016-01-01

    A facile solvothermal method is developed for synthesizing layered Co-Ni hydroxide hierarchical structures by using hexamethylenetetramine (HMT) as alkaline reagent. The electrochemical measurements reveal that the specific capacitances of layered bimetallic (Co-Ni) hydroxides are generally superior to those of layered monometallic (Co, Ni) hydroxides. The as-prepared Co0.5Ni0.5 hydroxide hierarchical structures possesses the highest specific capacitance of 1767 F g-1 at a galvanic current density of 1 A g-1 and an outstanding specific capacitance retention of 87% after 1000 cycles. In comparison with the dispersed nanosheets of Co-Ni hydroxide, layered hydroxide hierarchical structures show much superior electrochemical performance. This study provides a promising method to construct hierarchical structures with controllable transition-metal compositions for enhancing the electrochemical performance in hybrid supercapacitors.

  16. Transmission of terahertz waves through layered superconductors controlled by a dc magnetic field

    NASA Astrophysics Data System (ADS)

    Apostolov, S. S.; Maizelis, Z. A.; Makarov, N. M.; Pérez-Rodríguez, F.; Rokhmanova, T. N.; Yampol'skii, V. A.

    2016-07-01

    The transmission of THz electromagnetic waves via a slab of layered superconductor in the presence of dc magnetic field H0 is theoretically studied. We demonstrate that the external dc field turns the layered superconductor into nonuniform medium with spatially and frequency-dependent dielectric permittivity. Even a relatively weak dc magnetic field, when the superconductor is in the Meissner state, significantly affects the transmittance of the layered superconductor. Moreover, the proper choice of H0 can provide the perfect transparency of the slab. In addition, the dc magnetic field changes the dependence of the transmittance on the slab thickness, the frequency, and the incident angle of the wave. Thus, it can serve as an effective tool to control the transmissivity of layered superconductors.

  17. Adaptive nonlinear polynomial neural networks for control of boundary layer/structural interaction

    NASA Technical Reports Server (NTRS)

    Parker, B. Eugene, Jr.; Cellucci, Richard L.; Abbott, Dean W.; Barron, Roger L.; Jordan, Paul R., III; Poor, H. Vincent

    1993-01-01

    The acoustic pressures developed in a boundary layer can interact with an aircraft panel to induce significant vibration in the panel. Such vibration is undesirable due to the aerodynamic drag and structure-borne cabin noises that result. The overall objective of this work is to develop effective and practical feedback control strategies for actively reducing this flow-induced structural vibration. This report describes the results of initial evaluations using polynomial, neural network-based, feedback control to reduce flow induced vibration in aircraft panels due to turbulent boundary layer/structural interaction. Computer simulations are used to develop and analyze feedback control strategies to reduce vibration in a beam as a first step. The key differences between this work and that going on elsewhere are as follows: that turbulent and transitional boundary layers represent broadband excitation and thus present a more complex stochastic control scenario than that of narrow band (e.g., laminar boundary layer) excitation; and secondly, that the proposed controller structures are adaptive nonlinear infinite impulse response (IIR) polynomial neural network, as opposed to the traditional adaptive linear finite impulse response (FIR) filters used in most studies to date. The controllers implemented in this study achieved vibration attenuation of 27 to 60 dB depending on the type of boundary layer established by laminar, turbulent, and intermittent laminar-to-turbulent transitional flows. Application of multi-input, multi-output, adaptive, nonlinear feedback control of vibration in aircraft panels based on polynomial neural networks appears to be feasible today. Plans are outlined for Phase 2 of this study, which will include extending the theoretical investigation conducted in Phase 2 and verifying the results in a series of laboratory experiments involving both bum and plate models.

  18. Complexity control for high-efficiency video coding by coding layers complexity allocations

    NASA Astrophysics Data System (ADS)

    Fang, Jiunn-Tsair; Liang, Kai-Wen; Chen, Zong-Yi; Hsieh, Wei; Chang, Pao-Chi

    2016-03-01

    The latest video compression standard, high-efficiency video coding (HEVC), provides quad-tree structures of coding units (CUs) and four coding tree depths to facilitate coding efficiency. The HEVC encoder considerably increases the computational complexity to levels inappropriate for video applications of power-constrained devices. This work, therefore, proposes a complexity control method for the low-delay P-frame configuration of the HEVC encoder. The complexity control mechanism is among the group of pictures layer, frame layer, and CU layer, and each coding layer provides a distinct method for complexity allocation. Furthermore, the steps in the prediction unit encoding procedure are reordered. By allocating the complexity to each coding layer of HEVC, the proposed method can simultaneously satisfy the entire complexity constraint (ECC) for entire sequence encoding and the instant complexity constraint (ICC) for each frame during real-time encoding. Experimental results showed that as the target complexity under both the ECC and ICC was reduced to 80% and 60%, respectively, the decrease in the average Bjøntegaard delta peak signal-to-noise ratio was ˜0.1 dB with an increase of 1.9% in the Bjøntegaard delta rate, and the complexity control error was ˜4.3% under the ECC and 4.3% under the ICC.

  19. Driving-based generalized synchronization in two-layer networks via pinning control

    NASA Astrophysics Data System (ADS)

    Ning, Di; Wu, Xiaoqun; Lu, Jun-an; Lü, Jinhu

    2015-11-01

    Synchronization of complex networks has been extensively investigated in various fields. In the real world, one network is usually affected by another one but coexists in harmony with it, which can be regarded as another kind of synchronization—generalized synchronization (GS). In this paper, the GS in two-layer complex networks with unidirectional inter-layer coupling via pinning control is investigated based on the auxiliary-system approach. Specifically, for two-layer networks under study, one is considered as the drive network and the other is the response one. According to the auxiliary-system approach, output from the drive layer is designed as input for the response one, and an identical duplication of the response layer is constructed, which is driven by the same driving signals. A sufficient condition for achieving GS via pinning control is presented. Numerical simulations are further provided to illustrate the correctness of the theoretical results. It is also revealed that the least number of pinned nodes needed for achieving GS decreases with the increasing density of the response layer. In addition, it is found that when the intra-layer coupling strength of the response network is large, nodes with larger degrees should be selected to pin first for the purpose of achieving GS. However, when the coupling strength is small, it is more preferable to pin nodes with smaller degrees. This work provides engineers with a convenient approach to realize harmonious coexistence of various complex systems, which can further facilitate the selection of pinned systems and reduce control cost.

  20. Driving-based generalized synchronization in two-layer networks via pinning control.

    PubMed

    Ning, Di; Wu, Xiaoqun; Lu, Jun-an; Lü, Jinhu

    2015-11-01

    Synchronization of complex networks has been extensively investigated in various fields. In the real world, one network is usually affected by another one but coexists in harmony with it, which can be regarded as another kind of synchronization--generalized synchronization (GS). In this paper, the GS in two-layer complex networks with unidirectional inter-layer coupling via pinning control is investigated based on the auxiliary-system approach. Specifically, for two-layer networks under study, one is considered as the drive network and the other is the response one. According to the auxiliary-system approach, output from the drive layer is designed as input for the response one, and an identical duplication of the response layer is constructed, which is driven by the same driving signals. A sufficient condition for achieving GS via pinning control is presented. Numerical simulations are further provided to illustrate the correctness of the theoretical results. It is also revealed that the least number of pinned nodes needed for achieving GS decreases with the increasing density of the response layer. In addition, it is found that when the intra-layer coupling strength of the response network is large, nodes with larger degrees should be selected to pin first for the purpose of achieving GS. However, when the coupling strength is small, it is more preferable to pin nodes with smaller degrees. This work provides engineers with a convenient approach to realize harmonious coexistence of various complex systems, which can further facilitate the selection of pinned systems and reduce control cost. PMID:26627564

  1. Discrete-Layer Piezoelectric Plate and Shell Models for Active Tip-Clearance Control

    NASA Technical Reports Server (NTRS)

    Heyliger, P. R.; Ramirez, G.; Pei, K. C.

    1994-01-01

    The objectives of this work were to develop computational tools for the analysis of active-sensory composite structures with added or embedded piezoelectric layers. The targeted application for this class of smart composite laminates and the analytical development is the accomplishment of active tip-clearance control in turbomachinery components. Two distinct theories and analytical models were developed and explored under this contract: (1) a discrete-layer plate theory and corresponding computational models, and (2) a three dimensional general discrete-layer element generated in curvilinear coordinates for modeling laminated composite piezoelectric shells. Both models were developed from the complete electromechanical constitutive relations of piezoelectric materials, and incorporate both displacements and potentials as state variables. This report describes the development and results of these models. The discrete-layer theories imply that the displacement field and electrostatic potential through-the-thickness of the laminate are described over an individual layer rather than as a smeared function over the thickness of the entire plate or shell thickness. This is especially crucial for composites with embedded piezoelectric layers, as the actuating and sensing elements within these layers are poorly represented by effective or smeared properties. Linear Lagrange interpolation polynomials were used to describe the through-thickness laminate behavior. Both analytic and finite element approximations were used in the plane or surface of the structure. In this context, theoretical developments are presented for the discrete-layer plate theory, the discrete-layer shell theory, and the formulation of an exact solution for simply-supported piezoelectric plates. Finally, evaluations and results from a number of separate examples are presented for the static and dynamic analysis of the plate geometry. Comparisons between the different approaches are provided when

  2. Experimental Investigation of Normal Shock Boundary-Layer Interaction with Hybrid Flow Control

    NASA Technical Reports Server (NTRS)

    Vyas, Manan A.; Hirt, Stefanie M.; Anderson, Bernhard H.

    2012-01-01

    Hybrid flow control, a combination of micro-ramps and micro-jets, was experimentally investigated in the 15x15 cm Supersonic Wind Tunnel (SWT) at the NASA Glenn Research Center. Full factorial, a design of experiments (DOE) method, was used to develop a test matrix with variables such as inter-ramp spacing, ramp height and chord length, and micro-jet injection flow ratio. A total of 17 configurations were tested with various parameters to meet the DOE criteria. In addition to boundary-layer measurements, oil flow visualization was used to qualitatively understand shock induced flow separation characteristics. The flow visualization showed the normal shock location, size of the separation, path of the downstream moving counter-rotating vortices, and corner flow effects. The results show that hybrid flow control demonstrates promise in reducing the size of shock boundary-layer interactions and resulting flow separation by means of energizing the boundary layer.

  3. A highly efficient SDRAM controller supporting variable-length burst access and batch process for discrete reads

    NASA Astrophysics Data System (ADS)

    Li, Nan; Wang, Junzheng

    2016-03-01

    A highly efficient Synchronous Dynamic Random Access Memory (SDRAM) controller supporting variable-length burst access and batch process for discrete reads is proposed in this paper. Based on the Principle of Locality, command First In First Out (FIFO) and address range detector are designed within this controller to accelerate its responses to discrete read requests, which dramatically improves the average Effective Bus Utilization Ratio (EBUR) of SDRAM. Our controller is finally verified by driving the Micron 256-Mb SDRAM MT48LC16M16A2. Successful simulation and verification results show that our controller exhibits much higher EBUR than do most existing designs in case of discrete reads.

  4. Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    SciTech Connect

    Summerhill, Richard

    2009-08-14

    There were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, o Heterogeneous DataPlane Testing, o Simulation, o Project Publications, Reports, and Presentations.

  5. Laser Energy Deposition for Shock Wave Boundary Layer Control at Supersonic Speeds

    NASA Astrophysics Data System (ADS)

    Erdem, E.; Kontis, K.; Osuka, T.; Majima, R.; Tamba, T.; Sasoh, Akihiro

    Shock Wave Boundary Layer Interactions (SWBLIs) can induce separation which causes loss of a control surface effectiveness, drop of an air intake efficiency and it may be the origin of large scale fluctuations such as air-intake buzz, buffeting or fluctuating side loads in separated propulsive nozzles

  6. Control of excitons in multi-layer van der Waals heterostructures

    NASA Astrophysics Data System (ADS)

    Calman, E. V.; Dorow, C. J.; Fogler, M. M.; Butov, L. V.; Hu, S.; Mishchenko, A.; Geim, A. K.

    2016-03-01

    We report an experimental study of excitons in a double quantum well van der Waals heterostructure made of atomically thin layers of MoS2 and hexagonal boron nitride. The emission of neutral and charged excitons is controlled by gate voltage, temperature, and both the helicity and the power of optical excitation.

  7. Controlling pre-tilt angles of liquid crystal using mixed polyimide alignment layer.

    PubMed

    Wu, Wei-Yen; Wang, Chen-Chen; Fuh, Andy Y

    2008-10-13

    Three approaches to controlling liquid crystal (LC) pre-tilt angle in a cell are demonstrated using a polyimide (PI) alignment layer on substrates, in the form of a mixture of horizontal (H) and vertical (V) polyimides. The concentration ratio of H- to V-PI, baking temperature, and rubbing strength influence the pre-tilt angle, and highlight parameters for controlling the pre-tilt angle of an LC cell. Finally, a variable polarization converter is demonstrated using this approach. PMID:18852824

  8. Controlled Access of p53 to the Nucleus Regulates its Proteasomal Degradation by MDM2

    PubMed Central

    Davis, James R.; Mossalam, Mohanad; Lim, Carol S.

    2013-01-01

    The tumor suppressor p53 can be sent to the proteasome for degradation by placing its nucleo-cytoplasmic shuttling under ligand control. Endogenous p53 is ubiquitinated by MDM2 in the nucleus, and controlling the access of p53 to the nuclear compartment regulates its ubiquitination and proteasomal degradation. This was accomplished by the use of a “protein switch” that places nuclear translocation under the control of externally applied dexamethasone. Fluorescence microscopy revealed that sending protein switch p53 (PS-p53) to the nucleus produces a distinct punctate distribution in both the cytoplasm and nucleus. The nuclear role in accessing the proteasome was investigated by inhibiting classical nuclear export with leptomycin B. Trapping PS-p53 in the nucleus only allows this punctate staining in that compartment, suggesting that PS-p53 must translocate first to the nuclear compartment for cytoplasmic punctate staining to occur. The role of MDM2 binding was explored by inhibiting MDM2/p53 binding with nutlin-3. Inhibition of this interaction blocked both nuclear export and cytoplasmic and nuclear punctate staining, providing evidence that any change in localization after nuclear translocation is due to MDM2 binding. Further, blocking the proteolytic activity of the proteasome maintained the nuclear localization of the construct. Truncations of p53 were made to determine smaller constructs still capable of interacting with MDM2, and their subcellular localization and degradation potential was observed. PS-p53 and a smaller construct, construct containing the two MDM2 binding regions of p53 (Box I+V) were indeed degraded by the proteasome as measured by loss of enhanced green fluorescent protein that was also fused to the construct. The influence of these constructs on p53 gene transactivation function was assessed, and revealed that PS-p53 decreased gene transactivation, while PS-p53(BoxI+V) did not significantly change baseline gene transactivation. PMID

  9. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  10. A method for protecting and controlling access to JPEG2000 images

    NASA Astrophysics Data System (ADS)

    Serrão, Carlos; Serra, Antonio; Fonseca, Pedro; Salles Dias, Jose M.

    2003-11-01

    The image compression standard JPEG2000 brings not only powerful compression performance but also new functionality unavailable in previous standards (such as region of interest, scalability and random access to image data, through flexible code stream description of the image). ISO/IEC JTC1/SC29/WG1, which is the ISO Committee working group for JPEG2000 standardization is currently defining additional parts to the standard that will allow extended functionalities. One of these extensions is Part 8 JPSEC - JPEG2000 security, which deals with the protection and access control of JPEG2000 code-stream. This paper reports the JPSEC activities detailing with the three core experiments which are in progress to supply the JPEG2000 ISO Committee, with the appropriate protection technology. These core experiments are focusing on the protection of the code-stream itself and on the overall security infrastructure that is needed to manage the access rights of users and applications to that protected code-stream. Regarding the encryption/scrambling process, this one deals with the JPEG2000 code stream in such a way that only the packets, which contain image data information are encrypted. All the other code-stream data will be in clear mode. This paper will also advance details of one of the JPSEC proposed solutions for the security infrastructure - OpenSDRM (Open and Secure Digital Rights Management), which provides security and rights management from the content provider to the content final user. A use case where this security infrastructure was successfully used will also be provided.

  11. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  12. Direct numerical simulation of spatially developing turbulent boundary layers with opposition control

    NASA Astrophysics Data System (ADS)

    Xia, Qian-Jin; Huang, Wei-Xi; Xu, Chun-Xiao; Cui, Gui-Xiang

    2015-04-01

    Opposition control of spatially developing turbulent boundary layers for skin friction drag reduction is studied by direct numerical simulations. The boundary layer extends 800θ0 in the streamwise (x) direction, with θ0 denoting the momentum thickness at the flow inlet. The Reynolds number, based on the external flow velocity and the momentum thickness, ranges from 300 to 860. Opposition control applied in different streamwise ranges, i.e. 200\\lt x/{{θ }0}\\lt 350 and 200\\lt x/{{θ }0}\\lt 550, as well as the uncontrolled case, are simulated. Statistical results and instantaneous flow fields are presented, with special attention paid to the spatial evolution properties of the boundary layer flow with control and the underlying mechanism. It is observed that a long spatial transient region after the control start and a long recovery region after the control end are present in the streamwise direction. A maximum drag reduction rate of about 22% is obtained as the transient region is passed, and an overshoot in the local skin friction coefficient (Cf) occurs in the recovery region. A new identity is derived for dynamical decomposition of Cf. Reduction of Cf by opposition control and overshoot of Cf in the recovery region are explained by quantifying the contributions from the viscous shear stress term, the Reynolds shear stress term, the mean convection term and other terms.

  13. Resistive switching of a TaO{sub x}/TaON double layer via ionic control of carrier tunneling

    SciTech Connect

    Jeon, Heeyoung; Park, Jingyu; Kim, Hyunjung; Jang, Woochool; Song, Hyoseok; Kang, Chunho; Seo, Hyungtak; Jeon, Hyeongtag

    2014-04-14

    Resistance random access memory (RRAM) is an attractive candidate for future non-volatile memory due to its superior features. As the oxide thickness is scaled down, the charge transport mechanism is also subject to the transition from hopping to tunneling dominant process, which is critically related to the interfacial electronic band structure. A TaO{sub x}/TaON double layer-based RRAM is fabricated and characterized in this work. Upon TaON insertion at the lower interface, the improved switching behavior is observed. The TaON at the bottom electrode interface blocks oxygen vacancy percolation due to strong N-O bonds and also modifies interfacial band alignment to lower the injected electron energy from bottom electrode due to higher tunneling barrier height than that of TaO{sub x}/Pt. This study suggested that a defect-minimized insertion layer like TaON with a proper interfacial band alignment is pivotal in RRAM for the effective ionic control of carrier tunneling resulting in non-linear I-V behavior with improved properties.

  14. Regularized inversion of controlled source audio-frequency magnetotelluric data in horizontally layered transversely isotropic media

    NASA Astrophysics Data System (ADS)

    Zhou, Jianmei; Wang, Jianxun; Shang, Qinglong; Wang, Hongnian; Yin, Changchun

    2014-04-01

    We present an algorithm for inverting controlled source audio-frequency magnetotelluric (CSAMT) data in horizontally layered transversely isotropic (TI) media. The popular inversion method parameterizes the media into a large number of layers which have fixed thickness and only reconstruct the conductivities (e.g. Occam's inversion), which does not enable the recovery of the sharp interfaces between layers. In this paper, we simultaneously reconstruct all the model parameters, including both the horizontal and vertical conductivities and layer depths. Applying the perturbation principle and the dyadic Green's function in TI media, we derive the analytic expression of Fréchet derivatives of CSAMT responses with respect to all the model parameters in the form of Sommerfeld integrals. A regularized iterative inversion method is established to simultaneously reconstruct all the model parameters. Numerical results show that the inverse algorithm, including the depths of the layer interfaces, can significantly improve the inverse results. It can not only reconstruct the sharp interfaces between layers, but also can obtain conductivities close to the true value.

  15. Morphological Control of Cells on 3-Dimensional Multi-Layer Nanotopographic Structures.

    PubMed

    Jeong, Heon-Ho; Noh, Young-Mu; Song, Hwan-Moon; Lee, Sang-Ho; Park, Jin-Sung; Lee, Chang-Soo

    2015-05-01

    The extracellular matrix (ECM) environment is known to play an important role in the process of various cell regulatory mechanisms. We have investigated the ability of 3-dimensional ECM geometries to induce morphological changes in cells. Bi-layer polymeric structures with submicron scale stripe patterns were fabricated using a two-step nano-imprinting technique, and the orientation angle (θ(α)) of the upper layer was controlled by changing its alignment with respect to the orientation of the bottom layer. When cells were grown on the mono-layer stripe structure with a single orientation, they elongated along the direction of the stripe pattern. On bi-layer polymer structures, the cell morphologies gradually changed and became rounded, with an increase of θα up to 90 degrees, but the polarities of these cells were still aligned along the orientation of the upper layer. As a result, we show that the polarity and the roundness of cells can be independently regulated by adjusting the orientation of 3-dimensional hierarchical ECM topography. PMID:26505024

  16. Point and counterpoint: patient control of access to data in their electronic health records.

    PubMed

    Caine, Kelly; Tierney, William M

    2015-01-01

    Information collection, storage, and management is central to the practice of health care. For centuries, patients' and providers' expectations kept medical records confidential between providers and patients. With the advent of electronic health records, patient health information has become more widely available to providers and health care managers and has broadened its potential use beyond individual patient care. Adhering to the principles of Fair Information Practice, including giving patients control over the availability and use of their individual health records, would improve care by fostering the sharing of sensitive information between patients and providers. However, adherence to such principles could put patients at risk for unsafe care as a result of both missed opportunities for providing needed care as well as provision of contraindicated care, as it would prevent health care providers from having full access to health information. Patients' expectations for the highest possible quality and safety of care, therefore, may be at odds with their desire to limit provider access to their health records. Conversely, provider expectations that patients would willingly seek care for embarrassing conditions and disclose sensitive information may be at odds with patients' information privacy rights. An open dialogue between patients and providers will be necessary to balance respect for patient rights with provider need for patient information. PMID:25480723

  17. e-VLBI Access Point (eAXP) - a centralized control and EGAE configuration / management application

    NASA Astrophysics Data System (ADS)

    Ruszczyk, Chester Whitney, Alan

    Setting up experiments to utilize Experiment Guided Adaptive Endpoint (EGAE) and e-VLBI is presently a complex and time intensive process requiring scientific, Mark5 and networking knowledge. There is no central access to point to configure and manage all of these aspects of an experiment. The e-VLBI Access Point (eAXP) is a centralized control plane management tool that offers a GUI interface to augment the command line interface presently being used to set up and conduct experiments. eAXP contains three major toolsets: one to set up and execute an experiment using real-time or non-real time modes; the second to configure and manage EGAE; and a third to view statistics of the experiments. Initially the overall system architecture for eAXP is presented, followed by details of the Experiment Profiler toolset including screen shots of the system presently being tested. This will be followed by how eAXP will support real-time modes interfacing to the Dynamic Resource Allocation over GMPLS Optical Network (DRAGON) resource management project.

  18. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  19. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  20. Effects of Hybrid Flow Control on a Normal Shock Boundary-Layer Interaction

    NASA Technical Reports Server (NTRS)

    Hirt, Stefanie M.; Vyas, Manan A.

    2013-01-01

    Hybrid flow control, a combination of micro-ramps and steady micro-jets, was experimentally investigated in the 15x15 cm Supersonic Wind Tunnel at the NASA Glenn Research Center. A central composite design of experiments method, was used to develop response surfaces for boundary-layer thickness and reversed-flow thickness, with factor variables of inter-ramp spacing, ramp height and chord length, and flow injection ratio. Boundary-layer measurements and wall static pressure data were used to understand flow separation characteristics. A limited number of profiles were measured in the corners of the tunnel to aid in understanding the three-dimensional characteristics of the flowfield.

  1. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    PubMed Central

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  2. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    PubMed Central

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  3. Effects of boundary-layer separation controllers on a desktop fume hood.

    PubMed

    Huang, Rong Fung; Chen, Jia-Kun; Hsu, Ching Min; Hung, Shuo-Fu

    2016-10-01

    A desktop fume hood installed with an innovative design of flow boundary-layer separation controllers on the leading edges of the side plates, work surface, and corners was developed and characterized for its flow and containment leakage characteristics. The geometric features of the developed desktop fume hood included a rearward offset suction slot, two side plates, two side-plate boundary-layer separation controllers on the leading edges of the side plates, a slanted surface on the leading edge of the work surface, and two small triangular plates on the upper left and right corners of the hood face. The flow characteristics were examined using the laser-assisted smoke flow visualization technique. The containment leakages were measured by the tracer gas (sulphur hexafluoride) detection method on the hood face plane with a mannequin installed in front of the hood. The results of flow visualization showed that the smoke dispersions induced by the boundary-layer separations on the leading edges of the side plates and work surface, as well as the three-dimensional complex flows on the upper-left and -right corners of the hood face, were effectively alleviated by the boundary-layer separation controllers. The results of the tracer gas detection method with a mannequin standing in front of the hood showed that the leakage levels were negligibly small (≤0.003 ppm) at low face velocities (≥0.19 m/s). PMID:27104797

  4. Control of a shock wave-boundary layer interaction using localized arc filament plasma actuators

    NASA Astrophysics Data System (ADS)

    Webb, Nathan Joseph

    Supersonic flight is currently possible, but expensive. Inexpensive supersonic travel will require increased efficiency of high-speed air entrainment, an integral part of air-breathing propulsion systems. Although mixed compression inlet geometry can significantly improve entrainment efficiency, numerous Shock Wave-Boundary Layer Interactions (SWBLIs) are generated in this configuration. The boundary layer must therefore develop through multiple regions of adverse pressure gradient, causing it to thicken, and, in severe cases, separate. The associated increase in unsteadiness can have adverse effects on downstream engine hardware. The most severe consequence of these interactions is the increased aerodynamic blockage generated by the thickened boundary layer. If the increase is sufficient, it can choke the flow, causing inlet unstart, and resulting in a loss of thrust and high transient forces on the engine, airframe, and aircraft occupants. The potentially severe consequences associated with SWBLIs require flow control to ensure proper operation. Traditionally, boundary layer bleed has been used to control the interaction. Although this method is effective, it has inherent efficiency penalties. Localized Arc Filament Plasma Actuators (LAFPAs) are designed to generate perturbations for flow control. Natural flow instabilities act to amplify certain perturbations, allowing the LAFPAs to control the flow with minimal power input. LAFPAs also have the flexibility to maintain control over a variety of operating conditions. This work seeks to examine the effectiveness of LAFPAs as a separation control method for an oblique, impinging SWBLI. The low frequency unsteadiness in the reflected shock was thought to be the natural manifestation of a Kelvin-Helmholtz instability in the shear layer above the separation region. The LAFPAs were therefore placed upstream of the interaction to allow their perturbations to convect to the receptivity region (near the shear layer origin

  5. Low Mode Control of Cryogenic ICF Fuel Layers Using Infrared Heating

    SciTech Connect

    London, R A; Kozioziemski, B J; Marinak, M M; Kerbel, G D; Bittner, D N

    2005-07-06

    Infrared heating has been demonstrated as an effective technique to smooth solid hydrogen layers inside transparent cryogenic inertial confinement fusion capsules. Control of the first two Legendre modes of the fuel thickness perturbations using two infrared beams injected into a hohlraum was predicted by modeling and experimentally demonstrated. In the current work, we use coupled ray tracing and heat transfer simulations to explore a wider range of control of long scale length asymmetries. We demonstrate several scenarios to control the first four Legendre modes in the fuel layer using four beams. With such a system, it appears possible to smooth both short and long scale length fuel thickness variations in transparent indirect drive inertial confinement fusion targets.

  6. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  7. Controlling electronic access to the spin excitations of a single molecule in a tunnel junction

    NASA Astrophysics Data System (ADS)

    Hirjibehedin, Cyrus F.; Warner, Ben; El Hallak, Fadi; Prueser, Henning; Ajibade, Afolabi; Gill, Tobias G.; Fisher, Andrew J.; Persson, Mats

    Spintronic phenomena can be utilized to create new devices with applications in data storage and sensing. Scaling these down to the single molecule level requires controlling the properties of the current-carrying orbitals to enable access to spin states through phenomena such as inelastic electron tunneling. Here we show that the spintronic properties of a tunnel junction containing a single molecule can be controlled by their coupling to the local environment. For tunneling through iron phthalocyanine (FePc) on an insulating copper nitride (Cu2N) monolayer above Cu(001), we find that spin transitions may be strongly excited depending on the binding site of the central Fe atom. Different interactions between the Fe and the underlying Cu or N atoms shift the Fe d-orbitals with respect to the Fermi energy, and control the relative strength of the spin excitations, an effect that can described in a simple co-tunneling model. This work demonstrates the importance of the atomic-scale environment in the development of single molecule spintronic devices.

  8. Controlling Interfacial Reactions and Intermetallic Compound Growth at the Interface of a Lead-free Solder Joint with Layer-by-Layer Transferred Graphene.

    PubMed

    Ko, Yong-Ho; Lee, Jong-Dae; Yoon, Taeshik; Lee, Chang-Woo; Kim, Taek-Soo

    2016-03-01

    The immoderate growth of intermetallic compounds (IMCs) formed at the interface of a solder metal and the substrate during soldering can degrade the mechanical properties and reliability of a solder joint in electronic packaging. Therefore, it is critical to control IMC growth at the solder joints between the solder and the substrate. In this study, we investigated the control of interfacial reactions and IMC growth by the layer-by-layer transfer of graphene during the reflow process at the interface between Sn-3.0Ag-0.5Cu (in wt %) lead-free solder and Cu. As the number of graphene layers transferred onto the surface of the Cu substrate increased, the thickness of the total IMC (Cu6Sn5 and Cu3Sn) layer decreased. After 10 repetitions of the reflow process for 50 s above 217 °C, the melting temperature of Sn-3.0Ag-0.5Cu, with a peak temperature of 250 °C, the increase in thickness of the total IMC layer at the interface with multiple layers of graphene was decreased by more than 20% compared to that at the interface of bare Cu without graphene. Furthermore, the average diameter of the Cu6Sn5 scallops at the interface with multiple layers of graphene was smaller than that at the interface without graphene. Despite 10 repetitions of the reflow process, the growth of Cu3Sn at the interface with multiple layers of graphene was suppressed by more than 20% compared with that at the interface without graphene. The multiple layers of graphene at the interface between the solder metal and the Cu substrate hindered the diffusion of Cu atoms from the Cu substrate and suppressed the reactions between Cu and Sn in the solder. Thus, the multiple layers of graphene transferred at the interface between dissimilar metals can control the interfacial reaction and IMC growth occurring at the joining interface. PMID:26856638

  9. Force control of a tri-layer conducting polymer actuator using optimized fuzzy logic control

    NASA Astrophysics Data System (ADS)

    Itik, Mehmet; Sabetghadam, Mohammadreza; Alici, Gursel

    2014-12-01

    Conducting polymers actuators (CPAs) are potential candidates for replacing conventional actuators in various fields, such as robotics and biomedical engineering, due to their advantageous properties, which includes their low cost, light weight, low actuation voltage and biocompatibility. As these actuators are very suitable for use in micro-nano manipulation and in injection devices in which the magnitude of the force applied to the target is of crucial importance, the force generated by CPAs needs to be accurately controlled. In this paper, a fuzzy logic (FL) controller with a Mamdani inference system is designed to control the blocking force of a trilayer CPA with polypyrrole electrodes, which operates in air. The particle swarm optimization (PSO) method is employed to optimize the controller’s membership function parameters and therefore enhance the performance of the FL controller. An adaptive neuro-fuzzy inference system model, which can capture the nonlinear dynamics of the actuator, is utilized in the optimization process. The optimized Mamdani FL controller is then implemented on the CPA experimentally, and its performance is compared with a non-optimized fuzzy controller as well as with those obtained from a conventional PID controller. The results presented indicate that the blocking force at the tip of the CPA can be effectively controlled by the optimized FL controller, which shows excellent transient and steady state characteristics but increases the control voltage compared to the non-optimized fuzzy controllers.

  10. Feedback linearisation control of an induction machine augmented by single-hidden layer neural networks

    NASA Astrophysics Data System (ADS)

    Ait Abbas, Hamou; Belkheiri, Mohammed; Zegnini, Boubakeur

    2016-01-01

    We consider adaptive output feedback control methodology of highly uncertain nonlinear systems with both parametric uncertainties and unmodelled dynamics. The approach is also applicable to systems of unknown, but bounded dimension. However, the relative degree of the regulated output is assumed to be known. This new control strategy is proposed to address the tracking problem of an induction motor based on a modified field-oriented control method. The obtained controller is then augmented by an online neural network that serves as an approximator for the neglected dynamics and modelling errors. The network weight adaptation rule is derived from the Lyapunov stability analysis, that guarantees boundedness of all the error signals of the closed-loop system. Computer simulations of an output feedback controlled induction machine, augmented via single-hidden-layer neural networks, demonstrate the practical potential of the proposed control algorithm.

  11. Control over the preferred orientation of CIGS films deposited by magnetron sputtering using a wetting layer

    NASA Astrophysics Data System (ADS)

    Yan, Yong; Jiang, Fan; Liu, Lian; Yu, Zhou; Zhang, Yong; Zhao, Yong

    2016-01-01

    A growth method is presented to control the preferred orientation in chalcopyrite CuIn x Ga1- x Se2 (CIGS) thin films grown by magnetron sputtering. Films with (220/204) and (112) preferred orientation as well as randomly oriented films were prepared. The effects of an In2Se3 wetting layer and the working pressure on the texture transition phenomena were examined. A large-grained CIGS film with (220/204) texture was formed at 400°C with the inclusion of a thin (80 nm) In2Se3 layer and liquid phase (excess copper selenide phase) formation, and the reaction mechanism is proposed. The device deposited at 2.0 Pa on an In2Se3 layer exhibited the optimal electrical properties. [Figure not available: see fulltext.

  12. Understanding the Processes Controlling Aerosol-Cloud Interactions in the Arctic Marine Boundary Layer

    NASA Astrophysics Data System (ADS)

    Browse, J.; Carslaw, K. S.; Pringle, K.; Mann, G.; Reddington, C.; Brooks, I. M.; Mulcahy, J.; Young, G.; Allan, J. D.; Liu, D.; Trembath, J.; Dean, A.; Yoshioka, M.

    2015-12-01

    Here we use multiple configurations of the UKCA chemistry and aerosol scheme in a global climate model, capable of simulating cloud condensation nuclei (CCN) and cloud droplet number, to understand the processes controlling aerosol-cloud interactions in the marine Arctic boundary layer. Evaluation against an unprecedented number of aerosol and cloud observations made available through the Global Aerosol Synthesis and Science Project (GASSP), International Arctic Systems for Observing the Atmosphere (IASOA) and the 2013 ACCACIA campaign, suggest that Arctic summertime CCN is well represented in the model. Sensitivity studies indicate that DMS derived nucleation events are the primary source of Arctic summertime aerosol increasing mean (median) surface CCN concentrations north of 70N from 21(14) cm-3 to 46(33) cm-3. However, evaluation against observed aerosol size distributions suggests that UKCA overestimates nucleation mode (~10nm) particle concentrations either due to overestimation of boundary layer nucleation rates or underestimation of the Arctic marine boundary layer condensation sink.

  13. Towards precise defect control in layered oxide structures by using oxide molecular beam epitaxy

    PubMed Central

    Baiutti, Federico; Christiani, Georg

    2014-01-01

    Summary In this paper we present the atomic-layer-by-layer oxide molecular beam epitaxy (ALL-oxide MBE) which has been recently installed in the Max-Planck Institute for Solid State Research and we report on its present status, providing some examples that demonstrate its successful application in the synthesis of different layered oxides, with particular reference to superconducting La2CuO4 and insulator-to-metal La2− xSrxNiO4. We briefly review the ALL-oxide MBE technique and its unique capabilities in the deposition of atomically smooth single-crystal thin films of various complex oxides, artificial compounds and heterostructures, introducing our goal of pursuing a deep investigation of such systems with particular emphasis on structural defects, with the aim of tailoring their functional properties by precise defects control. PMID:24995148

  14. Precise Control of the Number of Layers of Graphene by Picosecond Laser Thinning

    PubMed Central

    Lin, Zhe; Ye, Xiaohui; Han, Jinpeng; Chen, Qiao; Fan, Peixun; Zhang, Hongjun; Xie, Dan; Zhu, Hongwei; Zhong, Minlin

    2015-01-01

    The properties of graphene can vary as a function of the number of layers (NOL). Controlling the NOL in large area graphene is still challenging. In this work, we demonstrate a picosecond (ps) laser thinning removal of graphene layers from multi-layered graphene to obtain desired NOL when appropriate pulse threshold energy is adopted. The thinning process is conducted in atmosphere without any coating and it is applicable for graphene films on arbitrary substrates. This method provides many advantages such as one-step process, non-contact operation, substrate and environment-friendly, and patternable, which will enable its potential applications in the manufacturing of graphene-based electronic devices. PMID:26111758

  15. Facile synthesis of CuO nanosheets via the controlled delamination of layered copper hydroxide acetate.

    PubMed

    Demel, Jan; Zhigunov, Alexander; Jirka, Ivan; Klementová, Mariana; Lang, Kamil

    2015-08-15

    CuO nanosheets were prepared by the controlled delamination of layered copper hydroxide acetate followed by the in situ solvothermal transformation of hydroxide to oxide. The reaction was performed in 1-butanol in order to prevent recrystallization or nanoparticle aggregation. Analyses by small angle X-ray scattering, transmission electron microscopy, and atomic force microscopy revealed that the CuO nanosheets are approximately 1 nm thin, corresponding to three to four stacked CuO6 octahedral layers. The average lateral size is approximately 5 nm. The nanosheets form stable dispersions in 1-butanol that are suitable for the fabrication of transparent and homogeneous CuO thin films by spin-coating or inkjet printing techniques. The present synthesis is a rare example of the top down strategy leading to the nanometric two-dimensional nanosheets of non-layered oxide materials. PMID:25942095

  16. Towards precise defect control in layered oxide structures by using oxide molecular beam epitaxy.

    PubMed

    Baiutti, Federico; Christiani, Georg; Logvenov, Gennady

    2014-01-01

    In this paper we present the atomic-layer-by-layer oxide molecular beam epitaxy (ALL-oxide MBE) which has been recently installed in the Max-Planck Institute for Solid State Research and we report on its present status, providing some examples that demonstrate its successful application in the synthesis of different layered oxides, with particular reference to superconducting La2CuO4 and insulator-to-metal La2- x Sr x NiO4. We briefly review the ALL-oxide MBE technique and its unique capabilities in the deposition of atomically smooth single-crystal thin films of various complex oxides, artificial compounds and heterostructures, introducing our goal of pursuing a deep investigation of such systems with particular emphasis on structural defects, with the aim of tailoring their functional properties by precise defects control. PMID:24995148

  17. Experimental investigation of the flow over three d-type microgeometries for boundary layer control

    NASA Astrophysics Data System (ADS)

    Hildalgo Ardana, Pablo

    2008-04-01

    An experimental investigation of the flow over three microgeometries was conducted in order to study its boundary layer control capabilities. Drag reduction and boundary layer control are two of the most researched areas in fluid mechanics. The necessity of reducing drag over vehicles is imperative to reduce the power needed to move a vehicle, or to save millions of gallons of fuel; this can also contribute to a reduction of the emissions of pollutant gases to the atmosphere. It has been estimated that a reduction in drag of 1% on an airplane can save the airlines around 200,000 in fuel costs per airliner per year, and worldwide this could result in total savings in fuel of approximately 1 billion every year. This experimental research was inspired by fast swimming shark species and the denticles present on their skin. Among other purposes, these denticles have some hydrodynamic capabilities that are investigated in this experimental work. Replicas of the denticles of the Shortfin Mako shark (Isurus oxyrinchus), which is speculated to be the fastest swimming shark, have been fabricated and they were embedded on a flat plate. Two additional simplified models of the shark skin consisting of embedded cavities, a two-dimensional grooved surface and a squared sawtooth geometry, were also tested. Time-resolved digital particle image velocimetry (TR-DPIV) measurements were taken in order to characterize the cavity vortices formed inside the geometries, as well as velocity profile measurements to identify the stability of the boundary layer over the geometries. The cavity vortices introduce a partial slip condition into the flow which affects the stability of the boundary layer. The results indicate that the shark skin can work as a boundary layer control mechanism by delaying or inhibiting separation over the shark's body, thereby reducing pressure drag. The ribs on the front side of the shark skin denticles promoted secondary vorticity that was measured under both

  18. Highly Reliable 0.15 μm/14 F2 Cell Ferroelectric Random Access Memory Capacitor Using SrRuO3 Buffer Layer

    NASA Astrophysics Data System (ADS)

    Heo, Jang‑Eun; Bae, Byoung‑Jae; Yoo, Dong‑Chul; Nam, Sang‑Don; Lim, Ji‑Eun; Im, Dong‑Hyun; Joo, Suk‑Ho; Jung, Yong‑Ju; Choi, Suk‑Hun; Park, Soon‑Oh; Kim, Hee‑Seok; Chung, U‑In; Moon, Joo‑Tae

    2006-04-01

    We investigated a novel technique of modifying the interface between a Pb(ZrxTi1-x)O3 (PZT) thin film and electrodes for high density 64 Mbit ferroelectric random access memory (FRAM) device. Using a SrRuO3 buffer layer, we successfully developed highly reliable 0.15 μm/14 F2 cell FRAM capacitors with 75-nm-thick polycrystalline PZT thin films. The SrRuO3 buffer layer greatly enhanced ferroelectric characteristics due to the decrease in interfacial defect density. In PZT capacitors with a total thickness of 180 nm for whole capacitor stack, a remnant polarization of approximately 42 μC/cm2 was measured with a 1.4 V operation. In addition, an opposite state remnant polarization loss of less than 15% was observed after baking at 150 °C for 100 h. In particular, we found that the SrRuO3 buffer layer also played a key role in inhibiting the diffusion of Pb and O from the PZT thin films.

  19. Development and characterization of 96 microsatellite markers suitable for QTL mapping and accession control in an Arabidopsis core collection

    PubMed Central

    2014-01-01

    Background To identify plant genes involved in various key traits, QTL mapping is a powerful approach. This approach is based on the use of mapped molecular markers to identify genomic regions controlling quantitative traits followed by a fine mapping and eventually positional cloning of candidate genes. Mapping technologies using SNP markers are still rather expensive and not feasible in every laboratory. In contrast, microsatellite (also called SSR for Simple Sequence Repeat) markers are technologically less demanding and less costly for any laboratory interested in genetic mapping. Results In this study, we present the development and the characterization of a panel of 96 highly polymorphic SSR markers along the Arabidopsis thaliana genome allowing QTL mapping among accessions of the Versailles 24 core collection that covers a high percentage of the A. thaliana genetic diversity. These markers can be used for any QTL mapping analysis involving any of these accessions. We optimized the use of these markers in order to reveal polymorphism using standard PCR conditions and agarose gel electrophoresis. In addition, we showed that the use of only three of these markers allows differentiating all 24 accessions which makes this set of markers a powerful tool to control accession identity or any cross between any of these accessions. Conclusion The set of SSR markers developed in this study provides a simple and efficient tool for any laboratory focusing on QTL mapping in A. thaliana and a simple means to control seed stock or crosses between accessions. PMID:24447639

  20. Large-Eddy Simulation of Shock-Wave Boundary Layer Interaction and its Control Using Sparkjet

    NASA Astrophysics Data System (ADS)

    Yang, Guang; Yao, Yufeng; Fang, Jian; Gan, Tian; Lu, Lipeng

    2016-06-01

    Large-eddy simulation (LES) of an oblique shock-wave generated by an 8° sharp wedge impinging onto a spatially-developing Mach 2.3 turbulent boundary layer and their interactions has been carried out in this study. The Reynolds number based on the incoming flow property and the boundary layer displacement thickness at the impinging point without shock-wave is 20,000. The detailed numerical approaches are described and the inflow turbulence is generated using the digital filter method to avoid artificial temporal or streamwise periodicity. Numerical results are compared with the available wind tunnel PIV measurements of the same flow conditions. Further LES study on the control of flow separation due to the strong shock-viscous interaction is also conducted by using an active control actuator “SparkJet” concept. The single-pulsed characteristics of the control device are obtained and compared with the experiments. Instantaneous flowfield shows that the “SparkJet” promotes the flow mixing in the boundary layer and enhances its ability to resist the flow separation. The time and spanwise averaged skin friction coefficient distribution demonstrates that the separation bubble length is reduced by maximum 35% with the control exerted.

  1. Laminar and turbulent boundary layer separation control of Mako shark skin

    NASA Astrophysics Data System (ADS)

    Afroz, Farhana

    The Shortfin Mako shark (Isurus oxyrinchus) is one of the fastest swimmers in nature. They have an incredible turning agility and are estimated to achieve speeds as high as ten body lengths per second. Shark skin is known to contain flexible denticles or scales, capable of being actuated by the flow whereby a unique boundary layer control (BLC) method could reduce drag. It is hypothesized that shark scales bristle when the flow is reversed, and this bristling may serve to control flow separation by (1) inhibiting the localized flow reversal near the wall and (2) inducing mixing within the boundary layer by cavities formed between the scales that increases the momentum of the flow near the wall. To test this hypothesis, samples of Mako shark skin have been studied under various amounts of adverse pressure gradient (APG). These samples were collected from the flank region of a Shortfin Mako shark where the scales have the greatest potential for separation control due to the highest bristling angles. An easy technique for inducing boundary layer separation has been developed where an APG can be generated and varied using a rotating cylinder. Both the experimental and numerical studies showed that the amount of APG can be varied as a function of cylinder rotation speed or cylinder gap height for a wide range of Reynolds numbers. This method of generating an APG is used effectively for inducing both laminar and turbulent boundary layer separation over a flat plate. Laminar and turbulent boundary layer separation studies conducted over a smooth plate have been compared with the same setup repeated over shark skin. The time-averaged DPIV results showed that shark scale bristling controlled both laminar and turbulent boundary layer separation to a measurable extent. It shows that the shark scales cause an early transition to turbulence and reduce the degree of laminar separation. For turbulent separation, reverse flow near the wall and inside the boundary layer is

  2. Effect of the control of global planarity of intermetal dielectric layers on the lithographic process window

    NASA Astrophysics Data System (ADS)

    Keysar, Shani; Markowitz, Leah; Ben-Gigi, Corin; Tweg, Rama; Margalit-Ilovich, Ayelet; Kepten, Avishai; Wachs, Amir; Shaviv, Roey

    1999-06-01

    The sensitivity of lithographic process window to global planarity of the inter metal dielectric layers is established in this work. The inter metal dielectric layers, between the metal layers, were prepared by utilizing the H2O2/SiH4 chemistry known as the 'Advanced Planarity Layer (APL)'. Four degrees of global planarity were tested within the APL process window, utilizing different H2O2 stabilization pressures. SEM cross sections were used to determine the degree of planarity in the CMOS product and at lithographic test structures. The lithographic process window and the effect of the stepper leveling system were defined for typical high and low topographies. The results how a strong link between the lithographic process window to degree of global planarity of the APL. Good global planarity enlarged depth of focus and energy latitude, allowing a wider lithographic process window. Also, in cases of improved APL planarity, the stepper leveling system had only a limited contribution to a lithographic process window. This control over the global planarity of the inter metal dielectric layers and the wide lithographic process window that results eliminate the need for CMP at 0.5 (mu) technology.

  3. Controlled MoS2 layer etching using CF4 plasma

    NASA Astrophysics Data System (ADS)

    Jeon, Min Hwan; Ahn, Chisung; Kim, HyeongU; Kim, Kyong Nam; Zhe LiN, Tai; Qin, Hongyi; Kim, Yeongseok; Lee, Sehan; Kim, Taesung; Yeom, Geun Young

    2015-09-01

    A few-layered molybdenum disulfide (MoS2) thin film grown by plasma enhanced chemical vapor deposition was etched using a CF4 inductively coupled plasma, and the possibility of controlling the MoS2 layer thickness to a monolayer of MoS2 over a large area substrate was investigated. In addition, damage and contamination of the remaining MoS2 layer surface after etching and a possible method for film recovery was also investigated. The results from Raman spectroscopy and atomic force microscopy showed that one monolayer of MoS2 was etched by exposure to a CF4 plasma for 20 s after an initial incubation time of 20 s, i.e., the number of MoS2 layers could be controlled by exposure to the CF4 plasma for a certain processing time. However, XPS data showed that exposure to CF4 plasma induced a certain amount of damage and contamination by fluorine of the remaining MoS2 surface. After exposure to a H2S plasma for more than 10 min, the damage and fluorine contamination of the etched MoS2 surface could be effectively removed.

  4. Controllable fabrication of nanostructured materials for photoelectrochemical water splitting via atomic layer deposition.

    PubMed

    Wang, Tuo; Luo, Zhibin; Li, Chengcheng; Gong, Jinlong

    2014-11-21

    Photoelectrochemical (PEC) water splitting is an attractive approach to generate hydrogen as a clean chemical fuel from solar energy. But there remain many fundamental issues to be solved, including inadequate photon absorption, short carrier diffusion length, surface recombination, vulnerability to photo-corrosion, and unfavorable reaction kinetics. Owing to its self-limiting surface reaction mechanism, atomic layer deposition (ALD) is capable of depositing thin films in a highly controllable manner, which makes it an enabling technique to overcome some of the key challenges confronted by PEC water splitting. This tutorial review describes some unique and representative applications of ALD in fabricating high performance PEC electrodes with various nanostructures, including (i) coating conformal thin films on three-dimensional scaffolds to facilitate the separation and migration of photocarriers and enhance light trapping, as well as realizing controllable doping for bandgap engineering and forming homojunctions for carrier separation; (ii) achieving surface modification through deposition of anti-corrosion layers, surface state passivation layers, and surface catalytic layers; and (iii) identifying the main rate limiting steps with model electrodes with highly defined thickness, composition, and interfacial structure. PMID:24500041

  5. The role of matrix proteins in the control of nacreous layer deposition during pearl formation

    PubMed Central

    Liu, Xiaojun; Li, Jiale; Xiang, Liang; Sun, Juan; Zheng, Guilan; Zhang, Guiyou; Wang, Hongzhong; Xie, Liping; Zhang, Rongqing

    2012-01-01

    To study the function of pearl oyster matrix proteins in nacreous layer biomineralization in vivo, we examined the deposition on pearl nuclei and the expression of matrix protein genes in the pearl sac during the early stage of pearl formation. We found that the process of pearl formation involves two consecutive stages: (i) irregular calcium carbonate (CaCO3) deposition on the bare nucleus and (ii) CaCO3 deposition that becomes more and more regular until the mature nacreous layer has formed on the nucleus. The low-expression level of matrix proteins in the pearl sac during periods of irregular CaCO3 deposition suggests that deposition may not be controlled by the organic matrix during this stage of the process. However, significant expression of matrix proteins in the pearl sac was detected by day 30–35 after implantation. On day 30, a thin layer of CaCO3, which we believe was amorphous CaCO3, covered large aragonites. By day 35, the nacreous layer had formed. The whole process is similar to that observed in shells, and the temporal expression of matrix protein genes indicated that their bioactivities were crucial for pearl development. Matrix proteins controlled the crystal phase, shape, size, nucleation and aggregation of CaCO3 crystals. PMID:21900328

  6. Controlling multidrug-resistant tuberculosis and access to expensive drugs: a rational framework.

    PubMed Central

    Pablos-Mendez, Ariel; Gowda, Deepthiman K.; Frieden, Thomas R.

    2002-01-01

    The emergence and spread of multidrug-resistant tuberculosis (MDR-TB), i.e. involving resistance to at least isoniazid and rifampicin, could threaten the control of TB globally. Controversy has emerged about the best way of confronting MDR-TB in settings with very limited resources. In 1999, the World Health Organization (WHO) created a working group on DOTS-Plus, an initiative exploring the programmatic feasibility and cost-effectiveness of treating MDR-TB in low-income and middle-income countries, in order to consider the management of MDR-TB under programme conditions. The challenges of implementation have proved more daunting than those of access to second-line drugs, the prices of which are dropping. Using data from the WHO/International Union Against Tuberculosis and Lung Disease surveillance project, we have grouped countries according to the proportion of TB patients completing treatment successfully and the level of MDR-TB among previously untreated patients. The resulting matrix provides a reasonable framework for deciding whether to use second-line drugs in a national programme. Countries in which the treatment success rate, i.e. the proportion of new patients who complete the scheduled treatment, irrespective of whether bacteriological cure is documented, is below 70% should give the highest priority to introducing or improving DOTS, the five-point TB control strategy recommended by WHO and the International Union Against Tuberculosis and Lung Disease. A poorly functioning programme can create MDR-TB much faster than it can be treated, even if unlimited resources are available. There is no single prescription for controlling MDR-TB but the various tools available should be applied wisely. Firstly, good DOTS and infection control; then appropriate use of second-line drug treatment. The interval between the two depends on the local context and resources. As funds are allocated to treat MDR-TB, human and financial resources should be increased to expand

  7. Layer-controlled stylolite growth and the creation and destruction of local seals

    NASA Astrophysics Data System (ADS)

    Koehn, Daniel; Pataki Rood, Daisy; Beaudoin, Nicolas; Aleksans, Janis; Bons, Paul; Gomez-Rivas, Enrique

    2015-04-01

    Cores of carbonate Zechstein sediments in the Lean Gas Field in northern Germany show a dense set of sedimentary stylolites. We studied these structures in detail using scans of cores, thin-sections, roughness analysis, SEM-EDS studies and a set of numerical simulations in order to understand timing and depth of stylolite growth, the development of varying stylolite patterns and their influence on fluid flow. The studied cores have a depth of about 4000m and it is expected that they experienced a minor inversion in the Cretaceous so that their original depth may have been up to 4500m. We studied the roughness of the stylolites and used a stress inversion technique to determine the depth at which they grew. The determined depth of growth is in the order of 4150m with an error of plus-minus 300m. This value represents the latest stylolite activity and indicates that they have been active until late in the burial history. SEM and EDS analysis on stylolite thin sections shows that the stylolites separate strongly dedolomitized sections from sections that still contain a large amount of dolomite. In addition stylolite seams capture or shield dolomitized parts of the rock. Dissolution holes are also partly linked to stylolite teeth indicating that fluid flow is significantly influenced by the presence of stylolites. Stylolite shapes and thus potentially their sealing capacity vary significantly throughout the cores from flat stylolites to small wavy ones all the way to stylolites showing extreme spikes and teeth. Quite often dark layers seem to control stylolite shapes. In order to understand the influence of layers on stylolite growth we use a numerical model that can treat the dynamics of the process linking elasticity with a dissolution routine. In this model we find that layers that dissolve slower can pin stylolite teeth and thus develop extremely long and spiky geometries. Growth typically happens in two to three stages depending on whether or not the pinning layer

  8. A layered approach to structural control system design for the JPL phase B testbed

    NASA Technical Reports Server (NTRS)

    Chu, Cheng-Chih; O'Brien, John

    1993-01-01

    This paper describes our efforts in structural control experiments for a flexible precision structure using both passive and active control. Specifically, a layered structural control approach utilizing passive viscous dampers, colocated and noncolocated active control is used. The passive dampers and active colocated control loops are used to enhance stability and robustness and the noncolocated multivariable controller is designed with respect to a partially controlled structure to further improve the performance. Our approach to the multivariable design problem requires not only a state space model description of the plant, but also an accompanying uncertainty model. To support the multivariable robust control design development, a significant effort in system identification was undertaken. The process of identification and identified results are discussed. Noncolocated controllers are designed using the H(infinity)/mu-synthesis methodology. The order of the controller is typically large, hence, model reduction is performed for practical digital implementation on a real-time control system developed at JPL. Finally, experimental results are presented and some of lessons are discussed.

  9. A Multi-Domain Access Control Infrastructure Based on Diameter and EAP

    NASA Astrophysics Data System (ADS)

    Ben Ayed, Souheil; Teraoka, Fumio

    The evolution of Internet, the growth of Internet users and the new enabled technological capabilities place new requirements to form the Future Internet. Many features improvements and challenges were imposed to build a better Internet, including securing roaming of data and services over multiple administrative domains. In this research, we propose a multi-domain access control infrastructure to authenticate and authorize roaming users through the use of the Diameter protocol and EAP. The Diameter Protocol is a AAA protocol that solves the problems of previous AAA protocols such as RADIUS. The Diameter EAP Application is one of Diameter applications that extends the Diameter Base Protocol to support authentication using EAP. The contributions in this paper are: 1) first implementation of Diameter EAP Application, called DiamEAP, capable of practical authentication and authorization services in a multi-domain environment, 2) extensibility design capable of adding any new EAP methods, as loadable plugins, without modifying the main part, and 3) provision of EAP-TLS plugin as one of the most secure EAP methods. DiamEAP Server basic performances were evaluated and tested in a real multi-domain environment where 200 users attempted to access network using the EAP-TLS method during an event of 4 days. As evaluation results, the processing time of DiamEAP using the EAP-TLS plugin for authentication of 10 requests is about 20ms while that for 400 requests/second is about 1.9 second. Evaluation and operation results show that DiamEAP is scalable and stable with the ability to handle more than 6 hundreds of authentication requests per second without any crashes. DiamEAP is supported by the AAA working group of the WIDE Project.

  10. Adaptive sliding mode control of tri-layer conjugated polymer actuators

    NASA Astrophysics Data System (ADS)

    Wang, Xiangjiang; Alici, Gursel; Nguyen, Chuc Huu

    2013-02-01

    This paper proposes an adaptive sliding mode control methodology to enhance the positioning ability of conducting polymer actuators typified by tri-layer conjugated polymer actuators. This is motivated by the search for an effective control strategy to command such actuators to a desired configuration in the presence of parametric uncertainties and unmodeled disturbances. After analyzing the stability of the adaptive sliding mode control system, experiments were conducted to demonstrate its satisfactory tracking ability, based on a series of experimental results. Implementation of the control law requires a valid model of the conducting polymer actuator and boundaries of the uncertainties and disturbances. Based on the theoretical and experimental results presented, the adaptive sliding mode control methodology is very attractive in the field of smart actuators which contain significant uncertainties and disturbances.

  11. Liquid crystal pretilt angle control using adjustable wetting properties of alignment layers

    SciTech Connect

    Ahn, Han Jin; Kim, Jong Bok; Kim, Kyung Chan; Hwang, Byoung Har; Kim, Jong Tae; Baik, Hong Koo; Park, Jin Seol; Kang, Daeseung

    2007-06-18

    The authors demonstrate the production of amorphous fluorinated carbon (a-C:F) thin film with adjustable wetting properties, inducing variable liquid crystal (LC) pretilt angles. To control the surface wetting properties, they apply a dual radio frequency magnetron system with a controlled power ratio of targets. In this manner we obtain various compositional surfaces with fluorine and carbon components and adjust the surface energy with regard to the various compositions. Whereas the fluorine-rich a-C:F layer shows a preference for homeotropic (vertical) LC alignment, the carbon-rich a-C:F layer shows a planar LC alignment. To achieve uniform LC alignment with a proper pretilt angle, an accelerated Ar{sup +} ion beam irradiates the films after the deposition process. The ion beam selectively destroys the surface bonding of the a-C:F films, yielding an intermediate pretilt angle.

  12. A self-excited wire method for control of the evolution of a turbulent mixing layer

    NASA Astrophysics Data System (ADS)

    Vandsburger, U.; Ding, C.

    1993-01-01

    A new technique for the control of the evolution of a turbulent two-stream (planar) mixing layer is presented. A (music) wire strung across the flow and placed in the zone near the trailing edge of the splitter plate is employed to excite the flow. The vibrating wire triggers the shedding of multiple vortical structures in the near field, and eventually locks the large coherent structures to the excitation frequency in the far field.

  13. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    NASA Astrophysics Data System (ADS)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  14. Hot-Film and Hot-Wire Anemometry for a Boundary Layer Active Flow Control Test

    NASA Technical Reports Server (NTRS)

    Lenahan, Keven C.; Schatzman, David M.; Wilson, Jacob Samuel

    2013-01-01

    Unsteady active flow control (AFC) has been used experimentally for many years to minimize bluff-body drag. This technology could significantly improve performance of rotorcraft by cleaning up flow separation. It is important, then, that new actuator technologies be studied for application to future vehicles. A boundary layer wind tunnel was constructed with a 1ft-x-3ft test section and unsteady measurement instrumentation to study how AFC manipulates the boundary layer to overcome adverse pressure gradients and flow separation. This unsteady flow control research requires unsteady measurement methods. In order to measure the boundary layer characteristics, both hot-wire and hot-film Constant Temperature Anemometry is used. A hot-wire probe is mounted in the flow to measure velocity while a hot-film array lays on the test surface to measure skin friction. Hot-film sensors are connected to an anemometer, a Wheatstone bridge circuit with an output that corresponds to the dynamic flow response. From this output, the time varying flow field, turbulence, and flow reversal can be characterized. Tuning the anemometers requires a fan test on the hot-film sensors to adjust each output. This is a delicate process as several variables drastically affect the data, including control resistance, signal input, trim, and gain settings.

  15. Control of shock-wave boundary layer interaction using steady micro-jets

    NASA Astrophysics Data System (ADS)

    Verma, S. B.; Manisankar, C.; Akshara, P.

    2015-09-01

    An experimental investigation was conducted to control the amplitude of shock unsteadiness associated with the interaction induced by a cylindrical protuberance on a flat plate in a Mach 2.18 flow. The control was applied in the form of an array of steady micro air-jets of different configurations with variation in pitch and skew angle of the jets. The effect of air-jet supply pressure on control was also studied. Each of the micro-jet configurations was placed 20 boundary layer thicknesses upstream of the leading edge of the cylinder. The overall interaction is seen to get modified for all control configurations and shows a reduction in both separation- and bow-shock strengths and in triple-point height. A significant reduction in the peak rms value is also observed in the intermittent region of separation for each case. For pitched jets placed in a zig-zag configuration, good control effectiveness is achieved at control pressures similar to the stagnation pressure of the freestream. At higher control pressures, however, their obstruction component increases and if these jets are not spaced sufficiently far apart, the effectiveness of their control begins to drop due to the beginning of spanwise jet-to-jet interaction. On the other hand, pitching or skewing the jets to reduces the obstruction component considerably which at lower control pressures shows lower effectiveness. But at higher control pressure, the effectiveness of these configurations continues to increase unlike the pitched jets.

  16. Suppression of vortex-induced vibration using moving surface boundary-layer control

    NASA Astrophysics Data System (ADS)

    Korkischko, I.; Meneghini, J. R.

    2012-10-01

    Experimental results of flow around a circular cylinder with moving surface boundary-layer control (MSBC) are presented. Two small rotating cylinders strategically located inject momentum in the boundary layer of the cylinder, which delays the separation of the boundary layer. As a consequence, the wake becomes narrower and the fluctuating transverse velocity is reduced, resulting in a recirculation free region that prevents the vortex formation. The control parameter is the ratio between the tangential velocity of the moving surface and the flow velocity (Uc/U). The main advantage of the MSBC is the possibility of combining the suppression of vortex-induced vibration (VIV) and drag reduction. The experimental tests are preformed at a circulating water channel facility and the circular cylinders are mounted on a low-damping air bearing base with one degree-of-freedom in the transverse direction of the channel flow. The mass ratio is 1.8. The Reynolds number ranges from 1600 to 7500, the reduced velocity varies up to 17, and the control parameter interval is Uc/U=5-10. A significant decreasing in the maximum amplitude of oscillation for the cylinder with MSBC is observed. Drag measurements are obtained for statically mounted cylinders with and without MSBC. The use of the flow control results in a mean drag reduction at Uc/U=5 of almost 60% compared to the plain cylinder. PIV velocity fields of the wake of static cylinders are measured at Re=3000. The results show that the wake is highly organized and narrower compared to the one observed in cylinders without control. The calculation of the total variance of the fluctuating transverse velocity in the wake region allows the introduction of an active closed-loop control. The experimental results are in good agreement with the numerical simulation studies conducted by other researchers for cylinders with MSBC.

  17. Effect of Suction on Controlling the Secondary Instability of Boundary Layers

    NASA Technical Reports Server (NTRS)

    El-Hady, Nabil M.

    1990-01-01

    The effect of suction on controlling the 3-D secondary instability is investigated for a boundary layer with pressure gradient in the presence of small but finite amplitude Tollmien-Schlichting wave. The focus is on principal parametric resonance responsible for strong growth of subharmonics in low disturbance environment. Calculations are presented for the effect of suction on the onset and amplification of the secondary instability in Blasius and Falkner-Skan flows, as well as its effect on controlling the production of the vortical structure.

  18. Control of the vortical structure in the early stages of transition in boundary layers

    NASA Technical Reports Server (NTRS)

    El-Hady, Nabil M.

    1990-01-01

    The effect of suction and pressure gradient on controlling the production of the three-dimensional vortical structure due to secondary instability is investigated for a boundary layer in the presence of small but finite amplitude Tollmien-Schlichting wave. The subharmonic instability is the focus of the study due to its realistic application in low disturbance flight environment. The spanwise wavelength of the most unstable secondary subharmonic disturbance increases with the increase of control indicating possible alteration of the flow structure from H-type to C-type.

  19. Effect of suction on controlling the secondary instability of boundary layers

    NASA Technical Reports Server (NTRS)

    El-Hady, Nabil M.

    1991-01-01

    The effect of suction on controlling the three-dimensional secondary instability is investigated for a boundary layer with a pressure gradient in the presence of a small but finite-amplitude Tollmien-Schlichting wave. The focus is on the principal parametric resonance responsible for the strong growth of subharmonics in a low disturbance environment. Calculations are presented for the effect of suction on the onset and amplification of the secondary instability in Blasius and Falkner-Skan flows, as well as its effect on controlling the production of the vortical structure.

  20. Microwave absorption properties of carbon nanocoils coated with highly controlled magnetic materials by atomic layer deposition.

    PubMed

    Wang, Guizhen; Gao, Zhe; Tang, Shiwei; Chen, Chaoqiu; Duan, Feifei; Zhao, Shichao; Lin, Shiwei; Feng, Yuhong; Zhou, Lei; Qin, Yong

    2012-12-21

    In this work, atomic layer deposition is applied to coat carbon nanocoils with magnetic Fe(3)O(4) or Ni. The coatings have a uniform and highly controlled thickness. The coated nanocoils with coaxial multilayer nanostructures exhibit remarkably improved microwave absorption properties compared to the pristine carbon nanocoils. The enhanced absorption ability arises from the efficient complementarity between complex permittivity and permeability, chiral morphology, and multilayer structure of the products. This method can be extended to exploit other composite materials benefiting from its convenient control of the impedance matching and combination of dielectric-magnetic multiple loss mechanisms for microwave absorption applications. PMID:23171130

  1. Graphene coated with controllable N-doped carbon layer by molecular layer deposition as electrode materials for supercapacitors

    NASA Astrophysics Data System (ADS)

    Chen, Yao; Gao, Zhe; Zhang, Bin; Zhao, Shichao; Qin, Yong

    2016-05-01

    In this work, graphene is coated with nitrogen-doped carbon layer, which is produced by a carbonization process of aromatic polyimide (PI) films deposited on the surfaces of graphene by molecular layer deposition (MLD). The utilization of MLD not only allows uniform coating of PI layers on the surfaces of pristine graphene without any surface treatment, but also enables homogenous dispersion of doped nitrogen atoms in the carbonized products. The as-prepared N-doped carbon layer coated graphene (NC-G) exhibited remarkable capacitance performance as electrode materials for supercapacitor, showing a high specific capacitance of 290.2 F g-1 at current density of 1 A g-1 in 6 M KOH aqueous electrolyte, meanwhile maintaining good rate performance and stable cycle capability. The NC-G synthesized by this way represents an alternative promising candidate as electrode material for supercapacitors.

  2. Physical-layer energy-efficient receiving method based on selective sampling in orthogonal frequency division multiplexing access passive optical network

    NASA Astrophysics Data System (ADS)

    Li, Jun; He, Hao; Bi, Meihua; Hu, Weisheng

    2014-05-01

    We propose a physical-layer energy-efficient receiving method based on selective sampling in an orthogonal frequency division multiplexing access passive optical network (OFDMA-PON). By using the special designed frame head, the receiver within an optical network unit (ONU) can identify the destination of the incoming frame. The receiver only samples at the time when the destination is in agreement with the ONU, while it stays in standby during the rest of the time. We clarify its feasibility through an experiment and analyze the downstream traffic delay by simulation. The results indicate that under limited delay conditions, ˜60% energy can be saved compared with the traditional receiving method in the OFDMA-PON system with 512 ONUs.

  3. Template-Free 3D Microprinting of Metals Using a Force-Controlled Nanopipette for Layer-by-Layer Electrodeposition.

    PubMed

    Hirt, Luca; Ihle, Stephan; Pan, Zhijian; Dorwling-Carter, Livie; Reiser, Alain; Wheeler, Jeffrey M; Spolenak, Ralph; Vörös, János; Zambelli, Tomaso

    2016-03-23

    A novel 3D printing method for voxel-by-voxel metal printing is presented. Hollow atomic force microscopy (AFM) cantilevers are used to locally supply metal ions in an electrochemical cell, enabling a localized electroplating reaction. By exploiting the deflection feedback of these probes, electrochemical 3D metal printing is, for the first time, demonstrated in a layer-by-layer fashion, enabling the fabrication of arbitrary-shaped geometries. PMID:26783090

  4. Active Control of Turbulent Boundary Layer Induced Sound Radiation from Multiple Aircraft Panels

    NASA Technical Reports Server (NTRS)

    Gibbs, Gary P.; Cabell, Randolph H.

    2002-01-01

    The objective of this work is to experimentally investigate active structural acoustic control of turbulent boundary layer (TBL) induced sound radiation from multiple panels on an aircraft sidewall. One possible approach for controlling sound radiation from multiple panels is a multi-input/multi-output scheme which considers dynamic coupling between the panels. Unfortunately, this is difficult for more than a few panels, and is impractical for a typical aircraft which contains several hundred such panels. An alternative is to implement a large number of independent control systems. Results from the current work demonstrate the feasibility of reducing broadband radiation from multiple panels utilizing a single-input/single-output (SISO) controller per bay, and is the first known demonstration of active control of TBL induced sound radiation on more than two bays simultaneously. The paper compares sound reduction for fully coupled control of six panels versus independent control on each panel. An online adaptive control scheme for independent control is also demonstrated. This scheme will adjust for slow time varying dynamic systems such as fuselage response changes due to aircraft pressurization, etc.

  5. Coherent Control of the Optical Absorption in a Plasmonic Lattice Coupled to a Luminescent Layer

    NASA Astrophysics Data System (ADS)

    Pirruccio, Giuseppe; Ramezani, Mohammad; Rodriguez, Said Rahimzadeh-Kalaleh; Rivas, Jaime Gómez

    2016-03-01

    We experimentally demonstrate the coherent control, i.e., phase-dependent enhancement and suppression, of the optical absorption in an array of metallic nanoantennas covered by a thin luminescent layer. The coherent control is achieved by using two collinear, counterpropagating, and phase-controlled incident waves with wavelength matching the absorption spectrum of dye molecules coupled to the array. Symmetry arguments shed light on the relation between the relative phase of the incident waves and the excitation efficiency of the optical resonances of the system. This coherent control is associated with a phase-dependent distribution of the electromagnetic near fields in the structure which enables a significant reduction of the unwanted dissipation in the metallic structures.

  6. Coherent Control of the Optical Absorption in a Plasmonic Lattice Coupled to a Luminescent Layer.

    PubMed

    Pirruccio, Giuseppe; Ramezani, Mohammad; Rodriguez, Said Rahimzadeh-Kalaleh; Rivas, Jaime Gómez

    2016-03-11

    We experimentally demonstrate the coherent control, i.e., phase-dependent enhancement and suppression, of the optical absorption in an array of metallic nanoantennas covered by a thin luminescent layer. The coherent control is achieved by using two collinear, counterpropagating, and phase-controlled incident waves with wavelength matching the absorption spectrum of dye molecules coupled to the array. Symmetry arguments shed light on the relation between the relative phase of the incident waves and the excitation efficiency of the optical resonances of the system. This coherent control is associated with a phase-dependent distribution of the electromagnetic near fields in the structure which enables a significant reduction of the unwanted dissipation in the metallic structures. PMID:27015478

  7. Control of the crystalline structure of inkjet-printed semiconductor layers using overlap condition and surface wettability

    NASA Astrophysics Data System (ADS)

    Kang, Byung Ju; Oh, Je Hoon

    2015-05-01

    We demonstrate the effects of overlap condition and surface wettability of dielectric layers on the drying process and crystalline structure of inkjet-printed semiconductor layers. 6,13-bis(triisopropylsilylethynyl) pentacene (TIPS pentacene) was utilized to inkjet-print the semiconductor layer. Using various overlap conditions, semiconductor layers were inkjet-printed on dielectric layers with different surface wettabilities. It is observed that crystal growth and the resulting crystalline structures in inkjet-printed semiconductor layers are primarily determined by evaporation behavior, particularly the contact line movement of the drying semiconductor layers, which can be controlled via the overlap condition. With inappropriate overlap conditions, randomly oriented TIPS pentacene crystalline structures are generated in the semiconductor layer through irregular contact line recession. One-dimensionally oriented TIPS pentacene crystal structures can be obtained using the optimized overlap condition of 50% as a result of the uniform contact line movement. Relatively hydrophobic dielectric layers help to generate good crystallinity in the semiconductor layer. All-inkjet-printed organic thin film transistors (OTFTs) with well-oriented TIPS pentacene crystalline structures in the semiconductor layer show a high field effect mobility of ~0.1 cm2 V-1s-1, suggesting that, when printing inkjet semiconductor layers, the overlap condition and surface wettability of the dielectric layer are important factors for generating a well-oriented crystalline structure and thereby fabricating high-performance all-inkjet-printed OTFTs.

  8. Shock Wave/Boundary Layer Interaction Control in a Supersonic Inlet

    NASA Astrophysics Data System (ADS)

    Webb, Nathan; Caraballo, Edgar; Little, Jesse; Kim, Jin-Hwa; Samimy, Mo

    2009-11-01

    A shock wave/boundary layer interaction (SWBLI) occurs in a supersonic mixed compression inlet. The SWBLI could cause boundary layer separation resulting in adverse consequences such as reduced pressure recovery and non-uniform fan loading. Boundary layer bleed is currently used to prevent separation, which incurs a significant performance penalty. We have recently used Localized Arc Filament Plasma Actuators (LAFPAs) with high amplitude and wide bandwidth to control the SWBLI in a Mach 1.9 flow. The preliminary results are promising and show excellent potential for this technique. These actuators may affect the SWBLI by two mechanisms: manipulation of flow instabilities and/or streamwise vorticity generation. Particle image velocimetry measurements have confirmed that instability manipulation is the key to the LAFPAs' ability to significantly energize the boundary layer in the interaction region. The streamwise vorticity effects are currently being investigated. The LAFPAs have been tested at varying frequency, duty cycle, and mode to determine the parameters with the maximum effectiveness. Supported by AFRL and AFOSR.

  9. Controlling turbulent boundary layer separation using biologically inspired 2D transverse grooves

    NASA Astrophysics Data System (ADS)

    Lang, Amy; Jones, Emily; Afroz, Farhana

    2013-11-01

    It is theorized that the presence of grooves, such as the sinusoidal ones found on dolphin skin or the cavities that form between bristled shark skin scales, can lead to induced boundary layer mixing and result in the control of turbulent boundary layer separation. To test this hypothesis, a series of water tunnel experiments using DPIV studied the characteristics of a flat plate turbulent boundary layer whereby a rotating cylinder was used to induce an adverse pressure gradient and resulting flow separation. The experiments were repeated with the use of a plate covered with two types of grooves, rectangular and sinusoidal, with a spacing of 2 mm in size. Flow similarity of the cavity flow was preserved between the experiments and flow over bristled shark skin scales. Both geometries resulted in a reduction of flow separation as measured by backflow coefficient. In addition, Reynolds stress profiles showed that as the pressure gradient was increased, the sinusoidal geometry outperformed the rectangular grooves in terms of increased mixing close to the wall. The sinusoidal plate also generated a lower momentum deficit within the boundary layer which would indicate a smaller drag penalty. Support from NSF grant CBET 0932352 and a UA Graduate Council Fellowship is gratefully acknowledged.

  10. Research Update: Magnetoionic control of magnetization and anisotropy in layered oxide/metal heterostructures

    NASA Astrophysics Data System (ADS)

    Duschek, K.; Pohl, D.; Fähler, S.; Nielsch, K.; Leistner, K.

    2016-03-01

    Electric field control of magnetization and anisotropy in layered structures with perpendicular magnetic anisotropy is expected to increase the versatility of spintronic devices. As a model system for reversible voltage induced changes of magnetism by magnetoionic effects, we present several oxide/metal heterostructures polarized in an electrolyte. Room temperature magnetization of Fe-O/Fe layers can be changed by 64% when applying only a few volts in 1M KOH. In a next step, the bottom interface of the in-plane magnetized Fe layer is functionalized by an L10 FePt(001) underlayer exhibiting perpendicular magnetic anisotropy. During subsequent electrocrystallization and electrooxidation, well defined epitaxial Fe3O4/Fe/FePt heterostructures evolve. The application of different voltages leads to a thickness change of the Fe layer sandwiched between Fe-O and FePt. At the point of transition between rigid magnet and exchange spring magnet regime for the Fe/FePt bilayer, this induces a large variation of magnetic anisotropy.

  11. Multi-wavelength lasers fabricated by an Al layer controlled quantum well intermixing technology

    NASA Astrophysics Data System (ADS)

    Teng, J. H.; Chua, S. J.; Huang, Y. H.; Li, G.; Zhang, Z. H.; Helmy, A. Saher; Marsh, J. H.

    2000-09-01

    We report that the shift in the band gap of Al0.3Ga0.7As/GaAs quantum well structures can be precisely controlled by an Al layer buried between a spin-on silica film and a wet-oxidized GaAs surface. The blueshift in wavelength of the Al0.3Ga0.7As/GaAs quantum well photoluminescence (PL) depends linearly on the thickness of the buried Al layer. By changing the Al layer thickness, the PL peak wavelength can be tuned from 7870 Å for the as-grown sample to 7300 and 7050 Å after 20 and 45 s rapid thermal annealing at 850 °C, respectively. Applying this technology, Al layers with different thickness, i.e., no Al, 200 and 300 Å thick, were applied to the oxidized GaAs surface in three adjacent regions with 200 μm spacing on a quantum well laser structure sample. Three wavelength lasers were successfully fabricated in a single chip by a one step rapid thermal annealing. All the lasers have similar threshold current and slope efficiency.

  12. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    NASA Astrophysics Data System (ADS)

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  13. Control of electronic properties of 2D carbides (MXenes) by manipulating their transition metal layers

    DOE PAGESBeta

    Anasori, Babak; Shi, Chenyang; Moon, Eun Ju; Xie, Yu; Voigt, Cooper A.; Kent, Paul R. C.; May, Steven J.; Billinge, Simon J. L.; Barsoum, Michel W.; Gogotsi, Yury

    2016-02-24

    In this paper, a transition from metallic to semiconducting-like behavior has been demonstrated in two-dimensional (2D) transition metal carbides by replacing titanium with molybdenum in the outer transition metal (M) layers of M3C2 and M4C3 MXenes. The MXene structure consists of n + 1 layers of near-close packed M layers with C or N occupying the octahedral site between them in an [MX]nM arrangement. Recently, two new families of ordered 2D double transition metal carbides MXenes were discovered, M'2M"C2 and M'2M"2C3 – where M' and M" are two different early transition metals, such as Mo, Cr, Ta, Nb, V, andmore » Ti. The M' atoms only occupy the outer layers and the M" atoms fill the middle layers. In other words, M' atomic layers sandwich the middle M"–C layers. Using X-ray atomic pair distribution function (PDF) analysis on Mo2TiC2 and Mo2Ti2C3 MXenes, we present the first quantitative analysis of structures of these novel materials and experimentally confirm that Mo atoms are in the outer layers of the [MC]nM structures. The electronic properties of these Mo-containing MXenes are compared with their Ti3C2 counterparts, and are found to be no longer metallic-like conductors; instead the resistance increases mildly with decreasing temperatures. Density functional theory (DFT) calculations suggest that OH terminated Mo–Ti MXenes are semiconductors with narrow band gaps. Measurements of the temperature dependencies of conductivities and magnetoresistances have confirmed that Mo2TiC2Tx exhibits semiconductor-like transport behavior, while Ti3C2Tx is a metal. Finally, this finding opens new avenues for the control of the electronic and optical applications of MXenes and for exploring new applications, in which semiconducting properties are required.« less

  14. Large-Area Quality Control of Atomically-Thin Layered Materials

    NASA Astrophysics Data System (ADS)

    Nolen, Craig Merten

    Fast progress in chemical vapor deposition of graphene and other quasi-two-dimensional layered materials such as topological insulators call for development of a reliable high-throughput method of layered materials identification and quality control. The number of atomic planes in graphene or other ultra-thin films has to be determined very fast and over large wafer-scale areas. The previously existed methods of accurate counting of the number of atomic planes in few-layer graphene were primarily based on micro-Raman spectroscopy. These methods were local, slow, and could not be scaled up to characterize the whole wafers. In this dissertation research I proposed and developed an automatic approach for graphene inspection over the wafer-size areas. The proposed method can be scaled up for industrial use. It is based on the image processing analysis of the pseudo-color contrasts uniquely assigned to each few-layer graphene region characterized by a specific number of atomic planes. The initial calibration of the technique is performed with the help of micro-Raman spectroscopy. The image processing is also used to account for the lighting non-uniformity of the samples. Implementation of the technique developed in this dissertation research reduces the cost and time required for graphene identification and quality assessment, and can become the next major impetus for practical applications of graphene, few-layer graphene and other atomically-thin films. The technique was tested on mechanically exfoliated graphene and then extended to the chemical-vapor-deposited graphene, and to bismuth telluride topological insulator thin films. The second part of the dissertation research deals with development of the electrostatic transfer process. The investigated approach allows one to transfer the patterned few-layer graphene films controllably to Si3N4 substrates compatible with other materials. The large-area quality control and graphene transfer techniques developed in this

  15. Ongoing Spontaneous Activity Controls Access to Consciousness: A Neuronal Model for Inattentional Blindness

    PubMed Central

    2005-01-01

    Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden “ignition” of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of “inattentional blindness,” in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness. PMID:15819609

  16. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon.

    PubMed

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S

    2015-06-15

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome-Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S-RQC and 80S-Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome-translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel. PMID:25877867

  17. Analysis of driver injury severity in wrong-way driving crashes on controlled-access highways.

    PubMed

    Pour-Rouholamin, Mahdi; Zhou, Huaguo

    2016-09-01

    For more than five decades, wrong-way driving (WWD) has been notorious as a traffic safety issue for controlled-access highways. Numerous studies and efforts have tried to identify factors that contribute to WWD occurrences at these sites in order to delineate between WWD and non-WWD crashes. However, none of the studies investigate the effect of various confounding variables on the injury severity being sustained by the at-fault drivers in a WWD crash. This study tries to fill this gap in the existing literature by considering possible variables and taking into account the ordinal nature of injury severity using three different ordered-response models: ordered logit or proportional odds (PO), generalized ordered logit (GOL), and partial proportional odds (PPO) model. The findings of this study reveal that a set of variables, including driver's age, condition (i.e., intoxication), seatbelt use, time of day, airbag deployment, type of setting, surface condition, lighting condition, and type of crash, has a significant effect on the severity of a WWD crash. Additionally, a comparison was made between the three proposed methods. The results corroborate that the PPO model outperforms the other two models in terms of modeling injury severity using our database. Based on the findings, several countermeasures at the engineering, education, and enforcement levels are recommended. PMID:27263080

  18. Controlling the taste receptor accessible structure of rebaudioside A via binding to bovine serum albumin.

    PubMed

    Mudgal, Samriddh; Keresztes, Ivan; Feigenson, Gerald W; Rizvi, S S H

    2016-04-15

    We illustrate a method that uses bovine serum albumin (BSA) to control the receptor-accessible part of rebaudioside A (Reb A). The critical micelle concentration (CMC) of Reb A was found to be 4.5 mM and 5 mM at pH 3 and 6.7 respectively. NMR studies show that below its CMC, Reb A binds weakly to BSA to generate a Reb A-protein complex ("RPC"), which is only modestly stable under varying conditions of pH (3.0-6.7) and temperature (4-40°C) with its binding affinities determined to be in the range of 5-280 mM. Furthermore, saturation transfer difference (STD) NMR experiments confirm that the RPC has fast exchange of the bitterness-instigating diterpene of Reb A into the binding sites of BSA. Our method can be used to alter the strength of Reb A-receptor interaction, as a result of binding of Reb A to BSA, which may ultimately lead to moderation of its taste. PMID:26616927

  19. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  20. An energy-efficient media access control protocol for chain-type wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Wang, Yu; Chen, Chang Wen

    2005-06-01

    We present in this paper an energy efficient media access control (MAC) protocol for chain-type wireless sensor networks. The chain-type sensor networks are fundamentally different from traditional sensor networks in that the sensor nodes in this class of networks are deployed along narrow and elongated geographical areas and form a chain-type topology. Recently, we have successfully developed hierarchical network architecture, sensor deployment strategy, and corresponding network initialization and operation protocols for this class of sensor networks. In this paper, we present a novel TDMA scheduling protocol that takes full advantages of the available channel reuse inherent in the chain-type sensor networks to develop energy efficient and high data throughput MAC protocols for sensor data transmission. The synchronized TDMA scheduling allows the nodes to power on only when it is scheduled to send and receive and therefore results in additional energy saving. Within a cluster, parallel transmission is made possible because of the linear distribution of nodes within the chain-type topology and this yields the desired high throughput. Preliminary simulations have been carried out to show that the proposed TDMA scheduling outperforms the well-know SMAC scheme in terms of energy efficiency and data throughput under various duty cycles.

  1. Correlation of anomalous write error rates and ferromagnetic resonance spectrum in spin-transfer-torque-magnetic-random-access-memory devices containing in-plane free layers

    SciTech Connect

    Evarts, Eric R.; Rippard, William H.; Pufall, Matthew R.; Heindl, Ranko

    2014-05-26

    In a small fraction of magnetic-tunnel-junction-based magnetic random-access memory devices with in-plane free layers, the write-error rates (WERs) are higher than expected on the basis of the macrospin or quasi-uniform magnetization reversal models. In devices with increased WERs, the product of effective resistance and area, tunneling magnetoresistance, and coercivity do not deviate from typical device properties. However, the field-swept, spin-torque, ferromagnetic resonance (FS-ST-FMR) spectra with an applied DC bias current deviate significantly for such devices. With a DC bias of 300 mV (producing 9.9 × 10{sup 6} A/cm{sup 2}) or greater, these anomalous devices show an increase in the fraction of the power present in FS-ST-FMR modes corresponding to higher-order excitations of the free-layer magnetization. As much as 70% of the power is contained in higher-order modes compared to ≈20% in typical devices. Additionally, a shift in the uniform-mode resonant field that is correlated with the magnitude of the WER anomaly is detected at DC biases greater than 300 mV. These differences in the anomalous devices indicate a change in the micromagnetic resonant mode structure at high applied bias.

  2. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  3. Phase control of iridium and iridium oxide thin films in atomic layer deposition

    SciTech Connect

    Kim, Sung-Wook; Kwon, Se-Hun; Kwak, Dong-Kee; Kang, Sang-Won

    2008-01-15

    The atomic layer deposition of iridium (Ir) and iridium oxide (IrO{sub 2}) films was investigated using an alternating supply of (ethylcyclopentadienyl)(1,5-cyclooctadiene) iridium and oxygen gas at temperatures between 230 and 290 deg. C. The phase transition between Ir and IrO{sub 2} occurred at the critical oxygen partial pressure during the oxygen injection pulse. The oxygen partial pressure was controlled by the O{sub 2}/(Ar+O{sub 2}) ratio or deposition pressures. The resistivity of the deposited Ir and IrO{sub 2} films was about 9 and 120 {mu}{omega} cm, respectively. In addition, the critical oxygen partial pressure for the phase transition between Ir and IrO{sub 2} was increased with increasing the deposition temperature. Thus, the phase of the deposited film, either Ir or IrO{sub 2}, was controlled by the oxygen partial pressure and the deposition temperature. However, the formation of a thin Ir layer was detected between the IrO{sub 2} and SiO{sub 2} substrate. To remove this interfacial layer, the oxygen partial pressure is increased to a severe condition. And the impurity contents were below the detection limit of Auger electron spectroscopy in both Ir and IrO{sub 2} films.

  4. Shape and size control of nano dispersed Mg/Al layered double hydroxide.

    PubMed

    Panda, H S; Srivastava, R; Bahadur, D

    2008-08-01

    Controlling the shape and size of the layered inorganic-organic hybrid particles is a challenge with conventional methods of synthesis. The co-precipitation method has been modified to synthesize Mg/Al Layered double hydroxide by controlling the particle growth using ultrasonic wave at the time of nucleation. In this project, magnesium and aluminum ions were considered as model systems with carbonate anion as intercalating agent. The resulting particles are compared with those of LDHs produced by conventional co-precipitation method at constant pH. Powder X-ray diffraction confirmed formation of the layered double hydroxide phases having crystallite size 19-20 nm in both 'a' and 'c' crystallographic directions. Transmission electron microscope and dynamic light scattering revealed nano disperse hexagonal platelets with narrow size distribution and average size was around 48 nm. The modified method reduces the particle size, increases the surface charge, narrows down the size distribution and also reduces the aspect ratio of the particles. Therefore, it is suggested that low amplitude ultrasonic wave prevents the aggregation of the nuclei, thus restricting the particle growth and results in uniform size particles. PMID:19049206

  5. Controllable chemical vapor deposition growth of few layer graphene for electronic devices.

    PubMed

    Wei, Dacheng; Wu, Bin; Guo, Yunlong; Yu, Gui; Liu, Yunqi

    2013-01-15

    Because of its atomic thickness, excellent properties, and widespread applications, graphene is regarded as one of the most promising candidate materials for nanoelectronics. The wider use of graphene will require processes that produce this material in a controllable manner. In this Account, we focus on our recent studies of the controllable chemical vapor deposition (CVD) growth of graphene, especially few-layer graphene (FLG), and the applications of this material in electronic devices. CVD provides various means of control over the morphologies of the produced graph ene. We studied several variables that can affect the CVD growth of graphene, including the catalyst, gas flow rate, growth time, and growth temperature and successfully achieved the controlled growth of hexagonal graphene crystals. Moreover, we developed several modified CVD methods for the controlled growth of FLGs. Patterned CVD produced FLGs with desired shapes in required areas. By introducing dopant precursor in the CVD process, we produced substitutionally doped FLGs, avoiding the typically complicated post-treatment processes for graphene doping. We developed a template CVD method to produce FLG ribbons with controllable morphologies on a large scale. An oxidation-activated surface facilitated the CVD growth of polycrystalline graphene without the use of a metal catalyst or a complicated postgrowth transfer process. In devices, CVD offers a controllable means to modulate the electronic properties of the graphene samples and to improve device performance. Using CVD-grown hexagonal graphene crystals as the channel materials in field-effect transistors (FETs), we improved carrier mobility. Substitutional doping of graphene in CVD opened a band gap for efficient FET operation and modulated the Fermi energy level for n-type or p-type features. The similarity between the chemical structure of graphene and organic semiconductors suggests potential applications of graphene in organic devices. We

  6. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  7. Two-layer wireless distributed sensor/control network based on RF

    NASA Astrophysics Data System (ADS)

    Feng, Li; Lin, Yuchi; Zhou, Jingjing; Dong, Guimei; Xia, Guisuo

    2006-11-01

    A project of embedded Wireless Distributed Sensor/Control Network (WDSCN) based on RF is presented after analyzing the disadvantages of traditional measure and control system. Because of high-cost and complexity, such wireless techniques as Bluetooth and WiFi can't meet the needs of WDSCN. The two-layer WDSCN is designed based on RF technique, which operates in the ISM free frequency channel with low power and high transmission speed. Also the network is low cost, portable and moveable, integrated with the technologies of computer network, sensor, microprocessor and wireless communications. The two-layer network topology is selected in the system; a simple but efficient self-organization net protocol is designed to fit the periodic data collection, event-driven and store-and-forward. Furthermore, adaptive frequency hopping technique is adopted for anti-jamming apparently. The problems about power reduction and synchronization of data in wireless system are solved efficiently. Based on the discussion above, a measure and control network is set up to control such typical instruments and sensors as temperature sensor and signal converter, collect data, and monitor environmental parameters around. This system works well in different rooms. Experiment results show that the system provides an efficient solution to WDSCN through wireless links, with high efficiency, low power, high stability, flexibility and wide working range.

  8. Powder Layer Preparation Using Vibration-controlled Capillary Steel Nozzles for Additive Manufacturing

    NASA Astrophysics Data System (ADS)

    Stichel, Thomas; Laumer, Tobias; Baumüller, Tobias; Amend, Philipp; Roth, Stephan

    In this report, the dry delivery of polyamide 12 powders by vibrating capillary steel nozzles is investigated and discussed regarding its potential for powder layer preparation in Laser Beam Melting. Therefore, a setup including a steel nozzle assembled on a piezoelectric actuator is presented, which enables the precise control over very small powder quantities by vibration excitation. An analysis reveals that the mass flow through the nozzle can be adjusted by the vibration modes in a certain range depending on the nozzle's specifications, whereas the vibration modes themselves show a complicated behaviour. Using a positioning system in combination with the vibrating nozzle, single-layer patterns consisting of polyamide 12 are produced and characterized regarding surface homogeneity and selectivity using a laser stripe sensor.

  9. Surface photovoltage method for the quality control of silicon epitaxial layers on sapphire

    SciTech Connect

    Yaremchuk, A. F.; Starkov, A. V.; Zaikin, A. V.; Alekseev, A. V.; Sokolov, E. M.

    2014-12-15

    The surface photovoltage method is used to study “silicon-on-sapphire” epitaxial layers with a thickness of 0.3–0.6 μm, which are used to fabricate p-channel MOS (metal—oxide-semiconductor) transistors with improved radiation hardness. It is shown that the manner in which the photoconductivity of the epitaxial layer decays after the end of a light pulse generated by a light-emitting diode (wavelength ∼400 nm) strongly depends on the density of structural defects in the bulk of the structure. This enables control over how a “silicon-on-sapphire” structure is formed to provide the manufacturing of MOS structures with optimal operating characteristics.

  10. Injection slot location for boundary-layer control in shock-induced separation

    NASA Technical Reports Server (NTRS)

    Viswanath, P. R.; Sankaran, L.; Sagdeo, P. M.; Narasimha, R.; Prabhu, A.

    1978-01-01

    An experimental investigation of the effect of tangential air injection, when the injection slot is located inside of what would otherwise have been the dead air zone in a separated flow, in controlling shock-induced turbulent boundary layer separation is presented. The experiments were carried out at a free-stream Mach number of 2.5 in the separated flow induced by a compression corner with a 20 deg angle. The observations made were wall static pressures, pitot profiles, and schlieren visualizations of the flow. The results show that the present location for injection is more effective in suppressing boundary-layer separation than the more conventional one, where the slot is located upstream of where separation would occur in the absence of injection.

  11. Interfacial Layer Control by Dry Cleaning Technology for Polycrystalline and Single Crystalline Silicon Growth.

    PubMed

    Im, Dong-Hyun; Kong-Soo Lee; Kang, Yoongoo; Jeong, Myoungho; Park, Kwang Wuk; Lee, Soon-Gun; Ma, Jin-Won; Kim, Youngseok; Kim, Bonghyun; Im, Ki-Vin; Lim, Hanjin; Lee, Jeong Yong

    2016-05-01

    Native oxide removal prior to poly-Si contact and epitaxial growth of Si is the most critical technology to ensure process and device performances of poly-Si plugs and selective epitaxial growth (SEG) layers for DRAM, flash memory, and logic device. Recently, dry cleaning process for interfacial oxide removal has attracted a world-wide attention due to its superior passivation properties to conventional wet cleaning processes. In this study, we investigated the surface states of Si substrate during and after dry cleaning process, and the role of atomic elements including fluorine and hydrogen on the properties of subsequent deposited silicon layer using SIMS, XPS, and TEM analysis. The controlling of residual fluorine on the Si surface after dry cleaning is a key factor for clean interface. The mechanism of native oxide re-growth caused by residual fluorine after dry cleaning is proposed based on analytical results. PMID:27483844

  12. Local and Distant Input Controlling Excitation in Layer II of the Medial Entorhinal Cortex

    PubMed Central

    Fuchs, Elke C.; Neitz, Angela; Pinna, Roberta; Melzer, Sarah; Caputi, Antonio; Monyer, Hannah

    2016-01-01

    Summary Layer II (LII) of the medial entorhinal cortex (MEC) comprises grid cells that support spatial navigation. The firing pattern of grid cells might be explained by attractor dynamics in a network, which requires either direct excitatory connectivity between phase-specific grid cells or indirect coupling via interneurons. However, knowledge regarding local networks that support in vivo activity is incomplete. Here we identified essential components of LII networks in the MEC. We distinguished four types of excitatory neurons that exhibit cell-type-specific local excitatory and inhibitory connectivity. Furthermore, we found that LII neurons contribute to the excitation of contralateral neurons in the corresponding layer. Finally, we demonstrated that the medial septum controls excitation in the MEC via two subpopulations of long-range GABAergic neurons that target distinct interneurons in LII, thereby disinhibiting local circuits. We thus identified local connections that could support attractor dynamics and external inputs that likely govern excitation in LII. PMID:26711115

  13. Controlled Synthesis of ZrS2 Monolayer and Few Layers on Hexagonal Boron Nitride.

    PubMed

    Zhang, Mei; Zhu, Yiming; Wang, Xinsheng; Feng, Qingliang; Qiao, Shanlin; Wen, Wen; Chen, Yanfeng; Cui, Menghua; Zhang, Jin; Cai, Congzhong; Xie, Liming

    2015-06-10

    Group IVB transition metal (Zr and Hf) dichalcogenide (TMD) monolayers can have higher carrier mobility and higher tunneling current density than group VIB (Mo and W) TMD monolayers. Here we report the synthesis of hexagonal ZrS2 monolayer and few layers on hexagonal boron nitride (BN) using ZrCl4 and S as precursors. The domain size of ZrS2 hexagons is around 1-3 μm. The number of layers of ZrS2 was controlled by tuning the evaporation temperature of ZrCl4. The stacking angle between ZrS2 and BN characterized by transmission electron microscopy shows a preferred stacking angle of near 0°. Field-effect transistors (FETs) fabricated on ZrS2 flakes showed n-type transport behavior with an estimated mobility of 0.1-1.1 cm(2) V(-1) s(-1). PMID:25996159

  14. Integrated, nonvolatile, high-speed analog random access memory

    NASA Technical Reports Server (NTRS)

    Katti, Romney R. (Inventor); Wu, Jiin-Chuan (Inventor); Stadler, Henry L. (Inventor)

    1994-01-01

    This invention provides an integrated, non-volatile, high-speed random access memory. A magnetically switchable ferromagnetic or ferrimagnetic layer is sandwiched between an electrical conductor which provides the ability to magnetize the magnetically switchable layer and a magneto resistive or Hall effect material which allows sensing the magnetic field which emanates from the magnetization of the magnetically switchable layer. By using this integrated three-layer form, the writing process, which is controlled by the conductor, is separated from the storage medium in the magnetic layer and from the readback process which is controlled by the magnetoresistive layer. A circuit for implementing the memory in CMOS or the like is disclosed.

  15. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  16. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  17. A Comparison of Active and Passive Methods for Control of Hypersonic Boundary Layers on Airbreathing Configurations

    NASA Technical Reports Server (NTRS)

    Berry, Scott A.; Nowak, Robert J.

    2003-01-01

    Active and passive methods for control of hypersonic boundary layers have been experimentally examined in NASA Langley Research Center wind tunnels on a Hyper-X model. Several configurations for forcing transition using passive discrete roughness elements and active mass addition, or blowing, methods were compared in two hypersonic facilities, the 20-Inch Mach 6 Air and the 31-Inch Mach 10 Air tunnels. Heat transfer distributions, obtained via phosphor thermography, shock system details, and surface streamline patterns were measured on a 0.333-scale model of the Hyper-X forebody. The comparisons between the active and passive methods for boundary layer control were conducted at test conditions that nearly match the nominal Mach 7 flight trajectory of an angle-of-attack of 2-deg and length Reynolds number of 5.6 million. For the passive roughness examination, the primary parametric variation was a range of trip heights within the calculated boundary layer thickness for several trip concepts. The prior passive roughness study resulted in a swept ramp configuration being selected for the Mach 7 flight vehicle that was scaled to be roughly 0.6 of the calculated boundary layer thickness. For the active jet blowing study, the blowing manifold pressure was systematically varied for each configuration, while monitoring the mass flow, to determine the jet penetration height with schlieren and transition movement with the phosphor system for comparison to the passive results. All the blowing concepts tested were adequate for providing transition onset near the trip location with manifold stagnation pressures on the order of 40 times the model static pressure or higher.

  18. Layer-Controlled Chemical Vapor Deposition Growth of MoS2 Vertical Heterostructures via van der Waals Epitaxy.

    PubMed

    Samad, Leith; Bladow, Sage M; Ding, Qi; Zhuo, Junqiao; Jacobberger, Robert M; Arnold, Michael S; Jin, Song

    2016-07-26

    The fascinating semiconducting and optical properties of monolayer and few-layer transition metal dichalcogenides, as exemplified by MoS2, have made them promising candidates for optoelectronic applications. Controllable growth of heterostructures based on these layered materials is critical for their successful device applications. Here, we report a direct low temperature chemical vapor deposition (CVD) synthesis of MoS2 monolayer/multilayer vertical heterostructures with layer-controlled growth on a variety of layered materials (SnS2, TaS2, and graphene) via van der Waals epitaxy. Through precise control of the partial pressures of the MoCl5 and elemental sulfur precursors, reaction temperatures, and careful tracking of the ambient humidity, we have successfully and reproducibly grown MoS2 vertical heterostructures from 1 to 6 layers over a large area. The monolayer MoS2 heterostructure was verified using cross-sectional high resolution transmission electron microscopy (HRTEM) while Raman and photoluminescence spectroscopy confirmed the layer-controlled MoS2 growth and heterostructure electronic interactions. Raman, photoluminescence, and energy dispersive X-ray spectroscopy (EDS) mappings verified the uniform coverage of the MoS2 layers. This reaction provides an ideal method for the scalable layer-controlled growth of transition metal dichalcogenide heterostructures via van der Waals epitaxy for a variety of optoelectronic applications. PMID:27373305

  19. Numerical Modeling of Active Flow Control in a Boundary Layer Ingesting Offset Inlet

    NASA Technical Reports Server (NTRS)

    Allan, Brian G.; Owens, Lewis R.; Berrier, Bobby L.

    2004-01-01

    This investigation evaluates the numerical prediction of flow distortion and pressure recovery for a boundary layer ingesting offset inlet with active flow control devices. The numerical simulations are computed using a Reynolds averaged Navier-Stokes code developed at NASA. The numerical results are validated by comparison to experimental wind tunnel tests conducted at NASA Langley Research Center at both low and high Mach numbers. Baseline comparisons showed good agreement between numerical and experimental results. Numerical simulations for the inlet with passive and active flow control also showed good agreement at low Mach numbers where experimental data has already been acquired. Numerical simulations of the inlet at high Mach numbers with flow control jets showed an improvement of the flow distortion. Studies on the location of the jet actuators, for the high Mach number case, were conducted to provide guidance for the design of a future experimental wind tunnel test.

  20. Active control of panel vibrations induced by boundary-layer flow

    NASA Technical Reports Server (NTRS)

    Chow, Pao-Liu

    1991-01-01

    Some problems in active control of panel vibration excited by a boundary layer flow over a flat plate are studied. In the first phase of the study, the optimal control problem of vibrating elastic panel induced by a fluid dynamical loading was studied. For a simply supported rectangular plate, the vibration control problem can be analyzed by a modal analysis. The control objective is to minimize the total cost functional, which is the sum of a vibrational energy and the control cost. By means of the modal expansion, the dynamical equation for the plate and the cost functional are reduced to a system of ordinary differential equations and the cost functions for the modes. For the linear elastic plate, the modes become uncoupled. The control of each modal amplitude reduces to the so-called linear regulator problem in control theory. Such problems can then be solved by the method of adjoint state. The optimality system of equations was solved numerically by a shooting method. The results are summarized.

  1. Integration of in situ RHEED with magnetron sputter deposition for atomic layer controlled growth

    NASA Astrophysics Data System (ADS)

    Podkaminer, Jacob P.

    Epitaxial thin films continue to be one of the most promising topics within electronic materials research. Sputter deposition is one process by which these films can be formed and is a widely used growth technique for a large range of technologically important material systems. Epitaxial films of carbides, nitrides, metals, oxides and more can all be formed during the sputter process which offers the ability to deposit smooth and uniform films from the research level up to an industrial scale. This tunable kinematic deposition process excels in easily adapting for a large range of environments and growth procedures. Despite the vast advantages associated with sputter deposition, there is a significant lack of in situ analysis options during sputtering. In particular, the area of real time atomic layer control is severely deficient. Atomic layer controlled growth of epitaxial thin films and artificially layered superlattices is critical for both understanding their emergent phenomena and engineering novel material systems and devices. Reflection high-energy electron diffraction (RHEED) is one of the most common in situ analysis techniques during thin film deposition that is rarely used during sputtering due to the strong permanent magnets in magnetron sputter sources and their effect on the RHEED electron beam. In this work we have solved this problem and designed a novel way to deter the effect of the magnets for a wide range of growth geometries and demonstrate the ability for the first time to have layer by layer control during sputter deposition by in situ RHEED. A novel growth chamber that can seamlessly change between pulsed laser deposition and sputtering with RHEED for the growth of complex heterostructures has been designed and implemented. Epitaxial thin films of LaAlO3, La1-xSrxMnO3, and SrRuO3 have all been deposited by sputtering and shown to exhibit clear and extended RHEED oscillations. To solve the magnet issue, a finite element model has been

  2. Open-loop control of noise amplification in a separated boundary layer flow

    SciTech Connect

    Boujo, E. Gallaire, F.; Ehrenstein, U.

    2013-12-15

    Linear optimal gains are computed for the subcritical two-dimensional separated boundary-layer flow past a bump. Very large optimal gain values are found, making it possible for small-amplitude noise to be strongly amplified and to destabilize the flow. The optimal forcing is located close to the summit of the bump, while the optimal response is the largest in the shear layer. The largest amplification occurs at frequencies corresponding to eigenvalues which first become unstable at higher Reynolds number. Nonlinear direct numerical simulations show that a low level of noise is indeed sufficient to trigger random flow unsteadiness, characterized here by large-scale vortex shedding. Next, a variational technique is used to compute efficiently the sensitivity of optimal gains to steady control (through source of momentum in the flow, or blowing/suction at the wall). A systematic analysis at several frequencies identifies the bump summit as the most sensitive region for control with wall actuation. Based on these results, a simple open-loop control strategy is designed, with steady wall suction at the bump summit. Linear calculations on controlled base flows confirm that optimal gains can be drastically reduced at all frequencies. Nonlinear direct numerical simulations also show that this control allows the flow to withstand a higher level of stochastic noise without becoming nonlinearly unstable, thereby postponing bypass transition. In the supercritical regime, sensitivity analysis of eigenvalues supports the choice of this control design. Full restabilization of the flow is obtained, as evidenced by direct numerical simulations and linear stability analysis.

  3. Open-loop control of noise amplification in a separated boundary layer flow

    NASA Astrophysics Data System (ADS)

    Boujo, E.; Ehrenstein, U.; Gallaire, F.

    2013-12-01

    Linear optimal gains are computed for the subcritical two-dimensional separated boundary-layer flow past a bump. Very large optimal gain values are found, making it possible for small-amplitude noise to be strongly amplified and to destabilize the flow. The optimal forcing is located close to the summit of the bump, while the optimal response is the largest in the shear layer. The largest amplification occurs at frequencies corresponding to eigenvalues which first become unstable at higher Reynolds number. Nonlinear direct numerical simulations show that a low level of noise is indeed sufficient to trigger random flow unsteadiness, characterized here by large-scale vortex shedding. Next, a variational technique is used to compute efficiently the sensitivity of optimal gains to steady control (through source of momentum in the flow, or blowing/suction at the wall). A systematic analysis at several frequencies identifies the bump summit as the most sensitive region for control with wall actuation. Based on these results, a simple open-loop control strategy is designed, with steady wall suction at the bump summit. Linear calculations on controlled base flows confirm that optimal gains can be drastically reduced at all frequencies. Nonlinear direct numerical simulations also show that this control allows the flow to withstand a higher level of stochastic noise without becoming nonlinearly unstable, thereby postponing bypass transition. In the supercritical regime, sensitivity analysis of eigenvalues supports the choice of this control design. Full restabilization of the flow is obtained, as evidenced by direct numerical simulations and linear stability analysis.

  4. Blended Wing Body Systems Studies: Boundary Layer Ingestion Inlets With Active Flow Control

    NASA Technical Reports Server (NTRS)

    Geiselhart, Karl A. (Technical Monitor); Daggett, David L.; Kawai, Ron; Friedman, Doug

    2003-01-01

    A CFD analysis was performed on a Blended Wing Body (BWB) aircraft with advanced, turbofan engines analyzing various inlet configurations atop the aft end of the aircraft. The results are presented showing that the optimal design for best aircraft fuel efficiency would be a configuration with a partially buried engine, short offset diffuser using active flow control, and a D-shaped inlet duct that partially ingests the boundary layer air in flight. The CFD models showed that if active flow control technology can be satisfactorily developed, it might be able to control the inlet flow distortion to the engine fan face and reduce the powerplant performance losses to an acceptable level. The weight and surface area drag benefits of a partially submerged engine shows that it might offset the penalties of ingesting the low energy boundary layer air. The combined airplane performance of such a design might deliver approximately 5.5% better aircraft fuel efficiency over a conventionally designed, pod-mounted engine.

  5. Numerical study of wingtip shed vorticity reduction by wing Boundary Layer Control

    NASA Astrophysics Data System (ADS)

    Posada, Jose Alejandro

    Wingtip vortex reductions have been obtained by Boundary Layer Control application to an AR=1.5 rectangular wing using a NACA 0012 airfoil. If wingtip shed vorticity could be reduced significantly, then so would induced drag resulting in improved cruise fuel economy. Power savings would be even more impressive at low flight speed or in climb. A two dimensional wing produces lift without wingtip vorticity. Its bound vorticity, Gamma, equals the contour integral of the boundary layer vorticity gamma or Gamma = ∮gamma · dl. Where the upper and lower boundary layers meet at the cusped TE, their local static pressure pu=pl then the boundary layer outer edge inviscid velocity Vupper=Vlower and gammalower=-gamma upper. This explains the 2-D wing self cancellation of the upper and lower surface boundary layer vorticity when they meet upon shedding at the trailing edge. In finite wings, the presence of spanwise pressure gradients near the wing tips misaligns gammalower and gammaupper at the wingtip TE preventing the upper and lower surface boundary layers from completely canceling each other. To prevent them from generating wing tip vortices, the local boundary layers need to be captured in suction slots. Once vorticity is captured, it can be eliminated by viscous mixing prior to venting over board. The objective of this dissertation was to use a commercial Computational Fluid Dynamics code (Fluent) to search for the best configuration to locate BLC suction slots to capture non-parallel boundary layer vorticity prior to shedding near the wingtips. The configuration selected for running the simulations was tested by trying to duplicate a 3D wing for which sufficient experimental and computational models by others are available. The practical case selected was done by Chow et al in the 32 x 48 in. low speed wind tunnel at the Fluid Mechanics Laboratory of NASA Ames Research Center, and computationally analyzed by Dacles-Mariani et al, and Khim and Rhee. The present

  6. Controlling single and few-layer graphene crystals growth in a solid carbon source based chemical vapor deposition

    SciTech Connect

    Papon, Remi; Sharma, Subash; Shinde, Sachin M.; Vishwakarma, Riteshkumar; Tanemura, Masaki; Kalita, Golap

    2014-09-29

    Here, we reveal the growth process of single and few-layer graphene crystals in the solid carbon source based chemical vapor deposition (CVD) technique. Nucleation and growth of graphene crystals on a polycrystalline Cu foil are significantly affected by the injection of carbon atoms with pyrolysis rate of the carbon source. We observe micron length ribbons like growth front as well as saturated growth edges of graphene crystals depending on growth conditions. Controlling the pyrolysis rate of carbon source, monolayer and few-layer crystals and corresponding continuous films are obtained. In a controlled process, we observed growth of large monolayer graphene crystals, which interconnect and merge together to form a continuous film. On the other hand, adlayer growth is observed with an increased pyrolysis rate, resulting few-layer graphene crystal structure and merged continuous film. The understanding of monolayer and few-layer crystals growth in the developed CVD process can be significant to grow graphene with controlled layer numbers.

  7. Intercalation and controlled release properties of vitamin C intercalated layered double hydroxide

    SciTech Connect

    Gao, Xiaorui; Lei, Lixu; O'Hare, Dermot; Xie, Juan; Gao, Pengran; Chang, Tao

    2013-07-15

    Two drug-inorganic composites involving vitamin C (VC) intercalated in Mg–Al and Mg–Fe layered double hydroxides (LDHs) have been synthesized by the calcination–rehydration (reconstruction) method. Powder X-ray diffraction (XRD), Fourier transform infrared (FTIR), and UV–vis absorption spectroscopy indicate a successful intercalation of VC into the interlayer galleries of the LDH host. Studies of VC release from the LDHs in deionised water and in aqueous CO{sub 3}{sup 2−} solutions imply that Mg{sub 3}Al–VC LDH is a better controlled release system than Mg{sub 3}Fe–VC LDH. Analysis of the release profiles using a number of kinetic models suggests a solution-dependent release mechanism, and a diffusion-controlled deintercalation mechanism in deionised water, but an ion exchange process in CO{sub 3}{sup 2−} solution. - Graphical abstract: Vitamin C anions have been intercalated in the interlayer space of layered double hydroxide and released in CO{sub 3}{sup 2−} solution and deionised water. - Highlights: • Vitamin C intercalated Mg–Al and Mg–Fe layered double hydroxides were prepared. • Release property of vitamin C in aqueous CO{sub 3}{sup 2−} solution is better. • Avrami-Erofe’ev and first-order models provide better fit for release results. • Diffusion-controlled and ion exchange processes occur in deionised water. • An ion exchange process occurs in CO{sub 3}{sup 2−} solution.

  8. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  9. The design and performance of axially symmetrical contoured wall diffusers employing suction boundary layer control

    NASA Technical Reports Server (NTRS)

    Nelson, C. D., Jr.; Hudson, W. G.; Yang, T.

    1974-01-01

    This paper presents a procedure for the design and the performance prediction of axially symmetrical contoured wall diffusers employing suction boundary layer control. An inverse problem approach was used in the potential flow design of the diffuser wall contours. The experimentally observed flow characteristics and the stability of flows within the diffuser are also described. Guidelines for the design of low suction (less than 10 percent of the inlet flow) and thus high effectiveness contoured wall diffusers are also provided based on the results of the experimental program.

  10. Dynamics of flow control in an emulated boundary layer-ingesting offset diffuser

    NASA Astrophysics Data System (ADS)

    Gissen, A. N.; Vukasinovic, B.; Glezer, A.

    2014-08-01

    Dynamics of flow control comprised of arrays of active (synthetic jets) and passive (vanes) control elements , and its effectiveness for suppression of total-pressure distortion is investigated experimentally in an offset diffuser, in the absence of internal flow separation. The experiments are conducted in a wind tunnel inlet model at speeds up to M = 0.55 using approach flow conditioning that mimics boundary layer ingestion on a Blended-Wing-Body platform. Time-dependent distortion of the dynamic total-pressure field at the `engine face' is measured using an array of forty total-pressure probes, and the control-induced distortion changes are analyzed using triple decomposition and proper orthogonal decomposition (POD). These data indicate that an array of the flow control small-scale synthetic jet vortices merge into two large-scale, counter-rotating streamwise vortices that exert significant changes in the flow distortion. The two most energetic POD modes appear to govern the distortion dynamics in either active or hybrid flow control approaches. Finally, it is shown that the present control approach is sufficiently robust to reduce distortion with different inlet conditions of the baseline flow.

  11. Boundary Layer Flow Control by an Array of Ramp-Shaped Vortex Generators

    NASA Technical Reports Server (NTRS)

    Zaman, K. B. M. Q.; Hirt, S. M.; Bencic, T. J.

    2012-01-01

    Flow field survey results for the effect of ramp-shaped vortex generators (VG) on a turbulent boundary layer are presented. The experiments are carried out in a low-speed wind tunnel and the data are acquired primarily by hot-wire anemometry. Distributions of mean velocity and turbulent stresses as well as streamwise vorticity, on cross-sectional planes at various downstream locations, are obtained. These detailed flow field properties, including the boundary layer characteristics, are documented with the primary objective of aiding possible computational investigations. The results show that VG orientation with apex upstream, that produces a downwash directly behind it, yields a stronger pair of streamwise vortices. This is in contrast to the case with apex downstream that produces a pair of vortices of opposite sense. Thus, an array of VG s with the former orientation, usually considered for film-cooling application, may also be superior for mixing enhancement and boundary layer separation control. The data files can be found on a supplemental CD.

  12. Boundary Layer Flow Control by an Array of Ramp-Shaped Vortex Generators

    NASA Technical Reports Server (NTRS)

    Zaman, K. B. M. Q.; Hirt, S. M.; Bencic, T. J.

    2012-01-01

    Flow field survey results for the effect of ramp-shaped vortex generators (VG) on a turbulent boundary layer are presented. The experiments are carried out in a low-speed wind tunnel and the data are acquired primarily by hot-wire anemometry. Distributions of mean velocity and turbulent stresses as well as streamwise vorticity, on cross-sectional planes at various downstream locations, are obtained. These detailed flow field properties, including the boundary layer characteristics, are documented with the primary objective of aiding possible computational investigations. The results show that VG orientation with apex upstream, that produces a downwash directly behind it, yields a stronger pair of streamwise vortices. This is in contrast to the case with apex downstream that produces a pair of vortices of opposite sense. Thus, an array of VG s with the former orientation, usually considered for film-cooling application, may also be superior for mixing enhancement and boundary layer separation control. (See CASI ID 20120009374 for Supplemental CD-ROM.)

  13. Anticancer nanodelivery system with controlled release property based on protocatechuate–zinc layered hydroxide nanohybrid

    PubMed Central

    Barahuie, Farahnaz; Hussein, Mohd Zobir; Abd Gani, Shafinaz; Fakurazi, Sharida; Zainal, Zulkarnain

    2014-01-01

    Background We characterize a novel nanocomposite that acts as an efficient anticancer agent. Methods This nanocomposite consists of zinc layered hydroxide intercalated with protocatechuate (an anionic form of protocatechuic acid), that has been synthesized using a direct method with zinc oxide and protocatechuic acid as precursors. Results The resulting protocatechuic acid nanocomposite (PAN) showed a basal spacing of 12.7 Å, indicating that protocatechuate was intercalated in a monolayer arrangement, with an angle of 54° from the Z-axis between the interlayers of the zinc layered hydroxide, and an estimated drug loading of about 35.7%. PAN exhibited the properties of a mesoporous type material, with greatly enhanced thermal stability of protocatechuate as compared to its free counterpart. The presence of protocatechuate in the interlayers of the zinc layered hydroxide was further supported by Fourier transform infrared spectroscopy. Protocatechuate was released from PAN in a slow and sustained manner. This mechanism of release was well represented by a pseudo-second order kinetics model. PAN has shown increased cytotoxicity compared to the free form of protocatechuic acid in all cancer cell lines tested. Tumor growth suppression was extensive, particularly in HepG2 and HT29 cell lines. Conclusion PAN is suitable for use as a controlled release formulation, and our in vitro evidence indicates that PAN is an effective anticancer agent. PAN may have potential as a chemotherapeutic drug for human cancer. PMID:25061291

  14. Controlled synthesis of single-layer MoSe2 nanostructures

    NASA Astrophysics Data System (ADS)

    Chen, Yuxuan; Zhang, Chendong; Cui, Ping; Zhang, Zhenyu; Shih, Chih-Kang

    Group VIB transition metal dichalcogenides (TMD), such as MoSe2, WS2, etc., are a family of layered materials with weak van der Waals (vdW) interaction between neighboring layers. A transition from indirect to direct bandgap semiconductor takes place for most of these materials when they become single layer (SL), and the values of these direct band gap are comparable to visible light. This makes SL TMDs attractive candidates for 2D electronic and optoelectronic devices. Though epitaxial SL TMDs have been successfully prepared, there is controversy in their growth conditions and in their edge structures. Moreover, some intriguing theoretical predictions about the finite-size effect on SL TMDs are still awaiting experimental proof. Here we report systematic studies of the thermodynamics/ kinetics of SL MoSe2 formation on a vdW surface (namely, highly oriented pyrolytic graphite) using molecular beam epitaxy (MBE). We also report the controlled creation of various nanostructures of MBE SL MoSe2. The edge properties and the influence of the in-plane confinement on the electronic structure are addressed by in-situ STM and STS. Theoretical calculations have been carried out to help understanding the experimental discoveries. Corresponding author.

  15. Picosecond pulsed laser deposition of metal-oxide sensing layers with controllable porosity for gas sensor applications

    NASA Astrophysics Data System (ADS)

    Kekkonen, Ville; Chaudhuri, Saumyadip; Clarke, Fergus; Kaisto, Juho; Liimatainen, Jari; Pandian, Santhosh Kumar; Piirto, Jarkko; Siltanen, Mikael; Zolotukhin, Aleksey

    2016-03-01

    Recent results of properties and performance of {WO}_3 gas sensing layers produced by industrial picosecond pulsed laser deposition process developed by Picodeon Ltd Oy are presented in this paper. {WO}_3 layers with controllable porosity and nanostructure were successfully deposited on commercial sensor platforms, and basic measurements to characterize their performance as gas sensors gave promising results.

  16. Hybrid Active/Passive Control of Sound Radiation from Panels with Constrained Layer Damping and Model Predictive Feedback Control

    NASA Technical Reports Server (NTRS)

    Cabell, Randolph H.; Gibbs, Gary P.

    2000-01-01

    There has been considerable interest over the past several years in applying feedback control methods to problems of structural acoustics. One problem of particular interest is the control of sound radiation from aircraft panels excited on one side by a turbulent boundary layer (TBL). TBL excitation appears as many uncorrelated sources acting on the panel, which makes it difficult to find a single reference signal that is coherent with the excitation. Feedback methods have no need for a reference signal, and are thus suited to this problem. Some important considerations for the structural acoustics problem include the fact that the required controller bandwidth can easily extend to several hundred Hertz, so a digital controller would have to operate at a few kilohertz. In addition, aircraft panel structures have a reasonably high modal density over this frequency range. A model based controller must therefore handle the modally dense system, or have some way to reduce the bandwidth of the problem. Further complicating the problem is the fact that the stiffness and dynamic properties of an aircraft panel can vary considerably during flight due to altitude changes resulting in significant resonant frequency shifts. These considerations make the tradeoff between robustness to changes in the system being controlled and controller performance especially important. Recent papers concerning the design and implementation of robust controllers for structural acoustic problems highlight the need to consider both performance and robustness when designing the controller. While robust control methods such as H1 can be used to balance performance and robustness, their implementation is not easy and requires assumptions about the types of uncertainties in the plant being controlled. Achieving a useful controller design may require many tradeoff studies of different types of parametric uncertainties in the system. Another approach to achieving robustness to plant changes is to

  17. Controls upon microbial accessibility to soil organic matter following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, C. A.; Boutton, T. W.; Filley, T. R.

    2009-12-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic matter (SOM) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and soil hydrology. To elucidate the controls upon microbial accessibility to SOM, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas A&M Agricultural Experimental Station La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, plant biopolymer chemistry in SOM, and microbial community structure were tracked. Respiration rates declined steadily over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total carbon was mineralized to CO2 throughout the incubation. After day 84 a significantly (p < 0.05) greater portion of carbon was mineralized from soils of older woody clusters (34-86 years) than from soils of younger clusters (14-23 years) and the native grassland. Approximately 80% of patterns seen in cumulative CO2 loss could be explained by the proportions of macro- and micro-aggregates within each soil, suggesting soil structure is a major controlling factor of respiration rates. Despite documented carbon accrual within La Copita soils due to WPE, we observed no evidence of enhanced carbon stabilization in these respiration experiments. In fact, a greater proportion of total carbon was lost from the soil of mature woody stands than from young stands, suggesting carbon accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. A cluster approximately 34 years in age represents a transition point in WPE where respiration dynamics become distinct between grassland and wooded elements. By day 84 of the incubation CO2 respired from all soils was depleted with respect to bulk SOM (1.5 to 5‰) and this

  18. Micro vortex generator control of axisymmetric high-speed laminar boundary layer separation

    NASA Astrophysics Data System (ADS)

    Estruch-Samper, D.; Vanstone, L.; Hillier, R.; Ganapathisubramani, B.

    2015-09-01

    Interest in the development of micro vortex generators (MVGs) to control high-speed flow separation has grown in the last decade. In contrast to conventional vortex generators, MVGs are fully submerged in the boundary layer and have the potential of inducing surface flow mixing with marginal drag penalty when suitably designed. Also, they do not result in undesired reduced mass flow such as with suction methods. The flow mechanisms at the location of MVGs are not yet fully understood, and optimal designs are difficult to establish given that both numerical predictions and experiments are particularly challenged for short element heights, yet optimal MVGs are generally expected to be at least shorter than half the local boundary layer thickness. The present work aims at investigating experimentally the fundamental flow physics concerning an individual MVG element (of `canonical' or simplified geometry) at a range of near-wall heights. A fully laminar base flow is considered so as to isolate the effect of incoming turbulence as well as the more complex physics that may occur when specific and/or multiple elements are used. Tests were performed in a gun tunnel at a freestream Mach number of 8.9 and Reynolds number of /m, and the basic test model consisted of a blunt-nosed cylinder which produced an axisymmetric laminar boundary layer with an edge Mach number of 3.4 and Reynolds number of /m at the MVG location. A laminar shock-wave/boundary layer interaction with separation was induced by a flare located further downstream on the model. Measurements consisted of time-resolved surface heat transfer obtained in the axial direction immediately downstream of the MVG and along the interaction, together with simultaneous high-speed schlieren imaging. The height () of the MVG element used in a `diamond' configuration (square planform with one vertex facing the flow) was adjusted between tests ranging from = 0.03 to 0.58, where the local undisturbed boundary layer thickness

  19. Experimental validation of microseismic emissions from a controlled hydraulic fracture in a synthetic layered medium

    NASA Astrophysics Data System (ADS)

    Roundtree, Russell

    A controlled hydraulic fracture experiment was performed on two medium sized (11" x 11" x 15") synthetic layered blocks of low permeability, low porosity Lyons sandstone sandwiched between cement. The purpose of the research was to better understand and characterize the fracture evolution as the fracture tip impinged upon the layer boundaries between the well bonded layers. It is also one of the first documented uses of passive microseismic used in a laboratory environment to characterize hydraulic fracturing. A relatively low viscosity fluid of 1000 centipoise, compared to properly scaled previous work (Casas 2005, and Athavale 2007), was pumped at a constant rate of 10 mL/minute through a steel cased hole landed and isolated in the sandstone layer. Efforts were made to contain the hydraulic fracture within the confines of the rock specimen to retain the created hydraulic fracture geometry. Two identical samples and treatment schedules were created and differed only in the monitoring system used to characterize the microseismic activity during the fracture treatment. The first block had eight embedded P-wave transducers placed in the sandstone layer to record the passive microseismic emissions and localize the location and time of the acoustic event. The second block had six compressional wave transducers and twelve shear wave transducers embedded in the sandstone layer of the block. The intention was to record and process the seismic data using conventional P-wave to S-wave difference timing techniques well known in industry. While this goal ultimately not possible due to the geometry of the receiver placements and the limitations of the Vallene acquisition processing software, the data received and the events localized from the 18 transducer test were of much higher numbers and quality than on the eight transducer test. This experiment proved conclusively that passive seismic emission recording can yield positive results in the laboratory. Just as in the field

  20. Layer-by-layer engineering fluorescent polyelectrolyte coated mesoporous silica nanoparticles as pH-sensitive nanocarriers for controlled release

    NASA Astrophysics Data System (ADS)

    Du, Pengcheng; Zhao, Xubo; Zeng, Jin; Guo, Jinshan; Liu, Peng

    2015-08-01

    Fluorescent core/shell composite has been fabricated by the layer-by-layer (LbL) assembly of the fluorescein isothiocyanate modified chitosan (CS-FITC) and sodium alginate (AL) onto the carboxyl modified mesoporous silica nanoparticles (MSN-COOH), followed by PEGylation. It exhibits stability in high salt-concentration media and the pH responsive fluorescent feature can be used for cell imaging. Furthermore, the modified MSN cores can enhance the DOX loading capacity and the multifunctional polyelectrolyte shell can adjust the drug release upon the media pH, showing a low leakage quantity at the neutral environment but significantly enhanced release at lower pH media mimicking the tumor environments. Therefore, the biocompatible fluorescent polyelectrolyte coated mesoporous silica nanoparticles (MSN-LBL-PEG) offer promise for tumor therapy.