Sample records for access control specifications

  1. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  2. Hormone-dependent control of developmental timing through regulation of chromatin accessibility

    PubMed Central

    Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.

    2017-01-01

    Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147

  3. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  4. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  5. Typing for Conflict Detection in Access Control Policies

    NASA Astrophysics Data System (ADS)

    Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge

    In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.

  6. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  7. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  8. On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)

    DTIC Science & Technology

    2013-07-01

    Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of

  9. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  10. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  11. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  12. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  13. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  14. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  15. Formalization of the Access Control on ARM-Android Platform with the B Method

    NASA Astrophysics Data System (ADS)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  16. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  17. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  18. DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military Installations (REDACTED)

    DTIC Science & Technology

    2016-04-01

    DEPARTMENT OF THE ARMY SUBJECT: DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military...public tenants who leased DoD privatized housing before granting those tenants unescorted access to military installations. In addition, DoD officials...Military Housing Privatization Initiative (MHPI). Specifically, our objective was to determine whether DoD was effectively screening civilian tenants

  19. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  20. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  1. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  2. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  3. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  4. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  5. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  6. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  7. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  8. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...

  9. Network support for turn-taking in multimedia collaboration

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1997-01-01

    The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.

  10. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  11. Intestinal Master Transcription Factor CDX2 Controls Chromatin Access for Partner Transcription Factor Binding

    PubMed Central

    Verzi, Michael P.; Shin, Hyunjin; San Roman, Adrianna K.

    2013-01-01

    Tissue-specific gene expression requires modulation of nucleosomes, allowing transcription factors to occupy cis elements that are accessible only in selected tissues. Master transcription factors control cell-specific genes and define cellular identities, but it is unclear if they possess special abilities to regulate cell-specific chromatin and if such abilities might underlie lineage determination and maintenance. One prevailing view is that several transcription factors enable chromatin access in combination. The homeodomain protein CDX2 specifies the embryonic intestinal epithelium, through unknown mechanisms, and partners with transcription factors such as HNF4A in the adult intestine. We examined enhancer chromatin and gene expression following Cdx2 or Hnf4a excision in mouse intestines. HNF4A loss did not affect CDX2 binding or chromatin, whereas CDX2 depletion modified chromatin significantly at CDX2-bound enhancers, disrupted HNF4A occupancy, and abrogated expression of neighboring genes. Thus, CDX2 maintains transcription-permissive chromatin, illustrating a powerful and dominant effect on enhancer configuration in an adult tissue. Similar, hierarchical control of cell-specific chromatin states is probably a general property of master transcription factors. PMID:23129810

  12. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  13. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  14. Programmable Direct-Memory-Access Controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F.

    1990-01-01

    Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.

  15. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  16. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  17. RBAC-Matrix-based EMR right management system to improve HIPAA compliance.

    PubMed

    Lee, Hung-Chang; Chang, Shih-Hsin

    2012-10-01

    Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.

  18. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  19. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  20. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms are essential keys for this approach and they are accomplished by using semantic technologies (i.e., ontologies, rule languages, and inference engines). The results are mainly focused on the security and access control of the proposed scenario. An ontology has been designed and developed for the POVO covering the terminology of the scenario and easing the automation of administration tasks. Over that ontology, an access control mechanism based on rule languages allows specifying access control policies, and an inference engine performs the decision making process automatically. The usability of solutions to ease administration tasks to the SoC is improved by the Me-As-An-Admin (M3A) application. This guides the SoC through the specification of personal access control policies to his/her distributed resources by using semantic technologies (e.g., metamodeling, model-to-text transformations, etc.). All results are developed as services and included in an architecture in accordance with standards and principles of openness and interoperability. Current technology can bring health, social and well-being care actually centered on citizens, and granting each person the management of his/her health information. However, the application of technology without adopting methodologies or normalized guidelines will reduce the interoperability of solutions developed, failing in the development of advanced services and improved scenarios for health delivery. Standards and reference architectures can be cornerstones for future-proof and powerful developments. Finally, not only technology must follow citizen-centric approaches, but also the gaps needing legislative efforts that support these new paradigms of healthcare delivery must be identified and addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  1. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  2. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  3. DOD Information Technology Standard Guidance (ITSG) Version 3.1

    DTIC Science & Technology

    1997-04-07

    from NGSBs later (e.g., OSFs Motif specification became the basis for IEEE 1295 . 1). Most consortia specifications are available now, do not overlap...Illumination) CIM Center for Information Management (DISA) CINC Conumnder in Chief CIS CASE Integration Services CJCS Chairman of the Joint Chiefs of...Compound Text Encoding CUA Common User Access DAC Discretionary Access Controls DAD Draft Addendum (ISO) DAM Draft Amendment (ISO) DAP Document

  4. An integrated set of UNIX based system tools at control room level

    NASA Astrophysics Data System (ADS)

    Potepan, F.; Scafuri, C.; Bortolotto, C.; Surace, G.

    1994-12-01

    The design effort of providing a simple point-and-click approach to the equipment access has led to the definition and realization of a modular set of software tools to be used at the ELETTRA control room level. Point-to-point equipment access requires neither programming nor specific knowledge of the control system architecture. The development and integration of communication, graphic, editing and global database modules are described in depth, followed by a report of their use in the first commissioning period.

  5. Product Definition Data Interface (PDDI) Product Specification

    DTIC Science & Technology

    1991-07-01

    syntax of the language gives a precise specification of the data without interpretation of it. M - Constituent Read Block. CSECT - Control Section, the...to conform to the PDDI Access Software’s internal data representation so that it may be further processed. JCL - Job Control Language - IBM language...software development and life cycle * phases. OUALITY CONTROL - The planned and systematic application of all actions (management/technical) necessary to

  6. A New Signaling Architecture THREP with Autonomous Radio-Link Control for Wireless Communications Systems

    NASA Astrophysics Data System (ADS)

    Hirono, Masahiko; Nojima, Toshio

    This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.

  7. An Analytical Index to the Internet: Dreams of Utopia.

    ERIC Educational Resources Information Center

    Casey, Carol

    1999-01-01

    Explores the need for analytical indexes to access Internet resources. Considers bibliographic control, Web site design, keyword search engines, hierarchical subject indexes, and special indexes and compilations of links, and concludes that the creation of small, focused indexes may be the best solution for accessing specific types of digital…

  8. 29 CFR 1926.406 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... disconnecting means shall not be less than the supply conductor ampacity. (d) X-Ray equipment—(1) Disconnecting... means shall be operable from a location readily accessible from the X-ray control. For equipment... provide equivalent access. (4) Grounding. All exposed metal parts of cranes, monorail hoists, hoists and...

  9. 29 CFR 1926.406 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... disconnecting means shall not be less than the supply conductor ampacity. (d) X-Ray equipment—(1) Disconnecting... means shall be operable from a location readily accessible from the X-ray control. For equipment... provide equivalent access. (4) Grounding. All exposed metal parts of cranes, monorail hoists, hoists and...

  10. Barriers to access to opioid medicines for patients with opioid dependence: a review of legislation and regulations in eleven central and eastern European countries.

    PubMed

    Vranken, Marjolein J M; Mantel-Teeuwisse, Aukje K; Jünger, Saskia; Radbruch, Lukas; Scholten, Willem; Lisman, John A; Subataite, Marija; Schutjens, Marie-Hélène D B

    2017-06-01

    Barriers linked to drug control systems are considered to contribute to inequitable access to controlled medicines, leaving millions of people in pain and suffering. Most studies focus on access to opioids for the treatment of severe (cancer) pain. This study aims to identify specific access barriers for patients with opioid dependence in legislation and regulations of 11 central and eastern European countries. This study builds on a previous analysis of legislation and regulations as part of the EU 7th Framework Access To Opioid Medication in Europe (ATOME) project. An in-depth analysis was undertaken to determine specific barriers for patients with opioid dependence in need of opioid analgesics or opioid agonist therapy (OAT). For each country, the number and nature of specific potential barriers for these patients were assessed according to eight categories: prescribing; dispensing; manufacturing; usage; trade and distribution; affordability; penalties; and other. An additional keyword search was conducted to minimize the omission of barriers. Barriers in an additional category, language, were recorded qualitatively. Countries included Bulgaria, Cyprus, Estonia, Greece, Hungary, Latvia, Lithuania, Serbia, Slovakia, Slovenia and Turkey. Ten of the 11 countries (all except Estonia) showed specific potential barriers in their legislation and regulations. The total number of barriers varied from two (Slovenia) to 46 (Lithuania); the number of categories varied from one (Slovenia) to five (Lithuania). Most specific potential barriers were shown in the categories 'prescribing', 'usage' and 'other'. The total number in a single category varied from one to 18 (Lithuania, prescribing). Individual differences between countries in the same specific potential barrier were shown; for example, variation in minimum age criteria for admission to OAT ranging from 15 (Lithuania, in special cases) to 20 years (Greece). All countries had stigmatizing language in their legislation. Patients with opioid dependence are likely to experience specific barriers to accessing opioids in addition to those experienced by other non-dependent patients. © 2017 Society for the Study of Addiction.

  11. The design and testing of a novel mechanomyogram-driven switch controlled by small eyebrow movements

    PubMed Central

    2010-01-01

    Background Individuals with severe physical disabilities and minimal motor behaviour may be unable to use conventional mechanical switches for access. These persons may benefit from access technologies that harness the volitional activity of muscles. In this study, we describe the design and demonstrate the performance of a binary switch controlled by mechanomyogram (MMG) signals recorded from the frontalis muscle during eyebrow movements. Methods Muscle contractions, detected in real-time with a continuous wavelet transform algorithm, were used to control a binary switch for computer access. The automatic selection of scale-specific thresholds reduced the effect of artefact, such as eye blinks and head movement, on the performance of the switch. Switch performance was estimated by cued response-tests performed by eleven participants (one with severe physical disabilities). Results The average sensitivity and specificity of the switch was 99.7 ± 0.4% and 99.9 ± 0.1%, respectively. The algorithm performance was robust against typical participant movement. Conclusions The results suggest that the frontalis muscle is a suitable site for controlling the MMG-driven switch. The high accuracies combined with the minimal requisite effort and training show that MMG is a promising binary control signal. Further investigation of the potential benefits of MMG-control for the target population is warranted. PMID:20492680

  12. The design and testing of a novel mechanomyogram-driven switch controlled by small eyebrow movements.

    PubMed

    Alves, Natasha; Chau, Tom

    2010-05-21

    Individuals with severe physical disabilities and minimal motor behaviour may be unable to use conventional mechanical switches for access. These persons may benefit from access technologies that harness the volitional activity of muscles. In this study, we describe the design and demonstrate the performance of a binary switch controlled by mechanomyogram (MMG) signals recorded from the frontalis muscle during eyebrow movements. Muscle contractions, detected in real-time with a continuous wavelet transform algorithm, were used to control a binary switch for computer access. The automatic selection of scale-specific thresholds reduced the effect of artefact, such as eye blinks and head movement, on the performance of the switch. Switch performance was estimated by cued response-tests performed by eleven participants (one with severe physical disabilities). The average sensitivity and specificity of the switch was 99.7 +/- 0.4% and 99.9 +/- 0.1%, respectively. The algorithm performance was robust against typical participant movement. The results suggest that the frontalis muscle is a suitable site for controlling the MMG-driven switch. The high accuracies combined with the minimal requisite effort and training show that MMG is a promising binary control signal. Further investigation of the potential benefits of MMG-control for the target population is warranted.

  13. Making DidFail Succeed: Enhancing the CERT Static Taint Analyzer for Android App Sets

    DTIC Science & Technology

    2015-03-01

    limitations on what resources applications can use, Android allows users a large degree of control over how much trust should be given to specific...and other personal details. One of the core assumptions of the Android permission system is that an application that lacks permission to access a...the Android permission system is well suited for controlling access for applications in isolation, it can fail to protect resources on the device

  14. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  15. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  16. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  17. 75 FR 23822 - Notice of Opportunity for Public Comment on the Proposed Models for Plant-Specific Adoption of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-04

    ... Agencywide Documents Access and Management System (ADAMS) under Accession Number ML092670242. The proposed... and Maintenance Program'' is being proposed for Section [5.5] [``Administrative Controls--Programs and... and Management System (ADAMS): Publicly available documents created or received at the NRC are...

  18. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  19. Virtual Interactive Classroom: A New Technology for Distance Learning Developed

    NASA Technical Reports Server (NTRS)

    York, David W.; Babula, Maria

    1999-01-01

    The Virtual Interactive Classroom (VIC) allows Internet users, specifically students, to remotely control and access data from scientific equipment. This is a significant advantage to school systems that cannot afford experimental equipment, have Internet access, and are seeking to improve science and math scores with current resources. A VIC Development Lab was established at Lewis to demonstrate that scientific equipment can be controlled by remote users over the Internet. Current projects include a wind tunnel, a room camera, a science table, and a microscope.

  20. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  1. Spatial accessibility to specific sport facilities and corresponding sport practice: the RECORD Study.

    PubMed

    Karusisi, Noëlla; Thomas, Frédérique; Méline, Julie; Chaix, Basile

    2013-04-20

    Physical activity is considered as a major component of a healthy lifestyle. However, few studies have examined the relationships between the spatial accessibility to sport facilities and sport practice with a sufficient degree of specificity. The aim of this study was to investigate the associations between the spatial accessibility to specific types of sports facilities and the practice of the corresponding sports after carefully controlling for various individual socio-demographic characteristics and neighborhood socioeconomic variables. Data from the RECORD Study involving 7290 participants recruited in 2007-2008, aged 30-79 years, and residing in the Paris metropolitan area were analyzed. Four categories of sports were studied: team sports, racket sports, swimming and related activities, and fitness. Spatial accessibility to sport facilities was measured with two complementary approaches that both take into account the street network (distance to the nearest facility and count of facilities around the dwelling). Associations between the spatial accessibility to sport facilities and the practice of the corresponding sports were assessed using multilevel logistic regression after adjusting for individual and contextual characteristics. High individual education and high household income were associated with the practice of racket sports, swimming or related activities, and fitness over the previous 7 days. The spatial accessibility to swimming pools was associated with swimming and related sports, even after adjustment for individual/contextual factors. The spatial accessibility to facilities was not related to the practice of other sports. High neighborhood income was associated with the practice of a racket sport and fitness. Accessibility is a multi-dimensional concept that integrates educational, financial, and geographical aspects. Our work supports the evidence that strategies to increase participation in sport activities should improve the spatial and financial access to specific facilities, but also address educational disparities in sport practice.

  2. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks.

    PubMed

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-10-12

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  3. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    PubMed Central

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-01-01

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel. PMID:27754316

  4. Toward Optimization of Gaze-Controlled Human-Computer Interaction: Application to Hindi Virtual Keyboard for Stroke Patients.

    PubMed

    Meena, Yogesh Kumar; Cecotti, Hubert; Wong-Lin, Kongfatt; Dutta, Ashish; Prasad, Girijesh

    2018-04-01

    Virtual keyboard applications and alternative communication devices provide new means of communication to assist disabled people. To date, virtual keyboard optimization schemes based on script-specific information, along with multimodal input access facility, are limited. In this paper, we propose a novel method for optimizing the position of the displayed items for gaze-controlled tree-based menu selection systems by considering a combination of letter frequency and command selection time. The optimized graphical user interface layout has been designed for a Hindi language virtual keyboard based on a menu wherein 10 commands provide access to type 88 different characters, along with additional text editing commands. The system can be controlled in two different modes: eye-tracking alone and eye-tracking with an access soft-switch. Five different keyboard layouts have been presented and evaluated with ten healthy participants. Furthermore, the two best performing keyboard layouts have been evaluated with eye-tracking alone on ten stroke patients. The overall performance analysis demonstrated significantly superior typing performance, high usability (87% SUS score), and low workload (NASA TLX with 17 scores) for the letter frequency and time-based organization with script specific arrangement design. This paper represents the first optimized gaze-controlled Hindi virtual keyboard, which can be extended to other languages.

  5. Genetic and Chemical Profiling of Gymnema sylvestre Accessions from Central India: Its Implication for Quality Control and Therapeutic Potential of Plant

    PubMed Central

    Verma, Ashutosh Kumar; Dhawan, Sunita Singh; Singh, Seema; Bharati, Kumar Avinash; Jyotsana

    2016-01-01

    Background: Gymnema sylvestre, a vulnerable plant species, is mentioned in Indian Pharmacopeia as an antidiabetic drug Objective: Study of genetic and chemical diversity and its implications in accessions of G. sylvestre Materials and Methods: Fourteen accessions of G. sylvestre collected from Central India and assessment of their genetic and chemical diversity were carried out using ISSR (inter simple sequence repeat) and HPLC (high performance liquid chromatography) fingerprinting methods Results: Among the screened 40 ISSR primers, 15 were found polymorphic and collectively produced nine unique accession-specific bands. The maximum and minimum numbers of amplicones were noted for ISSR-15 and ISSR-11, respectively. The ISSR -11 and ISSR-13 revealed 100% polymorphism. HPLC chromatograms showed that accessions possess the secondary metabolites of mid-polarity with considerable variability. Unknown peaks with retention time 2.63, 3.41, 23.83, 24.50, and 44.67 were found universal type. Comparative hierarchical clustering analysis based on foresaid fingerprints indicates that both techniques have equal potential to discriminate accessions according to percentage gymnemic acid in their leaf tissue. Second approach was noted more efficiently for separation of accessions according to their agro-climatic/collection site Conclusion: Highly polymorphic ISSRs could be utilized as molecular probes for further selection of high gymnemic acid yielding accessions. Observed accession specific bands may be used as a descriptor for plant accessions protection and converted into sequence tagged sites markers. Identified five universal type peaks could be helpful in identification of G. sylvestre-based various herbal preparations. SUMMARY Nine accession specific unique bandsFive marker peaks for G. sylvestre.Suitability of genetic and chemical fingerprinting Abbreviations used: HPLC: High Performance Liquid Chromatography, ISSR: Inter Simple Sequence Repeats, CTAB: Cetyl Trimethylammonium Bromide, DNTP: Deoxynucleotide Triphosphates PMID:27761067

  6. Genetic and Chemical Profiling of Gymnema sylvestre Accessions from Central India: Its Implication for Quality Control and Therapeutic Potential of Plant.

    PubMed

    Verma, Ashutosh Kumar; Dhawan, Sunita Singh; Singh, Seema; Bharati, Kumar Avinash; Jyotsana

    2016-07-01

    Gymnema sylvestre , a vulnerable plant species, is mentioned in Indian Pharmacopeia as an antidiabetic drug. Study of genetic and chemical diversity and its implications in accessions of G. sylvestre . Fourteen accessions of G. sylvestre collected from Central India and assessment of their genetic and chemical diversity were carried out using ISSR (inter simple sequence repeat) and HPLC (high performance liquid chromatography) fingerprinting methods. Among the screened 40 ISSR primers, 15 were found polymorphic and collectively produced nine unique accession-specific bands. The maximum and minimum numbers of amplicones were noted for ISSR-15 and ISSR-11, respectively. The ISSR -11 and ISSR-13 revealed 100% polymorphism. HPLC chromatograms showed that accessions possess the secondary metabolites of mid-polarity with considerable variability. Unknown peaks with retention time 2.63, 3.41, 23.83, 24.50, and 44.67 were found universal type. Comparative hierarchical clustering analysis based on foresaid fingerprints indicates that both techniques have equal potential to discriminate accessions according to percentage gymnemic acid in their leaf tissue. Second approach was noted more efficiently for separation of accessions according to their agro-climatic/collection site. Highly polymorphic ISSRs could be utilized as molecular probes for further selection of high gymnemic acid yielding accessions. Observed accession specific bands may be used as a descriptor for plant accessions protection and converted into sequence tagged sites markers. Identified five universal type peaks could be helpful in identification of G. sylvestre -based various herbal preparations. Nine accession specific unique bandsFive marker peaks for G. sylvestre .Suitability of genetic and chemical fingerprinting Abbreviations used: HPLC: High Performance Liquid Chromatography, ISSR: Inter Simple Sequence Repeats, CTAB: Cetyl Trimethylammonium Bromide, DNTP: Deoxynucleotide Triphosphates.

  7. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  8. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... relationship with the ultimate customer, can more effectively implement them. In addition, a broker or dealer... specific risk management controls and supervisory procedures to a customer that is a registered broker... such customer, based on its position in the transaction and relationship with the ultimate customer...

  9. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  10. Controlled Retrieval of Specific Context Information in Children and Adults.

    PubMed

    Lorsbach, Thomas C; Friehe, Mary J; Teten, Amy Fair; Reimer, Jason F; Armendarez, Joseph J

    2015-01-01

    This study adapted a procedure used by Luo and Craik (2009) to examine whether developmental differences exist in the ability to use controlled retrieval processes to access the contextual details of memory representations. Participants from 3 age groups (mean ages 9, 12, and 25 years) were presented with words in 3 study contexts: with a black-and-white picture, with a color picture, or alone without a picture. Six recognition tests were then presented that varied in the demands (high or low) placed on the retrieval of specific contextual information. Each test consisted of a mixture of words that were old targets from 1 study context, distractors (i.e., previously studied words from a different context), and completely new words. A high-specificity and a low-specificity test list was paired with each test question, with high and low specificity being determined by the nature of the distractors used in a test list. High-specificity tests contained words that were studied in similar contexts: old targets (e.g., words studied with black-and-white pictures) and distractors (e.g., words studied with color pictures). In contrast, low-specificity tests contained words that were studied in dissimilar contexts: old targets (e.g., words studied with black-and-white pictures) and distractors (e.g., words previously studied without a picture). Relative to low-specificity tests, the retrieval conditions of high-specificity tests were assumed to place greater demands on the controlled access of specific contextual information. Analysis of recollection scores revealed that age differences were present on high-but not low-specificity tests, with the performance of 9-year-olds disproportionately affected by the retrieval demands of high-specificity tests.

  11. Verification of Security Policy Enforcement in Enterprise Systems

    NASA Astrophysics Data System (ADS)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  12. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A.; Mamidala, Amith R.

    2013-09-03

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  13. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A; Mamidala, Amith R

    2014-02-11

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  14. The Controlled Retrieval of Specific Context Information in Children and Adults

    PubMed Central

    Lorsbach, Thomas C.; Reimer, Jason F.; Friehe, Mary J.; Armendarez, Joseph J.; Teten, Amy Fair

    2017-01-01

    The present study adapted a procedure used recently by Luo and Craik (2009) in order to examine whether developmental differences exist in the ability to use controlled retrieval processes to access the specific contextual details of memory representations. Participants from three age groups (Mean ages: 9, 12, and 25 years) were presented with words in three study contexts: with a black-and-white picture, with a color picture, or alone without a picture. Six recognition tests were then presented that varied in the demands (high or low) placed on the retrieval of specific contextual information. Each test consisted of a mixture of words that were old targets from one study context, distractors (i.e., previously studied words from a different context), and completely new words. A “high specificity” and a “low specificity” test list was paired with each test question, with “high” and “low” specificity being determined by the nature of the distractors used in a test list. High specificity tests contained words that were studied in similar contexts: old targets (e.g., words studied with black-and-white pictures) and distractors (e.g., words studied with color pictures). In contrast, low specificity tests contained words that were studied in dissimilar contexts: old targets (e.g., words studied with black-and-white pictures) and distractors (e.g., words previously studied without a picture). Relative to low specificity tests, the retrieval conditions of high specificity tests were assumed to place greater demands on the controlled access of specific contextual information. Analysis of recollection scores revealed that age differences were present on high, but not low specificity tests, with the performance of 9-year olds being disproportionately affected by the retrieval demands of high specificity tests. PMID:26219173

  15. Spatial accessibility to specific sport facilities and corresponding sport practice: the RECORD Study

    PubMed Central

    2013-01-01

    Background Physical activity is considered as a major component of a healthy lifestyle. However, few studies have examined the relationships between the spatial accessibility to sport facilities and sport practice with a sufficient degree of specificity. The aim of this study was to investigate the associations between the spatial accessibility to specific types of sports facilities and the practice of the corresponding sports after carefully controlling for various individual socio-demographic characteristics and neighborhood socioeconomic variables. Methods Data from the RECORD Study involving 7290 participants recruited in 2007–2008, aged 30–79 years, and residing in the Paris metropolitan area were analyzed. Four categories of sports were studied: team sports, racket sports, swimming and related activities, and fitness. Spatial accessibility to sport facilities was measured with two complementary approaches that both take into account the street network (distance to the nearest facility and count of facilities around the dwelling). Associations between the spatial accessibility to sport facilities and the practice of the corresponding sports were assessed using multilevel logistic regression after adjusting for individual and contextual characteristics. Results High individual education and high household income were associated with the practice of racket sports, swimming or related activities, and fitness over the previous 7 days. The spatial accessibility to swimming pools was associated with swimming and related sports, even after adjustment for individual/contextual factors. The spatial accessibility to facilities was not related to the practice of other sports. High neighborhood income was associated with the practice of a racket sport and fitness. Conclusions Accessibility is a multi-dimensional concept that integrates educational, financial, and geographical aspects. Our work supports the evidence that strategies to increase participation in sport activities should improve the spatial and financial access to specific facilities, but also address educational disparities in sport practice. PMID:23601332

  16. Evaluation of Standards for Access Control Enabling PHR-S Federation.

    PubMed

    Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan

    2017-01-01

    The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.

  17. 77 FR 76300 - Recommendations To Modify Chapters 29, 30, 37, and 85 of the Harmonized Tariff Schedule of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-27

    ... United States (HTS). The goods involved include certain sensitized photographic film, video game console... chapter 37, and (2) Providing specifically for cordless video game console controllers which use infrared... ``; cordless video game console controllers which use infrared transmissions to operate or access the various...

  18. Analysis of DNA replication associated chromatin decondensation: in vivo assay for understanding chromatin remodeling mechanisms of selected proteins.

    PubMed

    Borysov, Sergiy; Bryant, Victoria L; Alexandrow, Mark G

    2015-01-01

    Of critical importance to many of the events underlying transcriptional control of gene expression are modifications to core and linker histones that regulate the accessibility of trans-acting factors to the DNA substrate within the context of chromatin. Likewise, control over the initiation of DNA replication, as well as the ability of the replication machinery to proceed during elongation through the multiple levels of chromatin condensation that are likely to be encountered, is known to involve the creation of chromatin accessibility. In the latter case, chromatin access will likely need to be a transient event so as to prevent total genomic unraveling of the chromatin that would be deleterious to cells. While there are many molecular and biochemical approaches in use to study histone changes and their relationship to transcription and chromatin accessibility, few techniques exist that allow a molecular dissection of the events underlying DNA replication control as it pertains to chromatin changes and accessibility. Here, we outline a novel experimental strategy for addressing the ability of specific proteins to induce large-scale chromatin unfolding (decondensation) in vivo upon site-specific targeting to an engineered locus. Our laboratory has used this powerful system in novel ways to directly address the ability of DNA replication proteins to create chromatin accessibility, and have incorporated modifications to the basic approach that allow for a molecular genetic analysis of the mechanisms and associated factors involved in causing chromatin decondensation by a protein of interest. Alternative approaches involving co-expression of other proteins (competitors or stimulators), concurrent drug treatments, and analysis of co-localizing histone modifications are also addressed, all of which are illustrative of the utility of this experimental system for extending basic findings to physiologically relevant mechanisms. Although used by our group to analyze mechanisms underlying DNA replication associated chromatin accessibility, this unique and powerful experimental system has the propensity to be a valuable tool for understanding chromatin remodeling mechanisms orchestrated by other cellular processes such as DNA repair, recombination, mitotic chromosome condensation, or other chromosome dynamics involving chromatin alterations and accessibility.

  19. A Neuroanatomical Model of Prefrontal Inhibitory Modulation of Memory Retrieval

    PubMed Central

    Depue, Brendan E.

    2012-01-01

    Memory of past experience is essential for guiding goal-related behavior. Being able to control accessibility of memory through modulation of retrieval enables humans to flexibly adapt to their environment. Understanding the specific neural pathways of how this control is achieved has largely eluded cognitive neuroscience. Accordingly, in the current paper I review literature that examines the overt control over retrieval in order to reduce accessibility. I first introduce three hypotheses of inhibition of retrieval. These hypotheses involve: i) attending to other stimuli as a form of diversionary attention, ii) inhibiting the specific individual neural representation of the memory, and iii) inhibiting the hippocampus and retrieval process more generally to prevent reactivation of the representation. I then analyze literature taken from the White Bear Suppression, Directed Forgetting and Think/No-Think tasks to provide evidence for these hypotheses. Finally, a neuroanatomical model is developed to indicate three pathways from PFC to the hippocampal complex that support inhibition of memory retrieval. Describing these neural pathways increases our understanding of control over memory in general. PMID:22374224

  20. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    PubMed Central

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  1. Smart cards: a specific application in the hospital.

    PubMed

    Güler, I; Zengin, R M; Sönmez, M

    1998-12-01

    Computers have the ability to process and access tremendous amounts of information in our daily lives. But, now, individuals have this ability by carrying a smart card in their own wallets. These cards provide us the versatility, power, and security of computers. This study begins with a short description of smart cards and their advantages. Then, an electronic circuit that is designed for healthcare application in hospitals is introduced. This circuit functions as a smart card holder identifier, access controller for hospital doors and also can be used as a smart card reader/writer. Design steps of this electronic circuit, operation principles, serial communication with P.C., and the software are examined. Finally a complete access control network for hospital doors that functions with smart cards is discussed.

  2. Attribute-Based Proxy Re-Encryption with Keyword Search

    PubMed Central

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257

  3. Attribute-based proxy re-encryption with keyword search.

    PubMed

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.

  4. Automated Library System Specifications.

    DTIC Science & Technology

    1986-06-01

    University), LIS (Georqetown Universitv Medical Center) 20 DiSTRI3UT!ON.. AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION :UNCLASSIFIED...Interface) acquisitions, patron access catalo. (Boolean search), authority Afiles, zana ~ezient reports. Serials control expected in 1985. INDIVIDUALIZATIOI

  5. Reduced Specificity of Autobiographical Memory and Depression: The Role of Executive Control

    ERIC Educational Resources Information Center

    Dalgleish, Tim; Golden, Ann-Marie J.; Barrett, Lisa Feldman; Au Yeung, Cecilia; Murphy, Victoria; Tchanturia, Kate; Williams, J. Mark G.; Perkins, Nicola; Barnard, Phillip J.; Elward, Rachael; Watkins, Edward

    2007-01-01

    It has been widely established that depressed mood states and clinical depression, as well as a range of other psychiatric disorders, are associated with a relative difficulty in accessing specific autobiographical information in response to emotion-related cue words on an Autobiographical Memory Test (AMT; J. M. G. Williams & K. Broadbent, 1986).…

  6. Biomedical Big Data: New Models of Control Over Access, Use and Governance.

    PubMed

    Vayena, Effy; Blasimme, Alessandro

    2017-12-01

    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated in informed consent documents or be implicit in the norms of confidentiality that govern the relationships of patients and healthcare professionals. However, with medicine becoming a data-intense enterprise, informed consent and medical confidentiality, as mechanisms of control, are put under pressure. In this paper we explore emerging models of informational control in data-intense healthcare and clinical research, which can compensate for the limitations of currently available instruments. More specifically, we discuss three approaches that hold promise in increasing individual control: the emergence of data portability rights as means to control data access, new mechanisms of informed consent as tools to control data use, and finally, new participatory governance schemes that allow individuals to control their data through direct involvement in data governance. We conclude by suggesting that, despite the impression that biomedical big data diminish individual control, the synergistic effect of new data management models can in fact improve it.

  7. Lineage-specific enhancers activate self-renewal genes in macrophages and embryonic stem cells

    PubMed Central

    Soucie, Erinn L.; Weng, Ziming; Geirsdóttir, Laufey; Molawi, Kaaweh; Maurizio, Julien; Fenouil, Romain; Mossadegh-Keller, Noushine; Gimenez, Gregory; VanHille, Laurent; Beniazza, Meryam; Favret, Jeremy; Berruyer, Carole; Perrin, Pierre; Hacohen, Nir; Andrau, J.-C.; Ferrier, Pierre; Dubreuil, Patrice; Sidow, Arend; Sieweke, Michael H.

    2016-01-01

    Differentiated macrophages can self-renew in tissues and expand long-term in culture, but the gene regulatory mechanisms that accomplish self-renewal in the differentiated state have remained unknown. Here we show that in mice, the transcription factors MafB and c-Maf repress a macrophage-specific enhancer repertoire associated with a gene network controlling self-renewal. Single cell analysis revealed that, in vivo, proliferating resident macrophages can access this network by transient down-regulation of Maf transcription factors. The network also controls embryonic stem cell self-renewal but is associated with distinct embryonic stem cell-specific enhancers. This indicates that distinct lineage-specific enhancer platforms regulate a shared network of genes that control self-renewal potential in both stem and mature cells. PMID:26797145

  8. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as well as legacy linked datasets. We show that SAFE enables granular graph-level access control over distributed clinical RDF data cubes and efficiently reduces the source selection and overall query execution time when compared with general-purpose SPARQL query federation engines in the targeted setting.

  9. A clinical data repository enhances hospital infection control.

    PubMed Central

    Samore, M.; Lichtenberg, D.; Saubermann, L.; Kawachi, C.; Carmeli, Y.

    1997-01-01

    We describe the benefits of a relational database of hospital clinical data (Clinical Data Repository; CDR) for an infection control program. The CDR consists of > 40 Sybase tables, and is directly accessible for ad hoc queries by members of the infection control unit who have been granted privileges for access by the Information Systems Department. The data elements and functional requirements most useful for surveillance of nosocomial infections, antibiotic use, and resistant organisms are characterized. Specific applications of the CDR are presented, including the use of automated definitions of nosocomial infection, graphical monitoring of resistant organisms with quality control limits, and prospective detection of inappropriate antibiotic use. Hospital surveillance and quality improvement activities are significantly benefited by the availability of a querable set of tables containing diverse clinical data. PMID:9357588

  10. 22 CFR 9.13 - Safeguarding.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.13 Safeguarding. Specific controls on the use, processing, storage, reproduction, and transmittal of classified information within the Department to provide protection for such information and to prevent access by unauthorized...

  11. 22 CFR 9.13 - Safeguarding.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.13 Safeguarding. Specific controls on the use, processing, storage, reproduction, and transmittal of classified information within the Department to provide protection for such information and to prevent access by unauthorized...

  12. A web-based biosignal data management system for U-health data integration.

    PubMed

    Ro, Dongwoo; Yoo, Sooyoung; Choi, Jinwook

    2008-11-06

    In the ubiquitous healthcare environment, the biosignal data should be easily accessed and properly maintained. This paper describes a web-based data management system. It consists of a device interface, a data upload control, a central repository, and a web server. For the user-specific web services, a MFER Upload ActiveX Control was developed.

  13. Controlled conformational transitions in the MVM virion expose the VP1 N-terminus and viral genome without particle disassembly.

    PubMed

    Cotmore, S F; D'abramo, A M; Ticknor, C M; Tattersall, P

    1999-02-01

    Antisera were raised against peptides corresponding to the N-termini of capsid proteins VP1 and VP2 from the parvovirus minute virus of mice. Epitopes in the 142-amino-acid VP1-specific region were not accessible in the great majority of newly released viral particles, and sera directed against them failed to neutralize virus directly or deplete stocks of infectious virions. However, brief exposure to temperatures of 45 degreesC or more induced a conformational transition in a population of full virions, but not in empty viral particles, in which VP1-specific sequences became externally accessible. In contrast, the VP2 N-terminus was antibody-accessible in all full, but not empty, particles without prior treatment. An electrophoretic mobility shift assay, in which particles were heat-treated and/or preincubated with antibodies prior to electrophoresis, confirmed this pattern of epitope accessibility, showing that the heat-induced conformational transition produces a retarded form of virion that can be supershifted by incubation with VP1-specific sera. The proportion of virions undergoing transition increased with temperature, but at all temperatures up to 70 degreesC viral particles retained structure-specific antigenic determinants and remained essentially intact, without shedding individual polypeptide species or subunits. However, despite the apparent integrity of its protective coat, the genome became accessible to externally applied enzymes in an increasing proportion of virions through this temperature range, suggesting that the conformational transitions that expose VP1 likely also allow access to the genome. Heating particles to 80 degreesC or above finally induced disassembly to polypeptide monomers. Copyright 1999 Academic Press.

  14. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  15. The transcription factor Grainy head primes epithelial enhancers for spatiotemporal activation by displacing nucleosomes.

    PubMed

    Jacobs, Jelle; Atkins, Mardelle; Davie, Kristofer; Imrichova, Hana; Romanelli, Lucia; Christiaens, Valerie; Hulselmans, Gert; Potier, Delphine; Wouters, Jasper; Taskiran, Ibrahim I; Paciello, Giulia; González-Blas, Carmen B; Koldere, Duygu; Aibar, Sara; Halder, Georg; Aerts, Stein

    2018-06-04

    Transcriptional enhancers function as docking platforms for combinations of transcription factors (TFs) to control gene expression. How enhancer sequences determine nucleosome occupancy, TF recruitment and transcriptional activation in vivo remains unclear. Using ATAC-seq across a panel of Drosophila inbred strains, we found that SNPs affecting binding sites of the TF Grainy head (Grh) causally determine the accessibility of epithelial enhancers. We show that deletion and ectopic expression of Grh cause loss and gain of DNA accessibility, respectively. However, although Grh binding is necessary for enhancer accessibility, it is insufficient to activate enhancers. Finally, we show that human Grh homologs-GRHL1, GRHL2 and GRHL3-function similarly. We conclude that Grh binding is necessary and sufficient for the opening of epithelial enhancers but not for their activation. Our data support a model positing that complex spatiotemporal expression patterns are controlled by regulatory hierarchies in which pioneer factors, such as Grh, establish tissue-specific accessible chromatin landscapes upon which other factors can act.

  16. Compendium of Arms Control Verification Proposals.

    DTIC Science & Technology

    1982-03-01

    proposals. This appears to be the case for virtually all kinds of prospective arms control topics from general and complete disarmament to control of specific... virtually anywhere. Unrestricted access would be particularly necessary in the case of states which previously had nuclear weapons. Practically speaking...been transferred out of the area, it would be harder to check on remaining stocks without some intrusive inspection and it would be virtually impossible

  17. Accessing and operating agricultural machinery: Advancements in assistive technology for users with impaired mobility.

    PubMed

    Ehlers, Shawn G; Field, William E

    2018-02-14

    This research focused on the advancements made in enabling agricultural workers with impaired mobility to access and operate off-road agricultural machinery. Although not a new concept, technological advancements in remote-controlled lifts, electronic actuators, electric over hydraulic controllers, and various modes of hand controls have advanced significantly, allowing operators with limited mobility to resume a high level of productivity in agricultural-related enterprises. In the United States, approximately 1.7% of the population is living with some form of paralysis or significant mobility impairment. When paired with the 2012 USDA Agriculture Census of 3.2 million farmers, it can be extrapolated that these technologies could impact 54,000 agricultural workers who have encountered disabling injuries or disease, which inhibit their ability to access and operate tractors, combines, and other self-propelled agricultural machines. Advancements in agricultural-specific technologies can allow for many of these individuals to regain the ability to effectively operate machinery once more.

  18. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blocksome, Michael A.; Mamidala, Amith R.

    2013-09-03

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segmentmore » of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.« less

  19. Emergency access to protected health records.

    PubMed

    Künzi, Julien; Koster, Paul; Petković, Milan

    2009-01-01

    Digital Rights Management (DRM) schemes are receiving increased attention in the healthcare domain for the protection of sensitive health records as they offer security against insider attacks and advance protection features such as usage control. However, to be accepted by health care providers, a DRM solution has to fulfill specific healthcare requirements including emergency access. In this paper, we propose such DRM solution that can be deployed in highly distributed environments of electronic or personal health record infrastructures.

  20. Lineage-specific enhancers activate self-renewal genes in macrophages and embryonic stem cells.

    PubMed

    Soucie, Erinn L; Weng, Ziming; Geirsdóttir, Laufey; Molawi, Kaaweh; Maurizio, Julien; Fenouil, Romain; Mossadegh-Keller, Noushine; Gimenez, Gregory; VanHille, Laurent; Beniazza, Meryam; Favret, Jeremy; Berruyer, Carole; Perrin, Pierre; Hacohen, Nir; Andrau, J-C; Ferrier, Pierre; Dubreuil, Patrice; Sidow, Arend; Sieweke, Michael H

    2016-02-12

    Differentiated macrophages can self-renew in tissues and expand long term in culture, but the gene regulatory mechanisms that accomplish self-renewal in the differentiated state have remained unknown. Here we show that in mice, the transcription factors MafB and c-Maf repress a macrophage-specific enhancer repertoire associated with a gene network that controls self-renewal. Single-cell analysis revealed that, in vivo, proliferating resident macrophages can access this network by transient down-regulation of Maf transcription factors. The network also controls embryonic stem cell self-renewal but is associated with distinct embryonic stem cell-specific enhancers. This indicates that distinct lineage-specific enhancer platforms regulate a shared network of genes that control self-renewal potential in both stem and mature cells. Copyright © 2016, American Association for the Advancement of Science.

  1. The problems and promise of DNA barcodes for species diagnosis of primate biomaterials

    PubMed Central

    Lorenz, Joseph G; Jackson, Whitney E; Beck, Jeanne C; Hanner, Robert

    2005-01-01

    The Integrated Primate Biomaterials and Information Resource (www.IPBIR.org) provides essential research reagents to the scientific community by establishing, verifying, maintaining, and distributing DNA and RNA derived from primate cell cultures. The IPBIR uses mitochondrial cytochrome c oxidase subunit I sequences to verify the identity of samples for quality control purposes in the accession, cell culture, DNA extraction processes and prior to shipping to end users. As a result, IPBIR is accumulating a database of ‘DNA barcodes’ for many species of primates. However, this quality control process is complicated by taxon specific patterns of ‘universal primer’ failure, as well as the amplification or co-amplification of nuclear pseudogenes of mitochondrial origins. To overcome these difficulties, taxon specific primers have been developed, and reverse transcriptase PCR is utilized to exclude these extraneous sequences from amplification. DNA barcoding of primates has applications to conservation and law enforcement. Depositing barcode sequences in a public database, along with primer sequences, trace files and associated quality scores, makes this species identification technique widely accessible. Reference DNA barcode sequences should be derived from, and linked to, specimens of known provenance in web-accessible collections in order to validate this system of molecular diagnostics. PMID:16214744

  2. ATAC-see reveals the accessible genome by transposase-mediated imaging and sequencing.

    PubMed

    Chen, Xingqi; Shen, Ying; Draper, Will; Buenrostro, Jason D; Litzenburger, Ulrike; Cho, Seung Woo; Satpathy, Ansuman T; Carter, Ava C; Ghosh, Rajarshi P; East-Seletsky, Alexandra; Doudna, Jennifer A; Greenleaf, William J; Liphardt, Jan T; Chang, Howard Y

    2016-12-01

    Spatial organization of the genome plays a central role in gene expression, DNA replication, and repair. But current epigenomic approaches largely map DNA regulatory elements outside of the native context of the nucleus. Here we report assay of transposase-accessible chromatin with visualization (ATAC-see), a transposase-mediated imaging technology that employs direct imaging of the accessible genome in situ, cell sorting, and deep sequencing to reveal the identity of the imaged elements. ATAC-see revealed the cell-type-specific spatial organization of the accessible genome and the coordinated process of neutrophil chromatin extrusion, termed NETosis. Integration of ATAC-see with flow cytometry enables automated quantitation and prospective cell isolation as a function of chromatin accessibility, and it reveals a cell-cycle dependence of chromatin accessibility that is especially dynamic in G1 phase. The integration of imaging and epigenomics provides a general and scalable approach for deciphering the spatiotemporal architecture of gene control.

  3. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  4. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  5. Fulfillment of Koch’s postulates and partial host range of Septoria lepidii Desm., a fungal pathogen for potential biological control of hoary cress (Lepidium spp.)

    USDA-ARS?s Scientific Manuscript database

    We have fulfilled Koch’s postulates and conducted host range tests with Septoria lepidii Desm. on five geographical accessions of hoary cress. Host range results showed the fungus specific to Lepidium spp. and damaging to hoary cress. This fungus is potentially an important biological control agent ...

  6. Life history changes in Trogoderma variabile and T. inclusum due to mating delay with implications for mating disruption as a management tactic

    USDA-ARS?s Scientific Manuscript database

    Controlling postharvest pest species is a costly process with insecticide resistance and species specific control requiring multiple tactics. Mating disruption can be used to both decrease a female’s access to males and delay timing of mating and decreases overall mating success in a population and ...

  7. Techniques for the Detection of Faulty Packet Header Modifications

    DTIC Science & Technology

    2014-03-12

    layer approaches to check if packets are being altered by middleboxes and were primarily developed as network neutrality analysis tools. Switzerland works...local and metropolitan area networks –specific requirements part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications...policy or position of the Department of Defense or the U.S. Government. Understanding, measuring, and debugging IP networks , particularly across

  8. Expanding access to high-quality plain-language patient education information through context-specific hyperlinks

    PubMed Central

    Ancker, Jessica S.; Mauer, Elizabeth; Hauser, Diane; Calman, Neil

    2016-01-01

    Medical records, which are increasingly directly accessible to patients, contain highly technical terms unfamiliar to many patients. A federally qualified health center (FQHC) sought to help patients interpret their records by embedding context-specific hyperlinks to plain-language patient education materials in its portal. We assessed the impact of this innovation through a 3-year retrospective cohort study. A total of 12,877 (10% of all patients) in this safety net population had used the MPC links. Black patients, Latino patients comfortable using English, and patients covered by Medicaid were more likely to use the informational hyperlinks than other patients. The positive association with black race and Latino ethnicity remained statistically significant in multivariable models that controlled for insurance type. We conclude that many of the sociodemographic factors associated with the digital divide do not present barriers to accessing context-specific patient education information once in the portal. In fact, this type of highly convenient plain-language patient education may provide particular value to patients in traditionally disadvantaged groups. PMID:28269821

  9. Discriminating languages in bilingual contexts: the impact of orthographic markedness

    PubMed Central

    Casaponsa, Aina; Carreiras, Manuel; Duñabeitia, Jon A.

    2014-01-01

    Does language-specific orthography help language detection and lexical access in naturalistic bilingual contexts? This study investigates how L2 orthotactic properties influence bilingual language detection in bilingual societies and the extent to which it modulates lexical access and single word processing. Language specificity of naturalistically learnt L2 words was manipulated by including bigram combinations that could be either L2 language-specific or common in the two languages known by bilinguals. A group of balanced bilinguals and a group of highly proficient but unbalanced bilinguals who grew up in a bilingual society were tested, together with a group of monolinguals (for control purposes). All the participants completed a speeded language detection task and a progressive demasking task. Results showed that the use of the information of orthotactic rules across languages depends on the task demands at hand, and on participants' proficiency in the second language. The influence of language orthotactic rules during language detection, lexical access and word identification are discussed according to the most prominent models of bilingual word recognition. PMID:24860536

  10. Breaking open the set top box

    NASA Astrophysics Data System (ADS)

    Banks, David; Wiley, Anthony; Catania, Nicolas; Coles, Alastair N.; Smith, Duncan; Baynham, Simon; Deliot, Eric; Chidzey, Rod

    1998-02-01

    In this paper we describe the work being done at HP Labs Bristol in the area of home networks and gateways. This work is based on the idea of breaking open the set top box by physically separating the access network specific functions from the application specific functions. The access network specific functions reside in an access network gateway that can be shared by many end user devices. The first section of the paper present the philosophy behind this approach. The end user devices and the access network gateways must be interconnected by a high bandwidth network which can offer a bounded delay service for delay sensitive traffic. We are advocating the use of IEEE 1394 for this network, and the next section of the paper gives a brief introduction to this technology. We then describe a prototype digital video broadcasting satellite compliant gateway that we have built. This gateway could be used, for example, by a PC for receiving a data service or by a digital TV for receiving an MPEG-2 video service. A control architecture is the presented which uses a PC application to provide a web based user interface to the system. Finally, we provide details of our work on extending the reach of IEEE 1394 and its standardization status.

  11. Investigation of Inter-Node B Macro Diversity for Single-Carrier Based Radio Access in Evolved UTRA Uplink

    NASA Astrophysics Data System (ADS)

    Kawai, Hiroyuki; Morimoto, Akihito; Higuchi, Kenichi; Sawahashi, Mamoru

    This paper investigates the gain of inter-Node B macro diversity for a scheduled-based shared channel using single-carrier FDMA radio access in the Evolved UTRA (UMTS Terrestrial Radio Access) uplink based on system-level simulations. More specifically, we clarify the gain of inter-Node B soft handover (SHO) with selection combining at the radio frame length level (=10msec) compared to that for hard handover (HHO) for a scheduled-based shared data channel, considering the gains of key packet-specific techniques including channel-dependent scheduling, adaptive modulation and coding (AMC), hybrid automatic repeat request (ARQ) with packet combining, and slow transmission power control (TPC). Simulation results show that the inter-Node B SHO increases the user throughput at the cell edge by approximately 10% for a short cell radius such as 100-300m due to the diversity gain from a sudden change in other-cell interference, which is a feature specific to full scheduled-based packet access. However, it is also shown that the gain of inter-Node B SHO compared to that for HHO is small in a macrocell environment when the cell radius is longer than approximately 500m due to the gains from hybrid ARQ with packet combining, slow TPC, and proportional fairness based channel-dependent scheduling.

  12. A Content Standard for Computational Models; Digital Rights Management (DRM) Architectures; A Digital Object Approach to Interoperable Rights Management: Finely-Grained Policy Enforcement Enabled by a Digital Object Infrastructure; LOCKSS: A Permanent Web Publishing and Access System; Tapestry of Time and Terrain.

    ERIC Educational Resources Information Center

    Hill, Linda L.; Crosier, Scott J.; Smith, Terrence R.; Goodchild, Michael; Iannella, Renato; Erickson, John S.; Reich, Vicky; Rosenthal, David S. H.

    2001-01-01

    Includes five articles. Topics include requirements for a content standard to describe computational models; architectures for digital rights management systems; access control for digital information objects; LOCKSS (Lots of Copies Keep Stuff Safe) that allows libraries to run Web caches for specific journals; and a Web site from the U.S.…

  13. Review of modern biometric user authentication and their development prospects

    NASA Astrophysics Data System (ADS)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  14. Identification of ribozymes within a ribozyme library that efficiently cleave a long substrate RNA.

    PubMed Central

    Campbell, T B; Cech, T R

    1995-01-01

    Positions 2-6 of the substrate-binding internal guide sequence (IGS) of the L-21 Sca I form of the Tetrahymena thermophila intron were mutagenized to produce a GN5 IGS library. Ribozymes within the GN5 library capable of efficient cleavage of an 818-nt human immunodeficiency virus type 1 vif-vpr RNA, at 37 degrees C, were identified by ribozyme-catalyzed guanosine addition to the 3' cleavage product. Three ribozymes (IGS = GGGGCU, GGCUCC, and GUGGCU) within the GN5 library that actively cleaved the long substrate were characterized kinetically and compared to the wild-type ribozyme (GGAGGG) and two control ribozymes (GGAGUC and GGAGAU). The two control ribozymes have specific sites within the long substrate, but were not identified during screening of the library. Under single-turnover conditions, ribozymes GGGGCU, GGCUCC, and GUGGCU cleaved the 818-nt substrate 4- to 200-fold faster than control ribozymes. Short cognate substrates, which should be structureless and therefore accessible to ribozyme binding, were cleaved at similar rates by all ribozymes except GGGGCU, which showed a fourfold rate enhancement. The rate of cleavage of long relative to short substrate under single-turnover conditions suggests that GGCUCC and GUGGCU were identified because of accessibility to their specific cleavage sites within the long substrate (substrate-specific effects), whereas GGGGCU was identified because of an enhanced rate of substrate binding despite a less accessible site in the long substrate. Even though screening was performed with 100-fold excess substrate (relative to total ribozyme), the rate of multiple-turnover catalysis did not contribute to identification of trans-cleaving ribozymes in the GN5 library. PMID:7489519

  15. What we talk about when we talk about access deficits

    PubMed Central

    Mirman, Daniel; Britt, Allison E.

    2014-01-01

    Semantic impairments have been divided into storage deficits, in which the semantic representations themselves are damaged, and access deficits, in which the representations are intact but access to them is impaired. The behavioural phenomena that have been associated with access deficits include sensitivity to cueing, sensitivity to presentation rate, performance inconsistency, negative serial position effects, sensitivity to number and strength of competitors, semantic blocking effects, disordered selection between strong and weak competitors, correlation between semantic deficits and executive function deficits and reduced word frequency effects. Four general accounts have been proposed for different subsets of these phenomena: abnormal refractoriness, too much activation, impaired competitive selection and deficits of semantic control. A combination of abnormal refractoriness and impaired competitive selection can account for most of the behavioural phenomena, but there remain several open questions. In particular, it remains unclear whether access deficits represent a single syndrome, a syndrome with multiple subtypes or a variable collection of phenomena, whether the underlying deficit is domain-general or domain-specific, whether it is owing to disorders of inhibition, activation or selection, and the nature of the connection (if any) between access phenomena in aphasia and in neurologically intact controls. Computational models offer a promising approach to answering these questions. PMID:24324232

  16. Association of Access to Publicly Funded Family Planning Services With Adolescent Birthrates in California Counties

    PubMed Central

    Chabot, Marina J.; Navarro, Sandy; Swann, Diane; Darney, Philip; Thiel de Bocanegra, Heike

    2014-01-01

    Objectives. We examined the association of adolescent birthrates (ABRs) with access to and receipt of publicly funded family planning services in California counties provided through 2 state programs: Medi-Cal, California’s Medicaid program, and the Family Planning, Access, Care, and Treatment (Family PACT) program. Methods. Our key data sources included the California Health Interview Survey and California Women’s Health Survey, Medi-Cal and Family PACT claims data, and the Birth Statistical Master File. We constructed a linear regression analysis measuring the relationship of access to and receipt of family planning services with ABRs when controlling for counties’ select covariates. Results. The regression analysis indicated that a higher access rate to Family PACT in a county was associated with a lower ABR (B = −0.19; P < .01) when controlling for unemployment rate, percentage of foreign-born adolescents, and percentage of adult low-income births. Conclusions. Efforts to reduce ABRs, specifically in counties that had persistently high rates are critical to achieving a healthy future for the state and the nation. Family PACT played a crucial role in helping adolescents avoid unintended and early childbearing. PMID:24354841

  17. Using routinely recorded data in the UK to assess outcomes in a randomised controlled trial: The Trials of Access.

    PubMed

    Powell, G A; Bonnett, L J; Tudur-Smith, C; Hughes, D A; Williamson, P R; Marson, A G

    2017-08-23

    In the UK, routinely recorded data may benefit prospective studies including randomised controlled trials (RCTs). In an on-going study, we aim to assess the feasibility of access and agreement of routinely recorded clinical and non-clinical data compared to data collected during a RCT using standard prospective methods. This paper will summarise available UK routinely recorded data sources and discuss our experience with the feasibility of accessing routinely recorded data for participants of a RCT before finally proposing recommendations for improving the access and implementation of routinely recorded data in RCTs. Setting: the case study RCT is the Standard and New Antiepileptic Drugs II (SANAD II) trial, a pragmatic, UK, multicentre, phase IV RCT assessing the clinical and cost-effectiveness of antiepileptic drug treatments for newly diagnosed epilepsy. 98 participants have provided written consent to permit the request of routinely recorded data. Study procedures: routinely recorded clinical and non-clinical data were identified and data requested through formal applications from available data holders for the duration that participants have been recruited into SANAD II. The feasibility of accessing routinely recorded data during a RCT is assessed and recommendations for improving access proposed. Secondary-care clinical and socioeconomic data is recorded on a national basis and can be accessed, although there are limitations in the application process. Primary-care data are recorded by a number of organisations on a de-identified basis but access for specific individuals has not been feasible. Access to data recorded by non-clinical sources, including The Department for Work and Pensions and The Driving and Vehicle Licensing Agency, was not successful. Recommendations discussed include further research to assess the attributes of routinely recorded data, an assessment of public perceptions and the development of strategies to collaboratively improve access to routinely recorded data for research. International Standard Randomised Controlled Trials, ISRCTN30294119 . Registered on 3 July 2012. EudraCT No: 2012-001884-64. Registered on 9 May 2012.

  18. Semantic control and modality: an input processing deficit in aphasia leading to deregulated semantic cognition in a single modality.

    PubMed

    Thompson, Hannah E; Jefferies, Elizabeth

    2013-08-01

    Research suggests that semantic memory deficits can occur in at least three ways. Patients can (1) show amodal degradation of concepts within the semantic store itself, such as in semantic dementia (SD), (2) have difficulty in controlling activation within the semantic system and accessing appropriate knowledge in line with current goals or context, as in semantic aphasia (SA) and (3) experience a semantic deficit in only one modality following degraded input from sensory cortex. Patients with SA show deficits of semantic control and access across word and picture tasks, consistent with the view that their problems arise from impaired modality-general control processes. However, there are a few reports in the literature of patients with semantic access problems restricted to auditory-verbal materials, who show decreasing ability to retrieve concepts from words when they are presented repeatedly with closely related distractors. These patients challenge the notion that semantic control processes are modality-general and suggest instead a separation of 'access' to auditory-verbal and non-verbal semantic systems. We had the rare opportunity to study such a case in detail. Our aims were to examine the effect of manipulations of control demands in auditory-verbal semantic, non-verbal semantic and non-semantic tasks, allowing us to assess whether such cases always show semantic control/access impairments that follow a modality-specific pattern, or whether there are alternative explanations. Our findings revealed: (1) deficits on executive tasks, unrelated to semantic demands, which were more evident in the auditory modality than the visual modality; (2) deficits in executively-demanding semantic tasks which were accentuated in the auditory-verbal domain compared with the visual modality, but still present on non-verbal tasks, and (3) a coupling between comprehension and executive control requirements, in that mild impairment on single word comprehension was greatly increased on more demanding, associative judgements across modalities. This pattern of results suggests that mild executive-semantic impairment, paired with disrupted connectivity from auditory input, may give rise to semantic 'access' deficits affecting only the auditory modality. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Get Linked or Get Lost: Marketing Strategy for the Internet.

    ERIC Educational Resources Information Center

    Aldridge, Alicia; Forcht, Karen; Pierson, Joan

    1997-01-01

    To cultivate an online market share, companies must design marketing strategies specifically for the Internet. This article examines the nature of business on the Internet, highlighting demographics, user control, accessibility, communication, authenticity, competition, and security and proposes a marketing strategy, including targeting and…

  20. Cleanups in My Community

    EPA Pesticide Factsheets

    Cleanups in My Community (CIMC) is a public web application that enables integrated access through maps, lists and search filtering to site-specific information EPA has across all cleanup programs. CIMC taps into data publicly available from EPA's EnviroFacts (RCRA Corrective Action facilities, Brownfields properties and grant areas, Superfund NPL sites, other facility data) and web services (water monitoring stations, impaired waters, emergency responses, tribal boundaries, congressional districts, etc.) and connects to other applications (e.g., Superfund's CPAD) to provide easy seamless access to site-specific cleanup information with explanatory text and within the context of related data. Data can be filtered by cleanup program, geography, environmental indicators, controls, and cleanup stage. CIMC also provides some web services that integrate these data for others to use in their applications.

  1. Preparation for an Airport Master Plan for Joint Use Operation at Scott AFB, Illinois.

    DTIC Science & Technology

    1987-08-01

    Airfield and approach lighting b) Air traffic control tower c) Meteorological facilities d) Airport access and service roads e) Utilities f) Public...use, and to comply with all requirements for control of air, water and noise pollution as well as solid waste disposal. Specific conditions would be...Identification of Persons e Identification of Ground Vehicles S• Fencing 0 Gates I * Security Lighting i * Locks and Key Control 9 Critical Areas (Other Than

  2. He just wants to play: how goals determine the influence of violent computer games on aggression.

    PubMed

    Denzler, Markus; Häfner, Michael; Förster, Jens

    2011-12-01

    Generally, the accessibility of goal-related constructs is inhibited upon goal fulfillment. In line with this notion, the current studies explored whether violent computer games may reduce relative accessibility of aggression if the game involves the fulfillment of an aggressive goal. Specifically, in Study 1, participants who watched a trailer for a violent computer game that fulfilled the goal of venting anger showed less relative accessibility of aggression compared to participants who watched the trailer without goal fulfillment. In Study 2, actually playing a violent computer game to vent anger also decreased the relative accessibility of aggression compared to a control condition in which the game was played without such a goal. Lastly, in Study 3, the relative accessibility of aggression was reduced after playing a violent computer game for participants who reported a high general tendency to vent their anger.

  3. Restricted Authentication and Encryption for Cyber-physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kirkpatrick, Michael S; Bertino, Elisa; Sheldon, Frederick T

    2009-01-01

    Cyber-physical systems (CPS) are characterized by the close linkage of computational resources and physical devices. These systems can be deployed in a number of critical infrastructure settings. As a result, the security requirements of CPS are different than traditional computing architectures. For example, critical functions must be identified and isolated from interference by other functions. Similarly, lightweight schemes may be required, as CPS can include devices with limited computing power. One approach that offers promise for CPS security is the use of lightweight, hardware-based authentication. Specifically, we consider the use of Physically Unclonable Functions (PUFs) to bind an access requestmore » to specific hardware with device-specific keys. PUFs are implemented in hardware, such as SRAM, and can be used to uniquely identify the device. This technology could be used in CPS to ensure location-based access control and encryption, both of which would be desirable for CPS implementations.« less

  4. Barriers and facilitators to intraosseous access in adult resuscitations when peripheral intravenous access is not achievable.

    PubMed

    James Cheung, Warren; Rosenberg, Hans; Vaillancourt, Christian

    2014-03-01

    Studies suggest that intraosseous (IO) access is underutilized in adult resuscitations, despite recommendations from advanced trauma and cardiac life support guidelines. The objective was to determine factors associated with IO access use by physicians during adult resuscitations when intravenous (IV) access is not immediately achievable. This study was an online survey among physicians purposefully recruited from various clinical care areas at three teaching hospitals. Questions were generated from the qualitative results of 20 iterative interviews, verified for internal validity, and piloted. The interview guide was based on the constructs of the Theory of Planned Behavior (TPB), which elicits salient attitudes, social influences, and control beliefs that potentially influence intention to use IO access. Recruitment took place in September 2012 until reaching more than 100% of the required sample size (n = 200). Internal consistency was measured using Cronbach's alpha, and the effect of TPB constructs and specific beliefs were assessed with regression analyses. For the 205 respondents, the mean age was 35 years (range = 20 to 66 years), and 53.3% were male. Participants' departmental affiliations were 50.3% emergency medicine (EM), 16.9% internal medicine, 14.9% anesthesia, 10.8% general surgery, and 7.2% critical care. Residents comprised 60.7% of the sample, and 39.3% were attending physicians. Median intention to use IO access when IV is not immediately achievable was 4.67 (interquartile range [IQR] = 4 to 5) out of 5 (5 highest) and predicted by the following TPB constructs: attitudes (AdjCoefficients = 0.504; 95% confidence interval [CI] = 0.334 to 0.673), social influences (AdjCoefficients = 0.285; 95% CI = 0.172 to 0.398), and control beliefs (AdjCoefficients 0.217; 95% CI = 0.113 to 0.320). Physicians were more likely to use IO access if they believed that it provided rapid vascular access for delivering large volumes of fluids, could prevent delays in care, and was associated with a low complication rate. Conversely, the perception that nurses are not familiar or supportive of IO access and a lack of physician confidence regarding the appropriate indications for IO access were barriers to use. These data are an important step in the knowledge-to-action process, as they identify specific factors associated with physician use of IO access. Interventions addressing these actionable facilitators and barriers are likely to have a positive effect on increasing the appropriate physician use of this potentially life-saving technique in adult patients requiring emergent vascular access. © 2014 by the Society for Academic Emergency Medicine.

  5. Job and industry classifications associated with sarcoidosis in A Case-Control Etiologic Study of Sarcoidosis (ACCESS).

    PubMed

    Barnard, Juliana; Rose, Cecile; Newman, Lee; Canner, Martha; Martyny, John; McCammon, Chuck; Bresnitz, Eddy; Rossman, Milt; Thompson, Bruce; Rybicki, Benjamin; Weinberger, Steven E; Moller, David R; McLennan, Geoffrey; Hunninghake, Gary; DePalo, Louis; Baughman, Robert P; Iannuzzi, Michael C; Judson, Marc A; Knatterud, Genell L; Teirstein, Alvin S; Yeager, Henry; Johns, Carol J; Rabin, David L; Cherniack, Reuben

    2005-03-01

    To determine whether specific occupations and industries may be associated with sarcoidosis. A Case Control Etiologic Study of Sarcoidosis (ACCESS) obtained occupational and environmental histories on 706 newly diagnosed sarcoidosis cases and matched controls. We used Standard Industrial Classification (SIC) and Standard Occupational Classification (SOC) to assess occupational contributions to sarcoidosis risk. Univariable analysis identified elevated risk of sarcoidosis for workers with industrial organic dust exposures, especially in Caucasian workers. Workers for suppliers of building materials, hardware, and gardening materials were at an increased risk of sarcoidosis as were educators. Work providing childcare was negatively associated with sarcoidosis risk. Jobs with metal dust or metal fume exposures were negatively associated with sarcoidosis risk, especially in Caucasian workers. In this study, we found that exposures in particular occupational settings may contribute to sarcoidosis risk.

  6. Metadata Standard and Data Exchange Specifications to Describe, Model, and Integrate Complex and Diverse High-Throughput Screening Data from the Library of Integrated Network-based Cellular Signatures (LINCS).

    PubMed

    Vempati, Uma D; Chung, Caty; Mader, Chris; Koleti, Amar; Datar, Nakul; Vidović, Dušica; Wrobel, David; Erickson, Sean; Muhlich, Jeremy L; Berriz, Gabriel; Benes, Cyril H; Subramanian, Aravind; Pillai, Ajay; Shamu, Caroline E; Schürer, Stephan C

    2014-06-01

    The National Institutes of Health Library of Integrated Network-based Cellular Signatures (LINCS) program is generating extensive multidimensional data sets, including biochemical, genome-wide transcriptional, and phenotypic cellular response signatures to a variety of small-molecule and genetic perturbations with the goal of creating a sustainable, widely applicable, and readily accessible systems biology knowledge resource. Integration and analysis of diverse LINCS data sets depend on the availability of sufficient metadata to describe the assays and screening results and on their syntactic, structural, and semantic consistency. Here we report metadata specifications for the most important molecular and cellular components and recommend them for adoption beyond the LINCS project. We focus on the minimum required information to model LINCS assays and results based on a number of use cases, and we recommend controlled terminologies and ontologies to annotate assays with syntactic consistency and semantic integrity. We also report specifications for a simple annotation format (SAF) to describe assays and screening results based on our metadata specifications with explicit controlled vocabularies. SAF specifically serves to programmatically access and exchange LINCS data as a prerequisite for a distributed information management infrastructure. We applied the metadata specifications to annotate large numbers of LINCS cell lines, proteins, and small molecules. The resources generated and presented here are freely available. © 2014 Society for Laboratory Automation and Screening.

  7. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  8. Integration of LDSE and LTVS logs with HIPAA compliant auditing system (HCAS)

    NASA Astrophysics Data System (ADS)

    Zhou, Zheng; Liu, Brent J.; Huang, H. K.; Guo, Bing; Documet, Jorge; King, Nelson

    2006-03-01

    The deadline of HIPAA (Health Insurance Portability and Accountability Act) Security Rules has passed on February 2005; therefore being HIPAA compliant becomes extremely critical to healthcare providers. HIPAA mandates healthcare providers to protect the privacy and integrity of the health data and have the ability to demonstrate examples of mechanisms that can be used to accomplish this task. It is also required that a healthcare institution must be able to provide audit trails on image data access on demand for a specific patient. For these reasons, we have developed a HIPAA compliant auditing system (HCAS) for image data security in a PACS by auditing every image data access. The HCAS was presented in 2005 SPIE. This year, two new components, LDSE (Lossless Digital Signature Embedding) and LTVS (Patient Location Tracking and Verification System) logs, have been added to the HCAS. The LDSE can assure medical image integrity in a PACS, while the LTVS can provide access control for a PACS by creating a security zone in the clinical environment. By integrating the LDSE and LTVS logs with the HCAS, the privacy and integrity of image data can be audited as well. Thus, a PACS with the HCAS installed can become HIPAA compliant in image data privacy and integrity, access control, and audit control.

  9. ATAC-Seq analysis reveals a widespread decrease of chromatin accessibility in age-related macular degeneration.

    PubMed

    Wang, Jie; Zibetti, Cristina; Shang, Peng; Sripathi, Srinivasa R; Zhang, Pingwu; Cano, Marisol; Hoang, Thanh; Xia, Shuli; Ji, Hongkai; Merbs, Shannath L; Zack, Donald J; Handa, James T; Sinha, Debasish; Blackshaw, Seth; Qian, Jiang

    2018-04-10

    Age-related macular degeneration (AMD) is a significant cause of vision loss in the elderly. The extent to which epigenetic changes regulate AMD progression is unclear. Here we globally profile chromatin accessibility using ATAC-Seq in the retina and retinal pigmented epithelium (RPE) from AMD and control patients. Global decreases in chromatin accessibility occur in the RPE with early AMD, and in the retina of advanced disease, suggesting that dysfunction in the RPE drives disease onset. Footprints of photoreceptor and RPE-specific transcription factors are enriched in differentially accessible regions (DARs). Genes associated with DARs show altered expression in AMD. Cigarette smoke treatment of RPE cells recapitulates chromatin accessibility changes seen in AMD, providing an epigenetic link between a known risk factor for AMD and AMD pathology. Finally, overexpression of HDAC11 is partially responsible for the observed reduction in chromatin accessibility, suggesting that HDAC11 may be a potential new therapeutic target for AMD.

  10. The ESGF Software Stack: a Configurable and Extensible Framework for Enabling Access to Geospatial Data

    NASA Astrophysics Data System (ADS)

    Cinquini, L.; Bell, G. M.; Williams, D.; Harney, J.

    2012-12-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing state-of-the-art services for the management and access of Earth system data. ESGF is currently used to serve the totality of the model output used for the forthcoming IPCC 5th assessment report on climate change, as well as supporting observational and reanalysis datasets. Also, it is been adopted by several other projects that focus on global, regional and local climate modeling. The ESGF software stack is composed of several modular applications that cover related but disjoint areas of functionality: data publishing, data search and discovery, data access, user management, security, and federation. Overall, the ESGF infrastructure offers a configurable end-to-end solution to the problem of enabling web-based access to large amounts of geospatial data. This talk will present the architectural and configuration options that are available to a data provider leveraging ESGF to serve their data: which services to expose, how to scale to larger data collections, how to establish access control, how to customize the user interface, and others. Additionally, the framework provides extension points that allow each site to plug in custom functionality such as crawling of specific metadata repositories, exposing domain-specific analysis and visualization services, developing custom access clients that interact with the system APIs. These configuration and extension capabilities are based on simple but effective domain-specific object models, that underpin the software applications: the data model, the security model, and the federation model. The ESGF software stack is developed collaboratively by software engineers at many institutions around the world, and is made freely available to the community under an open source license to promote adoption, reuse, inspection and continuous improvement.

  11. Preliminary experience in transoral laryngeal surgery with a flexible robotic system for benign lesions of the vocal folds.

    PubMed

    Remacle, Marc; Prasad, Vyas M N

    2018-03-01

    This purpose of this case series is to present the first four cases utilizing micro-phonosurgical instrumentation designed specifically for use with a semi-flexible 'robotic' system-the Medrobotics Flex system and to evaluate the accessibility and feasibility of this platform in the context of transoral robotic surgery (TORS) for laryngeal surgery. Four patients (3 female, 1 male; age range 49-79 years) were operated by the senior author at CHL-a tertiary hospital centre between 2016 and 2017. The 'robot' was deployed in all cases to assess its accessibility and ability to perform surgery in the larynx. All four patients were successfully treated using the system along with newly developed instrumentation specifically focused on phonosurgery. This series has demonstrated accessibility and ability for laryngeal surgery using a novel semi-rigid operator-controlled 'robotic' system. We encountered no device failures and were able to perform all the selected cases uneventfully.

  12. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  13. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  14. 46 CFR 189.55-5 - Plans and specifications required for new construction.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... of the alarm and extinguishing systems, the fire extinguishers, means of access to different... dampers and the number identifying each system. (2) Ventilation diagram including dampers and other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains...

  15. 46 CFR 189.55-5 - Plans and specifications required for new construction.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., the arrangement of the alarm and extinguishing systems, the fire extinguishers, means of access to... other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains, carbon dioxide, clean agent, foam, and sprinkling systems. (e) Marine engineering. For...

  16. 46 CFR 189.55-5 - Plans and specifications required for new construction.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., the arrangement of the alarm and extinguishing systems, the fire extinguishers, means of access to... other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains, carbon dioxide, clean agent, foam, and sprinkling systems. (e) Marine engineering. For...

  17. Addressing the Tension Between Strong Perimeter Control an Usability

    NASA Technical Reports Server (NTRS)

    Hinke, Thomas H.; Kolano, Paul Z.; Keller, Chris

    2006-01-01

    This paper describes a strong perimeter control system for a general purpose processing system, with the perimeter control system taking significant steps to address usability issues, thus mitigating the tension between strong perimeter protection and usability. A secure front end enforces two-factor authentication for all interactive access to an enclave that contains a large supercomputer and various associated systems, with each requiring their own authentication. Usability is addressed through a design in which the user has to perform two-factor authentication at the secure front end in order to gain access to the enclave, while an agent transparently performs public key authentication as needed to authenticate to specific systems within the enclave. The paper then describes a proxy system that allows users to transfer files into the enclave under script control, when the user is not present to perform two-factor authentication. This uses a pre-authorization approach based on public key technology, which is still strongly tied to both two-factor authentication and strict control over where files can be transferred on the target system. Finally the paper describes an approach to support network applications and systems such as grids or parallel file transfer protocols that require the use of many ports through the perimeter. The paper describes a least privilege approach that dynamically opens ports on a host-specific, if-authorized, as-needed, just-in-time basis.

  18. A systematic review of studies of web portals for patients with diabetes mellitus.

    PubMed

    Coughlin, Steven S; Williams, Lovoria B; Hatzigeorgiou, Christos

    2017-01-01

    Patient web portals are password-protected online websites that offer patients 24-hour access to personal health information from anywhere with an Internet connection. Due to advances in health information technologies, there has been increasing interest among providers and researchers in patient web portals for use by patients with diabetes and other chronic conditions. This article, which is based upon bibliographic searches in PubMed, reviews web portals for patients with diabetes mellitus including patient web portals tethered to electronic medical records and web portals developed specifically for patients with diabetes. Twelve studies of the impact of patient web portals on the management of diabetes patients were identified. Three had a cross-sectional design, 1 employed mixed-methods, one had a matched-control design, 3 had a retrospective cohort design, and 5 were randomized controlled trials. Six (50%) of the studies examined web portals tethered to electronic medical records and the remainder were web portals developed specifically for diabetes patients. The results of this review suggest that secure messaging between adult diabetic patients and their clinician is associated with improved glycemic control. However, results from observational studies indicate that many diabetic patients do not take advantage of web portal features such as secure messaging, perhaps because of a lack of internet access or lack of experience in navigating web portal resources. Although results from randomized controlled trials provide stronger evidence of the efficacy of web portal use in improving glycemic control among diabetic patients, the number of trials is small and results from the trials have been mixed. Studies suggest that secure messaging between adult diabetic patients and their clinician is associated with improved glycemic control, but negative findings have also been reported. The number of randomized controlled trials that have examined the efficacy of web portal use in improving glycemic control among diabetic patients is still small. Additional research is needed to identify specific portal features that may impact quality of care or improve glycemic control.

  19. A systematic review of studies of web portals for patients with diabetes mellitus

    PubMed Central

    Williams, Lovoria B.; Hatzigeorgiou, Christos

    2017-01-01

    Patient web portals are password-protected online websites that offer patients 24-hour access to personal health information from anywhere with an Internet connection. Due to advances in health information technologies, there has been increasing interest among providers and researchers in patient web portals for use by patients with diabetes and other chronic conditions. This article, which is based upon bibliographic searches in PubMed, reviews web portals for patients with diabetes mellitus including patient web portals tethered to electronic medical records and web portals developed specifically for patients with diabetes. Twelve studies of the impact of patient web portals on the management of diabetes patients were identified. Three had a cross-sectional design, 1 employed mixed-methods, one had a matched-control design, 3 had a retrospective cohort design, and 5 were randomized controlled trials. Six (50%) of the studies examined web portals tethered to electronic medical records and the remainder were web portals developed specifically for diabetes patients. The results of this review suggest that secure messaging between adult diabetic patients and their clinician is associated with improved glycemic control. However, results from observational studies indicate that many diabetic patients do not take advantage of web portal features such as secure messaging, perhaps because of a lack of internet access or lack of experience in navigating web portal resources. Although results from randomized controlled trials provide stronger evidence of the efficacy of web portal use in improving glycemic control among diabetic patients, the number of trials is small and results from the trials have been mixed. Studies suggest that secure messaging between adult diabetic patients and their clinician is associated with improved glycemic control, but negative findings have also been reported. The number of randomized controlled trials that have examined the efficacy of web portal use in improving glycemic control among diabetic patients is still small. Additional research is needed to identify specific portal features that may impact quality of care or improve glycemic control. PMID:28736732

  20. 75 FR 29588 - Notice of Availability of the Models for Plant-Specific Adoption of Technical Specifications Task...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... Documents Access and Management System (ADAMS) under Accession Number ML090510686. The proposed changes... Documents Access and Management System (ADAMS): Publicly available documents created or received at the NRC... expedited approval of plant-specific adoption of TSTF- 501, Revision 1. Documents: You can access publicly...

  1. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-07

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  2. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-14

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  3. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  4. A controlled trial of web-based diabetes disease management: the MGH diabetes primary care improvement project.

    PubMed

    Meigs, James B; Cagliero, Enrico; Dubey, Anil; Murphy-Sheehy, Patricia; Gildesgame, Catharyn; Chueh, Henry; Barry, Michael J; Singer, Daniel E; Nathan, David M

    2003-03-01

    To test effects of a web-based decision support tool, the diabetes Disease Management Application (DMA), developed to improve evidence-based management of type 2 diabetes. We conducted a group randomized controlled trial of 12 intervention and 14 control staff providers and 307 intervention and 291 control patients with type 2 diabetes in a hospital-based internal medicine clinic. Providers were randomly assigned from May 1998 through April 1999 to have access to the DMA (intervention) or not to have access (control). The DMA displays interactive patient-specific clinical data, treatment advice, and links to other web-based care resources. We compared patients in the intervention and control groups for changes in processes and outcomes of care from the year preceding the study through the year of the study by intention-to-treat analysis. The DMA was used for 42% of scheduled patient visits. The number of HbA(1c) tests obtained per year increased significantly in the intervention group (+0.3 tests/year) compared with the control group (-0.04 tests/year, P = 0.008), as did the number of LDL cholesterol tests (intervention, +0.2 tests/year; control, +0.01 tests/year; P = 0.02) and the proportions of patients undergoing at least one foot examination per year (intervention, +9.8%; control, -0.7%; P = 0.003). Levels of HbA(1c) decreased by 0.2 in the intervention group and increased by 0.1 in the control group (P = 0.09); proportions of patients with LDL cholesterol levels <130 mg/dl increased by 20.3% in the intervention group and 10.5% in the control group (P = 0.5). Web-based patient-specific decision support has the potential to improve evidence-based parameters of diabetes care.

  5. Cloud-assisted mobile-access of health data with privacy and auditability.

    PubMed

    Tong, Yue; Sun, Jinyuan; Chow, Sherman S M; Li, Pan

    2014-03-01

    Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and auditability for misusing health data. Specifically, we propose to integrate key management from pseudorandom number generator for unlinkability, a secure indexing method for privacy-preserving keyword search which hides both search and access patterns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with auditability to prevent potential misbehavior, in both normal and emergency cases.

  6. Access from Space: A New Perspective on NASA's Space Transportation Technology Requirements and Opportunities

    NASA Technical Reports Server (NTRS)

    Rasky, Daniel J.

    2004-01-01

    The need for robust and reliable access from space is clearly demonstrated by the recent loss of the Space Shuttle Columbia; as well as the NASA s goals to get the Shuttle re-flying and extend its life, build new vehicles for space access, produce successful robotic landers and s a q k retrr? llisrions, and maximize the science content of ambitious outer planets missions that contain nuclear reactors which must be safe for re-entry after possible launch aborts. The technology lynch pin of access from space is hypersonic entry systems such the thermal protection system, along with navigation, guidance and control (NG&C). But it also extends to descent and landing systems such as parachutes, airbags and their control systems. Current space access technology maturation programs such as NASA s Next Generation Launch Technology (NGLT) program or the In-Space Propulsion (ISP) program focus on maturing laboratory demonstrated technologies for potential adoption by specific mission applications. A key requirement for these programs success is a suitable queue of innovative technologies and advanced concepts to mature, including mission concepts enabled by innovative, cross cutting technology advancements. When considering space access, propulsion often dominates the capability requirements, as well as the attention and resources. From the perspective of access from space some new cross cutting technology drivers come into view, along with some new capability opportunities. These include new miniature vehicles (micro, nano, and picosats), advanced automated systems (providing autonomous on-orbit inspection or landing site selection), and transformable aeroshells (to maximize capabilities and minimize weight). This paper provides an assessment of the technology drivers needed to meet future access from space mission requirements, along with the mission capabilities that can be envisioned from innovative, cross cutting access from space technology developments.

  7. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases.

    PubMed

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F L; Utzinger, Jürg; Kristensen, Thomas K; Vounatsou, Penelope

    2011-12-01

    After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature'), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay.

  8. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  9. "Abbott v. Burke" vs. New Jersey: Policy, Politics and Political Economy.

    ERIC Educational Resources Information Center

    Bader, Beth D.

    Local funding and the resultant limited access to quality programs have created disparities in school funding because of disparities in local wealth. Two issues that control policies of New Jersey's school finance are addressed in this paper. The first is the behavior of government, specifically the responses of elected officials and bureaucrats…

  10. 40 CFR 63.1103 - Source category-specific applicability, definitions, and requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... separation of raw materials and by-products from the stabilized polymer. Front end process vent means any... vent systems, control devices, recovery devices, and routing to a fuel gas system or a process), as... allow worker access; passage of material into or out of the enclosure by conveyor, vehicles, or other...

  11. 29 CFR 1910.306 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... means required by paragraph (e)(1) of this section. (f) X-Ray equipment. This paragraph applies to X-ray... disconnecting means shall be operable from a location readily accessible from the X-ray control. For equipment... suitable nonmetallic raceways or cable trays; or (C) Wire or cable in suitable metal raceways or metal...

  12. 29 CFR 1910.306 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... means required by paragraph (e)(1) of this section. (f) X-Ray equipment. This paragraph applies to X-ray... disconnecting means shall be operable from a location readily accessible from the X-ray control. For equipment... suitable nonmetallic raceways or cable trays; or (C) Wire or cable in suitable metal raceways or metal...

  13. 40 CFR Table 5 to Subpart Ggg of... - Control Requirements for Items of Equipment That Meet the Criteria of § 63.1252(f)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...(h)(2); or (b) Equip with a floating roof that meets the equipment specifications of § 60.693(a)(1)(i... and other points of access to a conveyance system. c A fixed roof may have openings necessary for...

  14. Subliminal access to abstract face representations does not rely on attention.

    PubMed

    Harry, Bronson; Davis, Chris; Kim, Jeesun

    2012-03-01

    The present study used masked repetition priming to examine whether face representations can be accessed without attention. Two experiments using a face recognition task (fame judgement) presented masked repetition and control primes in spatially unattended locations prior to target onset. Experiment 1 (n=20) used the same images as primes and as targets and Experiment 2 (n=17) used different images of the same individual as primes and targets. Repetition priming was observed across both experiments regardless of whether spatial attention was cued to the location of the prime. Priming occurred for both famous and non-famous targets in Experiment 1 but was only reliable for famous targets in Experiment 2, suggesting that priming in Experiment 1 indexed access to view-specific representations whereas priming in Experiment 2 indexed access to view-invariant, abstract representations. Overall, the results indicate that subliminal access to abstract face representations does not rely on attention. Copyright © 2011 Elsevier Inc. All rights reserved.

  15. Identification of species- and tissue-specific proteins using proteomic strategy

    NASA Astrophysics Data System (ADS)

    Chernukha, I. M.; Vostrikova, N. L.; Kovalev, L. I.; Shishkin, S. S.; Kovaleva, M. A.; Manukhin, Y. S.

    2017-09-01

    Proteomic technologies have proven to be very effective for detecting biochemical changes in meat products, such as changes in tissue- and species-specific proteins. In the tissues of cattle, pig, horse and camel M. longissimus dorsi both tissue- and species specific proteins were detected using two dimensional electrophoresis. Species-specific isoforms of several muscle proteins were also identified. The identified and described proteins of cattle, pig, horse and camel skeletal muscles (including mass spectra of the tryptic peptides) were added to the national free access database “Muscle organ proteomics”. This research has enabled the development of new highly sensitive technologies for meat product quality control against food fraud.

  16. Open Source and Design Thinking at NASA: A Vision for Future Software

    NASA Technical Reports Server (NTRS)

    Trimble, Jay

    2017-01-01

    NASA Mission Control Software for the Visualization of data has historically been closed, accessible only to small groups of flight controllers, often bound to a specific mission discipline such as flight dynamics, health and status or mission planning. Open Mission Control Technologies (MCT) provides new capability for NASA mission controllers and, by being fully open source, opens up NASA software for the visualization of mission data to broader communities inside and outside of NASA. Open MCT is the product of a design thinking process within NASA, using participatory design and design sprints to build a product that serves users.

  17. Information governance in NHS's NPfIT: a case for policy specification.

    PubMed

    Becker, Moritz Y

    2007-01-01

    The National Health Service's (NHS's) National Programme for Information Technology (NPfIT) in the UK with its proposed nation-wide online health record service poses serious technical challenges, especially with regard to access control and patient confidentiality. The complexity of the confidentiality requirements and their constantly evolving nature (due to changes in law, guidelines and ethical consensus) make traditional technologies such as role-based access control (RBAC) unsuitable. Furthermore, a more formal approach is also needed for debating about and communicating on information governance, as natural-language descriptions of security policies are inherently ambiguous and incomplete. Our main goal is to convince the reader of the strong benefits of employing formal policy specification in nation-wide electronic health record (EHR) projects. Many difficulties could be alleviated by specifying the requirements in a formal authorisation policy language such as Cassandra. The language is unambiguous, declarative and machine-enforceable, and is based on distributed constrained Datalog. Cassandra is interpreted within a distributed Trust Management environment, where digital credentials are used for establishing mutual trust between strangers. To demonstrate how policy specification can be applied to NPfIT, we translate a fragment of natural-language NHS specification into formal Cassandra rules. In particular, we present policy rules pertaining to the management of Clinician Sealed Envelopes, the mechanism by which clinical patient data can be concealed in the nation-wide EHR service. Our case study exposes ambiguities and incompletenesses in the informal NHS documents. We strongly recommend the use of trust management and policy specification technology for the implementation of nation-wide EHR infrastructures. Formal policies can be used for automatically enforcing confidentiality requirements, but also for specification and communication purposes. Formalising the requirements also reveals ambiguities and missing details in the currently used informal specification documents.

  18. Prototype Packaged Databases and Software in Health

    PubMed Central

    Gardenier, Turkan K.

    1980-01-01

    This paper describes the recent demand for packaged databases and software for health applications in light of developments in mini-and micro-computer technology. Specific features for defining prospective user groups are discussed; criticisms generated for large-scale epidemiological data use as a means of replacing clinical trials and associated controls are posed to the reader. The available collaborative efforts for access and analysis of jointly structured health data are stressed, with recommendations for new analytical techniques specifically geared to monitoring data such as the CTSS (Cumulative Transitional State Score) generated for tacking ongoing patient status over time in clinical trials. Examples of graphic display are given from the Domestic Information Display System (DIDS) which is a collaborative multi-agency effort to computerize and make accessible user-specified U.S. and local maps relating to health, environment, socio-economic and energy data.

  19. Use of computers and the Internet for health information by patients with epilepsy.

    PubMed

    Escoffery, Cam; Diiorio, Colleen; Yeager, Katherine A; McCarty, Frances; Robinson, Elise; Reisinger, Elizabeth; Henry, Thomas; Koganti, Archana

    2008-01-01

    The purpose of this study was to describe computer and Internet use among an online group and a clinic-based group of people with epilepsy. Greater than 95% of the online group and 60% of the clinic group have access to computers and the Internet. More than 99% of the online group and 57% of the clinic group used the Internet to find health information. A majority of people reported being likely to employ an Internet-based self-management program to control their epilepsy. About 43% reported searching for general information on epilepsy, 30% for medication, 23% for specific types of epilepsy, and 20% for treatment. This study found that people with epilepsy have access to computers and the Internet, desire epilepsy-specific information, and are receptive to online health information on how to manage their epilepsy.

  20. Autobiographical memory specificity in response to verbal and pictorial cues in clinical depression.

    PubMed

    Ridout, Nathan; Dritschel, Barbara; Matthews, Keith; O'Carroll, Ronan

    2016-06-01

    Depressed individuals have been consistently shown to exhibit problems in accessing specific memories of events from their past and instead tend to retrieve categorical summaries of events. The majority of studies examining autobiographical memory changes associated with psychopathology have tended to use word cues, but only one study to date has used images (with PTSD patients). to determine if using images to cue autobiographical memories would reduce the memory specificity deficit exhibited by patients with depression in comparison to healthy controls. Twenty-five clinically depressed patients and twenty-five healthy controls were assessed on two versions of the autobiographical memory test; cued with emotional words and images. Depressed patients retrieved significantly fewer specific memories, and a greater number of categorical, than did the controls. Controls retrieved a greater proportion of specific memories to images compared to words, whereas depressed patients retrieved a similar proportion of specific memories to both images and words. no information about the presence and severity of past trauma was collected. results suggest that the overgeneral memory style in depression generalises from verbal to pictorial cues. This is important because retrieval to images may provide a more ecologically valid test of everyday memory experiences than word-cued retrieval.. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Diabetes treatment and control: the effect of public health insurance for the poor in Mexico.

    PubMed

    Sosa-Rubí, Sandra G; Galárraga, Omar; López-Ridaura, Ruy

    2009-07-01

    To analyse the effect of enrolment in the public health insurance scheme known as Seguro Popular [People's Insurance] on access to health resources, treatment and blood glucose control among poor adults with diabetes in Mexico. We analysed cross-sectional data from the 2006 National Health and Nutrition Survey and compared health care access and biological health outcomes, specifically glycosylated haemoglobin (HbA1c) levels, among adults with diabetes who were enrolled in the Seguro Popular (treatment group) and those who had no health insurance (control group). Standard propensity score matching was used to create a highly comparable control group. Adults with diabetes who were enrolled in the Seguro Popular had significantly more access than comparable uninsured adults to some type of blood glucose control test (by a difference of 9.5 percentage points; 95% confidence interval, CI: 2.4-16.6) and to insulin injections (3.13 more per week; 95% CI: 0.04-6.22). Those with insurance were also significantly more likely to have appropriately-controlled blood glucose levels (HbA1c 12%) was found in a significantly smaller proportion of adults in the insured group than in the uninsured group (by a difference of 17.5 percentage points; 95% CI: 6.5-28.5). The Seguro Popular appears to have improved access to health care and blood glucose control among poor adults with diabetes in Mexico, and it may have had a positive effect on the management of other chronic health conditions, but its long-term effects are yet to be demonstrated. Although the findings are most relevant to Mexico, they may also be applicable to other developing countries seeking to improve health-care coverage for the poor by expanding their public health insurance programmes.

  2. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  3. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  4. Toward the Design of Personalized Continuum Surgical Robots.

    PubMed

    Morimoto, Tania K; Greer, Joseph D; Hawkes, Elliot W; Hsieh, Michael H; Okamura, Allison M

    2018-05-31

    Robot-assisted minimally invasive surgical systems enable procedures with reduced pain, recovery time, and scarring compared to traditional surgery. While these improvements benefit a large number of patients, safe access to diseased sites is not always possible for specialized patient groups, including pediatric patients, due to their anatomical differences. We propose a patient-specific design paradigm that leverages the surgeon's expertise to design and fabricate robots based on preoperative medical images. The components of the patient-specific robot design process are a virtual reality design interface enabling the surgeon to design patient-specific tools, 3-D printing of these tools with a biodegradable polyester, and an actuation and control system for deployment. The designed robot is a concentric tube robot, a type of continuum robot constructed from precurved, elastic, nesting tubes. We demonstrate the overall patient-specific design workflow, from preoperative images to physical implementation, for an example clinical scenario: nonlinear renal access to a pediatric kidney. We also measure the system's behavior as it is deployed through real and artificial tissue. System integration and successful benchtop experiments in ex vivo liver and in a phantom patient model demonstrate the feasibility of using a patient-specific design workflow to plan, fabricate, and deploy personalized, flexible continuum robots.

  5. SODR Memory Control Buffer Control ASIC

    NASA Technical Reports Server (NTRS)

    Hodson, Robert F.

    1994-01-01

    The Spacecraft Optical Disk Recorder (SODR) is a state of the art mass storage system for future NASA missions requiring high transmission rates and a large capacity storage system. This report covers the design and development of an SODR memory buffer control applications specific integrated circuit (ASIC). The memory buffer control ASIC has two primary functions: (1) buffering data to prevent loss of data during disk access times, (2) converting data formats from a high performance parallel interface format to a small computer systems interface format. Ten 144 p in, 50 MHz CMOS ASIC's were designed, fabricated and tested to implement the memory buffer control function.

  6. Designing a system for patients controlling providers' access to their electronic health records: organizational and technical challenges.

    PubMed

    Leventhal, Jeremy C; Cummins, Jonathan A; Schwartz, Peter H; Martin, Douglas K; Tierney, William M

    2015-01-01

    Electronic health records (EHRs) are proliferating, and financial incentives encourage their use. Applying Fair Information Practice principles to EHRs necessitates balancing patients' rights to control their personal information with providers' data needs to deliver safe, high-quality care. We describe the technical and organizational challenges faced in capturing patients' preferences for patient-controlled EHR access and applying those preferences to an existing EHR. We established an online system for capturing patients' preferences for who could view their EHRs (listing all participating clinic providers individually and categorically-physicians, nurses, other staff) and what data to redact (none, all, or by specific categories of sensitive data or patient age). We then modified existing data-viewing software serving a state-wide health information exchange and a large urban health system and its primary care clinics to allow patients' preferences to guide data displays to providers. Patients could allow or restrict data displays to all clinicians and staff in a demonstration primary care clinic, categories of providers (physicians, nurses, others), or individual providers. They could also restrict access to all EHR data or any or all of five categories of sensitive data (mental and reproductive health, sexually transmitted diseases, HIV/AIDS, and substance abuse) and for specific patient ages. The EHR viewer displayed data via reports, data flowsheets, and coded and free text data displayed by Google-like searches. Unless patients recorded restrictions, by default all requested data were displayed to all providers. Data patients wanted restricted were not displayed, with no indication they were redacted. Technical barriers prevented redacting restricted information in free textnotes. The program allowed providers to hit a "Break the Glass" button to override patients' restrictions, recording the date, time, and next screen viewed. Establishing patient-control over EHR data displays was complex and required ethical, clinical, database, and programming expertise and difficult choices to overcome technical and health system constraints. Assessing patients' preferences for access to their EHRs and applying them in clinical practice requires wide-ranging technical, clinical, and bioethical expertise, to make tough choices to overcome significant technical and organization challenges.

  7. Supplier Assessment System (SAS)

    NASA Technical Reports Server (NTRS)

    Dietrich, Kristen

    2016-01-01

    Background: Sponsored by NASA Headquarters; Charter - provide information to assist the quality assurance community in evaluating and determining supplier risk; Comprehensive on-line repository of supplier information; Available to approved civil service personnel from all NASA Centers, other U.S. Government Agencies, Prime Contractors, and NASA direct support contractors; User access to specific data types or documents is controlled as needed.

  8. Negotiating Narratives, Accessing Asylum: Evaluating Language Policy as Multi-Level Practice, Beliefs and Management

    ERIC Educational Resources Information Center

    Smith-Khan, Laura

    2017-01-01

    Theories of language policy increasingly emphasise focusing on the specific contexts in which language management occurs. In government settings, policy seeks to shape how individuals interact with officials. Australian asylum procedure is an area where policy aims at tight control. I examine how communication is managed in this setting, in which…

  9. Contexts and Control Operations Used in Accessing List-Specific, Generalized, and Semantic Memories

    ERIC Educational Resources Information Center

    Humphreys, Michael S.; Murray, Krista L.; Maguire, Angela M.

    2009-01-01

    The human ability to focus memory retrieval operations on a particular list, episode or memory structure has not been fully appreciated or documented. In Experiment 1-3, we make it increasingly difficult for participants to switch between a less recent list (multiple study opportunities), and a more recent list (single study opportunity). Task…

  10. 21 CFR 1300.03 - Definitions relating to electronic orders for controlled substances and electronic prescriptions...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... standard for biometric data specifications for personal identity verification. Operating point means a... records on its servers. Audit trail means a record showing who has accessed an information technology... information on a local server or hard drive. Certificate policy means a named set of rules that sets forth the...

  11. 21 CFR 1300.03 - Definitions relating to electronic orders for controlled substances and electronic prescriptions...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... standard for biometric data specifications for personal identity verification. Operating point means a... records on its servers. Audit trail means a record showing who has accessed an information technology... information on a local server or hard drive. Certificate policy means a named set of rules that sets forth the...

  12. 21 CFR 1300.03 - Definitions relating to electronic orders for controlled substances and electronic prescriptions...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... standard for biometric data specifications for personal identity verification. Operating point means a... records on its servers. Audit trail means a record showing who has accessed an information technology... information on a local server or hard drive. Certificate policy means a named set of rules that sets forth the...

  13. 40 CFR Table 35 to Subpart G of... - Control Requirements for Items of Equipment That Meet the Criteria of § 63.149 of Subpart G

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... floating roof that meets the equipment specifications of § 60.693 (a)(1)(i), (a)(1)(ii), (a)(2), (a)(3... and other points of access to a conveyance system. c Applies to tanks with capacities of 38 m3 or...

  14. How can the German Electronic Health Card support patient's role in care management.

    PubMed

    Pharow, Peter; Blobel, Bernd; Hildebrand, Claudia

    2008-01-01

    All types of advanced communication, collaboration, and cooperation in healthcare require a strong involvement of all addressed parties including health professionals and patients. Modern healthcare aims at involving patients having them take over responsibility for their own health status. Allowing them to take on their changed roles as emancipated partners in advanced care management, health professionals need to be educated and patients need to be empowered. From a security viewpoint, health issues have to be communicated via trusted health networks. To provide communication and cooperation between professionals and patients as well as to guarantee the required level of involvement of patients in shared care management environments, cards are widely used as person identifiers, on the one hand, and as security tokens, on the other. Being introduced as storage media and portable personalized application system, cards enable a patient controlled access to personalized health services as well as proper use and exchange of personal health data for specific purposes such as emergency. Furthermore, cards allow access to the wider electronic patient record via pointers or tickets. Cards can empower patients. The German Electronic Health Card (eGK) shall thus support care management and specific workflow processes e.g. for prescription and disease management. Regardless whether designed as data or pointer card - international standardization is a prerequisite also for national solutions. The more information patients have regarding different procedures and processes in healthcare, the more are they able to play their dedicated role within care management. Cards can and will contribute by allowing patients to get controlled access to administrative and medical data stored either on cards or in networks. Card holders determine who has access to their health information.

  15. webPOISONCONTROL: can poison control be automated?

    PubMed

    Litovitz, Toby; Benson, Blaine E; Smolinske, Susan

    2016-08-01

    A free webPOISONCONTROL app allows the public to determine the appropriate triage of poison ingestions without calling poison control. If accepted and safe, this alternative expands access to reliable poison control services to those who prefer the Internet over the telephone. This study assesses feasibility, safety, and user-acceptance of automated online triage of asymptomatic, nonsuicidal poison ingestion cases. The user provides substance name, amount, age, and weight in an automated online tool or downloadable app, and is given a specific triage recommendation to stay home, go to the emergency department, or call poison control for further guidance. Safety was determined by assessing outcomes of consecutive home-triaged cases with follow-up and by confirming the correct application of algorithms. Case completion times and user perceptions of speed and ease of use were measures of user-acceptance. Of 9256 cases, 73.3% were triaged to home, 2.1% to an emergency department, and 24.5% directed to call poison control. Children younger than 6 years were involved in 75.2% of cases. Automated follow-up was done in 31.2% of home-triaged cases; 82.3% of these had no effect. No major or fatal outcomes were reported. More than 91% of survey respondents found the tool quick and easy to use. Median case completion time was 4.1 minutes. webPOISONCONTROL augments traditional poison control services by providing automated, accurate online access to case-specific triage and first aid guidance for poison ingestions. It is safe, quick, and easy to use. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  16. Engineering Nucleotide Specificity of Succinyl-CoA Synthetase in Blastocystis: The Emerging Role of Gatekeeper Residues.

    PubMed

    Vashisht, Kapil; Verma, Sonia; Gupta, Sunita; Lynn, Andrew M; Dixit, Rajnikant; Mishra, Neelima; Valecha, Neena; Hamblin, Karleigh A; Maytum, Robin; Pandey, Kailash C; van der Giezen, Mark

    2017-01-24

    Charged, solvent-exposed residues at the entrance to the substrate binding site (gatekeeper residues) produce electrostatic dipole interactions with approaching substrates, and control their access by a novel mechanism called "electrostatic gatekeeper effect". This proof-of-concept study demonstrates that the nucleotide specificity can be engineered by altering the electrostatic properties of the gatekeeper residues outside the binding site. Using Blastocystis succinyl-CoA synthetase (SCS, EC 6.2.1.5), we demonstrated that the gatekeeper mutant (ED) resulted in ATP-specific SCS to show high GTP specificity. Moreover, nucleotide binding site mutant (LF) had no effect on GTP specificity and remained ATP-specific. However, via combination of the gatekeeper mutant with the nucleotide binding site mutant (ED+LF), a complete reversal of nucleotide specificity was obtained with GTP, but no detectable activity was obtained with ATP. This striking result of the combined mutant (ED+LF) was due to two changes; negatively charged gatekeeper residues (ED) favored GTP access, and nucleotide binding site residues (LF) altered ATP binding, which was consistent with the hypothesis of the "electrostatic gatekeeper effect". These results were further supported by molecular modeling and simulation studies. Hence, it is imperative to extend the strategy of the gatekeeper effect in a different range of crucial enzymes (synthetases, kinases, and transferases) to engineer substrate specificity for various industrial applications and substrate-based drug design.

  17. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  18. Assessing the Efficacy of Restricting Access to Barbecue Charcoal for Suicide Prevention in Taiwan: A Community-Based Intervention Trial

    PubMed Central

    Chen, Ying-Yeh; Chen, Feng; Chang, Shu-Sen; Wong, Jacky; Yip, Paul S F

    2015-01-01

    Objective Charcoal-burning suicide has recently been spreading to many Asian countries. There have also been several cases involving this new method of suicide in Western countries. Restricting access to suicide means is one of the few suicide-prevention measures that have been supported by empirical evidence. The current study aims to assess the effectiveness of a community intervention program that restricts access to charcoal to prevent suicide in Taiwan. Methods and Findings A quasi-experimental design is used to compare method-specific (charcoal-burning suicide, non-charcoal-burning suicide) and overall suicide rates in New Taipei City (the intervention site, with a population of 3.9 million) with two other cities (Taipei City and Kaohsiung City, the control sites, each with 2.7 million residents) before (Jan 1st 2009- April 30th 2012) and after (May 1st 2012-Dec. 31st 2013) the initiation of a charcoal-restriction program on May 1st 2012. The program mandates the removal of barbecue charcoal from open shelves to locked storage in major retail stores in New Taipei City. No such restriction measure was implemented in the two control sites. Generalized linear regression models incorporating secular trends were used to compare the changes in method-specific and overall suicide rates before and after the initiation of the restriction measure. A simulation approach was used to estimate the number of lives saved by the intervention. Compared with the pre-intervention period, the estimated rate reduction of charcoal-burning suicide in New Taipei City was 37% (95% CI: 17%, 50%) after the intervention. Taking secular trends into account, the reduction was 30% (95% CI: 14%, 44%). No compensatory rise in non-charcoal-burning suicide was observed in New Taipei City. No significant reduction in charcoal-burning suicide was observed in the other two control sites. The simulation approach estimated that 91 (95%CI [55, 128]) lives in New Taipei City were saved during the 20 months of the intervention. Conclusion Our results demonstrate that the charcoal-restriction program reduced method-specific and overall suicides. This study provides strong empirical evidence that restricting the accessibility of common lethal methods of suicide can effectively reduce suicide rates. PMID:26305374

  19. 75 FR 26294 - Notice of Availability of the Models for Plant-Specific Adoption of Technical Specifications Task...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ... an errata sheet are available in the Agencywide Documents Access and Management System (ADAMS) under... Agencywide Documents Access and Management System (ADAMS): Publicly available documents created or received... facilitate expedited approval of plant-specific adoption of TSTF-493, Revision 4. Documents: You can access...

  20. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  1. mTOR kinase structure, mechanism and regulation by the rapamycin-binding domain

    PubMed Central

    Yang, Haijuan; Rudge, Derek G.; Koos, Joseph D.; Vaidialingam, Bhamini; Yang, Hyo J.; Pavletich, Nikola P.

    2015-01-01

    The mammalian target of rapamycin (mTOR), a phosphoinositide 3-kinase related protein kinase, controls cell growth in response to nutrients and growth factors and is frequently deregulated in cancer. Here we report co-crystal structures of a truncated mTOR-mLST8 complex with an ATP transition state mimic and with ATP-site inhibitors. The structures reveal an intrinsically active kinase conformation, with catalytic residues and mechanism remarkably similar to canonical protein kinases. The active site is highly recessed due to the FKBP12-Rapamycin binding (FRB) domain and an inhibitory helix protruding from the catalytic cleft. mTOR activating mutations map to the structural framework that holds these elements in place, indicating the kinase is controlled by restricted access. In vitro biochemistry indicates that the FRB domain acts as a gatekeeper, with its rapamycin-binding site interacting with substrates to grant them access to the restricted active site. FKBP12-rapamycin inhibits by directly blocking substrate recruitment and by further restricting active site access. The structures also reveal active site residues and conformational changes that underlie inhibitor potency and specificity. PMID:23636326

  2. Web Extensible Display Manager

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Slominski, Ryan; Larrieu, Theodore L.

    Jefferson Lab's Web Extensible Display Manager (WEDM) allows staff to access EDM control system screens from a web browser in remote offices and from mobile devices. Native browser technologies are leveraged to avoid installing and managing software on remote clients such as browser plugins, tunnel applications, or an EDM environment. Since standard network ports are used firewall exceptions are minimized. To avoid security concerns from remote users modifying a control system, WEDM exposes read-only access and basic web authentication can be used to further restrict access. Updates of monitored EPICS channels are delivered via a Web Socket using a webmore » gateway. The software translates EDM description files (denoted with the edl suffix) to HTML with Scalable Vector Graphics (SVG) following the EDM's edl file vector drawing rules to create faithful screen renderings. The WEDM server parses edl files and creates the HTML equivalent in real-time allowing existing screens to work without modification. Alternatively, the familiar drag and drop EDM screen creation tool can be used to create optimized screens sized specifically for smart phones and then rendered by WEDM.« less

  3. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  4. Challenges to effective cancer control in China, India, and Russia.

    PubMed

    Goss, Paul E; Strasser-Weippl, Kathrin; Lee-Bychkovsky, Brittany L; Fan, Lei; Li, Junjie; Chavarri-Guerra, Yanin; Liedke, Pedro E R; Pramesh, C S; Badovinac-Crnjevic, Tanja; Sheikine, Yuri; Chen, Zhu; Qiao, You-lin; Shao, Zhiming; Wu, Yi-Long; Fan, Daiming; Chow, Louis W C; Wang, Jun; Zhang, Qiong; Yu, Shiying; Shen, Gordon; He, Jie; Purushotham, Arnie; Sullivan, Richard; Badwe, Rajendra; Banavali, Shripad D; Nair, Reena; Kumar, Lalit; Parikh, Purvish; Subramanian, Somasundarum; Chaturvedi, Pankaj; Iyer, Subramania; Shastri, Surendra Srinivas; Digumarti, Raghunadhrao; Soto-Perez-de-Celis, Enrique; Adilbay, Dauren; Semiglazov, Vladimir; Orlov, Sergey; Kaidarova, Dilyara; Tsimafeyeu, Ilya; Tatishchev, Sergei; Danishevskiy, Kirill D; Hurlbert, Marc; Vail, Caroline; St Louis, Jessica; Chan, Arlene

    2014-04-01

    Cancer is one of the major non-communicable diseases posing a threat to world health. Unfortunately, improvements in socioeconomic conditions are usually associated with increased cancer incidence. In this Commission, we focus on China, India, and Russia, which share rapidly rising cancer incidence and have cancer mortality rates that are nearly twice as high as in the UK or the USA, vast geographies, growing economies, ageing populations, increasingly westernised lifestyles, relatively disenfranchised subpopulations, serious contamination of the environment, and uncontrolled cancer-causing communicable infections. We describe the overall state of health and cancer control in each country and additional specific issues for consideration: for China, access to care, contamination of the environment, and cancer fatalism and traditional medicine; for India, affordability of care, provision of adequate health personnel, and sociocultural barriers to cancer control; and for Russia, monitoring of the burden of cancer, societal attitudes towards cancer prevention, effects of inequitable treatment and access to medicine, and a need for improved international engagement. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Regional consolidation of orthopedic surgery: impacts on hip fracture surgery access and outcomes.

    PubMed

    Kreindler, Sara A; Siragusa, Lanette; Bohm, Eric; Rudnick, Wendy; Metge, Colleen J

    2017-09-01

    Timely access to orthopedic trauma surgery is essential for optimal outcomes. Regionalization of some types of surgery has shown positive effects on access, timeliness and outcomes. We investigated how the consolidation of orthopedic surgery in 1 Canadian health region affected patients requiring hip fracture surgery. We retrieved administrative data on all regional emergency department visits for lower-extremity injury and all linked inpatient stays from January 2010 through March 2013, identifying 1885 hip-fracture surgeries. Statistical process control and interrupted time series analysis controlling for demographics and comorbidities were used to assess impacts on access (receipt of surgery within 48-h benchmark) and surgical outcomes (complications, in-hospital/30-d mortality, length of stay). There was a significant increase in the proportion of patients receiving surgery within the benchmark. Complication rates did not change, but there appeared to be some decrease in mortality (significant at 6 mo). Length of stay increased at a hospital that experienced a major increase in patient volume, perhaps reflecting challenges associated with patient flow. Regionalization appeared to improve the timeliness of surgery and may have reduced mortality. The specific features of the present consolidation (including pre-existing interhospital performance variation and the introduction of daytime slates at the referral hospital) should be considered when interpreting the findings.

  6. Regional consolidation of orthopedic surgery: impacts on hip fracture surgery access and outcomes

    PubMed Central

    Kreindler, Sara A.; Siragusa, Lanette; Bohm, Eric; Rudnick, Wendy; Metge, Colleen J.

    2017-01-01

    Background Timely access to orthopedic trauma surgery is essential for optimal outcomes. Regionalization of some types of surgery has shown positive effects on access, timeliness and outcomes. We investigated how the consolidation of orthopedic surgery in 1 Canadian health region affected patients requiring hip fracture surgery. Methods We retrieved administrative data on all regional emergency department visits for lower-extremity injury and all linked inpatient stays from January 2010 through March 2013, identifying 1885 hip-fracture surgeries. Statistical process control and interrupted time series analysis controlling for demographics and comorbidities were used to assess impacts on access (receipt of surgery within 48-h benchmark) and surgical outcomes (complications, in-hospital/30-d mortality, length of stay). Results There was a significant increase in the proportion of patients receiving surgery within the benchmark. Complication rates did not change, but there appeared to be some decrease in mortality (significant at 6 mo). Length of stay increased at a hospital that experienced a major increase in patient volume, perhaps reflecting challenges associated with patient flow. Conclusion Regionalization appeared to improve the timeliness of surgery and may have reduced mortality. The specific features of the present consolidation (including pre-existing interhospital performance variation and the introduction of daytime slates at the referral hospital) should be considered when interpreting the findings. PMID:28930037

  7. Flexible services for the support of research.

    PubMed

    Turilli, Matteo; Wallom, David; Williams, Chris; Gough, Steve; Curran, Neal; Tarrant, Richard; Bretherton, Dan; Powell, Andy; Johnson, Matt; Harmer, Terry; Wright, Peter; Gordon, John

    2013-01-28

    Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations. Initially devised by corporations with direct control over large amounts of computational resources, cloud computing is now being endorsed by organizations with limited resources or with a more articulated, less direct control over these resources. The challenge for these organizations is to leverage the benefits of cloud computing while dealing with limited and often widely distributed computing resources. This study focuses on the adoption of cloud computing by higher education institutions and addresses two main issues: flexible and on-demand access to a large amount of storage resources, and scalability across a heterogeneous set of cloud infrastructures. The proposed solutions leverage a federated approach to cloud resources in which users access multiple and largely independent cloud infrastructures through a highly customizable broker layer. This approach allows for a uniform authentication and authorization infrastructure, a fine-grained policy specification and the aggregation of accounting and monitoring. Within a loosely coupled federation of cloud infrastructures, users can access vast amount of data without copying them across cloud infrastructures and can scale their resource provisions when the local cloud resources become insufficient.

  8. Musical Expertise Increases Top–Down Modulation Over Hippocampal Activation during Familiarity Decisions

    PubMed Central

    Gagnepain, Pierre; Fauvel, Baptiste; Desgranges, Béatrice; Gaubert, Malo; Viader, Fausto; Eustache, Francis; Groussard, Mathilde; Platel, Hervé

    2017-01-01

    The hippocampus has classically been associated with episodic memory, but is sometimes also recruited during semantic memory tasks, especially for the skilled exploration of familiar information. Cognitive control mechanisms guiding semantic memory search may benefit from the set of cognitive processes at stake during musical training. Here, we examined using functional magnetic resonance imaging, whether musical expertise would promote the top–down control of the left inferior frontal gyrus (LIFG) over the generation of hippocampally based goal-directed thoughts mediating the familiarity judgment of proverbs and musical items. Analyses of behavioral data confirmed that musical experts more efficiently access familiar melodies than non-musicians although such increased ability did not transfer to verbal semantic memory. At the brain level, musical expertise specifically enhanced the recruitment of the hippocampus during semantic access to melodies, but not proverbs. Additionally, hippocampal activation contributed to speed of access to familiar melodies, but only in musicians. Critically, causal modeling of neural dynamics between LIFG and the hippocampus further showed that top–down excitatory regulation over the hippocampus during familiarity decision specifically increases with musical expertise – an effect that generalized across melodies and proverbs. At the local level, our data show that musical expertise modulates the online recruitment of hippocampal response to serve semantic memory retrieval of familiar melodies. The reconfiguration of memory network dynamics following musical training could constitute a promising framework to understand its ability to preserve brain functions. PMID:29033805

  9. Reviewing the literature on access to prompt and effective malaria treatment in Kenya: implications for meeting the Abuja targets

    PubMed Central

    Chuma, Jane; Abuya, Timothy; Memusi, Dorothy; Juma, Elizabeth; Akhwale, Willis; Ntwiga, Janet; Nyandigisi, Andrew; Tetteh, Gladys; Shretta, Rima; Amin, Abdinasir

    2009-01-01

    Background Effective case management is central to reducing malaria mortality and morbidity worldwide, but only a minority of those affected by malaria, have access to prompt effective treatment. In Kenya, the Division of Malaria Control is committed to ensuring that 80 percent of childhood fevers are treated with effective anti-malarial medicines within 24 hours of fever onset, but this target is largely unmet. This review aimed to document evidence on access to effective malaria treatment in Kenya, identify factors that influence access, and make recommendations on how to improve prompt access to effective malaria treatment. Since treatment-seeking patterns for malaria are similar in many settings in sub-Saharan Africa, the findings presented in this review have important lessons for other malaria endemic countries. Methods Internet searches were conducted in PUBMED (MEDLINE) and HINARI databases using specific search terms and strategies. Grey literature was obtained by soliciting reports from individual researchers working in the treatment-seeking field, from websites of major organizations involved in malaria control and from international reports. Results The review indicated that malaria treatment-seeking occurs mostly in the informal sector; that most fevers are treated, but treatment is often ineffective. Irrational drug use was identified as a problem in most studies, but determinants of this behaviour were not documented. Availability of non-recommended medicines over-the-counter and the presence of substandard anti-malarials in the market are well documented. Demand side determinants of access include perception of illness causes, severity and timing of treatment, perceptions of treatment efficacy, simplicity of regimens and ability to pay. Supply side determinants include distance to health facilities, availability of medicines, prescribing and dispensing practices and quality of medicines. Policy level factors are around the complexity and unclear messages regarding drug policy changes. Conclusion Kenya, like many other African countries, is still far from achieving the Abuja targets. The government, with support from donors, should invest adequately in mechanisms that promote access to effective treatment. Such approaches should focus on factors influencing multiple dimensions of access and will require the cooperation of all stakeholders working in malaria control. PMID:19863788

  10. Structure and management of tuberculosis control programs in fragile states--Afghanistan, DR Congo, Haiti, Somalia.

    PubMed

    Mauch, Verena; Weil, Diana; Munim, Aayid; Boillot, Francois; Coninx, Rudi; Huseynova, Sevil; Powell, Clydette; Seita, Akihiro; Wembanyama, Henriette; van den Hof, Susan

    2010-07-01

    Health care delivery is particularly problematic in fragile states often connected with increased incidence of communicable diseases, among them tuberculosis. This article draws upon experiences in tuberculosis control in four fragile states from which four lessons learned were derived. A structured inventory to extract common themes specific for TB control in fragile states was conducted among twelve providers of technical assistance who have worked in fragile states. The themes were applied to the TB control programs of Afghanistan, DR Congo, Haiti and Somalia during the years 2000-2006. Case notifications and treatment outcomes have increased in all four countries since 2003 (treatment success rates 81-90%). Access to care and case detection however have remained insufficient (case detection rates 39-62%); There are four lessons learned: 1. TB control programs can function in fragile states. 2. National program leadership and stewardship are essential for quality and sustained TB control. 3. Partnerships with non-governmental providers are vital for continuous service delivery; 4. TB control programs in fragile states require consistent donor support. Despite challenges in management, coordination, security, logistics and funding, TB control programs can function in fragile states, but face considerable problems in access to diagnosis and treatment and therefore case detection. Copyright (c) 2010 Elsevier Ireland Ltd. All rights reserved.

  11. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  12. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  13. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  14. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  15. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  16. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  17. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  18. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  19. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  20. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  1. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  2. A Method to Exploit the Structure of Genetic Ancestry Space to Enhance Case-Control Studies.

    PubMed

    Bodea, Corneliu A; Neale, Benjamin M; Ripke, Stephan; Daly, Mark J; Devlin, Bernie; Roeder, Kathryn

    2016-05-05

    One goal of human genetics is to understand the genetic basis of disease, a challenge for diseases of complex inheritance because risk alleles are few relative to the vast set of benign variants. Risk variants are often sought by association studies in which allele frequencies in case subjects are contrasted with those from population-based samples used as control subjects. In an ideal world we would know population-level allele frequencies, releasing researchers to focus on case subjects. We argue this ideal is possible, at least theoretically, and we outline a path to achieving it in reality. If such a resource were to exist, it would yield ample savings and would facilitate the effective use of data repositories by removing administrative and technical barriers. We call this concept the Universal Control Repository Network (UNICORN), a means to perform association analyses without necessitating direct access to individual-level control data. Our approach to UNICORN uses existing genetic resources and various statistical tools to analyze these data, including hierarchical clustering with spectral analysis of ancestry; and empirical Bayesian analysis along with Gaussian spatial processes to estimate ancestry-specific allele frequencies. We demonstrate our approach using tens of thousands of control subjects from studies of Crohn disease, showing how it controls false positives, provides power similar to that achieved when all control data are directly accessible, and enhances power when control data are limiting or even imperfectly matched ancestrally. These results highlight how UNICORN can enable reliable, powerful, and convenient genetic association analyses without access to the individual-level data. Copyright © 2016 The American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  3. Using a screening tool to evaluate potential use of e-health services for older people with and without cognitive impairment.

    PubMed

    Malinowsky, Camilla; Nygård, Louise; Kottorp, Anders

    2014-01-01

    E-health services are increasingly offered to provide clients with information and a link to healthcare services. The aim of this study is to investigate the perceived access to and the potential to use technologies important for e-health services among older adults with mild cognitive impairment (MCI) or mild Alzheimer's disease (AD) and controls. The perceived access to and perception of difficulty in the use of everyday technology (such as cell phones, coffee machines, computers) was investigated in a sample of older adults (n = 118) comprising three subsamples: adults with MCI (n = 37), with mild AD (n = 37), and controls (n = 44) using the Everyday Technology Use Questionnaire (ETUQ). The use of seven technologies important for e-health services was specifically examined for each subsample and compared between the subsamples. The findings demonstrated that the older adults in all subsamples perceive access to e-health technologies and potentially would use them competently in several e-health services. However, among persons with AD a lower proportion of perceived access to the technology was described, as well as for persons with MCI. To make the benefits of e-health services available and used by all clients, it is important to consider access to the technology required in e-health services and also to support the clients' capabilities to understand and use the technologies. Also, the potential use of the ETUQ to explore the perceived access to and competence in using e-health technologies is a vital issue in the use of e-health services.

  4. Effects of a College Access Program for Youth Underrepresented in Higher Education: A Randomized Experiment

    ERIC Educational Resources Information Center

    Bergin, David A.; Cooks, Helen C.; Bergin, Christi C.

    2007-01-01

    This article describes EXCEL, a program that encourages youth underrepresented in higher education to enroll in higher education, specifically at the sponsoring university. Eighty-three eighth grade students with GPA of B and above and standardized test scores at grade level or above were randomly assigned to the program or to a control group. The…

  5. Mbd3/NuRD controls lymphoid cell fate and inhibits tumorigenesis by repressing a B cell transcriptional program

    PubMed Central

    Hamey, Fiona K.; Errami, Youssef

    2017-01-01

    Differentiation of lineage-committed cells from multipotent progenitors requires the establishment of accessible chromatin at lineage-specific transcriptional enhancers and promoters, which is mediated by pioneer transcription factors that recruit activating chromatin remodeling complexes. Here we show that the Mbd3/nucleosome remodeling and deacetylation (NuRD) chromatin remodeling complex opposes this transcriptional pioneering during B cell programming of multipotent lymphoid progenitors by restricting chromatin accessibility at B cell enhancers and promoters. Mbd3/NuRD-deficient lymphoid progenitors therefore prematurely activate a B cell transcriptional program and are biased toward overproduction of pro–B cells at the expense of T cell progenitors. The striking reduction in early thymic T cell progenitors results in compensatory hyperproliferation of immature thymocytes and development of T cell lymphoma. Our results reveal that Mbd3/NuRD can regulate multilineage differentiation by constraining the activation of dormant lineage-specific enhancers and promoters. In this way, Mbd3/NuRD protects the multipotency of lymphoid progenitors, preventing B cell–programming transcription factors from prematurely enacting lineage commitment. Mbd3/NuRD therefore controls the fate of lymphoid progenitors, ensuring appropriate production of lineage-committed progeny and suppressing tumor formation. PMID:28899870

  6. AccessMRS: integrating OpenMRS with smart forms on Android.

    PubMed

    Fazen, Louis E; Chemwolo, Benjamin T; Songok, Julia J; Ruhl, Laura J; Kipkoech, Carolyne; Green, James M; Ikemeri, Justus E; Christoffersen-Deb, Astrid

    2013-01-01

    We present a new open-source Android application, AccessMRS, for interfacing with an electronic medical record system (OpenMRS) and loading 'Smart Forms' on a mobile device. AccessMRS functions as a patient-centered interface for viewing OpenMRS data; managing patient information in reminders, task lists, and previous encounters; and launching patient-specific 'Smart Forms' for electronic data collection and dissemination of health information. We present AccessMRS in the context of related software applications we developed to serve Community Health Workers, including AccessInfo, AccessAdmin, AccessMaps, and AccessForms. The specific features and design of AccessMRS are detailed in relationship to the requirements that drove development: the workflows of the Kenyan Ministry of Health Community Health Volunteers (CHVs) supported by the AMPATH Primary Health Care Program. Specifically, AccessMRS was designed to improve the quality of community-based Maternal and Child Health services delivered by CHVs in Kosirai Division. AccessMRS is currently in use by more than 80 CHVs in Kenya and undergoing formal assessment of acceptability, effectiveness, and cost.

  7. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  8. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay. PMID:22180793

  9. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  10. Sanitation and Hygiene-Specific Risk Factors for Moderate-to-Severe Diarrhea in Young Children in the Global Enteric Multicenter Study, 2007-2011: Case-Control Study.

    PubMed

    Baker, Kelly K; O'Reilly, Ciara E; Levine, Myron M; Kotloff, Karen L; Nataro, James P; Ayers, Tracy L; Farag, Tamer H; Nasrin, Dilruba; Blackwelder, William C; Wu, Yukun; Alonso, Pedro L; Breiman, Robert F; Omore, Richard; Faruque, Abu S G; Das, Sumon Kumar; Ahmed, Shahnawaz; Saha, Debasish; Sow, Samba O; Sur, Dipika; Zaidi, Anita K M; Quadri, Fahreen; Mintz, Eric D

    2016-05-01

    Diarrheal disease is the second leading cause of disease in children less than 5 y of age. Poor water, sanitation, and hygiene conditions are the primary routes of exposure and infection. Sanitation and hygiene interventions are estimated to generate a 36% and 48% reduction in diarrheal risk in young children, respectively. Little is known about whether the number of households sharing a sanitation facility affects a child's risk of diarrhea. The objective of this study was to describe sanitation and hygiene access across the Global Enteric Multicenter Study (GEMS) sites in Africa and South Asia and to assess sanitation and hygiene exposures, including shared sanitation access, as risk factors for moderate-to-severe diarrhea (MSD) in children less than 5 y of age. The GEMS matched case-control study was conducted between December 1, 2007, and March 3, 2011, at seven sites in Basse, The Gambia; Nyanza Province, Kenya; Bamako, Mali; Manhiça, Mozambique; Mirzapur, Bangladesh; Kolkata, India; and Karachi, Pakistan. Data was collected for 8,592 case children aged <5 y old experiencing MSD and for 12,390 asymptomatic age, gender, and neighborhood-matched controls. An MSD case was defined as a child with a diarrheal illness <7 d duration comprising ≥3 loose stools in 24 h and ≥1 of the following: sunken eyes, skin tenting, dysentery, intravenous (IV) rehydration, or hospitalization. Site-specific conditional logistic regression models were used to explore the association between sanitation and hygiene exposures and MSD. Most households at six sites (>93%) had access to a sanitation facility, while 70% of households in rural Kenya had access to a facility. Practicing open defecation was a risk factor for MSD in children <5 y old in Kenya. Sharing sanitation facilities with 1-2 or ≥3 other households was a statistically significant risk factor for MSD in Kenya, Mali, Mozambique, and Pakistan. Among those with a designated handwashing area near the home, soap or ash were more frequently observed at control households and were significantly protective against MSD in Mozambique and India. This study suggests that sharing a sanitation facility with just one to two other households can increase the risk of MSD in young children, compared to using a private facility. Interventions aimed at increasing access to private household sanitation facilities may reduce the burden of MSD in children. These findings support the current World Health Organization/ United Nations Children's Emergency Fund (UNICEF) system that categorizes shared sanitation as unimproved.

  11. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  13. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  14. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  15. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  16. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  17. Video game access, parental rules, and problem behavior: a study of boys with autism spectrum disorder.

    PubMed

    Engelhardt, Christopher R; Mazurek, Micah O

    2014-07-01

    Environmental correlates of problem behavior among individuals with autism spectrum disorder remain relatively understudied. The current study examined the contribution of in-room (i.e. bedroom) access to a video game console as one potential correlate of problem behavior among a sample of 169 boys with autism spectrum disorder (ranging from 8 to 18 years of age). Parents of these children reported on (1) whether they had specific rules regulating their child's video game use, (2) whether their child had in-room access to a variety of screen-based media devices (television, computer, and video game console), and (3) their child's oppositional behaviors. Multivariate regression models showed that in-room access to a video game console predicted oppositional behavior while controlling for in-room access to other media devices (computer and television) and relevant variables (e.g. average number of video game hours played per day). Additionally, the association between in-room access to a video game console and oppositional behavior was particularly large when parents reported no rules on their child's video game use. The current findings indicate that both access and parental rules regarding video games warrant future experimental and longitudinal research as they relate to problem behavior in boys with autism spectrum disorder. © The Author(s) 2013.

  18. Security middleware infrastructure for DICOM images in health information systems.

    PubMed

    Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A

    2003-12-01

    In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.

  19. Providing Internet Access to High-Resolution Lunar Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  20. Condensation of chromatin in transcriptional regions of an inactivated plant transgene: evidence for an active role of transcription in gene silencing.

    PubMed

    van Blokland, R; ten Lohuis, M; Meyer, P

    1997-12-01

    The chromatin structures of two epigenetic alleles of a transgene were investigated by measuring the local accessibility of transgene chromatin to endonucleases. The two epialleles represented the active, hypomethylated state of a transgene in line 17-I of Petunia hybrida, and a transcriptionally inactive, hypermethylated derivative of the same transgene in line 17-IV. In nuclear preparations the inactive epiallele was significantly less sensitive to DNasel digestion and nuclease S7 digestion than the transcriptionally active epiallele, whereas no significant differences in accessibility were observed between naked DNA samples of the two epialleles. Our data suggest that a condensed chromatin structure is specifically imposed on transcribed regions of the construct in line 17-IV. In contrast, in both epialleles the plasmid region of the transgene, which is not transcriptionally active in plants, retains the same accessibility to endonucleases as the chromosomal integration site. These data suggest that transcriptional inactivation is linked to the process of transcription, and imply that control of transgene expression via the use of inducible or tissue-specific promoters might prevent transgene silencing and conserve the active state of transgenes during sexual propagation.

  1. Why build limited access highways?.

    DOT National Transportation Integrated Search

    1991-01-01

    This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...

  2. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  3. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  4. Adaptation of a Control Center Development Environment for Industrial Process Control

    NASA Technical Reports Server (NTRS)

    Killough, Ronnie L.; Malik, James M.

    1994-01-01

    In the control center, raw telemetry data is received for storage, display, and analysis. This raw data must be combined and manipulated in various ways by mathematical computations to facilitate analysis, provide diversified fault detection mechanisms, and enhance display readability. A development tool called the Graphical Computation Builder (GCB) has been implemented which provides flight controllers with the capability to implement computations for use in the control center. The GCB provides a language that contains both general programming constructs and language elements specifically tailored for the control center environment. The GCB concept allows staff who are not skilled in computer programming to author and maintain computer programs. The GCB user is isolated from the details of external subsystem interfaces and has access to high-level functions such as matrix operators, trigonometric functions, and unit conversion macros. The GCB provides a high level of feedback during computation development that improves upon the often cryptic errors produced by computer language compilers. An equivalent need can be identified in the industrial data acquisition and process control domain: that of an integrated graphical development tool tailored to the application to hide the operating system, computer language, and data acquisition interface details. The GCB features a modular design which makes it suitable for technology transfer without significant rework. Control center-specific language elements can be replaced by elements specific to industrial process control.

  5. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat. PMID:28758045

  6. Advanced software development workstation project ACCESS user's guide

    NASA Technical Reports Server (NTRS)

    1990-01-01

    ACCESS is a knowledge based software information system designed to assist the user in modifying retrieved software to satisfy user specifications. A user's guide is presented for the knowledge engineer who wishes to create for ACCESS a knowledge base consisting of representations of objects in some software system. This knowledge is accessible to an end user who wishes to use the catalogued software objects to create a new application program or an input stream for an existing system. The application specific portion of an ACCESS knowledge base consists of a taxonomy of object classes, as well as instances of these classes. All objects in the knowledge base are stored in an associative memory. ACCESS provides a standard interface for the end user to browse and modify objects. In addition, the interface can be customized by the addition of application specific data entry forms and by specification of display order for the taxonomy and object attributes. These customization options are described.

  7. A Logic for Reasoning About Time-Dependent Access Control Policies

    DTIC Science & Technology

    2008-05-20

    41 4.3.2 Filling Painkiller Prescriptions . . . . . . . . . . . . . . . . . . . . . . . . . . 42 4.3.3 A Homework Assignment Administration System...4.3.2 Filling Painkiller Prescriptions We now consider the specification of pharmacy policies for dispensing painkilling medications in ηL logic. To...prevent addiction, painkillers are tightly regulated. A patient must submit a valid doctor’s prescription to the pharmacist and may only receive a few

  8. Potential Healthcare Insurance and Provider Barriers to Pre-Exposure Prophylaxis Utilization Among Young Men Who Have Sex with Men.

    PubMed

    Marks, Sarah J; Merchant, Roland C; Clark, Melissa A; Liu, Tao; Rosenberger, Joshua G; Bauermeister, Jose; Mayer, Kenneth H

    2017-11-01

    Young adult men-who-have-sex-with-men (YMSM) continue to have among the highest incidence of HIV infection in the United States. Pre-exposure prophylaxis (PrEP) is an effective and safe method of preventing HIV infection; however, despite US Food and Drug Administration approval, utilization remains low, in part, due to structural barriers, particularly access to healthcare. In this study, we used social media to recruit black, Hispanic, and white HIV-uninfected 18- to 24-year-old YMSM. Participants completed an online survey about their sexual behavior, healthcare access, and previous use of PrEP. Of the 2297 YMSM surveyed, only 3.4% had used PrEP. PrEP use was associated with higher levels of education, living alone, older age, higher levels of sexual activity, and greater healthcare access, specifically having healthcare insurance and a clinic or primary care provider (PCP) from whom they received care. Among PrEP nonusers, 65% met at least one of the US Centers for Disease Control and Prevention recommended indications for PrEP use, and of these, 59% had healthcare insurance and received care in a clinic and/or had a PCP. Multi-variable multi-nomial logistic regression modeling identified disparities in access to healthcare by age, race/ethnicity, education, and region. Specifically, older YMSM, blacks and Hispanics, those with fewer years of formal education, and residents of the southern and the western United States were more likely to lack healthcare access. These results demonstrate both potential opportunities and barriers to the scale-up of PrEP among YMSM.

  9. The base rates and factors associated with reported access to firearms in psychiatric inpatients.

    PubMed

    Kolla, Bhanu Prakash; O'Connor, Stephen S; Lineberry, Timothy W

    2011-01-01

    The aim of this study was to define whether specific patient demographic groups, diagnoses or other factors are associated with psychiatric inpatients reporting firearms access. A retrospective medical records review study was conducted using information on access to firearms from electronic medical records for all patients 16 years and older admitted between July 2007 and May 2008 at the Mayo Clinic Psychiatric Hospital in Rochester, MN. Data were obtained only on patients providing authorization for record review. Data were analyzed using univariate and multivariate logistic regression analyses accounting for gender, diagnostic groups, comorbid substance use, history of suicide attempts and family history of suicide/suicide attempts. Seventy-four percent (1169/1580) of patients provided research authorization. The ratio of men to women was identical in both research and nonresearch authorization groups. There were 14.6% of inpatients who reported firearms access. In univariate analysis, men were more likely (P<.0001) to report access than women, and a history of previous suicide attempt(s) was associated with decreased access (P=.02). Multiple logistic regression analyses controlling for other factors found females and patients with history of previous suicide attempt(s) less likely to report access, while patients with a family history of suicide or suicide attempts reported increased firearms access. Diagnostic groups were not associated with access on univariate or multiple logistic regression analyses. Men and inpatients with a family history of suicide/suicide attempts were more likely to report firearms access. Clinicians should develop standardized systems of identification of firearms access and provide guidance on removal. Copyright © 2011 Elsevier Inc. All rights reserved.

  10. 75 FR 16507 - In the Matter of Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-01

    ... Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same... synchronous dynamic random access memory controllers and products containing same by reason of infringement of... semiconductor chips having synchronous dynamic random access memory controllers and products containing same...

  11. Physical Impairment

    NASA Astrophysics Data System (ADS)

    Trewin, Shari

    Many health conditions can lead to physical impairments that impact computer and Web access. Musculoskeletal conditions such as arthritis and cumulative trauma disorders can make movement stiff and painful. Movement disorders such as tremor, Parkinsonism and dystonia affect the ability to control movement, or to prevent unwanted movements. Often, the same underlying health condition also has sensory or cognitive effects. People with dexterity impairments may use a standard keyboard and mouse, or any of a wide range of alternative input mechanisms. Examples are given of the diverse ways that specific dexterity impairments and input mechanisms affect the fundamental actions of Web browsing. As the Web becomes increasingly sophisticated, and physically demanding, new access features at the Web browser and page level will be necessary.

  12. GSFC network operations with Tracking and Data Relay Satellites

    NASA Astrophysics Data System (ADS)

    Spearing, R.; Perreten, D. E.

    The Tracking and Data Relay Satellite System (TDRSS) Network (TN) has been developed to provide services to all NASA User spacecraft in near-earth orbits. Three inter-relating entities will provide these services. The TN has been transformed from a network continuously changing to meet User specific requirements to a network which is flexible to meet future needs without significant changes in operational concepts. Attention is given to the evolution of the TN network, the TN capabilities-space segment, forward link services, tracking services, return link services, the three basic capabilities, single access services, multiple access services, simulation services, the White Sands Ground Terminal, the NASA communications network, and the network control center.

  13. GSFC network operations with Tracking and Data Relay Satellites

    NASA Technical Reports Server (NTRS)

    Spearing, R.; Perreten, D. E.

    1984-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Network (TN) has been developed to provide services to all NASA User spacecraft in near-earth orbits. Three inter-relating entities will provide these services. The TN has been transformed from a network continuously changing to meet User specific requirements to a network which is flexible to meet future needs without significant changes in operational concepts. Attention is given to the evolution of the TN network, the TN capabilities-space segment, forward link services, tracking services, return link services, the three basic capabilities, single access services, multiple access services, simulation services, the White Sands Ground Terminal, the NASA communications network, and the network control center.

  14. Memory-Intensive Benchmarks: IRAM vs. Cache-Based Machines

    NASA Technical Reports Server (NTRS)

    Biswas, Rupak; Gaeke, Brian R.; Husbands, Parry; Li, Xiaoye S.; Oliker, Leonid; Yelick, Katherine A.; Biegel, Bryan (Technical Monitor)

    2002-01-01

    The increasing gap between processor and memory performance has lead to new architectural models for memory-intensive applications. In this paper, we explore the performance of a set of memory-intensive benchmarks and use them to compare the performance of conventional cache-based microprocessors to a mixed logic and DRAM processor called VIRAM. The benchmarks are based on problem statements, rather than specific implementations, and in each case we explore the fundamental hardware requirements of the problem, as well as alternative algorithms and data structures that can help expose fine-grained parallelism or simplify memory access patterns. The benchmarks are characterized by their memory access patterns, their basic control structures, and the ratio of computation to memory operation.

  15. Arsenic bio-accessibility and bioaccumulation in aged pesticide contaminated soils: A multiline investigation to understand environmental risk.

    PubMed

    Rahman, M S; Reichelt-Brushet, A J; Clark, M W; Farzana, T; Yee, L H

    2017-03-01

    Bio-accessibility and bioavailability of arsenic (As) in historically As-contaminated soils (cattle tick pesticide), and pristine soils were assessed using 3 different approaches. These approaches included human bio-accessibility using an extraction test replicating gastric conditions (in vitro physiologically-based extraction test); an operationally defined bioaccessibility extraction test - 1.0M HCl extraction; and a live organism bioaccumulation test using earthworms. A sequential extraction procedure revealed the soil As-pool that controls bio-accessibility and bioaccumulation of As. Findings show that As is strongly bound to historically contaminated soil with a lower degree of As bio-accessibility (<15%) and bioaccumulation (<9%) compared with freshly contaminated soil. Key to these lower degrees of bio-accessibility and bioaccumulation is the greater fraction of As associated with crystalline Fe/Al oxy-hydroxide and residual phases. The high bio-accessibility and bioaccumulation of freshly sorbed As in pristine soils were from the exchangeable and specifically sorbed As fractions. Arsenic bioaccumulation in earthworms correlates strongly with both the human bio-accessible, and the operationally defined bioavailable fractions. Hence, results suggest that indirect As bioavailability measures, such as accumulation by earthworm, can be used as complementary lines of evidence to reinforce site-wide trends in the bio-accessibility using in vitro physiologically-based extractions and/or operationally defined extraction test. Such detailed knowledge is useful for successful reclamation and management of the As contaminated soils. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Remote and chronic access to the third cerebral ventricle of the unrestrained prepubertal rhesus monkey.

    PubMed

    Gay, V L; Mikuma, N; Plant, T M

    1993-03-01

    One channel of a commercially available standard-size three-channel fluid swivel was modified to permit continuous access to the brain of unrestrained prepubertal rhesus monkeys via a continuous length of small-bore Teflon tube originating from a swivel device on top of the animal's cage and terminating in the third cerebral ventricle. This system was employed to achieve continuous access to the third cerebroventricle in four monkeys for periods of up to 12 mo. The value of the system for studies of the neurochemical control of hypothalamic-releasing factor secretion was established by monitoring adenohypophysial responses to neurotransmitter receptor agonists infused into the third ventricle. Specifically, repetitive infusions of morphine (30 micrograms/infusion) elicited a robust train of prolactin discharges, and third ventricular administration of N-methyl-DL-aspartic acid (NMA; 20 micrograms) resulted in striking discharges of LH.

  17. Attacking the information access problem with expert systems

    NASA Technical Reports Server (NTRS)

    Ragusa, James M.; Orwig, Gary W.

    1991-01-01

    The results of applications research directed at finding an improved method of storing and accessing information are presented. Twelve microcomputer-based expert systems shells and five laser-optical formats have been studied, and the general and specific methods of interfacing these technologies are being tested in prototype systems. Shell features and interfacing capabilities are discussed, and results from the study of five laser-optical formats are recounted including the video laser, compact, and WORM disks, and laser cards and film. Interfacing, including laser disk device driver interfacing, is discussed and it is pointed out that in order to control the laser device from within the expert systems application, the expert systems shell must be able to access the device driver software. Potential integrated applications are investigated and an initial list is provided including consumer services, travel, law enforcement, human resources, marketing, and education and training.

  18. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  19. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  20. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  1. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  2. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  3. Integration of EGA secure data access into Galaxy.

    PubMed

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J A Fijneman, Remond; Boiten, Jan-Willem; A Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.

  4. Integration of EGA secure data access into Galaxy

    PubMed Central

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; Fijneman, Remond J.A.; Boiten, Jan-Willem; A. Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer. PMID:28232859

  5. Transnational health care: from a global terminology towards transnational health region development.

    PubMed

    Mainil, Tomas; Van Loon, Francis; Dinnie, Keith; Botterill, David; Platenkamp, Vincent; Meulemans, Herman

    2012-11-01

    Within European cross-border health care, recent studies have identified several types of international patients. Within the Anglo-Saxon setting, the specific terminology of medical tourism is used. The analytical purpose of the paper is to resolve this semantic difference by suggesting an alternative terminology, 'transnational health care' that is understood as a 'context-controlled and coordinated network of health services'. For demand-driven trans-border access seekers and cross-border access searchers, there is a need to opt for regional health-policy strategies. For supply-driven sending context actors and receiving context actors, there would be organizational benefits to these strategies. Applying the terminology of trans-border access seekers, cross-border access searchers, sending context and receiving context actors results in a transnational patient mobility typology of twelve types of international patients, based on the criteria of geographical distance, cultural distance and searching efforts, public/private/no cover and private/public provision of health services. Finally, the normative purpose of the paper is to encourage the use of this terminology to promote a policy route for transnational health regions. It is suggested that the development of transnational health regions, each with their own medical and supportive service characteristics, could enhance governmental context-controlled decision power in applying sustainable health destination management. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  6. Development and Use of a Virtual NMR Facility

    NASA Astrophysics Data System (ADS)

    Keating, Kelly A.; Myers, James D.; Pelton, Jeffrey G.; Bair, Raymond A.; Wemmer, David E.; Ellis, Paul D.

    2000-03-01

    We have developed a "virtual NMR facility" (VNMRF) to enhance access to the NMR spectrometers in Pacific Northwest National Laboratory's Environmental Molecular Sciences Laboratory (EMSL). We use the term virtual facility to describe a real NMR facility made accessible via the Internet. The VNMRF combines secure remote operation of the EMSL's NMR spectrometers over the Internet with real-time videoconferencing, remotely controlled laboratory cameras, real-time computer display sharing, a Web-based electronic laboratory notebook, and other capabilities. Remote VNMRF users can see and converse with EMSL researchers, directly and securely control the EMSL spectrometers, and collaboratively analyze results. A customized Electronic Laboratory Notebook allows interactive Web-based access to group notes, experimental parameters, proposed molecular structures, and other aspects of a research project. This paper describes our experience developing a VNMRF and details the specific capabilities available through the EMSL VNMRF. We show how the VNMRF has evolved during a test project and present an evaluation of its impact in the EMSL and its potential as a model for other scientific facilities. All Collaboratory software used in the VNMRF is freely available from http://www.emsl.pnl.gov:2080/docs/collab.

  7. Cyber-physical networking for wireless mesh infrastructures

    NASA Astrophysics Data System (ADS)

    Mannweiler, C.; Lottermann, C.; Klein, A.; Schneider, J.; Schotten, H. D.

    2012-09-01

    This paper presents a novel approach for cyber-physical network control. "Cyber-physical" refers to the inclusion of different parameters and information sources, ranging from physical sensors (e.g. energy, temperature, light) to conventional network information (bandwidth, delay, jitter, etc.) to logical data providers (inference systems, user profiles, spectrum usage databases). For a consistent processing, collected data is represented in a uniform way, analyzed, and provided to dedicated network management functions and network services, both internally and, through an according API, to third party services. Specifically, in this work, we outline the design of sophisticated energy management functionalities for a hybrid wireless mesh network (WLAN for both backhaul traffic and access, GSM for access only), disposing of autonomous energy supply, in this case solar power. Energy consumption is optimized under the presumption of fluctuating power availability and considerable storage constraints, thus influencing, among others, handover and routing decisions. Moreover, advanced situation-aware auto-configuration and self-adaptation mechanisms are introduced for an autonomous operation of the network. The overall objective is to deploy a robust wireless access and backbone infrastructure with minimal operational cost and effective, cyber-physical control mechanisms, especially dedicated for rural or developing regions.

  8. Design and FPGA implementation for MAC layer of Ethernet PON

    NASA Astrophysics Data System (ADS)

    Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao

    2004-04-01

    Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.

  9. Layer-specific chromatin accessibility landscapes reveal regulatory networks in adult mouse visual cortex

    PubMed Central

    Gray, Lucas T; Yao, Zizhen; Nguyen, Thuc Nghi; Kim, Tae Kyung; Zeng, Hongkui; Tasic, Bosiljka

    2017-01-01

    Mammalian cortex is a laminar structure, with each layer composed of a characteristic set of cell types with different morphological, electrophysiological, and connectional properties. Here, we define chromatin accessibility landscapes of major, layer-specific excitatory classes of neurons, and compare them to each other and to inhibitory cortical neurons using the Assay for Transposase-Accessible Chromatin with high-throughput sequencing (ATAC-seq). We identify a large number of layer-specific accessible sites, and significant association with genes that are expressed in specific cortical layers. Integration of these data with layer-specific transcriptomic profiles and transcription factor binding motifs enabled us to construct a regulatory network revealing potential key layer-specific regulators, including Cux1/2, Foxp2, Nfia, Pou3f2, and Rorb. This dataset is a valuable resource for identifying candidate layer-specific cis-regulatory elements in adult mouse cortex. DOI: http://dx.doi.org/10.7554/eLife.21883.001 PMID:28112643

  10. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  11. Sugar and pH dual-responsive mesoporous silica nanocontainers based on competitive binding mechanisms

    NASA Astrophysics Data System (ADS)

    Yilmaz, M. Deniz; Xue, Min; Ambrogio, Michael W.; Buyukcakir, Onur; Wu, Yilei; Frasconi, Marco; Chen, Xinqi; Nassar, Majed S.; Stoddart, J. Fraser; Zink, Jeffrey I.

    2014-12-01

    A sugar and pH dual-responsive controlled release system, which is highly specific towards molecular stimuli, has been developed based on the binding between catechol and boronic acid on a platform of mesoporous silica nanoparticles (MSNs). By grafting phenylboronic acid stalks onto the silica surface, catechol-containing β-cyclodextrins can be attached to the orifices of the MSNs' nanopores through formation of boronate esters which block access to the nanopores. These esters are stable enough to prevent cargo molecules from escaping. The boronate esters disassociate in the presence of sugars, enabling the molecule-specific controlled-release feature of this hybrid system. The rate of release has been found to be tunable by varying both the structures and the concentrations of sugars, as a result of the competitive binding nature associated with the mechanism of its operation. Acidification also induces the release of cargo molecules. Further investigations show that the presence of both a low pH and sugar molecules provides cooperative effects which together control the rate of release.A sugar and pH dual-responsive controlled release system, which is highly specific towards molecular stimuli, has been developed based on the binding between catechol and boronic acid on a platform of mesoporous silica nanoparticles (MSNs). By grafting phenylboronic acid stalks onto the silica surface, catechol-containing β-cyclodextrins can be attached to the orifices of the MSNs' nanopores through formation of boronate esters which block access to the nanopores. These esters are stable enough to prevent cargo molecules from escaping. The boronate esters disassociate in the presence of sugars, enabling the molecule-specific controlled-release feature of this hybrid system. The rate of release has been found to be tunable by varying both the structures and the concentrations of sugars, as a result of the competitive binding nature associated with the mechanism of its operation. Acidification also induces the release of cargo molecules. Further investigations show that the presence of both a low pH and sugar molecules provides cooperative effects which together control the rate of release. Electronic supplementary information (ESI) available: Synthetic schemes, electron microscopy images and nitrogen adsorption/desorption isotherms of the nanoparticles, FT-IR spectra, isothermal titration calorimetry, X-ray photoelectron spectra and time-of-flight secondary ion mass spectra. DLS results for nanoparticle stability. See DOI: 10.1039/c4nr04796f

  12. Method and device for maximizing memory system bandwidth by accessing data in a dynamically determined order

    NASA Technical Reports Server (NTRS)

    Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)

    2000-01-01

    A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.

  13. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  14. Biosecurity measures in 48 isolation facilities managing highly infectious diseases.

    PubMed

    Puro, Vincenzo; Fusco, Francesco M; Schilling, Stefan; Thomson, Gail; De Iaco, Giuseppina; Brouqui, Philippe; Maltezou, Helena C; Bannister, Barbara; Gottschalk, René; Brodt, Hans-Rheinhard; Ippolito, Giuseppe

    2012-06-01

    Biosecurity measures are traditionally applied to laboratories, but they may also be usefully applied in highly specialized clinical settings, such as the isolation facilities for the management of patients with highly infectious diseases (eg, viral hemorrhagic fevers, SARS, smallpox, potentially severe pandemic flu, and MDR- and XDR-tuberculosis). In 2009 the European Network for Highly Infectious Diseases conducted a survey in 48 isolation facilities in 16 European countries to determine biosecurity measures for access control to the facility. Security personnel are present in 39 facilities (81%). In 35 facilities (73%), entrance to the isolation area is restricted; control methods include electronic keys, a PIN system, closed-circuit TV, and guards at the doors. In 25 facilities (52%), identification and registration of all staff entering and exiting the isolation area are required. Access control is used in most surveyed centers, but specific lacks exist in some facilities. Further data are needed to assess other biosecurity aspects, such as the security measures during the transportation of potentially contaminated materials and measures to address the risk of an "insider attack."

  15. Biosecurity Measures in 48 Isolation Facilities Managing Highly Infectious Diseases

    PubMed Central

    Puro, Vincenzo; Schilling, Stefan; Thomson, Gail; De Iaco, Giuseppina; Brouqui, Philippe; Maltezou, Helena C.; Bannister, Barbara; Gottschalk, René; Brodt, Hans-Rheinhard; Ippolito, Giuseppe

    2012-01-01

    Biosecurity measures are traditionally applied to laboratories, but they may also be usefully applied in highly specialized clinical settings, such as the isolation facilities for the management of patients with highly infectious diseases (eg, viral hemorrhagic fevers, SARS, smallpox, potentially severe pandemic flu, and MDR- and XDR-tuberculosis). In 2009 the European Network for Highly Infectious Diseases conducted a survey in 48 isolation facilities in 16 European countries to determine biosecurity measures for access control to the facility. Security personnel are present in 39 facilities (81%). In 35 facilities (73%), entrance to the isolation area is restricted; control methods include electronic keys, a PIN system, closed-circuit TV, and guards at the doors. In 25 facilities (52%), identification and registration of all staff entering and exiting the isolation area are required. Access control is used in most surveyed centers, but specific lacks exist in some facilities. Further data are needed to assess other biosecurity aspects, such as the security measures during the transportation of potentially contaminated materials and measures to address the risk of an “insider attack.” PMID:22571373

  16. Do positive psychology exercises work? A replication of Seligman et al. (2005).

    PubMed

    Mongrain, Myriam; Anselmo-Matthews, Tracy

    2012-04-01

    The current work replicated a landmark study conducted by Seligman and colleagues (2005) that demonstrated the long-term benefits of positive psychology exercises (PPEs). In the original study, two exercises administered over 1 week ("Three Good Things" and "Using your Signature Strengths in a New Way") were found to have long-lasting effects on depression and happiness (Seligman, Steen, Park, & Peterson, 2005). These exercises were tested here using the same methodology except for improvements to the control condition, and the addition of a second "positive placebo" to isolate the common factor of accessing positive, self-relevant constructs. This component control design was meant to assess the effect of expectancies for success (expectancy control), as well the cognitive access of positive information about the self (positive placebo). Repeated measures analyses showed that the PPEs led to lasting increases in happiness, as did the positive placebo. The PPEs did not exceed the control condition in producing changes in depression over time. Brief, positive psychology interventions may boost happiness through a common factor involving the activation of positive, self-relevant information rather than through other specific mechanisms. Finally, the effects of PPEs on depression may be more modest than previously assumed. © 2012 Wiley Periodicals, Inc.

  17. Changing Community Health Behaviors with a Health Promotion Computer Network: Preliminary Findings from Stanford Health-Net

    PubMed Central

    Robinson, Thomas N.; Walters, Paul A.

    1987-01-01

    Computer-based health education has been employed in many settings. However, data on resultant behavior change are lacking. A randomized, controlled, prospective study was performed to test the efficacy of Stanford Health-Net in changing community health behaviors. Graduate and undergraduate students (N=1003) were randomly assigned to treatment and control conditions. The treatment group received access to Health-Net, a health promotion computer network emphasizing specific self-care and preventive strategies. Over a four month intervention period, 26% of the treatment group used Health-Net an average of 6.4 times each (range 1 to 97). Users rated Health-Net favorably. The mean number of ambulatory medical visits decreesed 22.5% more in the treatment group than in the control group (P<.05), while hospitalizations did not differ significantly between groups. In addition, perceived self-efficacy for preventing the acquisition of a STD and herpes increased 577% (P<.05) and 261% (P<.01) more, respectively, in the treatment group than in the control group. These findings suggest that access to Stanford Health-Net can result in significant health behavior change. The advantages of the network approach make it a potential model for other communities.

  18. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. 76 FR 19510 - Notice of Availability (NOA) of the Models For Plant-Specific Adoption of Technical...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-07

    ...-Specific Adoption of Technical Specifications Task Force (TSTF) Traveler TSTF- 422, Revision 2, ``Change In... model safety evaluation (SE) for plant-specific adoption of TSTF Traveler TSTF-422, Revision 2, ``Change..., Revision 2, is available in the Agencywide Documents Access and Management System (ADAMS) under Accession...

  20. Single-session gamified virtual reality exposure therapy for spider phobia vs. traditional exposure therapy: study protocol for a randomized controlled non-inferiority trial.

    PubMed

    Miloff, Alexander; Lindner, Philip; Hamilton, William; Reuterskiöld, Lena; Andersson, Gerhard; Carlbring, Per

    2016-02-02

    Traditional one-session exposure therapy (OST) in which a patient is gradually exposed to feared stimuli for up to 3 h in a one-session format has been found effective for the treatment of specific phobias. However, many individuals with specific phobia are reluctant to seek help, and access to care is lacking due to logistic challenges of accessing, collecting, storing, and/or maintaining stimuli. Virtual reality (VR) exposure therapy may improve upon existing techniques by facilitating access, decreasing cost, and increasing acceptability and effectiveness. The aim of this study is to compare traditional OST with in vivo spiders and a human therapist with a newly developed single-session gamified VR exposure therapy application with modern VR hardware, virtual spiders, and a virtual therapist. Participants with specific phobia to spiders (N = 100) will be recruited from the general public, screened, and randomized to either VR exposure therapy (n = 50) or traditional OST (n = 50). A behavioral approach test using in vivo spiders will serve as the primary outcome measure. Secondary outcome measures will include spider phobia questionnaires and self-reported anxiety, depression, and quality of life. Outcomes will be assessed using a non-inferiority design at baseline and at 1, 12, and 52 weeks after treatment. VR exposure therapy has previously been evaluated as a treatment for specific phobias, but there has been a lack of high-quality randomized controlled trials. A new generation of modern, consumer-ready VR devices is being released that are advancing existing technology and have the potential to improve clinical availability and treatment effectiveness. The VR medium is also particularly suitable for taking advantage of recent phobia treatment research emphasizing engagement and new learning, as opposed to physiological habituation. This study compares a market-ready, gamified VR spider phobia exposure application, delivered using consumer VR hardware, with the current gold standard treatment. Implications are discussed. ClinicalTrials.gov identifier NCT02533310. Registered on 25 August 2015.

  1. DNA-based identification of Brassica vegetable species for the juice industry.

    PubMed

    Etoh, Kazumi; Niijima, Noritaka; Yokoshita, Masahiko; Fukuoka, Shin-Ichi

    2003-10-01

    Since kale (Brassica oleracea var. acephala), a cruciferous vegetable with a high level of vitamins and functional compounds beneficial to health and wellness, has become widely used in the juice industry, a precise method for quality control of vegetable species is necessary. We describe here a DNA-based identification method to distinguish kale from cabbage (Brassica oleracea var. capitata), a closely related species, which can be inadvertently mixed with kale during the manufacturing process. Using genomic DNA from these vegetables and combinatory sets of nucleotide primers, we screened for random amplified polymorphic DNA (RAPD) fragments and found three cabbage-specific fragments. These RAPD fragments, with lengths of 1.4, 0.5, and 1.5 kb, were purified, subcloned, and sequenced. Based on sequence-tagged sites (STS), we designed sets of primers to detect cabbage-specific identification (CAI) DNA markers. Utilizing the CAI markers, we successfully distinguished more than 10 different local cabbage accessions from 20 kale accessions, and identified kale juices experimentally spiked with different amounts of cabbage.

  2. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  3. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  4. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  5. [Online gaming. Potential risk and prevention programs].

    PubMed

    Malischnig, Doris

    2014-12-01

    Online gaming is more and more common and increasingly accessible. Due to a lack of social control the participation could be a potential risk for certain customers. The given article focuses on prevention measures that are provided by the Austrian online gaming operator, the Austrian Lotteries, provider of the online gaming platform win2day, in the light of the specifics of Internet gaming in order to avoid problems with gaming.

  6. Investigation of the ADA Language Implementation of the Hellenic Command Control and Information System.

    DTIC Science & Technology

    1982-06-01

    libary packages which support machine dependent physical interfaces, interrupt structures or special devices. Thus, programs and libraries written in...obtains real-time data, makes and imple- ments decisions and receives and originates digital messages. The major equipment items which are appropriate...maintenance. g. Provide digital communications access processing. Each microcomputer can be programmed to perform a specific set of functions using prepared

  7. Simulation of Physical and Media Access Control (MAC) for Resilient and Scalable Wireless Sensor Networks

    DTIC Science & Technology

    2006-03-01

    schedules uniform wakeup for all the nodes. When data is transmitted, only specific destination nodes need to remain awake. Other nodes not participating...of Carrier Sense ....................................................................30 3. Synchronous vs Asynchronous Wakeup Mechanisms...proposal is to have each pair of node schedule their “wake-up” or “beacons” independent of the IEEE 802.11 PSM beacon. In the ideal scenario, where

  8. Association between the accessibility to lethal methods and method-specific suicide rates: An ecological study in Taiwan.

    PubMed

    Lin, Jin-Jia; Lu, Tsung-Hsueh

    2006-07-01

    To examine the association between availability of lethal methods of suicide and method-specific suicide rates at the city/ county level in Taiwan. Age-adjusted and age-specific suicide rates of 23 cities/counties in Taiwan for the years 1999 to 2003 were calculated. Partial correlation coefficients were used to examine cross-sectional associations between independent variables, i.e., proportion of agricultural population and proportion of households living on the sixth floor or above, and suicide rates by different methods (poisoning by solids/liquids, jumping, and hanging) after adjusting for unemployment rates and prevalence of depression. The partial correlation coefficient was 0.77 (p < .001) for proportion of agricultural population with solids/liquids poisoning suicide rates. It was 0.73 (p < .001) for the proportion of households living on the sixth floor or above with suicide rates by jumping. Correlations between hanging suicide rates and proportion of agricultural population or between hanging suicide rates and proportion of households living on the sixth floor or above were not significant. The results showed strong positive associations between access to lethal methods and method-specific suicide rates. Controlling the availability of pesticides and fencing high buildings or installing window guards may be effective measures for suicide prevention.

  9. Publishing in Discipline-Specific Open Access Journals: Opportunities and Outreach for Librarians

    ERIC Educational Resources Information Center

    Tomaszewski, Robert; Poulin, Sonia; MacDonald, Karen I.

    2013-01-01

    Open access (OA) journals promote the opportunity for peer-reviewed journal articles to be freely accessible. In recent years, the number of OA journals has exploded in all disciplines. Previous studies have identified print-based pedagogical discipline-specific journals outside the field of Library and Information Science (LIS) for librarians to…

  10. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  11. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...

  12. A RCT of a Transdiagnostic Internet-Delivered Treatment for Three Anxiety Disorders: Examination of Support Roles and Disorder-Specific Outcomes

    PubMed Central

    Johnston, Luke; Titov, Nickolai; Andrews, Gavin; Spence, Jay; Dear, Blake F.

    2011-01-01

    Background Anxiety disorders share common vulnerabilities and symptoms. Disorder-specific treatment is efficacious, but few access evidence-based care. Administering transdiagnostic cognitive-behavioral therapy via the internet (iCBT) may increase access to evidence-based treatment, with a recent randomized controlled trial (RCT) providing preliminary support for this approach. This study extends those findings and aims to answer three questions: Is a transdiagnostic iCBT program for anxiety disorders efficacious and acceptable? Does it result in change for specific disorders? Can good clinical outcomes be obtained when guidance is provided via a Coach rather than a Clinician? Method RCT (N = 131) comparing three groups: Clinician-supported (CL) vs. Coach-supported (CO) vs. waitlist control (Control). Individuals met DSM-IV criteria for a principal diagnosis of generalized anxiety disorder (GAD), social phobia (SP) or panic disorder with or without agoraphobia (Pan/Ag). Treatment consisted of an 8-lesson/10 week iCBT program with weekly contact from a Clinician or Coach, and follow-up at 3-months post-treatment. Results Outcomes for the pooled treatment groups (CL+CO) were superior to the Control group on measures of anxiety, depression and disability, were associated with medium to large effect sizes (Cohen's d = .76 – 1.44) (response rate = 89–100%), and were maintained at follow-up. Significant reductions were found on disorder-specific outcomes for each of the target diagnoses, and were associated with large effect sizes. CO participants achieved similar outcomes to CL participants at post-treatment, yet had significantly lower symptom severity scores on general anxiety, panic-disorder, depression and disability at follow-up (d = .45 – .46). Seventy-four percent of CO and 76% of CL participants completed the program. Less than 70 minutes of Clinician or Coach time was required per participant during the program. Discussion This transdiagnostic iCBT course for anxiety appears to be efficacious, associated with significant change for three target disorders, and is efficacious when guided by either a Clinician or Coach. Trial Registration Australian New Zealand Clinical Trials Registry ACTRN12610000242022 PMID:22132216

  13. A randomized controlled trial to evaluate the impact of a geo-specific poster compared to a general poster for effecting change in perceived threat and intention to avoid drowning 'hotspots' among children of migrant workers: evidence from Ningbo, China.

    PubMed

    Zhu, Yinchao; Feng, Xiaoqi; Li, Hui; Huang, Yaqin; Chen, Jieping; Xu, Guozhang

    2017-05-30

    Drowning among children of migrant workers is a major, though neglected public health issue in China. A randomised controlled trial was used to examine the potential impact of viewing a preventive health poster with/without geo-located drowning events on perceptions of drowning risk among Chinese migrant children. A total of 752 children from three schools in Jiangbei district were selected by multi-stage sampling and randomly assigned to the intervention (n = 380) or control (n = 372). Multilevel models were used to analyse changes in responses to the following questions after viewing the assigned poster for 10 min: (1) "Do you believe that drowning is a serious health problem in Ningbo city?"; (2) "Do you believe that there are lots of drowning-risk waters around you?"; (3) "Do you believe that the likelihood of your accessing a drowning-risk water is great?"; and (4) "Would you intend to avoid accessing to those drowning-risk waters when being exposed?" At baseline there were no significant differences between the intervention and control groups in perceptions of drowning risk or covariates. Following the intervention, participants that viewed the geo-specific poster were more likely to respond more favourably to the first three questions (p < 0.001) than those who viewed the standard poster. However, there was no substantive difference between the geo-specific or standard poster in terms of changing intentions to avoid drowning hotspots (p = 0.214). Use of 'geo-located' information added value to the effectiveness of a drowning prevention poster for enhancing awareness of drowning hotspots among children of migrant workers. Chinese Clinical Trial Registry ChiCTR-IOR-16008979 (Retrospectively registered) (The date of trial registration: Aug 5, 2016, the date of enrolment of the first participant: Nov 10, 2015).

  14. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  15. A review of promoting access to medicines in China - problems and recommendations.

    PubMed

    Sun, Jing; Hu, Cecile Jia; Stuntz, Mark; Hogerzeil, Hans; Liu, Yuanli

    2018-02-20

    Despite recent reforms, distorting funding mechanisms and over-prescribing still maintain severe financial barriers to medicines access in China. Complicated and interrelated problems in the pharmaceutical sector require a common framework to be resolved as fragmented solutions do not work. We present a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and propose policy recommendations for promoting universal access to medicines in China. Drawing on multiple sources of information, including a review of published literatures and official national data, field investigations in six provinces and interviews with key opinion leaders, this paper presents a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and proposes policy recommendations for promoting universal access to medicines in China. Public expenditure on medicines has been strictly controlled since the national healthcare reforms of 2009. Yet total pharmaceutical expenditure (TPE) and total health expenditure growth rates continuously outpaced the growth of gross domestic product (GDP). With 2.4% of GDP, TPE now exceeds that of most high income countries. The distorted provider and consumer incentives in the Chinese health system have not fundamentally changed. Price-setting and reimbursement mechanisms do not promote cost-effective use of medicines. Inappropriate price controls and perverse financial incentives are the un-resolved root causes of preference of originator brands for some major diseases and shortages of low-cost and low-consumption medicines. In addition, access to expensive life-saving medicines is yet systematically addressed. The complicated and interdependent problems interact in a way that leads to significant system problems in China, which create dual challenges that both the developing country and the developed countries are facing. To further promote access to medicines, China should speed up the re-assessment of the quality and efficacy of domestically produced generic medicines; coordinate various reforms of price determination, insurance payments, and procurement policies; address medicine shortages through comprehensive policies and legislation; establish specific mechanisms to achieve sustainable equitable access to expensive essential medicines with health technology assessment as a tool to ensure that policy and priority setting are created in a coherent and evidence-based way.

  16. Cystic Echinococcosis in Spain: Current Situation and Relevance for Other Endemic Areas in Europe

    PubMed Central

    Rojo-Vazquez, Francisco A.; Pardo-Lledias, Javier; Francos-Von Hunefeld, Marcelo; Cordero-Sanchez, Miguel; Alamo-Sanz, Rufino; Hernandez-Gonzalez, Ana; Brunetti, Enrico; Siles-Lucas, Mar

    2011-01-01

    Cystic echinococcosis (CE) remains an important health problem in many regions of the world, both where no control measures have been implemented, and where control programs have been incompletely successful with ensuing re-emergence of the disease. In Spain, official data on CE show an increase in the proportion of intermediate hosts with CE during the last few years, and autochthonous pediatric patients have been reported, a sign of active local transmission of disease. A similar picture emerges from data reported to the European Food Safety Authority by other European countries. Nevertheless, several crucial aspects related to CE that would help better understand and control the disease have not been tackled appropriately, in particular the emergence of infection in specific geographical areas. In this respect, while some data are missing, other data are conflicting because they come from different databases. We review the current situation of CE in Spain compared with areas in which similar problems in the CE field exist, and offer recommendations on how to overcome those limitations. Specifically, we believe that the introduction of national registries for CE with online data entry, following the example set by the European Registry for Alveolar Echinococcosis, would help streamline data collection on CE by eliminating the need for evaluating and integrating data from multiple regions, by avoiding duplication of data from patients who access several different health facilities over time, and by providing much needed clinical and epidemiological data that are currently accessible only to clinicians. PMID:21283615

  17. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  18. Disintegrated care: the Achilles heel of international health policies in low and middle-income countries

    PubMed Central

    Unger, Jean-Pierre; De Paepe, Pierre; Ghilbert, Patricia; Soors, Werner; Green, Andrew

    2006-01-01

    Abstract Purpose To review the evidence basis of international aid and health policy. Context of case Current international aid policy is largely neoliberal in its promotion of commoditization and privatisation. We review this policy's responsibility for the lack of effectiveness in disease control and poor access to care in low and middle-income countries. Data sources National policies, international programmes and pilot experiments are examined in both scientific and grey literature. Conclusions and discussion We document how health care privatisation has led to the pool of patients being cut off from public disease control interventions—causing health care disintegration—which in turn resulted in substandard performance of disease control. Privatisation of health care also resulted in poor access. Our analysis consists of three steps. Pilot local contracting-out experiments are scrutinized; national health care records of Colombia and Chile, two countries having adopted contracting-out as a basis for health care delivery, are critically examined against Costa Rica; and specific failure mechanisms of the policy in low and middle-income countries are explored. We conclude by arguing that the negative impact of neoliberal health policy on disease control and health care in low and middle-income countries justifies an alternative aid policy to improve both disease control and health care. PMID:17006553

  19. A hierarchical distributed control model for coordinating intelligent systems

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.

    1991-01-01

    A hierarchical distributed control (HDC) model for coordinating cooperative problem-solving among intelligent systems is described. The model was implemented using SOCIAL, an innovative object-oriented tool for integrating heterogeneous, distributed software systems. SOCIAL embeds applications in 'wrapper' objects called Agents, which supply predefined capabilities for distributed communication, control, data specification, and translation. The HDC model is realized in SOCIAL as a 'Manager'Agent that coordinates interactions among application Agents. The HDC Manager: indexes the capabilities of application Agents; routes request messages to suitable server Agents; and stores results in a commonly accessible 'Bulletin-Board'. This centralized control model is illustrated in a fault diagnosis application for launch operations support of the Space Shuttle fleet at NASA, Kennedy Space Center.

  20. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  1. Experiences of Trans Women and Two-Spirit Persons Accessing Women-Specific Health and Housing Services in a Downtown Neighborhood of Vancouver, Canada.

    PubMed

    Lyons, Tara; Krüsi, Andrea; Pierre, Leslie; Smith, Adrienne; Small, Will; Shannon, Kate

    2016-10-01

    Little is known about trans womens' experiences accessing gender-segregated health and housing services, particularly services for marginalized individuals living in poverty. As such, we conducted a qualitative investigation into experiences of accessing women-specific health and housing services among trans women and two-spirit persons in a downtown neighborhood of Vancouver, Canada. Between June 2012 and May 2013 interviews were conducted with 32 trans women and two-spirit individuals who had accessed women-specific health and/or housing services. Participants were recruited from four open prospective cohorts of sex workers and individuals who use drugs. Interview data were analyzed using a participatory analysis approach with two participants who were hired as research assistants. Participants were generally able to access women-specific services in the neighborhood. However, there were reports of discrimination related to gender identity, discrimination based on gender expression (e.g., requirement of a feminine gender expression), and lack of staff intervention in harassment from other service users. Trans women and two-spirit persons in our study relied upon services for their health and safety and, therefore, exclusion from women-specific services had potentially severe adverse consequences such as homelessness and sexual violence. Recommendations to improve accessibility, including policy development and procedural recommendations, are put forth.

  2. Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Steinebach, Martin; Wohlmacher, Petra; Ackermann, Ralf

    2002-12-01

    Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Research has shown that data hiding techniques can be applied successfully to other application areas like manipulations recognition. In this paper, we show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific services, "Try&Buy" mechanisms to general means for long-term customer relationships. The tremendous recent efforts to develop and deploy ubiquitous mobile communication possibilities are changing the demands but also possibilities for establishing new business and commerce relationships. Especially we motivate annotation watermarks and aspects of M-Commerce to show important scenarios for access control. Based on a description of the challenges of the application domain and our latest work we discuss, which methods can be used for establishing services in a fast convenient and secure way for conditional access services based on digital watermarking combined with cryptographic techniques. We introduce an example scenario for digital audio and an overview of steps in order to establish these concepts practically.

  3. Leveraging Open Standard Interfaces in Accessing and Processing NASA Data Model Outputs

    NASA Astrophysics Data System (ADS)

    Falke, S. R.; Alameh, N. S.; Hoijarvi, K.; de La Beaujardiere, J.; Bambacus, M. J.

    2006-12-01

    An objective of NASA's Earth Science Division is to develop advanced information technologies for processing, archiving, accessing, visualizing, and communicating Earth Science data. To this end, NASA and other federal agencies have collaborated with the Open Geospatial Consortium (OGC) to research, develop, and test interoperability specifications within projects and testbeds benefiting the government, industry, and the public. This paper summarizes the results of a recent effort under the auspices of the OGC Web Services testbed phase 4 (OWS-4) to explore standardization approaches for accessing and processing the outputs of NASA models of physical phenomena. Within the OWS-4 context, experiments were designed to leverage the emerging OGC Web Processing Service (WPS) and Web Coverage Service (WCS) specifications to access, filter and manipulate the outputs of the NASA Goddard Earth Observing System (GEOS) and Goddard Chemistry Aerosol Radiation and Transport (GOCART) forecast models. In OWS-4, the intent is to provide the users with more control over the subsets of data that they can extract from the model results as well as over the final portrayal of that data. To meet that goal, experiments have been designed to test the suitability of use of OGC's Web Processing Service (WPS) and Web Coverage Service (WCS) for filtering, processing and portraying the model results (including slices by height or by time), and to identify any enhancements to the specs to meet the desired objectives. This paper summarizes the findings of the experiments highlighting the value of the Web Processing Service in providing standard interfaces for accessing and manipulating model data within spatial and temporal frameworks. The paper also points out the key shortcomings of the WPS especially in terms in comparison with a SOAP/WSDL approach towards solving the same problem.

  4. Media independent interface. Interface control document

    NASA Technical Reports Server (NTRS)

    1987-01-01

    A Media Independent Interface (MII) is specified, using current standards in the industry. The MII is described in hierarchical fashion. At the base are IEEE/International Standards Organization (ISO) documents (standards) which describe the functionality of the software modules or layers and their interconnection. These documents describe primitives which are to transcent the MII. The intent of the MII is to provide a universal interface to one or more Media Access Contols (MACs) for the Logical Link Controller and Station Manager. This interface includes both a standardized electrical and mechanical interface and a standardized functional specification which defines the services expected from the MAC.

  5. Ada Integrated Environment II Computer Program Development Specification. Part 1.

    DTIC Science & Technology

    1981-12-01

    34Programmable" access 3.2.5.5 controls ; provision for privileged 3.2.5.6 user. 3.3.1 3.3.3 4.1.2.11 3.7.1.2 KDBS - 3.2.5.7 Capability to archive data base...CM -1 1 PHASE I SOW REQUIREMENTS A - SPEC B5 -SPEC 4.111. 3.7.2 1Compiler -331 aMAPSE shall include a mechanism for 1 Linker -3.2.5 aautomatic stub...19 3.2.5.5 Process Administrator The Process Administrator controls the executions of logically concurrent MAPSE processes. The KFW Interface Package

  6. Semantically Enriched Data Access Policies in eHealth.

    PubMed

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  7. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  8. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  9. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  10. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  11. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  13. Mapping of a Novel Race Specific Resistance Gene to Phytophthora Root Rot of Pepper (Capsicum annuum) Using Bulked Segregant Analysis Combined with Specific Length Amplified Fragment Sequencing Strategy.

    PubMed

    Xu, Xiaomei; Chao, Juan; Cheng, Xueli; Wang, Rui; Sun, Baojuan; Wang, Hengming; Luo, Shaobo; Xu, Xiaowan; Wu, Tingquan; Li, Ying

    2016-01-01

    Phytophthora root rot caused by Phytophthora capsici (P. capsici) is a serious limitation to pepper production in Southern China, with high temperature and humidity. Mapping PRR resistance genes can provide linked DNA markers for breeding PRR resistant varieties by molecular marker-assisted selection (MAS). Two BC1 populations and an F2 population derived from a cross between P. capsici-resistant accession, Criollo de Morelos 334 (CM334) and P. capsici-susceptible accession, New Mexico Capsicum Accession 10399 (NMCA10399) were used to investigate the genetic characteristics of PRR resistance. PRR resistance to isolate Byl4 (race 3) was controlled by a single dominant gene, PhR10, that was mapped to an interval of 16.39Mb at the end of the long arm of chromosome 10. Integration of bulked segregant analysis (BSA) and Specific Length Amplified Fragment sequencing (SLAF-seq) provided an efficient genetic mapping strategy. Ten polymorphic Simple Sequence Repeat (SSR) markers were found within this region and used to screen the genotypes of 636 BC1 plants, delimiting PhR10 to a 2.57 Mb interval between markers P52-11-21 (1.5 cM away) and P52-11-41 (1.1 cM). A total of 163 genes were annotated within this region and 31 were predicted to be associated with disease resistance. PhR10 is a novel race specific gene for PRR, and this paper describes linked SSR markers suitable for marker-assisted selection of PRR resistant varieties, also laying a foundation for cloning the resistance gene.

  14. Evaluation of modified work zone traffic control devices at business accesses

    DOT National Transportation Integrated Search

    2001-01-01

    Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...

  15. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  16. Standardizing Interfaces for External Access to Data and Processing for the NASA Ozone Product Evaluation and Test Element (PEATE)

    NASA Technical Reports Server (NTRS)

    Tilmes, Curt A.; Fleig, Albert J.

    2008-01-01

    NASA's traditional science data processing systems have focused on specific missions, and providing data access, processing and services to the funded science teams of those specific missions. Recently NASA has been modifying this stance, changing the focus from Missions to Measurements. Where a specific Mission has a discrete beginning and end, the Measurement considers long term data continuity across multiple missions. Total Column Ozone, a critical measurement of atmospheric composition, has been monitored for'decades on a series of Total Ozone Mapping Spectrometer (TOMS) instruments. Some important European missions also monitor ozone, including the Global Ozone Monitoring Experiment (GOME) and SCIAMACHY. With the U.S.IEuropean cooperative launch of the Dutch Ozone Monitoring Instrument (OMI) on NASA Aura satellite, and the GOME-2 instrumental on MetOp, the ozone monitoring record has been further extended. In conjunction with the U.S. Department of Defense (DoD) and the National Oceanic and Atmospheric Administration (NOAA), NASA is now preparing to evaluate data and algorithms for the next generation Ozone Mapping and Profiler Suite (OMPS) which will launch on the National Polar-orbiting Operational Environmental Satellite System (NPOESS) Preparatory Project (NPP) in 2010. NASA is constructing the Science Data Segment (SDS) which is comprised of several elements to evaluate the various NPP data products and algorithms. The NPP SDS Ozone Product Evaluation and Test Element (PEATE) will build on the heritage of the TOMS and OM1 mission based processing systems. The overall measurement based system that will encompass these efforts is the Atmospheric Composition Processing System (ACPS). We have extended the system to include access to publically available data sets from other instruments where feasible, including non-NASA missions as appropriate. The heritage system was largely monolithic providing a very controlled processing flow from data.ingest of satellite data to the ultimate archive of specific operational data products. The ACPS allows more open access with standard protocols including HTTP, SOAPIXML, RSS and various REST incarnations. External entities can be granted access to various modules within the system, including an extended data archive, metadata searching, production planning and processing. Data access is provided with very fine grained access control. It is possible to easily designate certain datasets as being available to the public, or restricted to groups of researchers, or limited strictly to the originator. This can be used, for example, to release one's best validated data to the public, but restrict the "new version" of data processed with a new, unproven algorithm until it is ready. Similarly, the system can provide access to algorithms, both as modifiable source code (where possible) and fully integrated executable Algorithm Plugin Packages (APPs). This enables researchers to download publically released versions of the processing algorithms and easily reproduce the processing remotely, while interacting with the ACPS. The algorithms can be modified allowing better experimentation and rapid improvement. The modified algorithms can be easily integrated back into the production system for large scale bulk processing to evaluate improvements. The system includes complete provenance tracking of algorithms, data and the entire processing environment. The origin of any data or algorithms is recorded and the entire history of the processing chains are stored such that a researcher can understand the entire data flow. Provenance is captured in a form suitable for the system to guarantee scientific reproducability of any data product it distributes even in cases where the physical data products themselves have been deleted due to space constraints. We are currently working on Semantic Web ontologies for representing the various provenance information. A new web site focusing on consolidating informaon about the measurement, processing system, and data access has been established to encourage interaction with the overall scientific community. We will describe the system, its data processing capabilities, and the methods the community can use to interact with the standard interfaces of the system.

  17. Episodic, generalized, and semantic memory tests: switching and strength effects.

    PubMed

    Humphreys, Michael S; Murray, Krista L

    2011-09-01

    We continue the process of investigating the probabilistic paired associate paradigm in an effort to understand the memory access control processes involved and to determine whether the memory structure produced is in transition between episodic and semantic memory. In this paradigm two targets are probabilistically paired with a cue across a large number of short lists. Participants can recall the target paired with the cue in the most recent list (list specific test), produce the first of the two targets that have been paired with that cue to come to mind (generalised test), and produce a free association response (semantic test). Switching between a generalised test and a list specific test did not produce a switching cost indicating a general similarity in the control processes involved. In addition, there was evidence for a dissociation between two different strength manipulations (amount of study time and number of cue-target pairings) such that number of pairings influenced the list specific, generalised and the semantic test but amount of study time only influenced the list specific and generalised test. © 2011 Canadian Psychological Association

  18. Grid Computing and Collaboration Technology in Support of Fusion Energy Sciences

    NASA Astrophysics Data System (ADS)

    Schissel, D. P.

    2004-11-01

    The SciDAC Initiative is creating a computational grid designed to advance scientific understanding in fusion research by facilitating collaborations, enabling more effective integration of experiments, theory and modeling, and allowing more efficient use of experimental facilities. The philosophy is that data, codes, analysis routines, visualization tools, and communication tools should be thought of as easy to use network available services. Access to services is stressed rather than portability. Services share the same basic security infrastructure so that stakeholders can control their own resources and helps ensure fair use of resources. The collaborative control room is being developed using the open-source Access Grid software that enables secure group-to-group collaboration with capabilities beyond teleconferencing including application sharing and control. The ability to effectively integrate off-site scientists into a dynamic control room will be critical to the success of future international projects like ITER. Grid computing, the secure integration of computer systems over high-speed networks to provide on-demand access to data analysis capabilities and related functions, is being deployed as an alternative to traditional resource sharing among institutions. The first grid computational service deployed was the transport code TRANSP and included tools for run preparation, submission, monitoring and management. This approach saves user sites from the laborious effort of maintaining a complex code while at the same time reducing the burden on developers by avoiding the support of a large number of heterogeneous installations. This tutorial will present the philosophy behind an advanced collaborative environment, give specific examples, and discuss its usage beyond FES.

  19. Guided self-help cognitive behavioral intervention for VoicEs (GiVE): study protocol for a pilot randomized controlled trial.

    PubMed

    Hazell, Cassie M; Hayward, Mark; Cavanagh, Kate; Jones, Anna-Marie; Strauss, Clara

    2016-07-26

    Cognitive behavior therapy for psychosis (CBTp) is an effective intervention for people who hear distressing voices (auditory hallucinations). However, there continues to be a problem of poor access to CBTp. Constraints on health care funding require this problem to be addressed without a substantial increase in funding. One solution is to develop guided self-help forms of CBTp to improve access, and a symptom-specific focus on, for example, distressing voices (auditory verbal hallucinations) has the potential to enhance effectiveness. We term this cognitive behavior therapy for distressing voices (CBTv). This trial is an external pilot randomized controlled trial comparing the effects of 12-week guided self-help CBTv (with eight therapist support sessions) with a wait list control condition. Informed consent will be obtained from each participant. Half of the 30 participants will be randomized to receive guided self-help CBTv immediately; the remaining half will receive the intervention after a 12-week delay. All participants will continue with their usual treatment throughout the study. Outcomes will be assessed using questionnaires completed at baseline and 12 weeks postrandomization. Interviews will be offered to all those who receive therapy immediately to explore their experiences with the intervention. The outcomes of this trial, both quantitative and qualitative, will inform the design of a definitive randomized controlled trial of guided self-help CBTv. If this intervention is effective, it could help to increase access to CBT for those who hear distressing voices. ISRCTN registration number  ISRCTN77762753 . Registered on 23 July 2015.

  20. Reviewing independent access to HIV testing, counselling and treatment for adolescents in HIV-specific laws in sub-Saharan Africa: implications for the HIV response

    PubMed Central

    Eba, Patrick M.; Lim, HyeYoung

    2017-01-01

    Abstract Introduction: AIDS is a leading cause of death among adolescents in sub-Saharan Africa. Yet, legal, policy and social barriers continue to restrict their access to HIV services. In recent years, access to independent HIV testing and treatment for adolescents has gained increased attention. The 2013 WHO Guidance on HIV testing and counselling and care for adolescents living with HIV (WHO Guidance) calls for reviewing legal and regulatory frameworks to facilitate adolescents’ access to comprehensive HIV services. As of 31 March 2017, some 28 countries in sub-Saharan Africa have adopted HIV-specific legislation. But there is limited understanding of the provisions of these laws on access to HIV services for adolescents and their implication on efforts to scale up HIV prevention, testing, treatment and care among this population. Methods: A desk review of 28 HIV-specific laws in sub-Saharan Africa complemented with the review of HIV testing policies in four countries using human rights norms and key public health recommendations from the 2013 WHO Guidance. These recommendations call on countries to (i) lower the age of consent to HIV testing and counselling and allow mature adolescents who have not reached the age of consent to independently access HIV testing, (ii) ensure access to HIV counselling for adolescents, (iii) protect the confidentiality of adolescents living with HIV and (iv) facilitate access to HIV treatment for adolescents living with HIV. Results: Most HIV-specific laws fail to take into account human rights principles and public health recommendations for facilitating adolescents’ access to HIV services. None of the countries with HIV-specific laws has adopted all four recommendations for access to HIV services for adolescents. Discrepancies exist between HIV laws and national policy documents. Inadequate and conflicting provisions in HIV laws are likely to hinder access to HIV testing, counselling and treatment for adolescents. Conclusions: Efforts to end legal barriers to access to HIV services for adolescents in sub-Saharan Africa should address HIV-specific laws. Restrictive provisions in these laws should be reformed, and their protective norms effectively implemented including by translating them into national policies and ensuring sensitization and training of healthcare workers and communities. This study reiterates the need for action in all countries across Africa and beyond to review their laws and policies to create an enabling environment to accelerate access to HIV prevention, testing and treatment services for adolescents. PMID:28799324

  1. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility.

    PubMed

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I; Hantschel, Oliver

    2014-11-17

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  2. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  3. Los Coches Creek, San Diego County, California Detailed Project Report for Flood Control and Environmental Assessment. Main Report and Environmental Appendix.

    DTIC Science & Technology

    1984-08-01

    as California buckwheat (Eriogonum fasciculatum), elderberry ( Sambucus p.), bror.r bacoharis (Baccharis sarathroides), and coast live oak (Quercus...emergent wetland and riparian habitat, essentially all of the wetland and riparian habitat in the project area (Table EA-1). Access requirements for...reach a level of significance. The construction specifications would require the construction contractor to avoid polluting the creek with fuels, oils

  4. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  5. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  6. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  7. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  8. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  9. Infection control in hemodialysis units: a quick access to essential elements.

    PubMed

    Karkar, Ayman; Bouhaha, Betty Mandin; Dammang, Mienalyn Lim

    2014-05-01

    Infection is the most common cause of hospitalization and the second most common cause of mortality among hemodialysis (HD) patients, after cardiovascular disease. HD patients as well as the dialysis staff are vulnerable to contracting health-care-associated infections (HAIs) due to frequent and prolonged exposure to many possible contaminants in the dialysis environment. The extracorporeal nature of the therapy, the associated common environmental conditions and the immune compromised status of HD patients are major predisposing factors. The evident increased potential for transmission of infections in the HD settings led to the creation and implementation of specific and stricter infection prevention and control measures in addition to the usual standard precautions. Different international organizations have generated guidelines and recommendations on infection prevention and control for implementation in the HD settings. These include the Centers for Disease Control and Prevention (CDC), the Association of Professionals in Infection Control (APIC), the Kidney Disease Outcomes Quality Initiative (K/DOQI), the European Best Practice Guidelines/European Renal Best Practice (EBPG/ERBP) and the Kidney Disease: Improving Global Outcomes (KDIGO). However, these guidelines are extensive and sometimes vary among different guideline-producing bodies. Our aim in this review is to facilitate the access, increase the awareness and encourage implementation among dialysis providers by reviewing, extracting and comparing the essential elements of guidelines and recommendations on infection prevention and control in HD units.

  10. Navigated MRI-guided liver biopsies in a closed-bore scanner: experience in 52 patients.

    PubMed

    Moche, Michael; Heinig, Susann; Garnov, Nikita; Fuchs, Jochen; Petersen, Tim-Ole; Seider, Daniel; Brandmaier, Philipp; Kahn, Thomas; Busse, Harald

    2016-08-01

    To evaluate clinical effectiveness and diagnostic efficiency of a navigation device for MR-guided biopsies of focal liver lesions in a closed-bore scanner. In 52 patients, 55 biopsies were performed. An add-on MR navigation system with optical instrument tracking was used for image guidance and biopsy device insertion outside the bore. Fast control imaging allowed visualization of the true needle position at any time. The biopsy workflow and procedure duration were recorded. Histological analysis and clinical course/outcome were used to calculate sensitivity, specificity and diagnostic accuracy. Fifty-four of 55 liver biopsies were performed successfully with the system. No major and four minor complications occurred. Mean tumour size was 23 ± 14 mm and the skin-to-target length ranged from 22 to 177 mm. In 39 cases, access path was double oblique. Sensitivity, specificity and diagnostic accuracy were 88 %, 100 % and 92 %, respectively. The mean procedure time was 51 ± 12 min, whereas the puncture itself lasted 16 ± 6 min. On average, four control scans were taken. Using this navigation device, biopsies of poorly visible and difficult accessible liver lesions could be performed safely and reliably in a closed-bore MRI scanner. The system can be easily implemented in clinical routine workflow. • Targeted liver biopsies could be reliably performed in a closed-bore MRI. • The navigation system allows for image guidance outside of the scanner bore. • Assisted MRI-guided biopsies are helpful for focal lesions with a difficult access. • Successful integration of the method in clinical workflow was shown. • Subsequent system installation in an existing MRI environment is feasible.

  11. Practical considerations to guide development of access controls and decision support for genetic information in electronic medical records.

    PubMed

    Darcy, Diana C; Lewis, Eleanor T; Ormond, Kelly E; Clark, David J; Trafton, Jodie A

    2011-11-02

    Genetic testing is increasingly used as a tool throughout the health care system. In 2011 the number of clinically available genetic tests is approaching 2,000, and wide variation exists between these tests in their sensitivity, specificity, and clinical implications, as well as the potential for discrimination based on the results. As health care systems increasingly implement electronic medical record systems (EMRs) they must carefully consider how to use information from this wide spectrum of genetic tests, with whom to share information, and how to provide decision support for clinicians to properly interpret the information. Although some characteristics of genetic tests overlap with other medical test results, there are reasons to make genetic test results widely available to health care providers and counterbalancing reasons to restrict access to these test results to honor patient preferences, and avoid distracting or confusing clinicians with irrelevant but complex information. Electronic medical records can facilitate and provide reasonable restrictions on access to genetic test results and deliver education and decision support tools to guide appropriate interpretation and use. This paper will serve to review some of the key characteristics of genetic tests as they relate to design of access control and decision support of genetic test information in the EMR, emphasizing the clear need for health information technology (HIT) to be part of optimal implementation of genetic medicine, and the importance of understanding key characteristics of genetic tests when designing HIT applications.

  12. Engineering Design of ITER Prototype Fast Plant System Controller

    NASA Astrophysics Data System (ADS)

    Goncalves, B.; Sousa, J.; Carvalho, B.; Rodrigues, A. P.; Correia, M.; Batista, A.; Vega, J.; Ruiz, M.; Lopez, J. M.; Rojo, R. Castro; Wallander, A.; Utzel, N.; Neto, A.; Alves, D.; Valcarcel, D.

    2011-08-01

    The ITER control, data access and communication (CODAC) design team identified the need for two types of plant systems. A slow control plant system is based on industrial automation technology with maximum sampling rates below 100 Hz, and a fast control plant system is based on embedded technology with higher sampling rates and more stringent real-time requirements than that required for slow controllers. The latter is applicable to diagnostics and plant systems in closed-control loops whose cycle times are below 1 ms. Fast controllers will be dedicated industrial controllers with the ability to supervise other fast and/or slow controllers, interface to actuators and sensors and, if necessary, high performance networks. Two prototypes of a fast plant system controller specialized for data acquisition and constrained by ITER technological choices are being built using two different form factors. This prototyping activity contributes to the Plant Control Design Handbook effort of standardization, specifically regarding fast controller characteristics. Envisaging a general purpose fast controller design, diagnostic use cases with specific requirements were analyzed and will be presented along with the interface with CODAC and sensors. The requirements and constraints that real-time plasma control imposes on the design were also taken into consideration. Functional specifications and technology neutral architecture, together with its implications on the engineering design, were considered. The detailed engineering design compliant with ITER standards was performed and will be discussed in detail. Emphasis will be given to the integration of the controller in the standard CODAC environment. Requirements for the EPICS IOC providing the interface to the outside world, the prototype decisions on form factor, real-time operating system, and high-performance networks will also be discussed, as well as the requirements for data streaming to CODAC for visualization and archiving.

  13. A Python library for FAIRer access and deposition to the Metabolomics Workbench Data Repository.

    PubMed

    Smelter, Andrey; Moseley, Hunter N B

    2018-01-01

    The Metabolomics Workbench Data Repository is a public repository of mass spectrometry and nuclear magnetic resonance data and metadata derived from a wide variety of metabolomics studies. The data and metadata for each study is deposited, stored, and accessed via files in the domain-specific 'mwTab' flat file format. In order to improve the accessibility, reusability, and interoperability of the data and metadata stored in 'mwTab' formatted files, we implemented a Python library and package. This Python package, named 'mwtab', is a parser for the domain-specific 'mwTab' flat file format, which provides facilities for reading, accessing, and writing 'mwTab' formatted files. Furthermore, the package provides facilities to validate both the format and required metadata elements of a given 'mwTab' formatted file. In order to develop the 'mwtab' package we used the official 'mwTab' format specification. We used Git version control along with Python unit-testing framework as well as continuous integration service to run those tests on multiple versions of Python. Package documentation was developed using sphinx documentation generator. The 'mwtab' package provides both Python programmatic library interfaces and command-line interfaces for reading, writing, and validating 'mwTab' formatted files. Data and associated metadata are stored within Python dictionary- and list-based data structures, enabling straightforward, 'pythonic' access and manipulation of data and metadata. Also, the package provides facilities to convert 'mwTab' files into a JSON formatted equivalent, enabling easy reusability of the data by all modern programming languages that implement JSON parsers. The 'mwtab' package implements its metadata validation functionality based on a pre-defined JSON schema that can be easily specialized for specific types of metabolomics studies. The library also provides a command-line interface for interconversion between 'mwTab' and JSONized formats in raw text and a variety of compressed binary file formats. The 'mwtab' package is an easy-to-use Python package that provides FAIRer utilization of the Metabolomics Workbench Data Repository. The source code is freely available on GitHub and via the Python Package Index. Documentation includes a 'User Guide', 'Tutorial', and 'API Reference'. The GitHub repository also provides 'mwtab' package unit-tests via a continuous integration service.

  14. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  15. 77 FR 551 - Privacy Act of 1974; Amended System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-05

    ... Act system of records entitled ``Treasury/BEP .027--Access Control and Alarm Monitoring Systems (ACAMS... .027--Access Control and Alarm Monitoring Systems (ACAMS).'' BEP proposes to amend that system of... records entitled ``BEP .027--Access Control and Alarm Monitoring Systems (ACAMS),'' as follows: Treasury...

  16. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  17. Expression of Resistance in Amaranthus spp. (Caryophyllales: Amaranthaceae): Effects of Selected Accessions on the Behaviour and Biology of the Amaranth Leaf-Webber, Spoladea recurvalis (Lepidoptera: Crambidae).

    PubMed

    Othim, Stephen T O; Ramasamy, Srinivasan; Kahuthia-Gathu, Ruth; Dubois, Thomas; Ekesi, Sunday; Fiaboe, Komi K M

    2018-06-08

    Spoladea recurvalis F. is a major pest moth of amaranth ( Amaranthus spp.) flowers worldwide, with a potential of causing complete foliage loss under severe outbreaks. Chemical insecticides are uneconomical for resource-poor farmers and pose health and environmental risks. Host plant resistance (HPR) to insects is an effective, economical and environmentally friendly alternative that is poorly understood and largely unexploited among traditional leafy vegetables. A total of 35 amaranth accessions were evaluated for the expression of their antixenotic and antibiotic traits against S. recurvalis , focusing on their effects on the biology of the pest in comparison with a susceptible accession. The accession VI036227 was found to be highly resistant against the pest, exhibiting exemplary antibiosis by causing 100% larval mortality within the first 36 h, despite not being deterrent for oviposition. The accessions VI048076, VI056563 and VI047555-B demonstrated moderate resistance against the pest for specific parameters including low oviposition, moderate early stage larval mortality and reduced adult longevity. Total mortality and weight gain in these three accessions were, however, not significantly different from the susceptible control. Higher numbers of eggs were laid in no-choice compared to choice situations. The implications of these findings in the management of S. recurvalis on amaranths are discussed.

  18. The Fermilab Accelerator control system

    NASA Astrophysics Data System (ADS)

    Bogert, Dixon

    1986-06-01

    With the advent of the Tevatron, considerable upgrades have been made to the controls of all the Fermilab Accelerators. The current system is based on making as large an amount of data as possible available to many operators or end-users. Specifically there are about 100 000 separate readings, settings, and status and control registers in the various machines, all of which can be accessed by seventeen consoles, some in the Main Control Room and others distributed throughout the complex. A "Host" computer network of approximately eighteen PDP-11/34's, seven PDP-11/44's, and three VAX-11/785's supports a distributed data acquisition system including Lockheed MAC-16's left from the original Main Ring and Booster instrumentation and upwards of 1000 Z80, Z8002, and M68000 microprocessors in dozens of configurations. Interaction of the various parts of the system is via a central data base stored on the disk of one of the VAXes. The primary computer-hardware communication is via CAMAC for the new Tevatron and Antiproton Source; certain subsystems, among them vacuum, refrigeration, and quench protection, reside in the distributed microprocessors and communicate via GAS, an in-house protocol. An important hardware feature is an accurate clock system making a large number of encoded "events" in the accelerator supercycle available for both hardware modules and computers. System software features include the ability to save the current state of the machine or any subsystem and later restore it or compare it with the state at another time, a general logging facility to keep track of specific variables over long periods of time, detection of "exception conditions" and the posting of alarms, and a central filesharing capability in which files on VAX disks are available for access by any of the "Host" processors.

  19. Simulation of Paramecium Chemotaxis Exposed to Calcium Gradients.

    PubMed

    Sarvestani, Ali N; Shamloo, Amir; Ahmadian, Mohammad Taghi

    2016-06-01

    Paramecium or other ciliates have the potential to be utilized for minimally invasive surgery systems, making internal body organs accessible. Paramecium shows interesting responses to changes in the concentration of specific ions such as K(+), Mg(2+), and Ca(2+) in the ambient fluid. Some specific responses are observed as, changes in beat pattern of cilia and swimming toward or apart from the ion source. Therefore developing a model for chemotactic motility of small organisms is necessary in order to control the directional movements of these microorganisms before testing them. In this article, we have developed a numerical model, investigating the effects of Ca(2+) on swimming trajectory of Paramecium. Results for Ca(2+)-dependent chemotactic motility show that calcium gradients are efficient actuators for controlling the Paramecium swimming trajectory. After applying a very low Ca(2+) gradient, a directional chemotaxis of swimming Paramecium is observable in this model. As a result, chemotaxis is shown to be an efficient method for controlling the propulsion of these small organisms.

  20. Experiences of Trans Women and Two-Spirit Persons Accessing Women-Specific Health and Housing Services in a Downtown Neighborhood of Vancouver, Canada

    PubMed Central

    Krüsi, Andrea; Pierre, Leslie; Smith, Adrienne; Small, Will; Shannon, Kate

    2016-01-01

    Abstract Purpose: Little is known about trans womens' experiences accessing gender-segregated health and housing services, particularly services for marginalized individuals living in poverty. As such, we conducted a qualitative investigation into experiences of accessing women-specific health and housing services among trans women and two-spirit persons in a downtown neighborhood of Vancouver, Canada. Methods: Between June 2012 and May 2013 interviews were conducted with 32 trans women and two-spirit individuals who had accessed women-specific health and/or housing services. Participants were recruited from four open prospective cohorts of sex workers and individuals who use drugs. Interview data were analyzed using a participatory analysis approach with two participants who were hired as research assistants. Results: Participants were generally able to access women-specific services in the neighborhood. However, there were reports of discrimination related to gender identity, discrimination based on gender expression (e.g., requirement of a feminine gender expression), and lack of staff intervention in harassment from other service users. Conclusion: Trans women and two-spirit persons in our study relied upon services for their health and safety and, therefore, exclusion from women-specific services had potentially severe adverse consequences such as homelessness and sexual violence. Recommendations to improve accessibility, including policy development and procedural recommendations, are put forth. PMID:27575593

  1. Architecture engineering of supercapacitor electrode materials

    NASA Astrophysics Data System (ADS)

    Chen, Kunfeng; Li, Gong; Xue, Dongfeng

    2016-02-01

    The biggest challenge for today’s supercapacitor systems readily possessing high power density is their low energy density. Their electrode materials with controllable structure, specific surface area, electronic conductivity, and oxidation state, have long been highlighted. Architecture engineering of functional electrode materials toward powerful supercapacitor systems is becoming a big fashion in the community. The construction of ion-accessible tunnel structures can microscopically increase the specific capacitance and materials utilization; stiff 3D structures with high specific surface area can macroscopically assure high specific capacitance. Many exciting findings in electrode materials mainly focus on the construction of ice-folded graphene paper, in situ functionalized graphene, in situ crystallizing colloidal ionic particles and polymorphic metal oxides. This feature paper highlights some recent architecture engineering strategies toward high-energy supercapacitor electrode systems, including electric double-layer capacitance (EDLC) and pseudocapacitance.

  2. 75 FR 75705 - Notice of Availability of the Models for Plant-Specific Adoption of Technical Specifications Task...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-06

    ..., Rockville, Maryland. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly available documents created or received at the NRC are available electronically at the NRC's Electronic Reading Room... Specifications End States (BAW- 2441).'' TSTF-431, Revision 3, is available in the Agencywide Documents Access...

  3. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  4. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  5. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  6. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  7. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  8. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  9. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  10. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  11. Effective simulations of gas diffusion through kinetically accessible tunnels in multisubunit proteins: O2 pathways and escape routes in T-state deoxyhemoglobin.

    PubMed

    Shadrina, Maria S; English, Ann M; Peslherbe, Gilles H

    2012-07-11

    The diffusion of small gases to special binding sites within polypeptide matrices pivotally defines the biochemical specificity and reactivity of proteins. We investigate here explicit O(2) diffusion in adult human hemoglobin (HbA) as a case study employing the recently developed temperature-controlled locally enhanced sampling (TLES) method and vary the parameters to greatly increase the simulation efficiency. The method is carefully validated against standard molecular dynamics (MD) simulations and available experimental structural and kinetic data on ligand diffusion in T-state deoxyHbA. The methodology provides a viable alternative approach to traditional MD simulations and/or potential of mean force calculations for: (i) characterizing kinetically accessible diffusion tunnels and escape routes for light ligands in porous proteins; (ii) very large systems when realistic simulations require the inclusion of multiple subunits of a protein; and (iii) proteins that access short-lived conformations relative to the simulation time. In the case of T-state deoxyHbA, we find distinct ligand diffusion tunnels consistent with the experimentally observed disparate Xe cavities in the α- and β-subunits. We identify two distal barriers including the distal histidine (E7) that control access to the heme. The multiple escape routes uncovered by our simulations call for a review of the current popular hypothesis on ligand escape from hemoglobin. Larger deviations from the crystal structure during simulated diffusion in isolated α- and β-subunits highlight the dampening effects of subunit interactions and the importance of including all subunits of multisubunit proteins to map realistic kinetically accessible diffusion tunnels and escape routes.

  12. Dynamics of 1α,25-dihydroxyvitamin D3-dependent chromatin accessibility of early vitamin D receptor target genes.

    PubMed

    Seuter, Sabine; Pehkonen, Petri; Heikkinen, Sami; Carlberg, Carsten

    2013-12-01

    The signaling cascade of the transcription factor vitamin D receptor (VDR) is triggered by its specific ligand 1α,25-dihydroxyvitamin D3 (1α,25(OH)2D3). In this study we demonstrate that in THP-1 human monocytic leukemia cells 87.4% of the 1034 most prominent genome-wide VDR binding sites co-localize with loci of open chromatin. At 165 of them 1α,25(OH)2D3 strongly increases chromatin accessibility and has at further 217 sites weaker effects. Interestingly, VDR binding sites in 1α,25(OH)2D3-responsive chromatin regions are far more often composed of direct repeats with 3 intervening nucleotides (DR3s) than those in ligand insensitive regions. DR3-containing VDR sites are enriched in the neighborhood of genes that are involved in controling cellular growth, while non-DR3 VDR binding is often found close to genes related to immunity. At the example of six early VDR target genes we show that the slope of their 1α,25(OH)2D3-induced transcription correlates with the basal chromatin accessibility of their major VDR binding regions. However, the chromatin loci controlling these genes are indistinguishable in their VDR association kinetics. Taken together, ligand responsive chromatin loci represent dynamically regulated contact points of VDR with the genome, from where it controls early 1α,25(OH)2D3 target genes. © 2013.

  13. Ssrp1a controls organogenesis by promoting cell cycle progression and RNA synthesis.

    PubMed

    Koltowska, Katarzyna; Apitz, Holger; Stamataki, Despina; Hirst, Elizabeth M A; Verkade, Heather; Salecker, Iris; Ober, Elke A

    2013-05-01

    Tightly controlled DNA replication and RNA transcription are essential for differentiation and tissue growth in multicellular organisms. Histone chaperones, including the FACT (facilitates chromatin transcription) complex, are central for these processes and act by mediating DNA access through nucleosome reorganisation. However, their roles in vertebrate organogenesis are poorly understood. Here, we report the identification of zebrafish mutants for the gene encoding Structure specific recognition protein 1a (Ssrp1a), which, together with Spt16, forms the FACT heterodimer. Focussing on the liver and eye, we show that zygotic Ssrp1a is essential for proliferation and differentiation during organogenesis. Specifically, gene expression indicative of progressive organ differentiation is disrupted and RNA transcription is globally reduced. Ssrp1a-deficient embryos exhibit DNA synthesis defects and prolonged S phase, uncovering a role distinct from that of Spt16, which promotes G1 phase progression. Gene deletion/replacement experiments in Drosophila show that Ssrp1b, Ssrp1a and N-terminal Ssrp1a, equivalent to the yeast homologue Pob3, can substitute Drosophila Ssrp function. These data suggest that (1) Ssrp1b does not compensate for Ssrp1a loss in the zebrafish embryo, probably owing to insufficient expression levels, and (2) despite fundamental structural differences, the mechanisms mediating DNA accessibility by FACT are conserved between yeast and metazoans. We propose that the essential functions of Ssrp1a in DNA replication and gene transcription, together with its dynamic spatiotemporal expression, ensure organ-specific differentiation and proportional growth, which are crucial for the forming embryo.

  14. A Scoping Review of Immigrant Experience of Health Care Access Barriers in Canada.

    PubMed

    Kalich, Angela; Heinemann, Lyn; Ghahari, Setareh

    2016-06-01

    Canadian population-based surveys report comparable access to health care services between immigrant and non-immigrant populations, yet other research reports immigrant-specific access barriers. A scoping review was conducted to explore research regarding Canadian immigrants' unique experiences in accessing health care, and was guided by the research question: "What is currently known about the barriers that adult immigrants face when accessing Canadian health care services?" The findings of this study suggest that there are unmet health care access needs specific to immigrants to Canada. In reviewing research of immigrants' health care experiences, the most common access barriers were found to be language barriers, barriers to information, and cultural differences. These findings, in addition to low cultural competency reported by interviewed health care workers in the reviewed articles, indicate inequities in access to Canadian health care services for immigrant populations. Suggestions for future research and programming are discussed.

  15. Population structure and its effect on haplotype diversity and linkage disequilibrium surrounding the xa5 locus of rice (Oryza sativa L.).

    PubMed Central

    Garris, Amanda J; McCouch, Susan R; Kresovich, Stephen

    2003-01-01

    To assess the usefulness of linkage disequilibrium mapping in an autogamous, domesticated species, we have characterized linkage disequilibrium in the candidate region for xa5, a recessive gene conferring race-specific resistance to bacterial blight in rice. This trait and locus have good mapping information, a tractable phenotype, and available sequence data, but no cloned gene. We sampled 13 short segments from the 70-kb candidate region in 114 accessions of Oryza sativa. Five additional segments were sequenced from the adjacent 45-kb region in resistant accessions to estimate the distance at which linkage disequilibrium decays. The data show significant linkage disequilibrium between sites 100 kb apart. The presence of the xa5 resistant reaction in two ecotypes and in accessions with different haplotypes in the candidate region may indicate multiple origins or genetic heterogeneity for resistance. In addition, genetic differentiation between ecotypes emphasizes the need for controlling for population structure in the design of linkage disequilibrium studies in rice. PMID:14573486

  16. A Virtual Mission Operations Center: Collaborative Environment

    NASA Technical Reports Server (NTRS)

    Medina, Barbara; Bussman, Marie; Obenschain, Arthur F. (Technical Monitor)

    2002-01-01

    The Virtual Mission Operations Center - Collaborative Environment (VMOC-CE) intent is to have a central access point for all the resources used in a collaborative mission operations environment to assist mission operators in communicating on-site and off-site in the investigation and resolution of anomalies. It is a framework that as a minimum incorporates online chat, realtime file sharing and remote application sharing components in one central location. The use of a collaborative environment in mission operations opens up the possibilities for a central framework for other project members to access and interact with mission operations staff remotely. The goal of the Virtual Mission Operations Center (VMOC) Project is to identify, develop, and infuse technology to enable mission control by on-call personnel in geographically dispersed locations. In order to achieve this goal, the following capabilities are needed: Autonomous mission control systems Automated systems to contact on-call personnel Synthesis and presentation of mission control status and history information Desktop tools for data and situation analysis Secure mechanism for remote collaboration commanding Collaborative environment for remote cooperative work The VMOC-CE is a collaborative environment that facilitates remote cooperative work. It is an application instance of the Virtual System Design Environment (VSDE), developed by NASA Goddard Space Flight Center's (GSFC) Systems Engineering Services & Advanced Concepts (SESAC) Branch. The VSDE is a web-based portal that includes a knowledge repository and collaborative environment to serve science and engineering teams in product development. It is a "one stop shop" for product design, providing users real-time access to product development data, engineering and management tools, and relevant design specifications and resources through the Internet. The initial focus of the VSDE has been to serve teams working in the early portion of the system/product lifecycle - concept development, proposal preparation, and formulation. The VMOC-CE expands the application of the VSDE into the operations portion of the system lifecycle. It will enable meaningful and real-time collaboration regardless of the geographical distribution of project team members. Team members will be able to interact in satellite operations, specifically for resolving anomalies, through access to a desktop computer and the Internet. Mission Operations Management will be able to participate and monitor up to the minute status of anomalies or other mission operations issues. In this paper we present the VMOC-CE project, system capabilities, and technologies.

  17. Validation of a short-term memory test for the recognition of people and faces.

    PubMed

    Leyk, D; Sievert, A; Heiss, A; Gorges, W; Ridder, D; Alexander, T; Wunderlich, M; Ruther, T

    2008-08-01

    Memorising and processing faces is a short-term memory dependent task of utmost importance in the security domain, in which constant and high performance is a must. Especially in access or passport control-related tasks, the timely identification of performance decrements is essential, margins of error are narrow and inadequate performance may have grave consequences. However, conventional short-term memory tests frequently use abstract settings with little relevance to working situations. They may thus be unable to capture task-specific decrements. The aim of the study was to devise and validate a new test, better reflecting job specifics and employing appropriate stimuli. After 1.5 s (short) or 4.5 s (long) presentation, a set of seven portraits of faces had to be memorised for comparison with two control stimuli. Stimulus appearance followed 2 s (first item) and 8 s (second item) after set presentation. Twenty eight subjects (12 male, 16 female) were tested at seven different times of day, 3 h apart. Recognition rates were above 60% even for the least favourable condition. Recognition was significantly better in the 'long' condition (+10%) and for the first item (+18%). Recognition time showed significant differences (10%) between items. Minor effects of learning were found for response latencies only. Based on occupationally relevant metrics, the test displayed internal and external validity, consistency and suitability for further use in test/retest scenarios. In public security, especially where access to restricted areas is monitored, margins of error are narrow and operator performance must remain high and level. Appropriate schedules for personnel, based on valid test results, are required. However, task-specific data and performance tests, permitting the description of task specific decrements, are not available. Commonly used tests may be unsuitable due to undue abstraction and insufficient reference to real-world conditions. Thus, tests are required that account for task-specific conditions and neurophysiological characteristics.

  18. Can performance-based financing help reaching the poor with maternal and child health services? The experience of rural Rwanda.

    PubMed

    Lannes, Laurence; Meessen, Bruno; Soucat, Agnes; Basinga, Paulin

    2016-07-01

    More than 20 countries in Africa are scaling up performance-based financing (PBF), but its impact on equity in access to health services remains to be documented. This paper draws on evidence from Rwanda to examine the capacity of PBF to ensure equal access to key health interventions especially in rural areas where most of the poor live. Specifically, it focuses on maternal and child health services, distinguishing two wealth groups, and uses data from a rigorous impact evaluation. Difference-in-difference technique is used, and different model specifications are tested: control for unobserved heterogeneity and common random error using linear probability model, seemingly unrelated regression equations, and clustering and fixed effects. Results suggest that in Rwanda, PBF improved efficiency rather than equity for most health services. We find that PBF achieved efficiency gains by improving access to health services for those easier to reach, generally the relatively more affluent. It turns out to be less effective in reaching the poorest. Our results illustrate the advantages of rigorous randomized impact evaluation data as results published earlier using a nationally representative survey (Demographic and Health Survey) were not able to capture the pro-rich nature of the PBF scheme in Rwanda. Our paper advocates for building mechanisms targeting the vulnerable groups in PBF strategies. It also highlights the need to understand the impact of PBF together with the specific development of health insurance coverage and the organization of the health system. Copyright © 2015 John Wiley & Sons, Ltd.

  19. Review of SDDOT's highway access control process

    DOT National Transportation Integrated Search

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  20. System access control study

    DOT National Transportation Integrated Search

    1974-06-01

    The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...

  1. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 2: Switches and Environmental Controls. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…

  2. Entrepreneurial proliferation: Russia`s nuclear industry suits the buyers market. Master`s thesis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whalen, T.D.; Williams, A.R.

    1995-06-01

    The Soviet Union collapsed in December 1991, bringing an end to four decades of the Cold War. A system of tight centralized controls has given way to chaotic freedom and un-managed, entrepreneurial capitalism. Of immediate concern to most world leaders has been the control and safety of over 30,000 Soviet nuclear weapons. After 1991, the Soviet, centralized system of management lost one key structural element: a reliable `human factor` for nuclear material control. The Soviet systems for physical security and material control are still in place in the nuclear inheritor states - Russia, Ukraine, Khazakhnstan, and Belarus - but theymore » do not restrain or regulate their nuclear industry. In the chaos created by the Soviet collapse, the nonproliferation regime may not adequately temper the supply of the nuclear materials of the new inheritor states. This could permit organizations or states seeking nuclear weapons easier access to fissile materials. New initiatives such as the United States Cooperative Threat Reduction program, which draws upon U.S. technology and expertise to help the NIS solve these complex problems, are short-tern tactics. At present there are no strategies which address the long-tern root problems caused by the Soviet collapse.This thesis demonstrates the extent of the nuclear control problems in Russia. Specifically, we examine physical security, material control and accounting regulation and enforcement, and criminal actions. It reveals that the current lack of internal controls make access to nuclear materials easier for aspiring nuclear weapons States.« less

  3. Plasticity Regulators Modulate Specific Root Traits in Discrete Nitrogen Environments

    PubMed Central

    Gifford, Miriam L.; Banta, Joshua A.; Katari, Manpreet S.; Hulsmans, Jo; Chen, Lisa; Ristova, Daniela; Tranchina, Daniel; Purugganan, Michael D.; Coruzzi, Gloria M.; Birnbaum, Kenneth D.

    2013-01-01

    Plant development is remarkably plastic but how precisely can the plant customize its form to specific environments? When the plant adjusts its development to different environments, related traits can change in a coordinated fashion, such that two traits co-vary across many genotypes. Alternatively, traits can vary independently, such that a change in one trait has little predictive value for the change in a second trait. To characterize such “tunability” in developmental plasticity, we carried out a detailed phenotypic characterization of complex root traits among 96 accessions of the model Arabidopsis thaliana in two nitrogen environments. The results revealed a surprising level of independence in the control of traits to environment – a highly tunable form of plasticity. We mapped genetic architecture of plasticity using genome-wide association studies and further used gene expression analysis to narrow down gene candidates in mapped regions. Mutants in genes implicated by association and expression analysis showed precise defects in the predicted traits in the predicted environment, corroborating the independent control of plasticity traits. The overall results suggest that there is a pool of genetic variability in plants that controls traits in specific environments, with opportunity to tune crop plants to a given environment. PMID:24039603

  4. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  5. Information Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study

    ERIC Educational Resources Information Center

    Antony, Laljith

    2016-01-01

    Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…

  6. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...

  7. Improved corrosion control by coating in the splash zone and subsea

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    John, R.C.; VanHooff, W.

    1989-01-01

    The splash zone around offshore structures is without doubt one of nature's most hostile and corrosive environments. Apart from the wave impacts, plentiful supplies of oxygen, lack of cathodic protection, and the salt spray that continually wets and then dries upon objects, the region is difficult and sometimes dangerous to access. This article reviews the performance of two new offshore repair coatings recently installed on North Sea and Gulf of Mexico installations. The first coating, a reinforced heat-shrinkable sleeve, is designed to be installed over properly cleaned and dried steel surfaces. Suitable conditions for the application of this coating existmore » during low tide and calm weather when certain exposed sections of the splash zone are accessible. Alternatively, by using a special remote-controlled cofferdam chamber to create an artificial local environment, subsea coating application can proceed under ideal conditions. Cofferdam chamber installations are diver-free and can be made throughout the entire splash zone, even during rough weather. When a remote-controlled cofferdam is not available and repairs are needed in subsea or wet areas, diver assistance is usually required. The second coating system, a gel-based, diver-applied tape, has been developed specifically for such applications.« less

  8. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  9. Integrated Short Range, Low Bandwidth, Wearable Communications Networking Technologies

    DTIC Science & Technology

    2012-04-30

    Only (FOUO) Table of Contents Introduction 7 Research Discussions 7 1 Specifications 8 2 SAN Radio 9 2.1 R.F. Design Improvements 9 2.1.1 LNA...Characterization and Verification Testing 26 2.2 Digital Design Improvements 26 2.2.1 Improve Processor Access to Memory Resources 26 2.2.2...integrated and tested . A hybrid architecture of the automatic gain control (AGC) was designed to Page 7 of 116 For Official Use Only (FOUO

  10. Optical Brain Imaging: A Powerful Tool for Neuroscience.

    PubMed

    Zhu, Xinpei; Xia, Yanfang; Wang, Xuecen; Si, Ke; Gong, Wei

    2017-02-01

    As the control center of organisms, the brain remains little understood due to its complexity. Taking advantage of imaging methods, scientists have found an accessible approach to unraveling the mystery of neuroscience. Among these methods, optical imaging techniques are widely used due to their high molecular specificity and single-molecule sensitivity. Here, we overview several optical imaging techniques in neuroscience of recent years, including brain clearing, the micro-optical sectioning tomography system, and deep tissue imaging.

  11. Evolution to Space

    NASA Technical Reports Server (NTRS)

    Cohen, Jacob

    2013-01-01

    This presentation will discuss recent space exploration results (LCROSS, KEPLER, etc.), increase access to space and the small and cube satellites platform as it relates to the future of space exploration. It will highlight the concept of modularization and the use of biology, and specifically synthetic biology in the future. The presentation will be a general public presentation. When speaking to a younger audience, I will discuss my background. All slides contain only public information. No technical ITAR/Export controlled material will be discussed.

  12. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC. These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.

  13. Air Superiority And The Anti Access/Area Denial Environment In The Asia pacific In 2044

    DTIC Science & Technology

    2014-04-01

    Ibid. 74 Ibid. 75 Ibid. 76 Ibid. 77 Lockheed Martin, “F-22 Raptor Specifications,” http://www.lockheedmartin.com/us/products/ f22 /f-22...Specifications.” http://www.lockheedmartin.com/us/products/ f22 /f-22-specifications.html (accessed 16 March 2014). Lockheed Martin. “F-35C Carrier Variant

  14. Deflate decompressor

    DOEpatents

    Hamlet, Jason R [Albuquerque, NM; Robertson, Perry J [Albuquerque, NM; Pierson, Lyndon G [Albuquerque, NM; Olsberg, Ronald R [Albuquerque, NM

    2012-02-28

    A deflate decompressor includes at least one decompressor unit, a memory access controller, a feedback path, and an output buffer unit. The memory access controller is coupled to the decompressor unit via a data path and includes a data buffer to receive the data stream and temporarily buffer a first portion the data stream. The memory access controller transfers fixed length data units of the data stream from the data buffer to the decompressor unit with reference to a memory pointer pointing into the memory buffer. The feedback path couples the decompressor unit to the memory access controller to feed back decrement values to the memory access controller for updating the memory pointer. The decrement values each indicate a number of bits unused by the decompressor unit when decoding the fixed length data units. The output buffer unit buffers a second portion of the data stream after decompression.

  15. Validity of administrative database code algorithms to identify vascular access placement, surgical revisions, and secondary patency.

    PubMed

    Al-Jaishi, Ahmed A; Moist, Louise M; Oliver, Matthew J; Nash, Danielle M; Fleet, Jamie L; Garg, Amit X; Lok, Charmaine E

    2018-03-01

    We assessed the validity of physician billing codes and hospital admission using International Classification of Diseases 10th revision codes to identify vascular access placement, secondary patency, and surgical revisions in administrative data. We included adults (≥18 years) with a vascular access placed between 1 April 2004 and 31 March 2013 at the University Health Network, Toronto. Our reference standard was a prospective vascular access database (VASPRO) that contains information on vascular access type and dates of placement, dates for failure, and any revisions. We used VASPRO to assess the validity of different administrative coding algorithms by calculating the sensitivity, specificity, and positive predictive values of vascular access events. The sensitivity (95% confidence interval) of the best performing algorithm to identify arteriovenous access placement was 86% (83%, 89%) and specificity was 92% (89%, 93%). The corresponding numbers to identify catheter insertion were 84% (82%, 86%) and 84% (80%, 87%), respectively. The sensitivity of the best performing coding algorithm to identify arteriovenous access surgical revisions was 81% (67%, 90%) and specificity was 89% (87%, 90%). The algorithm capturing arteriovenous access placement and catheter insertion had a positive predictive value greater than 90% and arteriovenous access surgical revisions had a positive predictive value of 20%. The duration of arteriovenous access secondary patency was on average 578 (553, 603) days in VASPRO and 555 (530, 580) days in administrative databases. Administrative data algorithms have fair to good operating characteristics to identify vascular access placement and arteriovenous access secondary patency. Low positive predictive values for surgical revisions algorithm suggest that administrative data should only be used to rule out the occurrence of an event.

  16. Cancer Care at Times of Crisis and War: The Syrian Example

    PubMed Central

    Sahloul, Eman; Salem, Riad; Alrez, Wessam; Alkarim, Tayseer; Sukari, Ammar; Maziak, Wasim

    2017-01-01

    Purpose As Syria enters its fifth year of conflict, the number of civilians killed and injured continues to rise sharply. Along with this conflict comes the rapid decline of medical care, specifically cancer care. To determine physician and equipment availability, cancer screening and management, and possible solutions relative to various major cities, a survey was distributed to physicians inside Syria through the help of the humanitarian organization Syrian American Medical Society. Methods Online surveys were distributed to both certified oncologists who work in cancer clinics and general physicians who work in rural and mobile clinics inside Syria. Variables assessed were physician specialty, location, population, cost, regional situation (besieged versus government controlled), and resource availability and access. Results were stratified by location and physician specialty. Results Survey results revealed a large shortage of specialized physicians and inhibited accessibility to screening and management options in besieged areas compared with government-controlled regions. Physicians within both government-controlled and besieged cities reported limited or no targeted agents, radiation therapy, clinical trials, bone marrow transplantation, positron emission tomography scans, magnetic resonance imaging, and genetic testing. Conclusion The Syrian civil war has resulted in suboptimal oncology care in the majority of the region. In consideration of specific deficiencies in cancer care, we recommend several solutions that may better the level of care in Syria: patient education on medical documentation and self-examination; online consultation; and cheap, effective screening methods. The implementation of these recommendations may change the course of cancer care in a country that has deteriorated into the worst humanitarian crisis of the century. PMID:28831442

  17. Cancer Care at Times of Crisis and War: The Syrian Example.

    PubMed

    Sahloul, Eman; Salem, Riad; Alrez, Wessam; Alkarim, Tayseer; Sukari, Ammar; Maziak, Wasim; Atassi, M Bassel

    2017-08-01

    As Syria enters its fifth year of conflict, the number of civilians killed and injured continues to rise sharply. Along with this conflict comes the rapid decline of medical care, specifically cancer care. To determine physician and equipment availability, cancer screening and management, and possible solutions relative to various major cities, a survey was distributed to physicians inside Syria through the help of the humanitarian organization Syrian American Medical Society. Online surveys were distributed to both certified oncologists who work in cancer clinics and general physicians who work in rural and mobile clinics inside Syria. Variables assessed were physician specialty, location, population, cost, regional situation (besieged versus government controlled), and resource availability and access. Results were stratified by location and physician specialty. Survey results revealed a large shortage of specialized physicians and inhibited accessibility to screening and management options in besieged areas compared with government-controlled regions. Physicians within both government-controlled and besieged cities reported limited or no targeted agents, radiation therapy, clinical trials, bone marrow transplantation, positron emission tomography scans, magnetic resonance imaging, and genetic testing. The Syrian civil war has resulted in suboptimal oncology care in the majority of the region. In consideration of specific deficiencies in cancer care, we recommend several solutions that may better the level of care in Syria: patient education on medical documentation and self-examination; online consultation; and cheap, effective screening methods. The implementation of these recommendations may change the course of cancer care in a country that has deteriorated into the worst humanitarian crisis of the century.

  18. Validated environmental and physiological data from the CELSS Breadboard Projects Biomass Production Chamber. BWT931 (Wheat cv. Yecora Rojo)

    NASA Technical Reports Server (NTRS)

    Stutte, G. W.; Mackowiak, C. L.; Markwell, G. A.; Wheeler, R. M.; Sager, J. C.

    1993-01-01

    This KSC database is being made available to the scientific research community to facilitate the development of crop development models, to test monitoring and control strategies, and to identify environmental limitations in crop production systems. The KSC validated dataset consists of 17 parameters necessary to maintain bioregenerative life support functions: water purification, CO2 removal, O2 production, and biomass production. The data are available on disk as either a DATABASE SUBSET (one week of 5-minute data) or DATABASE SUMMARY (daily averages of parameters). Online access to the VALIDATED DATABASE will be made available to institutions with specific programmatic requirements. Availability and access to the KSC validated database are subject to approval and limitations implicit in KSC computer security policies.

  19. Catalytic diversity in self-propagating peptide assemblies

    NASA Astrophysics Data System (ADS)

    Omosun, Tolulope O.; Hsieh, Ming-Chien; Childers, W. Seth; Das, Dibyendu; Mehta, Anil K.; Anthony, Neil R.; Pan, Ting; Grover, Martha A.; Berland, Keith M.; Lynn, David G.

    2017-08-01

    The protein-only infectious agents known as prions exist within cellular matrices as populations of assembled polypeptide phases ranging from particles to amyloid fibres. These phases appear to undergo Darwinian-like selection and propagation, yet remarkably little is known about their accessible chemical and biological functions. Here we construct simple peptides that assemble into well-defined amyloid phases and define paracrystalline surfaces able to catalyse specific enantioselective chemical reactions. Structural adjustments of individual amino acid residues predictably control both the assembled crystalline order and their accessible catalytic repertoire. Notably, the density and proximity of the extended arrays of enantioselective catalytic sites achieve template-directed polymerization of new polymers. These diverse amyloid templates can now be extended as dynamic self-propagating templates for the construction of even more complex functional materials.

  20. A licence to vape: Is it time to trial of a nicotine licensing scheme to allow Australian adults controlled access to electronic cigarettes devices and refill solutions containing nicotine?

    PubMed

    Gartner, Coral; Hall, Wayne

    2015-06-01

    Australia has some of the most restrictive laws concerning use of nicotine in e-cigarettes. The only current legal option for Australians to legally possess and use nicotine for vaping is with a medical prescription and domestic supply is limited to compounding pharmacies that prepare medicines for specific patients. An alternative regulatory option that could be implemented under current drugs and poisons regulations is a 'nicotine licensing' scheme utilising current provisions for 'dangerous poisons'. This commentary discusses how such a scheme could be used to trial access to nicotine solutions for vaping outside of a 'medicines framework' in Australia. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. Australian Infection Control Association members' use of skills and resources that promote evidence-based infection control.

    PubMed

    Murphy, C L; McLaws, M

    2000-04-01

    To adopt an evidence-based approach, professionals must be able to access, identify, interpret, and critically appraise best evidence. Critical appraisal requires essential skills, such as computer literacy and an understanding of research principles. These skills also are required for professionals to contribute to evidence. In 1996, members of the Australian Infection Control Association were surveyed to establish a profile including the extent to which they were reading infection control publications, using specific documents for policy and guideline development, developing and undertaking research, publishing research, and using computers. The relationships between demographics, computer use, and research activity were examined. The response rate was 63. 4% (630/993). The study group comprised mostly women (96.1%), and most (66.4%) were older than 40 years of age. Median infection control experience was 4 years (mean, 5.4 years; range, <12 months to 35 years). When developing guidelines and policies (92.7%; 584/630), infection control professionals reviewed State Health Department Infection Control Guidelines and Regulations. Research relating to infection control was undertaken by 21.5% (135/628) of the sample, and 27.6% (37/134) of this group published their research findings. Of the respondents (51.1%; 318/622) who used a computer to undertake infection control tasks, the majority (89.0%) used a personal computer for word processing. Regardless of infection control experience, Australian infection control professionals must be adequately prepared to contribute to, access, appraise, and where appropriate, apply best evidence to their practice. We suggest that computer literacy, an understanding of research principles, and familiarity with infection control literature are three essential skills that infection control professionals must possess and regularly exercise.

  2. Role of the chromatin landscape and sequence in determining cell type-specific genomic glucocorticoid receptor binding and gene regulation

    PubMed Central

    Huska, Matthew R.; Jurk, Marcel; Schöpflin, Robert; Starick, Stephan R.; Schwahn, Kevin; Cooper, Samantha B.; Yamamoto, Keith R.; Thomas-Chollier, Morgane; Vingron, Martin

    2017-01-01

    Abstract The genomic loci bound by the glucocorticoid receptor (GR), a hormone-activated transcription factor, show little overlap between cell types. To study the role of chromatin and sequence in specifying where GR binds, we used Bayesian modeling within the universe of accessible chromatin. Taken together, our results uncovered that although GR preferentially binds accessible chromatin, its binding is biased against accessible chromatin located at promoter regions. This bias can only be explained partially by the presence of fewer GR recognition sequences, arguing for the existence of additional mechanisms that interfere with GR binding at promoters. Therefore, we tested the role of H3K9ac, the chromatin feature with the strongest negative association with GR binding, but found that this correlation does not reflect a causative link. Finally, we find a higher percentage of promoter–proximal GR binding for genes regulated by GR across cell types than for cell type-specific target genes. Given that GR almost exclusively binds accessible chromatin, we propose that cell type-specific regulation by GR preferentially occurs via distal enhancers, whose chromatin accessibility is typically cell type-specific, whereas ubiquitous target gene regulation is more likely to result from binding to promoter regions, which are often accessible regardless of cell type examined. PMID:27903902

  3. Computer assisted audit techniques for UNIX (UNIX-CAATS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Polk, W.T.

    1991-12-31

    Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General`s Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less

  4. Computer assisted audit techniques for UNIX (UNIX-CAATS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Polk, W.T.

    1991-01-01

    Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General's Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less

  5. Graduating to Postdoc: Information-Sharing in Support of Organizational Structures and Needs

    NASA Technical Reports Server (NTRS)

    Keller, Richard M.; Lucas, Paul J.; Compton, Michael M.; Stewart, Helen J.; Baya, Vinod; DelAlto, Martha

    1999-01-01

    The deployment of information-sharing systems in large organizations can significantly impact existing policies and procedures with regard to authority and control over information. Unless information-sharing systems explicitly support organizational structures and needs, these systems will be rejected summarily. The Postdoc system is a deployed Web-based information-sharing system created specifically to address organizational needs. Postdoc contains various organizational support features including a shared, globally navigable document space, as well as specialized access control, distributed administration, and mailing list features built around the key notion of hierarchical group structures. We review successes and difficulties in supporting organizational needs with Postdoc

  6. Multilevel examination of the association of urbanization with inflammation in Chinese adults

    PubMed Central

    Thompson, Amanda L.; Houck, Kelly M.; Adair, Linda; Gordon-Larsen, Penny; Popkin, Barry

    2014-01-01

    We examine the associations between overall urbanicity and specific physical and social components of community-level urbanization with C-reactive protein (CRP) in adults participating in the China Health and Nutrition Study. Higher overall urbanicity and environment-related urbanicity component scores, including education, housing quality, and access to markets, were associated with elevated CRP in multilevel models controlling for clustering by community. These associations differed by age and gender and persisted after controlling for individual-level anthropometric, diet, and pathogenic risk factors. These results highlight the importance of place in relation to inflammation across the spectrum of rural and urban environments. PMID:24908386

  7. Integrating Top-down and Bottom-up Cybersecurity Guidance using XML

    PubMed Central

    Lubell, Joshua

    2016-01-01

    This paper describes a markup-based approach for synthesizing disparate information sources and discusses a software implementation of the approach. The implementation makes it easier for people to use two complementary, but differently structured, guidance specifications together: the (top-down) Cybersecurity Framework and the (bottom-up) National Institute of Standards and Technology Special Publication 800-53 security control catalog. An example scenario demonstrates how the software implementation can help a security professional select the appropriate safeguards for restricting unauthorized access to an Industrial Control System. The implementation and example show the benefits of this approach and suggest its potential application to disciplines other than cybersecurity. PMID:27795810

  8. Chemotherapy-Induced Nausea and Vomiting Mitigation With Music Interventions
.

    PubMed

    Kiernan, Jason M; Conradi Stark, Jody; Vallerand, April H

    2018-01-01

    Despite three decades of studies examining music interventions as a mitigant of chemotherapy-induced nausea and vomiting (CINV), to date, no systematic review of this literature exists.
. PubMed, Scopus, PsycInfo®, CINAHL®, Cochrane Library, and Google Scholar were searched. Keywords for all databases were music, chemotherapy, and nausea.
. All studies were appraised for methodology and results.
. 10 studies met inclusion criteria for review. Sample sizes were generally small and nonrandomized. Locus of control for music selection was more often with the investigator rather than the participant. Few studies controlled for the emetogenicity of the chemotherapy administered, nor for known patient-specific risk factors for CINV.
. The existing data have been largely generated by nurse scientists, and implications for nursing practice are many, because music interventions are low-cost, easily accessible, and without known adverse effects. However, this specific body of knowledge requires additional substantive inquiry to generate clinically relevant data.

  9. Object-oriented controlled-vocabulary translator using TRANSOFT + HyperPAD.

    PubMed

    Moore, G W; Berman, J J

    1991-01-01

    Automated coding of surgical pathology reports is demonstrated. This public-domain translation software operates on surgical pathology files, extracting diagnoses and assigning codes in a controlled medical vocabulary, such as SNOMED. Context-sensitive translation algorithms are employed, and syntactically correct diagnostic items are produced that are matched with controlled vocabulary. English-language surgical pathology reports, accessioned over one year at the Baltimore Veterans Affairs Medical Center, were translated. With an interface to a larger hospital information system, all natural language pathology reports are automatically rendered as topography and morphology codes. This translator frees the pathologist from the time-intensive task of personally coding each report, and may be used to flag certain diagnostic categories that require specific quality assurance actions.

  10. Object-oriented controlled-vocabulary translator using TRANSOFT + HyperPAD.

    PubMed Central

    Moore, G. W.; Berman, J. J.

    1991-01-01

    Automated coding of surgical pathology reports is demonstrated. This public-domain translation software operates on surgical pathology files, extracting diagnoses and assigning codes in a controlled medical vocabulary, such as SNOMED. Context-sensitive translation algorithms are employed, and syntactically correct diagnostic items are produced that are matched with controlled vocabulary. English-language surgical pathology reports, accessioned over one year at the Baltimore Veterans Affairs Medical Center, were translated. With an interface to a larger hospital information system, all natural language pathology reports are automatically rendered as topography and morphology codes. This translator frees the pathologist from the time-intensive task of personally coding each report, and may be used to flag certain diagnostic categories that require specific quality assurance actions. PMID:1807773

  11. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    PubMed

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  12. Complex dynamics of semantic memory access in reading.

    PubMed

    Baggio, Giosué; Fonseca, André

    2012-02-07

    Understanding a word in context relies on a cascade of perceptual and conceptual processes, starting with modality-specific input decoding, and leading to the unification of the word's meaning into a discourse model. One critical cognitive event, turning a sensory stimulus into a meaningful linguistic sign, is the access of a semantic representation from memory. Little is known about the changes that activating a word's meaning brings about in cortical dynamics. We recorded the electroencephalogram (EEG) while participants read sentences that could contain a contextually unexpected word, such as 'cold' in 'In July it is very cold outside'. We reconstructed trajectories in phase space from single-trial EEG time series, and we applied three nonlinear measures of predictability and complexity to each side of the semantic access boundary, estimated as the onset time of the N400 effect evoked by critical words. Relative to controls, unexpected words were associated with larger prediction errors preceding the onset of the N400. Accessing the meaning of such words produced a phase transition to lower entropy states, in which cortical processing becomes more predictable and more regular. Our study sheds new light on the dynamics of information flow through interfaces between sensory and memory systems during language processing.

  13. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    NASA Astrophysics Data System (ADS)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  14. Reduced Specificity of Autobiographical Memory and Depression

    PubMed Central

    Dalgleish, Tim; Williams, J. Mark G.; Golden, Ann-Marie J.; Perkins, Nicola; Barrett, Lisa Feldman; Barnard, Phillip J.; Yeung, Cecilia Au; Murphy, Victoria; Elward, Rachael; Tchanturia, Kate; Watkins, Edward

    2007-01-01

    It has been widely established that depressed mood states and clinical depression, as well as a range of other psychiatric disorders, are associated with a relative difficulty in accessing specific autobiographical information in response to emotion-related cue words on an Autobiographical Memory Test (AMT; J. M. G. Williams & K. Broadbent, 1986). In 8 studies the authors examined the extent to which this relationship is a function of impaired executive control associated with these mood states and clinical disorders. Studies 1–4 demonstrated that performance on the AMT is associated with performance on measures of executive control, independent of depressed mood. Furthermore, Study 1 showed that executive control (as measured by verbal fluency) mediated the relationship between both depressed mood and a clinical diagnosis of eating disorder and AMT performance. Using a stratified sample in Study 5, the authors confirmed the positive association between depressed mood and impaired performance on the AMT. Studies 6–8 involved experimental manipulations of the parameters of the AMT designed to further indicate that reduced executive control is to a significant extent driving the relationship between depressed mood and AMT performance. The potential role of executive control in accounting for other aspects of the AMT literature is discussed. PMID:17324083

  15. Mobile Edge Computing Empowers Internet of Things

    NASA Astrophysics Data System (ADS)

    Ansari, Nirwan; Sun, Xiang

    In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging to the same user) are associated to a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes the IoT data (generated by its IoT devices) in real-time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access control problem in the IoT system. In addition, we propose two dynamic proxy VM migration methods to minimize the end-to-end delay between proxy VMs and their IoT devices and to minimize the total on-grid energy consumption of the cloudlets, respectively. Performance of the proposed methods are validated via extensive simulations.

  16. Evaluation of adding distance information to mainline specific service (logo) signs.

    DOT National Transportation Integrated Search

    2009-01-01

    Specific service (or logo) signs provide information on attractions, camping, lodging, food, and gas services on the mainline of limited access highways in advance of the interchange that provides access to the services. At present, to ascertain the ...

  17. A short cut to the past: Cueing via concrete objects improves autobiographical memory retrieval in Alzheimer's disease patients.

    PubMed

    Kirk, Marie; Berntsen, Dorthe

    2018-02-01

    Older adults diagnosed with Alzheimer's disease (AD) have difficulties accessing autobiographical memories. However, this deficit tends to spare memories dated to earlier parts of their lives, and may partially reflect retrieval deficits rather than complete memory loss. Introducing a novel paradigm, the present study examines whether autobiographical memory recall can be improved in AD by manipulating the sensory richness, concreteness and cultural dating of the memory cues. Specifically, we examine whether concrete everyday objects historically dated to the participants' youth (e.g., a skipping rope), relative to verbal cues (i.e., the verbal signifiers for the objects) facilitate access to autobiographical memories. The study includes 49 AD patients, and 50 healthy, older matched control participants, all tested on word versus object-cued recall. Both groups recalled significantly more memories, when cued by objects relative to words, but the advantage was significantly larger in the AD group. In both groups, memory descriptions were longer and significantly more episodic in nature in response to object-cued recall. Together these findings suggest that the multimodal nature of the object cues (i.e. vision, olfaction, audition, somatic sensation) along with specific cue characteristics, such as time reference, texture, shape, may constrain the retrieval search, potentially minimizing executive function demands, and hence strategic processing requirements, thus easing access to autobiographical memories in AD. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...

  19. 77 FR 25994 - Notice of Proposed Information Collection Requests; Institute of Education Sciences; Pell Grant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... will have expanded access to Pell grants; or (2) a control group, which will not have access. Within both substudies, the treatment group will be very similar to the control at the time of random... between treatment and control group members can then be attributed to Pell grant access. The first...

  20. 50 CFR 660.311 - Open access fishery-definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 13 2012-10-01 2012-10-01 false Open access fishery-definitions. 660.311... Groundfish-Open Access Fisheries § 660.311 Open access fishery—definitions. General definitions for the... specific to the open access fishery covered in this subpart and are in addition to those specified at § 660...

  1. 50 CFR 660.311 - Open access fishery-definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 11 2011-10-01 2011-10-01 false Open access fishery-definitions. 660.311... Groundfish-Open Access Fisheries § 660.311 Open access fishery—definitions. General definitions for the... specific to the open access fishery covered in this subpart and are in addition to those specified at § 660...

  2. 50 CFR 660.311 - Open access fishery-definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-definitions. 660.311... Groundfish-Open Access Fisheries § 660.311 Open access fishery—definitions. General definitions for the... specific to the open access fishery covered in this subpart and are in addition to those specified at § 660...

  3. 50 CFR 660.311 - Open access fishery-definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 13 2013-10-01 2013-10-01 false Open access fishery-definitions. 660.311... Groundfish-Open Access Fisheries § 660.311 Open access fishery—definitions. General definitions for the... specific to the open access fishery covered in this subpart and are in addition to those specified at § 660...

  4. 50 CFR 660.311 - Open access fishery-definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 13 2014-10-01 2014-10-01 false Open access fishery-definitions. 660.311... Groundfish-Open Access Fisheries § 660.311 Open access fishery—definitions. General definitions for the... specific to the open access fishery covered in this subpart and are in addition to those specified at § 660...

  5. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    EPA Pesticide Factsheets

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  6. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  7. Exaggerating Accessible Differences: When Gender Stereotypes Overestimate Actual Group Differences.

    PubMed

    Eyal, Tal; Epley, Nicholas

    2017-09-01

    Stereotypes are often presumed to exaggerate group differences, but empirical evidence is mixed. We suggest exaggeration is moderated by the accessibility of specific stereotype content. In particular, because the most accessible stereotype contents are attributes perceived to differ between groups, those attributes are most likely to exaggerate actual group differences due to regression to the mean. We tested this hypothesis using a highly accessible gender stereotype: that women are more socially sensitive than men. We confirmed that the most accessible stereotype content involves attributes perceived to differ between groups (pretest), and that these stereotypes contain some accuracy but significantly exaggerate actual gender differences (Experiment 1). We observe less exaggeration when judging less accessible stereotype content (Experiment 2), or when judging individual men and women (Experiment 3). Considering the accessibility of specific stereotype content may explain when stereotypes exaggerate actual group differences and when they do not.

  8. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  9. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  10. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  11. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  12. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  13. Autobiographical memory specificity in dissociative identity disorder.

    PubMed

    Huntjens, Rafaële J C; Wessel, Ineke; Hermans, Dirk; van Minnen, Agnes

    2014-05-01

    A lack of adequate access to autobiographical knowledge has been related to psychopathology. More specifically, patients suffering from depression or a history of trauma have been found to be characterized by overgeneral memory, in other words, they show a relative difficulty in retrieving a specific event from memory located in time and place. Previous studies of overgeneral memory have not included patients with dissociative disorders. These patients are interesting to consider, as they are hypothesized to have the ability to selectively compartmentalize information linked to negative emotions. This study examined avoidance and overgeneral memory in patients with dissociative identity disorder (DID; n = 12). The patients completed the autobiographical memory test (AMT). Their performance was compared with control groups of posttraumatic stress disorder (PTSD) patients (n = 26), healthy controls (n = 29), and DID simulators (n = 26). Specifically, we compared the performance of separate identity states in DID hypothesized to diverge in the use of avoidance as a coping strategy to deal with negative affect. No significant differences in memory specificity were found between the separate identities in DID. Irrespective of identity state, DID patients were characterized by a lack of memory specificity, which was similar to the lack of memory specificity found in PTSD patients. The converging results for DID and PTSD patients add empirical evidence for the role of overgeneral memory involved in the maintenance of posttraumatic psychopathology.

  14. Alternatives to project-specific consent for access to personal information for health research: Insights from a public dialogue

    PubMed Central

    Willison, Donald J; Swinton, Marilyn; Schwartz, Lisa; Abelson, Julia; Charles, Cathy; Northrup, David; Cheng, Ji; Thabane, Lehana

    2008-01-01

    Background The role of consent for research use of health information is contentious. Most discussion has focused on when project-specific consent may be waived but, recently, a broader range of consent options has been entertained, including broad opt-in for multiple studies with restrictions and notification with opt-out. We sought to elicit public values in this matter and to work toward an agreement about a common approach to consent for use of personal information for health research through deliberative public dialogues. Methods We conducted seven day-long public dialogues, involving 98 participants across Canada. Immediately before and after each dialogue, participants completed a fixed-response questionnaire rating individuals' support for 3 approaches to consent in the abstract and their consent choices for 5 health research scenarios using personal information. They also rated how confident different safeguards made them feel that their information was being used responsibly. Results Broad opt-in consent for use of personal information garnered the greatest support in the abstract. When presented with specific research scenarios, no one approach to consent predominated. When profit was introduced into the scenarios, consent choices shifted toward greater control over use. Despite lively and constructive dialogues, and considerable shifting in opinion at the individual level, at the end of the day, there was no substantive aggregate movement in opinion. Personal controls were among the most commonly cited approaches to improving people's confidence in the responsible use of their information for research. Conclusion Because no one approach to consent satisfied even a simple majority of dialogue participants and the importance placed on personal controls, a mechanism should be developed for documenting consent choice for different types of research, including ways for individuals to check who has accessed their medical record for purposes other than clinical care. This could be done, for example, through a web-based patient portal to their electronic health record. Researchers and policy makers should continue to engage the public to promote greater public understanding of the research process and to look for feasible alternatives to existing approaches to project-specific consent for observational research. PMID:19019239

  15. Review of manual control methods for handheld maneuverable instruments.

    PubMed

    Fan, Chunman; Dodou, Dimitra; Breedveld, Paul

    2013-06-01

    By the introduction of new technologies, surgical procedures have been varying from free access in open surgery towards limited access in minimal access surgery. Improving access to difficult-to-reach anatomic sites, e.g. in neurosurgery or percutaneous interventions, needs advanced maneuverable instrumentation. Advances in maneuverable technology require the development of dedicated methods enabling surgeons to stay in direct, manual control of these complex instruments. This article gives an overview of the state-of-the-art in the development of manual control methods for handheld maneuverable instruments. It categorizes the manual control methods in three levels: a) number of steerable segments, b) number of Degrees Of Freedom (DOF), and c) coupling between control motion of the handle and steering motion of the tip. The literature research was completed by using Web of Science, Scopus and PubMed. The study shows that in controlling single steerable segments, direct as well as indirect control methods have been developed, whereas in controlling multiple steerable segments, a gradual shift can be noticed from parallel and serial control to integrated control. The development of multi-segmented maneuverable instruments is still at an early stage, and an intuitive and effective method to control them has to become a primary focus in the domain of minimal access surgery.

  16. Specific binding of magnetic nanoparticle probes to platelets in whole blood detected by magnetorelaxometry

    NASA Astrophysics Data System (ADS)

    Eberbeck, Dietmar; Wiekhorst, Frank; Steinhoff, Uwe; Schwarz, Kay Oliver; Kummrow, Andreas; Kammel, Martin; Neukammer, Jörg; Trahms, Lutz

    2009-05-01

    The binding of monoclonal antibodies labelled with magnetic nanoparticles to CD61 surface proteins expressed by platelets in whole blood samples was measured by magnetorelaxometry. This technique is sensitive to immobilization of the magnetic labels upon binding. Control experiments with previous saturation of the epitopes on the platelet surfaces demonstrated the specificity of the binding. The kinetics of the antibody antigen reaction is accessible with a temporal resolution of 12 s. The minimal detectable platelet concentration is about 2000 μL -1 (sample volume 150 μL). The proportionality of the magnetic relaxation amplitude to the number of bound labels allows a quantification of the antibody binding capacity.

  17. 78 FR 22588 - Joint Industry Plan; Notice of Filing and Immediate Effectiveness of Amendment No. 28 to the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ... the firm controls access to market data and not for external interrogation devices or internal interrogation devices for which a vendor (and not the firm) controls access to market data. This program better... that its employees use and in respect of which the firm controls access to market data. The...

  18. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  19. Securely and Flexibly Sharing a Biomedical Data Management System

    PubMed Central

    Wang, Fusheng; Hussels, Phillip; Liu, Peiya

    2011-01-01

    Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285

  20. Perirhinal Cortex mGlu5 Receptor Activation Reduces Relapse to Methamphetamine Seeking by Restoring Novelty Salience

    PubMed Central

    Peters, Jamie; Scofield, Michael D; Ghee, Shannon M; Heinsbroek, Jasper A; Reichel, Carmela M

    2016-01-01

    Rats that have self-administered methamphetamine (meth) under long access, but not short access, conditions do not recognize novel objects. The perirhinal cortex is critical for novelty detection, and perirhinal metabotropic glutamate 5 receptors (mGlu5) are downregulated after long-access meth. The novel positive allosteric modulator (PAM) 1-(4-(2,4-difluorophenyl) piperazin-1-yl)-2-((4-fluorobenzyl)oxy)-ethanone, or DPFE, demonstrates improved solubility compared with other mGlu5 PAMs, thus allowing brain-site-specific pharmacological studies. Infusion of DPFE into perirhinal cortex restored novel object recognition in long-access meth rats. To investigate the impact of these cognitive enhancing effects on relapse, we tested the effects of DPFE infusions into perirhinal cortex on meth-seeking under two different test conditions. In the standard cue relapse test, perirhinal DPFE infusions did not alter meth-seeking in the presence of meth cues. However, in a novel cue relapse test, wherein animals were allowed to allocate responding between a novel cue and meth-conditioned cue, perirhinal DPFE infusions shifted the pattern of responding in long-access rats toward a profile resembling short-access rats, which respond equally for novel and meth cues. Perirhinal mGlu5 are thus a promising pharmacological target for the restoration of cognitive function in meth addicts. Targeting these receptors may also reduce relapse, particularly in situations where novel stimuli compete with conditioned stimuli for control over meth seeking. PMID:26365953

  1. Balancing entrepreneurship and business practices for e-collaboration: responsible information sharing in academic research.

    PubMed

    Porter, Mark W; Porter, Mark William; Milley, David; Oliveti, Kristyn; Ladd, Allen; O'Hara, Ryan J; Desai, Bimal R; White, Peter S

    2008-11-06

    Flexible, highly accessible collaboration tools can inherently conflict with controls placed on information sharing by offices charged with privacy protection, compliance, and maintenance of the general business environment. Our implementation of a commercial enterprise wiki within the academic research environment addresses concerns of all involved through the development of a robust user training program, a suite of software customizations that enhance security elements, a robust auditing program, allowance for inter-institutional wiki collaboration, and wiki-specific governance.

  2. Genetic variation in jasmonic acid- and spider mite-induced plant volatile emission of cucumber accessions and attraction of the predator Phytoseiulus persimilis.

    PubMed

    Kappers, Iris F; Verstappen, Francel W A; Luckerhoff, Ludo L P; Bouwmeester, Harro J; Dicke, Marcel

    2010-05-01

    Cucumber plants (Cucumis sativus L.) respond to spider-mite (Tetranychus urticae) damage with the release of specific volatiles that are exploited by predatory mites, the natural enemies of the spider mites, to locate their prey. The production of volatiles also can be induced by exposing plants to the plant hormone jasmonic acid. We analyzed volatile emissions from 15 cucumber accessions upon herbivory by spider mites and upon exposure to jasmonic acid using gas chromatography-mass spectrometry. Upon induction, cucumber plants emitted over 24 different compounds, and the blend of induced volatiles consisted predominantly of terpenoids. The total amount of volatiles was higher in plants treated with jasmonic acid than in those infested with spider mites, with (E)-4,8-dimethyl-1,3,7-nonatriene, (E,E)-alpha-farnesene, and (E)-beta-ocimene as the most abundant compounds in all accessions in both treatments. Significant variation among the accessions was found for the 24 major volatile compounds. The accessions differed strongly in total amount of volatiles emitted, and displayed very different odor profiles. Principal component analysis performed on the relative quantities of particular compounds within the blend revealed clusters of highly correlated volatiles, which is suggestive of common metabolic pathways. A number of cucumber accessions also were tested for their attractiveness to Phytoseiulus persimilis, a specialist predator of spider mites. Differences in the attraction of predatory mites by the various accessions correlated to differences in the individual chemical profiles of these accessions. The presence of genetic variation in induced plant volatile emission in cucumber shows that it is possible to breed for cucumber varieties that are more attractive to predatory mites and other biological control agents.

  3. Genetic Variation in Jasmonic Acid- and Spider Mite-Induced Plant Volatile Emission of Cucumber Accessions and Attraction of the Predator Phytoseiulus persimilis

    PubMed Central

    Verstappen, Francel W. A.; Luckerhoff, Ludo L. P.; Bouwmeester, Harro J.; Dicke, Marcel

    2010-01-01

    Cucumber plants (Cucumis sativus L.) respond to spider–mite (Tetranychus urticae) damage with the release of specific volatiles that are exploited by predatory mites, the natural enemies of the spider mites, to locate their prey. The production of volatiles also can be induced by exposing plants to the plant hormone jasmonic acid. We analyzed volatile emissions from 15 cucumber accessions upon herbivory by spider mites and upon exposure to jasmonic acid using gas chromatography—mass spectrometry. Upon induction, cucumber plants emitted over 24 different compounds, and the blend of induced volatiles consisted predominantly of terpenoids. The total amount of volatiles was higher in plants treated with jasmonic acid than in those infested with spider mites, with (E)-4,8-dimethyl-1,3,7-nonatriene, (E,E)-α-farnesene, and (E)-β-ocimene as the most abundant compounds in all accessions in both treatments. Significant variation among the accessions was found for the 24 major volatile compounds. The accessions differed strongly in total amount of volatiles emitted, and displayed very different odor profiles. Principal component analysis performed on the relative quantities of particular compounds within the blend revealed clusters of highly correlated volatiles, which is suggestive of common metabolic pathways. A number of cucumber accessions also were tested for their attractiveness to Phytoseiulus persimilis, a specialist predator of spider mites. Differences in the attraction of predatory mites by the various accessions correlated to differences in the individual chemical profiles of these accessions. The presence of genetic variation in induced plant volatile emission in cucumber shows that it is possible to breed for cucumber varieties that are more attractive to predatory mites and other biological control agents. PMID:20383796

  4. State laws on tobacco control--United States, 1998.

    PubMed

    Fishman, J A; Allison, H; Knowles, S B; Fishburn, B A; Woollery, T A; Marx, W T; Shelton, D M; Husten, C G; Eriksen, M P

    1999-06-25

    State laws addressing tobacco use, the leading preventable cause of death in the United States, are summarized. Laws address smoke-free indoor air, minors' access to tobacco products, advertising of tobacco products, and excise taxes on tobacco products. Legislation effective through December 31, 1998. CDC identified laws addressing tobacco control by using an on-line legal research database. CDC's findings were verified with the National Cancer Institute's State Cancer Legislative Database. Since a previous surveillance summary on state tobacco-control laws published in November 1995 (covering legislation effective through June 30, 1995), several states have enacted new restrictions or strengthened existing legislation that addresses smoke-free indoor air, minors' access to tobacco, tobacco advertising, and tobacco taxes. Five states strengthened their smoke-free indoor air legislation. All states and Washington, D.C., continued to prohibit the sale and distribution of tobacco products to minors; however, 21 states expanded minors' access laws by designating enforcement authorities, adding license suspension or revocation for sale to minors, or requiring signage. Since the 1995 report, eight additional states (a total of 19 states and Washington, D.C.) now ban vending machines from areas accessible to minors. Thirteen states restrict advertising of tobacco products, an increase of four states since the 1995 report. Although the number of states that tax cigarettes and smokeless tobacco did not change, 13 states increased excise taxes on cigarettes, and five states increased excise taxes on smokeless tobacco products. The average state excise tax on cigarettes is 38.9 cents per pack, an increase of 7.4 cents compared with the average tax in the 1995 report. State laws addressing tobacco control vary in relation to restrictiveness, enforcement and penalties, preemptions, and exceptions. The data summarizing state tobacco-control laws are available through CDC's State Tobacco Activities Tracking and Evaluation (STATE) System; the laws are collected and updated every quarter. The STATE System also contains state-specific data on the prevalence of tobacco use, tobacco-related deaths, and the costs of tobacco use. Information from the STATE System is available for use by policy makers at the state and local levels to plan and implement initiatives to prevent and reduce tobacco use. In addition, CDC is using this information to assess the ongoing impact of tobacco-control programs and policies on tobacco use.

  5. Moving Virtual Research Environments from high maintenance Stovepipes to Multi-purpose Sustainable Service-oriented Science Platforms

    NASA Astrophysics Data System (ADS)

    Klump, Jens; Fraser, Ryan; Wyborn, Lesley; Friedrich, Carsten; Squire, Geoffrey; Barker, Michelle; Moloney, Glenn

    2017-04-01

    The researcher of today is likely to be part of a team distributed over multiple sites that will access data from an external repository and then process the data on a public or private cloud or even on a large centralised supercomputer. They are increasingly likely to use a mixture of their own code, third party software and libraries, or even access global community codes. These components will be connected into a Virtual Research Environments (VREs) that will enable members of the research team who are not co-located to actively work together at various scales to share data, models, tools, software, workflows, best practices, infrastructures, etc. Many VRE's are built in isolation: designed to meet a specific research program with components tightly coupled and not capable of being repurposed for other use cases - they are becoming 'stovepipes'. The limited number of users of some VREs also means that the cost of maintenance per researcher can be unacceptably high. The alternative is to develop service-oriented Science Platforms that enable multiple communities to develop specialised solutions for specific research programs. The platforms can offer access to data, software tools and processing infrastructures (cloud, supercomputers) through globally distributed, interconnected modules. In Australia, the Virtual Geophysics Laboratory (VGL) was initially built to enable a specific set of researchers in government agencies access to specific data sets and a limited number of tools, that is now rapidly evolving into a multi-purpose Earth science platform with access to an increased variety of data, a broader range of tools, users from more sectors and a diversity of computational infrastructures. The expansion has been relatively easy, because of the architecture whereby data, tools and compute resources are loosely coupled via interfaces that are built on international standards and accessed as services wherever possible. In recent years, investments in discoverability and accessibility of data via online services in Australia mean that data resources can be easily added to the virtual environments as and when required. Another key to increasing to reusability and uptake of the VRE is the capability to capturing workflows so that they can be reused and repurposed both within and beyond the community that that defined the original use case. Unfortunately, Software-as-a-Service in the research sector is not yet mature. In response, we developed a Scientific Software solutions Center (SSSC) that enables researchers to discover, deploy and then share computational codes, code snippets or processes both in a human and machine-readable manner. Growth has come not only from within the Earth science community but from the Australian Virtual Laboratory community which is building VREs for a diversity of communities such as astronomy, genomics, environment, humanities, climate etc. Components such as access control, provenance, visualisation, accounting etc. are common to all scientific domains and sharing of these across multiple domains reduces costs, but more importantly increases the ability to undertake interdisciplinary science. These efforts are transitioning VREs to more sustainable Service-oriented Science Platforms that can be delivered in an agile, adaptable manner for broader community interests.

  6. The WHF Roadmap for Reducing CV Morbidity and Mortality Through Prevention and Control of RHD.

    PubMed

    Palafox, Benjamin; Mocumbi, Ana Olga; Kumar, R Krishna; Ali, Sulafa K M; Kennedy, Elizabeth; Haileamlak, Abraham; Watkins, David; Petricca, Kadia; Wyber, Rosemary; Timeon, Patrick; Mwangi, Jeremiah

    2017-03-01

    Rheumatic heart disease (RHD) is a preventable non-communicable condition that disproportionately affects the world's poorest and most vulnerable. The World Heart Federation Roadmap for improved RHD control is a resource designed to help a variety of stakeholders raise the profile of RHD nationally and globally, and provide a framework to guide and support the strengthening of national, regional and global RHD control efforts. The Roadmap identifies the barriers that limit access to and uptake of proven interventions for the prevention and control of RHD. It also highlights a variety of established and promising solutions that may be used to overcome these barriers. As a general guide, the Roadmap is meant to serve as the foundation for the development of tailored plans of action to improve RHD control in specific contexts. Copyright © 2016 World Heart Federation (Geneva). Published by Elsevier B.V. All rights reserved.

  7. Patient ECG recording control for an automatic implantable defibrillator

    NASA Technical Reports Server (NTRS)

    Fountain, Glen H. (Inventor); Lee, Jr., David G. (Inventor); Kitchin, David A. (Inventor)

    1986-01-01

    An implantable automatic defibrillator includes sensors which are placed on or near the patient's heart to detect electrical signals indicative of the physiology of the heart. The signals are digitally converted and stored into a FIFO region of a RAM by operation of a direct memory access (DMA) controller. The DMA controller operates transparently with respect to the microprocessor which is part of the defibrillator. The implantable defibrillator includes a telemetry communications circuit for sending data outbound from the defibrillator to an external device (either a patient controller or a physician's console or other) and a receiver for sensing at least an externally generated patient ECG recording command signal. The patient recording command signal is generated by the hand held patient controller. Upon detection of the patient ECG recording command, DMA copies the contents of the FIFO into a specific region of the RAM.

  8. An improved fault-tolerant control scheme for PWM inverter-fed induction motor-based EVs.

    PubMed

    Tabbache, Bekheïra; Benbouzid, Mohamed; Kheloui, Abdelaziz; Bourgeot, Jean-Matthieu; Mamoune, Abdeslam

    2013-11-01

    This paper proposes an improved fault-tolerant control scheme for PWM inverter-fed induction motor-based electric vehicles. The proposed strategy deals with power switch (IGBTs) failures mitigation within a reconfigurable induction motor control. To increase the vehicle powertrain reliability regarding IGBT open-circuit failures, 4-wire and 4-leg PWM inverter topologies are investigated and their performances discussed in a vehicle context. The proposed fault-tolerant topologies require only minimum hardware modifications to the conventional off-the-shelf six-switch three-phase drive, mitigating the IGBTs failures by specific inverter control. Indeed, the two topologies exploit the induction motor neutral accessibility for fault-tolerant purposes. The 4-wire topology uses then classical hysteresis controllers to account for the IGBT failures. The 4-leg topology, meanwhile, uses a specific 3D space vector PWM to handle vehicle requirements in terms of size (DC bus capacitors) and cost (IGBTs number). Experiments on an induction motor drive and simulations on an electric vehicle are carried-out using a European urban driving cycle to show that the proposed fault-tolerant control approach is effective and provides a simple configuration with high performance in terms of speed and torque responses. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  9. Role of the chromatin landscape and sequence in determining cell type-specific genomic glucocorticoid receptor binding and gene regulation.

    PubMed

    Love, Michael I; Huska, Matthew R; Jurk, Marcel; Schöpflin, Robert; Starick, Stephan R; Schwahn, Kevin; Cooper, Samantha B; Yamamoto, Keith R; Thomas-Chollier, Morgane; Vingron, Martin; Meijsing, Sebastiaan H

    2017-02-28

    The genomic loci bound by the glucocorticoid receptor (GR), a hormone-activated transcription factor, show little overlap between cell types. To study the role of chromatin and sequence in specifying where GR binds, we used Bayesian modeling within the universe of accessible chromatin. Taken together, our results uncovered that although GR preferentially binds accessible chromatin, its binding is biased against accessible chromatin located at promoter regions. This bias can only be explained partially by the presence of fewer GR recognition sequences, arguing for the existence of additional mechanisms that interfere with GR binding at promoters. Therefore, we tested the role of H3K9ac, the chromatin feature with the strongest negative association with GR binding, but found that this correlation does not reflect a causative link. Finally, we find a higher percentage of promoter-proximal GR binding for genes regulated by GR across cell types than for cell type-specific target genes. Given that GR almost exclusively binds accessible chromatin, we propose that cell type-specific regulation by GR preferentially occurs via distal enhancers, whose chromatin accessibility is typically cell type-specific, whereas ubiquitous target gene regulation is more likely to result from binding to promoter regions, which are often accessible regardless of cell type examined. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  10. Cloud-enabled microscopy and droplet microfluidic platform for specific detection of Escherichia coli in water.

    PubMed

    Golberg, Alexander; Linshiz, Gregory; Kravets, Ilia; Stawski, Nina; Hillson, Nathan J; Yarmush, Martin L; Marks, Robert S; Konry, Tania

    2014-01-01

    We report an all-in-one platform - ScanDrop - for the rapid and specific capture, detection, and identification of bacteria in drinking water. The ScanDrop platform integrates droplet microfluidics, a portable imaging system, and cloud-based control software and data storage. The cloud-based control software and data storage enables robotic image acquisition, remote image processing, and rapid data sharing. These features form a "cloud" network for water quality monitoring. We have demonstrated the capability of ScanDrop to perform water quality monitoring via the detection of an indicator coliform bacterium, Escherichia coli, in drinking water contaminated with feces. Magnetic beads conjugated with antibodies to E. coli antigen were used to selectively capture and isolate specific bacteria from water samples. The bead-captured bacteria were co-encapsulated in pico-liter droplets with fluorescently-labeled anti-E. coli antibodies, and imaged with an automated custom designed fluorescence microscope. The entire water quality diagnostic process required 8 hours from sample collection to online-accessible results compared with 2-4 days for other currently available standard detection methods.

  11. Cloud-Enabled Microscopy and Droplet Microfluidic Platform for Specific Detection of Escherichia coli in Water

    PubMed Central

    Kravets, Ilia; Stawski, Nina; Hillson, Nathan J.; Yarmush, Martin L.; Marks, Robert S.; Konry, Tania

    2014-01-01

    We report an all-in-one platform – ScanDrop – for the rapid and specific capture, detection, and identification of bacteria in drinking water. The ScanDrop platform integrates droplet microfluidics, a portable imaging system, and cloud-based control software and data storage. The cloud-based control software and data storage enables robotic image acquisition, remote image processing, and rapid data sharing. These features form a “cloud” network for water quality monitoring. We have demonstrated the capability of ScanDrop to perform water quality monitoring via the detection of an indicator coliform bacterium, Escherichia coli, in drinking water contaminated with feces. Magnetic beads conjugated with antibodies to E. coli antigen were used to selectively capture and isolate specific bacteria from water samples. The bead-captured bacteria were co-encapsulated in pico-liter droplets with fluorescently-labeled anti-E. coli antibodies, and imaged with an automated custom designed fluorescence microscope. The entire water quality diagnostic process required 8 hours from sample collection to online-accessible results compared with 2–4 days for other currently available standard detection methods. PMID:24475107

  12. Cholera risk factors, Papua New Guinea, 2010.

    PubMed

    Rosewell, Alexander; Addy, Benita; Komnapi, Lucas; Makanda, Freda; Ropa, Berry; Posanai, Enoch; Dutta, Samir; Mola, Glen; Man, W Y Nicola; Zwi, Anthony; MacIntyre, C Raina

    2012-11-05

    Cholera is newly emergent in Papua New Guinea but may soon become endemic. Identifying the risk factors for cholera provides evidence for targeted prevention and control measures. We conducted a hospital-based case-control study to identify cholera risk factors. Using stool culture as the standard, we evaluated a cholera point of care test in the field. 176 participants were recruited: 54 cases and 122 controls. Independent risk factors for cholera were: being over 20 years of age (aOR 2.5; 95%CI 1.1, 5.4), defecating in the open air (or river) (aOR 4.5; 95% CI 1.4, 14.4) and knowing someone who travelled to a cholera affected area (aOR 4.1; 95%CI 1.6, 10.7); while the availability of soap for handwashing at home was protective (aOR 0.41; 95%CI 0.19, 0.87). Those reporting access to a piped water distribution system in the home were twice as likely to report the availability of soap for handwashing. The sensitivity and specificity of the rapid test were 72% (95% CI 47-90) and 71% (95%CI 44-90%). Improving population access to the piped water distribution system and sanitation will likely reduce transmission by enabling enhanced hygiene and limiting the contamination of water sources. The One step V. cholerae O1/O139 Antigen Test is of limited utility for clinical decision making in a hospital setting with access to traditional laboratory methods. Settlement dwellers and mobile populations of all age groups should be targeted for interventions in Papua New Guinea.

  13. Cholera risk factors, Papua New Guinea, 2010

    PubMed Central

    2012-01-01

    Background Cholera is newly emergent in Papua New Guinea but may soon become endemic. Identifying the risk factors for cholera provides evidence for targeted prevention and control measures. Methods We conducted a hospital-based case–control study to identify cholera risk factors. Using stool culture as the standard, we evaluated a cholera point of care test in the field. Results 176 participants were recruited: 54 cases and 122 controls. Independent risk factors for cholera were: being over 20 years of age (aOR 2.5; 95%CI 1.1, 5.4), defecating in the open air (or river) (aOR 4.5; 95% CI 1.4, 14.4) and knowing someone who travelled to a cholera affected area (aOR 4.1; 95%CI 1.6, 10.7); while the availability of soap for handwashing at home was protective (aOR 0.41; 95%CI 0.19, 0.87). Those reporting access to a piped water distribution system in the home were twice as likely to report the availability of soap for handwashing. The sensitivity and specificity of the rapid test were 72% (95% CI 47–90) and 71% (95%CI 44–90%). Conclusions Improving population access to the piped water distribution system and sanitation will likely reduce transmission by enabling enhanced hygiene and limiting the contamination of water sources. The One step V. cholerae O1/O139 Antigen Test is of limited utility for clinical decision making in a hospital setting with access to traditional laboratory methods. Settlement dwellers and mobile populations of all age groups should be targeted for interventions in Papua New Guinea. PMID:23126504

  14. A user-friendly mathematical modelling web interface to assist local decision making in the fight against drug-resistant tuberculosis.

    PubMed

    Ragonnet, Romain; Trauer, James M; Denholm, Justin T; Marais, Ben J; McBryde, Emma S

    2017-05-30

    Multidrug-resistant and rifampicin-resistant tuberculosis (MDR/RR-TB) represent an important challenge for global tuberculosis (TB) control. The high rates of MDR/RR-TB observed among re-treatment cases can arise from diverse pathways: de novo amplification during initial treatment, inappropriate treatment of undiagnosed MDR/RR-TB, relapse despite appropriate treatment, or reinfection with MDR/RR-TB. Mathematical modelling allows quantification of the contribution made by these pathways in different settings. This information provides valuable insights for TB policy-makers, allowing better contextualised solutions. However, mathematical modelling outputs need to consider local data and be easily accessible to decision makers in order to improve their usefulness. We present a user-friendly web-based modelling interface, which can be used by people without technical knowledge. Users can input their own parameter values and produce estimates for their specific setting. This innovative tool provides easy access to mathematical modelling outputs that are highly relevant to national TB control programs. In future, the same approach could be applied to a variety of modelling applications, enhancing local decision making.

  15. Using ICT techniques for improving mechatronic systems' dependability

    NASA Astrophysics Data System (ADS)

    Miron, Emanuel; Silva, João P. M. A.; Machado, José; Olaru, Dumitru; Prisacaru, Gheorghe

    2013-10-01

    The use of analysis techniques for industrial controller's analysis, such as Simulation and Formal Verification, is complex on industrial context. This complexity is due to the fact that such techniques require sometimes high investment in specific skilled human resources that have sufficient theoretical knowledge in those domains. This paper aims, mainly, to show that it is possible to obtain a timed automata model for formal verification purposes, considering the CAD model of a mechanical component. This systematic approach can be used, by companies, for the analysis of industrial controllers programs. For this purpose, it is discussed, in the paper, the best way to systematize these procedures, and this paper describes, only, the first step of a complex process and promotes a discussion of the main difficulties that can be found and a possibility for handle those difficulties. A library for formal verification purposes is obtained from original 3D CAD models using Software as a Service platform (SaaS) that, nowadays, has become a common deliverable model for many applications, because SaaS is typically accessed by users via internet access.

  16. Variation in resource limitation of plant reproduction influences natural selection on floral traits of Asclepias syriaca.

    PubMed

    Caruso, Christina M; Remington, Davin L D; Ostergren, Kate E

    2005-11-01

    The availability of both pollen and resources can influence natural selection on floral traits, but their relative importance in shaping floral evolution is unclear. We experimentally manipulated pollinator and resource (fertilizer and water) availability in the perennial wildflower Asclepias syriaca L. Nine floral traits, one male fitness component (number of pollinia removed), and two female fitness components (number of pollinia inserted and number of fruits initiated) were measured for plants in each of three treatments (unmanipulated control, decreased pollinator access, and resource supplementation). Although decreasing pollinators' access to flowers did result in fewer pollinia inserted and removed, fruit set and phenotypic selection on floral traits via female and male fitness did not differ from the control. In contrast, resource supplementation increased fruit set, and phenotypic selection on seven out of nine floral traits was stronger via female than male fitness, consistent with the prediction that selection via female fitness would be greater when reproduction was less resource-limited. Our results support the hypothesis that abiotic resource availability can influence floral evolution by altering gender-specific selection.

  17. Applying Service-Oriented Architecture to Archiving Data in Control and Monitoring Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nogiec, J. M.; Trombly-Freytag, K.

    Current trends in the architecture of software systems focus our attention on building systems using a set of loosely coupled components, each providing a specific functionality known as service. It is not much different in control and monitoring systems, where a functionally distinct sub-system can be identified and independently designed, implemented, deployed and maintained. One functionality that renders itself perfectly to becoming a service is archiving the history of the system state. The design of such a service and our experience of using it are the topic of this article. The service is built with responsibility segregation in mind, therefore,more » it provides for reducing data processing on the data viewer side and separation of data access and modification operations. The service architecture and the details concerning its data store design are discussed. An implementation of a service client capable of archiving EPICS process variables (PV) and LabVIEW shared variables is presented. Data access tools, including a browser-based data viewer and a mobile viewer, are also presented.« less

  18. Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent

    NASA Technical Reports Server (NTRS)

    Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.

    2013-01-01

    This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.

  19. Use and perceptions of information among family physicians: sources considered accessible, relevant, and reliable.

    PubMed

    Kosteniuk, Julie G; Morgan, Debra G; D'Arcy, Carl K

    2013-01-01

    The research determined (1) the information sources that family physicians (FPs) most commonly use to update their general medical knowledge and to make specific clinical decisions, and (2) the information sources FPs found to be most physically accessible, intellectually accessible (easy to understand), reliable (trustworthy), and relevant to their needs. A cross-sectional postal survey of 792 FPs and locum tenens, in full-time or part-time medical practice, currently practicing or on leave of absence in the Canadian province of Saskatchewan was conducted during the period of January to April 2008. Of 666 eligible physicians, 331 completed and returned surveys, resulting in a response rate of 49.7% (331/666). Medical textbooks and colleagues in the main patient care setting were the top 2 sources for the purpose of making specific clinical decisions. Medical textbooks were most frequently considered by FPs to be reliable (trustworthy), and colleagues in the main patient care setting were most physically accessible (easy to access). When making specific clinical decisions, FPs were most likely to use information from sources that they considered to be reliable and generally physically accessible, suggesting that FPs can best be supported by facilitating easy and convenient access to high-quality information.

  20. Use and perceptions of information among family physicians: sources considered accessible, relevant, and reliable

    PubMed Central

    Kosteniuk, Julie G.; Morgan, Debra G.; D'Arcy, Carl K.

    2013-01-01

    Objectives: The research determined (1) the information sources that family physicians (FPs) most commonly use to update their general medical knowledge and to make specific clinical decisions, and (2) the information sources FPs found to be most physically accessible, intellectually accessible (easy to understand), reliable (trustworthy), and relevant to their needs. Methods: A cross-sectional postal survey of 792 FPs and locum tenens, in full-time or part-time medical practice, currently practicing or on leave of absence in the Canadian province of Saskatchewan was conducted during the period of January to April 2008. Results: Of 666 eligible physicians, 331 completed and returned surveys, resulting in a response rate of 49.7% (331/666). Medical textbooks and colleagues in the main patient care setting were the top 2 sources for the purpose of making specific clinical decisions. Medical textbooks were most frequently considered by FPs to be reliable (trustworthy), and colleagues in the main patient care setting were most physically accessible (easy to access). Conclusions: When making specific clinical decisions, FPs were most likely to use information from sources that they considered to be reliable and generally physically accessible, suggesting that FPs can best be supported by facilitating easy and convenient access to high-quality information. PMID:23405045

  1. Achieving fertility control through woman’s autonomy and access to maternal healthcare: Are we on track? In-depth analysis of PDHS-2012-13

    PubMed Central

    Hassan, Sehar-un-Nisa; Siddiqui, Salma; Mahmood, Ayeshah

    2015-01-01

    Background and Objective: Fertility control preferences and maternal healthcare have recently become a major concern for developing nations with evidence suggesting that low fertility control rates and poor maternal healthcare are among major obstructions in ensuring health and social status for women. Our objective was toanalyze the factors that influence women’s autonomy, access to maternal healthcare, and fertility control preferences in Pakistan. Methods: Data consisted of 11,761 ever-married women of ages 15-49 years from PDHS, 2012-13. Variables included socio-demographics, women’s autonomy, fertility control preferences and access to maternal healthcare. Results: Findings from multivariate analysis showed that women’s younger age, having less than three number of children and independent or joint decision-making (indicators of high autonomy) remained the most significant predictors for access to better quality maternal healthcare and better fertility control preferences when other variables were controlled. Conclusion: Women’s access to good quality maternal health care and fertility control preferences are directly and indirectly influenced by their demographic characteristics and decision-making patterns in domestic affairs. PMID:26870096

  2. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  3. 75 FR 63161 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ... access. Records are accessible only to authorized persons with a valid need-to-know, who are... need-to-know are allowed access to JPAS. Additionally, access to JPAS is based on a user's specific...). (Signature).' Attorneys or other persons acting on behalf of an individual must provide written authorization...

  4. 75 FR 39991 - Notice of Availability of the Proposed Models For Plant-Specific Adoption of Technical...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... Agencywide Documents Access and Management System (ADAMS) under Accession Number ML080510164. The proposed..., Maryland. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly available documents..., Revision 3. You can access publicly available documents related to this notice using the following methods...

  5. 49 CFR 38.125 - Mobility aid accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SPECIFICATIONS FOR TRANSPORTATION VEHICLES Intercity Rail Cars and Systems § 38.125 Mobility aid accessibility. (a)(1) General. All intercity rail cars, other than level entry cars, required to be accessible by... to be accessible, or mini-high platforms complying with § 38.113(d) are provided, the car is not...

  6. Demystifying Remote Access

    ERIC Educational Resources Information Center

    Howe, Grant

    2009-01-01

    With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…

  7. 78 FR 38227 - Connect America Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-26

    ... different per- location support amounts based on the existing level of Internet access ($550 for homes with low-speed Internet access and $775, as in the first round, for homes with only dial-up access), and... Internet access. We adopt a process for challenges to the eligibility of specific areas where price cap...

  8. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  9. A panel analysis of the strategic association between information and communication technology and public health delivery.

    PubMed

    Wu, Sarah Jinhui; Raghupathi, Wullianallur

    2012-10-22

    In this exploratory research, we use panel data analysis to examine the correlation between Information and Communication Technology (ICTs) and public health delivery at the country level. The goal of this exploratory research is to examine the strategic association over time between ICTs and country-level public health. Using data from the World Development Indicators, we construct a panel data set of countries of five different income levels and look closely at the period from 2000 to 2008. The panel data analysis allows us to explore this dynamic relationship under the control for unobserved country-specific effects by using a fixed-effects estimation method. In particular,, we examine the association of five ICT factors with five public health indicators: adolescent fertility rate, child immunization coverage, tuberculosis case detected, life expectancy, and adult mortality rate. First, overall ICTs' factors substantially improve a country's public health delivery on the top of wealth effect. Second, among all the ICTs' factors, accessibility is the only one that is associated with improvements in all aspects of public health delivery, while the contributions from the usage, quality, and applications are negligible. ICTs' accessibility factor is associated with a considerable extension to life expectancy and reduced adult mortality rate. Third, all entity-specific factors are significant in each model, indicating that countries' economic development level does influence their public health delivery. Our results indicate that ICT accessibility has a strong association with effective delivery of public health. There are others, but the key strategic applications are eHealth and mHealth. The findings of this study will help government officials and public health policy makers to formulate strategic decisions regarding the best ICT investments and deployment. For example, the study shows that providing accessibility should be a critical focus.

  10. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  11. [Surgical approaches to tibial plateau fractures].

    PubMed

    Krause, Matthias; Müller, Gunnar; Frosch, Karl-Heinz

    2018-06-06

    Intra-articular tibial plateau fractures can present a surgical challenge due to complex injury patterns and compromised soft tissue. The treatment goal is to spare the soft tissue and an anatomical reconstruction of the tibial articular surface. Depending on the course of the fracture, a fracture-specific access strategy is recommended to provide correct positioning of the plate osteosynthesis. While the anterolateral approach is used in the majority of lateral tibial plateau fractures, only one third of the joint surface is visible; however, posterolateral fragments require an individual approach, e. g. posterolateral or posteromedial. If necessary, osteotomy of the femoral epicondyles can improve joint access for reduction control. Injuries to the posterior columns should be anatomically reconstructed and biomechanically correctly addressed via posterior approaches. Bony posterior cruciate ligament tears can be refixed via a minimally invasive posteromedial approach.

  12. Driver face recognition as a security and safety feature

    NASA Astrophysics Data System (ADS)

    Vetter, Volker; Giefing, Gerd-Juergen; Mai, Rudolf; Weisser, Hubert

    1995-09-01

    We present a driver face recognition system for comfortable access control and individual settings of automobiles. The primary goals are the prevention of car thefts and heavy accidents caused by unauthorized use (joy-riders), as well as the increase of safety through optimal settings, e.g. of the mirrors and the seat position. The person sitting on the driver's seat is observed automatically by a small video camera in the dashboard. All he has to do is to behave cooperatively, i.e. to look into the camera. A classification system validates his access. Only after a positive identification, the car can be used and the driver-specific environment (e.g. seat position, mirrors, etc.) may be set up to ensure the driver's comfort and safety. The driver identification system has been integrated in a Volkswagen research car. Recognition results are presented.

  13. Electronic media, violence, and adolescents: an emerging public health problem.

    PubMed

    David-Ferdon, Corinne; Hertz, Marci Feldman

    2007-12-01

    Adolescents' access to and use of new media technology (e.g., cell phone, personal data assistant, computer for Internet access) are on the rise, and this explosion of technology brings with it potential benefits and risks. Attention is growing about the risk of adolescents to become victims of aggression perpetrated by peers with new technology. In September 2006, the Centers for Disease Control and Prevention convened a panel of experts in technology and youth aggression to examine this specific risk. This special issue of the Journal of Adolescent Health presents the data and recommendations for future directions discussed at the meeting. The articles in the Journal support the argument that electronic aggression is an emerging public health problem in need of additional prevalence and etiological research to support the development and evaluation of effective prevention programs.

  14. Exploring the formation pathways of donor-acceptor catenanes in aqueous dynamic combinatorial libraries.

    PubMed

    Cougnon, Fabien B L; Au-Yeung, Ho Yu; Pantoş, G Dan; Sanders, Jeremy K M

    2011-03-09

    The discovery through dynamic combinatorial chemistry (DCC) of a new generation of donor-acceptor [2]catenanes highlights the power of DCC to access unprecedented structures. While conventional thinking has limited the scope of donor-acceptor catenanes to strictly alternating stacks of donor (D) and acceptor (A) aromatic units, DCC is demonstrated in this paper to give access to unusual DAAD, DADD, and ADAA stacks. Each of these catenanes has specific structural requirements, allowing control of their formation. On the basis of these results, and on the observation that the catenanes represent kinetic bottlenecks in the reaction pathway, we propose a mechanism that explains and predicts the structures formed. Furthermore, the spontaneous assembly of catenanes in aqueous dynamic systems gives a fundamental insight into the role played by hydrophobic effect and donor-acceptor interactions when building such complex architectures.

  15. Going "open" with mesoscopy: a new dimension on multi-view imaging.

    PubMed

    Gualda, Emilio; Moreno, Nuno; Tomancak, Pavel; Martins, Gabriel G

    2014-03-01

    OpenSPIM and OpenSpinMicroscopy emerged as open access platforms for Light Sheet and Optical Projection Imaging, often called as optical mesoscopy techniques. Both projects can be easily reproduced using comprehensive online instructions that should foster the implementation and further development of optical imaging techniques with sample rotation control. This additional dimension in an open system offers the possibility to make multi-view microscopy easily modified and will complement the emerging commercial solutions. Furthermore, it is deeply based on other open platforms such as MicroManager and Arduino, enabling development of tailored setups for very specific biological questions. In our perspective, the open access principle of OpenSPIM and OpenSpinMicroscopy is a game-changer, helping the concepts of light sheet and optical projection tomography (OPT) to enter the mainstream of biological imaging.

  16. How Well Does Medicaid Work in Improving Access to Care?

    PubMed Central

    Long, Sharon K; Coughlin, Teresa; King, Jennifer

    2005-01-01

    Objective To provide an assessment of how well the Medicaid program is working at improving access to and use of health care for low-income mothers. Data Source/Study Setting The 1997 and 1999 National Survey of America's Families, with state and county information drawn from the Area Resource File and other sources. Study Design Estimate the effects of Medicaid on access and use relative to private coverage and being uninsured, using instrumental variables methods to control for selection into insurance status. Data Collection/Extraction Method This study combines data from 1997 and 1999 for mothers in families with incomes below 200 percent of the federal poverty level. Principal Findings We find that Medicaid beneficiaries' access and use are significantly better than those obtained by the uninsured. Analysis that controls for insurance selection shows that the benefits of having Medicaid coverage versus being uninsured are substantially larger than what is estimated when selection is not accounted for. Our results also indicate that Medicaid beneficiaries' access and use are comparable to that of the low-income privately insured. Once insurance selection is controlled for, access and use under Medicaid is not significantly different from access and use under private insurance. Without controls for insurance selection, access and use for Medicaid beneficiaries is found to be significantly worse than for the low-income privately insured. Conclusions Our results show that the Medicaid program improved access to care relative to uninsurance for low-income mothers, achieving access and use levels comparable to those of the privately insured. Our results also indicate that prior research, which generally has not controlled for selection into insurance coverage, has likely understated the gains of Medicaid relative to uninsurance and overstated the gains of private coverage relative to Medicaid. PMID:15663701

  17. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  18. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  19. Automating Access Control Logics in Simple Type Theory with LEO-II

    NASA Astrophysics Data System (ADS)

    Benzmüller, Christoph

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.

  20. 42 CFR 431.834 - Access to records: Claims processing assessment systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834 Access to records: Claims processing assessment systems. The agency, upon written request, must provide HHS staff with access to all records pertaining to its MQC claims processing assessment system reviews...

  1. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  2. Investigating an Open Methodology for Designing Domain-Specific Language Collections

    ERIC Educational Resources Information Center

    Fitzgerald, Alannah; Wu, Shaoqun; Barge, Martin

    2014-01-01

    With this research and design paper, we are proposing that Open Educational Resources (OERs) and Open Access (OA) publications give increasing access to high quality online educational and research content for the development of powerful domain-specific language collections that can be further enhanced linguistically with the Flexible Language…

  3. 10 CFR 709.3 - Covered persons subject to a CI evaluation and polygraph.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... administrator with access to a system containing classified information, as identified by the DOE or NNSA Chief Information Officer. (d) Specific incident polygraph examinations. In response to specific facts or...) of this section who will have or has access to classified information or materials protected under...

  4. 10 CFR 709.3 - Covered persons subject to a CI evaluation and polygraph.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... administrator with access to a system containing classified information, as identified by the DOE or NNSA Chief Information Officer. (d) Specific incident polygraph examinations. In response to specific facts or...) of this section who will have or has access to classified information or materials protected under...

  5. 10 CFR 709.3 - Covered persons subject to a CI evaluation and polygraph.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... administrator with access to a system containing classified information, as identified by the DOE or NNSA Chief Information Officer. (d) Specific incident polygraph examinations. In response to specific facts or...) of this section who will have or has access to classified information or materials protected under...

  6. Can contracted out health facilities improve access, equity, and quality of maternal and newborn health services? Evidence from Pakistan.

    PubMed

    Zaidi, Shehla; Riaz, Atif; Rabbani, Fauziah; Azam, Syed Iqbal; Imran, Syeda Nida; Pradhan, Nouhseen Akber; Khan, Gul Nawaz

    2015-11-25

    The case of contracting out government health services to non-governmental organizations (NGOs) has been weak for maternal, newborn, and child health (MNCH) services, with documented gains being mainly in curative services. We present an in-depth assessment of the comparative advantages of contracting out on MNCH access, quality, and equity, using a case study from Pakistan. An end-line, cross-sectional assessment was conducted of government facilities contracted out to a large national NGO and government-managed centres serving as controls, in two remote rural districts of Pakistan. Contracting out was specific for augmenting MNCH services but without contractual performance incentives. A household survey, a health facility survey, and focus group discussions with client and spouses were used for assessment. Contracted out facilities had a significantly higher utilization as compared to control facilities for antenatal care, delivery, postnatal care, emergency obstetric care, and neonatal illness. Contracted facilities had comparatively better quality of MNCH services but not in all aspects. Better household practices were also seen in the district where contracting involved administrative control over outreach programs. Contracting was also faced with certain drawbacks. Facility utilization was inequitably higher amongst more educated and affluent clients. Contracted out catchments had higher out-of-pocket expenses on MNCH services, driven by steeper transport costs and user charges for additional diagnostics. Contracting out did not influence higher MNCH service coverage rates across the catchment. Physical distances, inadequate transport, and low demand for facility-based care in non-emergency settings were key client-reported barriers. Contracting out MNCH services at government health facilities can improve facility utilization and bring some improvement in  quality of services. However, contracting out of health facilities is insufficient to increase service access across the catchment in remote rural contexts and requires accompanying measures for demand enhancement, transportation access, and targeting of the more disadvantaged clientele.

  7. Interactive web-based mapping: bridging technology and data for health.

    PubMed

    Highfield, Linda; Arthasarnprasit, Jutas; Ottenweller, Cecelia A; Dasprez, Arnaud

    2011-12-23

    The Community Health Information System (CHIS) online mapping system was first launched in 1998. Its overarching goal was to provide researchers, residents and organizations access to health related data reflecting the overall health and well-being of their communities within the Greater Houston area. In September 2009, initial planning and development began for the next generation of CHIS. The overarching goal for the new version remained to make health data easily accessible for a wide variety of research audiences. However, in the new version we specifically sought to make the CHIS truly interactive and give the user more control over data selection and reporting. In July 2011, a beta version of the next-generation of the application was launched. This next-generation is also a web based interactive mapping tool comprised of two distinct portals: the Breast Health Portal and Project Safety Net. Both are accessed via a Google mapping interface. Geographic coverage for the portals is currently an 8 county region centered on Harris County, Texas. Data accessed by the application include Census 2000, Census 2010 (underway), cancer incidence from the Texas Cancer Registry (TX Dept. of State Health Services), death data from Texas Vital Statistics, clinic locations for free and low-cost health services, along with service lists, hours of operation, payment options and languages spoken, uninsured and poverty data. The system features query on the fly technology, which means the data is not generated until the query is provided to the system. This allows users to interact in real-time with the databases and generate customized reports and maps. To the author's knowledge, the Breast Health Portal and Project Safety Net are the first local-scale interactive online mapping interfaces for public health data which allow users to control the data generated. For example, users may generate breast cancer incidence rates by Census tract, in real time, for women aged 40-64. Conversely, they could then generate the same rates for women aged 35-55. The queries are user controlled.

  8. Human Connectome Project Informatics: quality control, database services, and data visualization

    PubMed Central

    Marcus, Daniel S.; Harms, Michael P.; Snyder, Abraham Z.; Jenkinson, Mark; Wilson, J Anthony; Glasser, Matthew F.; Barch, Deanna M.; Archie, Kevin A.; Burgess, Gregory C.; Ramaratnam, Mohana; Hodge, Michael; Horton, William; Herrick, Rick; Olsen, Timothy; McKay, Michael; House, Matthew; Hileman, Michael; Reid, Erin; Harwell, John; Coalson, Timothy; Schindler, Jon; Elam, Jennifer S.; Curtiss, Sandra W.; Van Essen, David C.

    2013-01-01

    The Human Connectome Project (HCP) has developed protocols, standard operating and quality control procedures, and a suite of informatics tools to enable high throughput data collection, data sharing, automated data processing and analysis, and data mining and visualization. Quality control procedures include methods to maintain data collection consistency over time, to measure head motion, and to establish quantitative modality-specific overall quality assessments. Database services developed as customizations of the XNAT imaging informatics platform support both internal daily operations and open access data sharing. The Connectome Workbench visualization environment enables user interaction with HCP data and is increasingly integrated with the HCP's database services. Here we describe the current state of these procedures and tools and their application in the ongoing HCP study. PMID:23707591

  9. Circulating levels of endocannabinoids respond acutely to voluntary exercise, are altered in mice selectively bred for high voluntary wheel running, and differ between the sexes

    PubMed Central

    Thompson, Zoe; Argueta, Donovan; Garland, Theodore; DiPatrizio, Nicholas

    2017-01-01

    The endocannabinoid system serves many physiological roles, including in the regulation of energy balance, food reward, and voluntary locomotion. Signaling at the cannabinoid type 1 receptor has been specifically implicated in motivation for rodent voluntary exercise on wheels. We studied four replicate lines of high runner (HR) mice that have been selectively bred for 81 generations based on average number of wheel revolutions on days five and six of a six-day period of wheel access. Four additional replicate lines are bred without regard to wheel running, and serve as controls (C) for random genetic effects that may cause divergence among lines. On average, mice from HR lines voluntarily run on wheels three times more than C mice on a daily basis. We tested the general hypothesis that circulating levels of endocannabinoids (i.e., 2-arachidonoylglycerol [2-AG] and anandamide [AEA]) differ between HR and C mice in a sex-specific manner. Fifty male and 50 female mice were allowed access to wheels for six days, while another 50 males and 50 females were kept without access to wheels (half HR, half C for all groups). Blood was collected by cardiac puncture during the time of peak running on the sixth night of wheel access or no wheel access, and later analyzed for 2-AG and AEA content by ultra-performance liquid chromatography coupled to tandem mass spectrometry. We observed a significant three-way interaction among sex, linetype, and wheel access for 2-AG concentrations, with females generally having lower levels than males and wheel access lowering 2-AG levels in some but not all subgroups. The number of wheel revolutions in the minutes or hours immediately prior to sampling did not quantitatively predict plasma 2-AG levels within groups. We also observed a trend for a linetype-by-wheel access interaction for AEA levels, with wheel access lowering plasma concentrations of AEA in HR mice, while raising them in C mice. In addition, females tended to have higher AEA concentrations than males. For mice housed with wheels, the amount of running during the 30 minutes before sampling was a significant positive predictor of plasma AEA within groups, and HR mice had significantly lower levels of AEA than C mice. Our results suggest that voluntary exercise alters circulating levels of endocannabinoids, and further demonstrate that selective breeding for voluntary exercise is associated with evolutionary changes in the endocannabinoid system. PMID:28017680

  10. Circulating levels of endocannabinoids respond acutely to voluntary exercise, are altered in mice selectively bred for high voluntary wheel running, and differ between the sexes.

    PubMed

    Thompson, Zoe; Argueta, Donovan; Garland, Theodore; DiPatrizio, Nicholas

    2017-03-01

    The endocannabinoid system serves many physiological roles, including in the regulation of energy balance, food reward, and voluntary locomotion. Signaling at the cannabinoid type 1 receptor has been specifically implicated in motivation for rodent voluntary exercise on wheels. We studied four replicate lines of high runner (HR) mice that have been selectively bred for 81 generations based on average number of wheel revolutions on days five and six of a six-day period of wheel access. Four additional replicate lines are bred without regard to wheel running, and serve as controls (C) for random genetic effects that may cause divergence among lines. On average, mice from HR lines voluntarily run on wheels three times more than C mice on a daily basis. We tested the general hypothesis that circulating levels of endocannabinoids (i.e., 2-arachidonoylglycerol [2-AG] and anandamide [AEA]) differ between HR and C mice in a sex-specific manner. Fifty male and 50 female mice were allowed access to wheels for six days, while another 50 males and 50 females were kept without access to wheels (half HR, half C for all groups). Blood was collected by cardiac puncture during the time of peak running on the sixth night of wheel access or no wheel access, and later analyzed for 2-AG and AEA content by ultra-performance liquid chromatography coupled to tandem mass spectrometry. We observed a significant three-way interaction among sex, linetype, and wheel access for 2-AG concentrations, with females generally having lower levels than males and wheel access lowering 2-AG levels in some but not all subgroups. The number of wheel revolutions in the minutes or hours immediately prior to sampling did not quantitatively predict plasma 2-AG levels within groups. We also observed a trend for a linetype-by-wheel access interaction for AEA levels, with wheel access lowering plasma concentrations of AEA in HR mice, while raising them in C mice. In addition, females tended to have higher AEA concentrations than males. For mice housed with wheels, the amount of running during the 30min before sampling was a significant positive predictor of plasma AEA within groups, and HR mice had significantly lower levels of AEA than C mice. Our results suggest that voluntary exercise alters circulating levels of endocannabinoids, and further demonstrate that selective breeding for voluntary exercise is associated with evolutionary changes in the endocannabinoid system. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Fundamental constructs in food parenting practices: a content map to guide future research

    PubMed Central

    Ward, Dianne S.; Fisher, Jennifer O.; Faith, Myles S.; Hughes, Sheryl O.; Kremers, Stef P.J.; Musher-Eizenman, Dara R.; O’Connor, Teresia M.; Patrick, Heather; Power, Thomas G.

    2016-01-01

    Although research shows that “food parenting practices” can impact children’s diet and eating habits, current understanding of the impact of specific practices has been limited by inconsistencies in terminology and definitions. This article represents a critical appraisal of food parenting practices, including clear terminology and definitions, by a working group of content experts. The result of this effort was the development of a content map for future research that presents 3 overarching, higher-order food parenting constructs – coercive control, structure, and autonomy support – as well as specific practice subconstructs. Coercive control includes restriction, pressure to eat, threats and bribes, and using food to control negative emotions. Structure includes rules and limits, limited/guided choices, monitoring, meal- and snacktime routines, modeling, food availability and accessibility, food preparation, and unstructured practices. Autonomy support includes nutrition education, child involvement, encouragement, praise, reasoning, and negotiation. Literature on each construct is reviewed, and directions for future research are offered. Clear terminology and definitions should facilitate cross-study comparisons and minimize conflicting findings resulting from previous discrepancies in construct operationalization. PMID:26724487

  12. Identification of Alternative Splice Variants Using Unique Tryptic Peptide Sequences for Database Searches.

    PubMed

    Tran, Trung T; Bollineni, Ravi C; Strozynski, Margarita; Koehler, Christian J; Thiede, Bernd

    2017-07-07

    Alternative splicing is a mechanism in eukaryotes by which different forms of mRNAs are generated from the same gene. Identification of alternative splice variants requires the identification of peptides specific for alternative splice forms. For this purpose, we generated a human database that contains only unique tryptic peptides specific for alternative splice forms from Swiss-Prot entries. Using this database allows an easy access to splice variant-specific peptide sequences that match to MS data. Furthermore, we combined this database without alternative splice variant-1-specific peptides with human Swiss-Prot. This combined database can be used as a general database for searching of LC-MS data. LC-MS data derived from in-solution digests of two different cell lines (LNCaP, HeLa) and phosphoproteomics studies were analyzed using these two databases. Several nonalternative splice variant-1-specific peptides were found in both cell lines, and some of them seemed to be cell-line-specific. Control and apoptotic phosphoproteomes from Jurkat T cells revealed several nonalternative splice variant-1-specific peptides, and some of them showed clear quantitative differences between the two states.

  13. Truck facility access design guidelines statewide.

    DOT National Transportation Integrated Search

    2011-06-01

    The overall purpose of this project is to develop design guidelines for truck access to truck stop facilities adjoining interstate highways and accessed by interchanges in Louisiana. The specific objectives of the research are to: 1. Identify existin...

  14. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  15. The Genetic Privacy Act and commentary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. Therefore, to effectively protect genetic privacy unauthorized collection and analysis of individually identifiable DNA must be prohibited. As a result, the premise of the Act is that no stranger should have or control identifiable DNA samples or genetic information about an individual unless that individual specifically authorizes the collection of DNA samples for the purpose of genetic analysis, authorized the creation of that private information, andmore » has access to and control over the dissemination of that information.« less

  16. Testing and Performance Analysis of the Multichannel Error Correction Code Decoder

    NASA Technical Reports Server (NTRS)

    Soni, Nitin J.

    1996-01-01

    This report provides the test results and performance analysis of the multichannel error correction code decoder (MED) system for a regenerative satellite with asynchronous, frequency-division multiple access (FDMA) uplink channels. It discusses the system performance relative to various critical parameters: the coding length, data pattern, unique word value, unique word threshold, and adjacent-channel interference. Testing was performed under laboratory conditions and used a computer control interface with specifically developed control software to vary these parameters. Needed technologies - the high-speed Bose Chaudhuri-Hocquenghem (BCH) codec from Harris Corporation and the TRW multichannel demultiplexer/demodulator (MCDD) - were fully integrated into the mesh very small aperture terminal (VSAT) onboard processing architecture and were demonstrated.

  17. Empower: access to medicine - working towards early access.

    PubMed

    Pearson, Jennifer Bryant; Turgoose, James; Hargrave, James

    2015-01-01

    Empower: Access to Medicine's contribution will document the founding of Empower: Access to Medicine and tactics used to create a lobbying campaign designed to facilitate the debate around barriers to medical innovation and patient access to medicines. The article will detail the evolution of the campaign's goals and the potential solutions to an expensive and slow system. Specifically the submission will look at the influence that Empower: Access to Medicine had on the Government's thinking and development of an early access scheme.

  18. 77 FR 59249 - Agency Information Collection (Access to Financial Records) Activities Under OMB Review

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-26

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0739] Agency Information Collection (Access...) of 1995 (44 U.S.C. 3501-3521), this notice announces that the Veterans Benefits Administration (VBA... . Please refer to ``OMB Control No. 2900-0739.'' SUPPLEMENTARY INFORMATION: Title: Access to Financial...

  19. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  20. Polycomb Group Repression Reduces DNA Accessibility

    PubMed Central

    Fitzgerald, Daniel P.; Bender, Welcome

    2001-01-01

    The Polycomb group proteins are responsible for long-term repression of a number of genes in Drosophila melanogaster, including the homeotic genes of the bithorax complex. The Polycomb protein is thought to alter the chromatin structure of its target genes, but there has been little direct evidence for this model. In this study, the chromatin structure of the bithorax complex was probed with three separate assays for DNA accessibility: (i) activation of polymerase II (Pol II) transcription by Gal4, (ii) transcription by the bacteriophage T7 RNA polymerase (T7RNAP), and (iii) FLP-mediated site-specific recombination. All three processes are restricted or blocked in Polycomb-repressed segments. In contrast, control test sites outside of the bithorax complex permitted Gal4, T7RNAP, and FLP activities throughout the embryo. Several P insertions in the bithorax complex were tested, providing evidence that the Polycomb-induced effect is widespread over target genes. This accessibility effect is similar to that seen for SIR silencing in Saccharomyces cerevisiae. In contrast to SIR silencing, however, episomes excised from Polycomb-repressed chromosomal sites do not show an altered superhelix density. PMID:11533246

  1. Advance reservation access control using software-defined networking and tokens

    DOE PAGES

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; ...

    2017-03-09

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less

  2. Health-Promoting Nature Access for People with Mobility Impairments: A Systematic Review.

    PubMed

    Zhang, Gaochao; Poulsen, Dorthe V; Lygum, Victoria L; Corazon, Sus S; Gramkow, Marie C; Stigsdotter, Ulrika K

    2017-06-29

    This study systematically evaluated the scientific evidence for health benefits of natural environments for people with mobility impairments. Literature searches based on five categories of terms-target group, nature type, health-related impacts, nature-related activities and accessibility issues-were conducted in four databases (Web of Science, Scopus, CAB ABSTRACT and Medline). Twenty-seven articles from 4196 hits were included in the systematic reviews. We concluded that people with mobility disabilities could gain different health benefits, including physical health benefits, mental health benefits and social health benefits from nature in different kinds of nature contacts ranging from passive contact, active involvement to rehabilitative interventions. Several issues related to the accessibility and use of nature for people with mobility impairments need attention from professionals such as landscape architects, rehabilitative therapists, caregivers and policy makers. The overall quality of methodology of the included studies is not high based on assessment of the Mixed Methods Appraisal Tool (MMAT). Moreover, more randomized controlled trials and longitudinal studies that focus specifically on evidence-based health design of nature for people with mobility impairments in the future are needed.

  3. Health-Promoting Nature Access for People with Mobility Impairments: A Systematic Review

    PubMed Central

    Zhang, Gaochao; Poulsen, Dorthe V.; Lygum, Victoria L.; Corazon, Sus S.; Gramkow, Marie C.; Stigsdotter, Ulrika K.

    2017-01-01

    This study systematically evaluated the scientific evidence for health benefits of natural environments for people with mobility impairments. Literature searches based on five categories of terms—target group, nature type, health-related impacts, nature-related activities and accessibility issues—were conducted in four databases (Web of Science, Scopus, CAB ABSTRACT and Medline). Twenty-seven articles from 4196 hits were included in the systematic reviews. We concluded that people with mobility disabilities could gain different health benefits, including physical health benefits, mental health benefits and social health benefits from nature in different kinds of nature contacts ranging from passive contact, active involvement to rehabilitative interventions. Several issues related to the accessibility and use of nature for people with mobility impairments need attention from professionals such as landscape architects, rehabilitative therapists, caregivers and policy makers. The overall quality of methodology of the included studies is not high based on assessment of the Mixed Methods Appraisal Tool (MMAT). Moreover, more randomized controlled trials and longitudinal studies that focus specifically on evidence-based health design of nature for people with mobility impairments in the future are needed. PMID:28661433

  4. Advance reservation access control using software-defined networking and tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less

  5. Advance reservation access control using software-defined networking and tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We usemore » SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.« less

  6. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  7. Leveraging the U.S. Criminal Justice System to Access Women for HIV Interventions.

    PubMed

    Meyer, Jaimie P; Muthulingam, Dharushana; El-Bassel, Nabila; Altice, Frederick L

    2017-12-01

    The criminal justice (CJ) system can be leveraged to access women for HIV prevention and treatment programs. Research is lacking on effective implementation strategies tailored to the specific needs of CJ-involved women. We conducted a scoping review of published studies in English from the United States that described HIV interventions, involved women or girls, and used the CJ system as an access point for sampling or intervention delivery. We identified 350 studies and synthesized data from 42 unique interventions, based in closed (n = 26), community (n = 7), or multiple/other CJ settings (n = 9). A minority of reviewed programs incorporated women-specific content or conducted gender-stratified analyses. CJ systems are comprised of diverse access points, each with unique strengths and challenges for implementing HIV treatment and prevention programs for women. Further study is warranted to develop women-specific and trauma-informed content and evaluate program effectiveness.

  8. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  9. NASA's UAS NAS Access Project

    NASA Technical Reports Server (NTRS)

    Johnson, Charles W.

    2011-01-01

    The vision of the Unmanned Aircraft System (UAS) Integration in the National Airspace System (NAS) Project is "A global transportation system which allows routine access for all classes of UAS." The goal of the UAS Integration in the NAS Project is to "contribute capabilities that reduce technical barriers related to the safety and operational challenges associated with enabling routine UAS access to the NAS." This goal will be accomplished through a two-phased approach based on development of system-level integration of key concepts, technologies and/or procedures, and demonstrations of integrated capabilities in an operationally relevant environment. Phase 1 will take place the first two years of the Project and Phase 2 will take place the following three years. The Phase 1 and 2 technical objectives are: Phase 1: Developing a gap analysis between current state of the art and the Next Generation Air Transportation System (NextGen) UAS Concept of Operations . Validating the key technical areas identified by this Project . Conducting initial modeling, simulation, and flight testing activities . Completing Sub-project Phase 1 deliverables (spectrum requirements, comparative analysis of certification methodologies, etc.) and continue Phase 2 preparation (infrastructure, tools, etc.) Phase 2: Providing regulators with a methodology for developing airworthiness requirements for UAS, and data to support development of certifications standards and regulatory guidance . Providing systems-level, integrated testing of concepts and/or capabilities that address barriers to routine access to the NAS. Through simulation and flight testing, address issues including separation assurance, communications requirements, and human systems integration in operationally relevant environments. The UAS in the NAS Project will demonstrate solutions in specific technology areas, which will address operational/safety issues related to UAS access to the NAS. Since the resource allocation for this Project is limited ($150M over the five years), the focus is on reducing the technical barriers where NASA has unique capabilities. As a result, technical areas, such as Sense and Avoid (SAA) and beyond line of sight command and control will not be addressed. While these are critical barriers to UAS access, currently, there is a great deal of global effort being exercised to address these challenge areas. Instead, specific technology development in areas where there is certainty that NASA can advance the research to high technology readiness levels will be the Project's focus. Specific sub-projects include Separation Assurance, Human Systems Integration, Communications, Certification, and Integrated Test and Evaluation. Each sub-project will transfer technologies to relevant key stakeholders and decision makers through research transition teams, technology forums, or through other analogous means.

  10. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  11. Genome-Wide Association Studies Identify Heavy Metal ATPase3 as the Primary Determinant of Natural Variation in Leaf Cadmium in Arabidopsis thaliana

    PubMed Central

    Chao, Dai-Yin; Silva, Adriano; Baxter, Ivan; Huang, Yu S.; Nordborg, Magnus; Danku, John; Lahner, Brett; Yakubova, Elena; Salt, David E.

    2012-01-01

    Understanding the mechanism of cadmium (Cd) accumulation in plants is important to help reduce its potential toxicity to both plants and humans through dietary and environmental exposure. Here, we report on a study to uncover the genetic basis underlying natural variation in Cd accumulation in a world-wide collection of 349 wild collected Arabidopsis thaliana accessions. We identified a 4-fold variation (0.5–2 µg Cd g−1 dry weight) in leaf Cd accumulation when these accessions were grown in a controlled common garden. By combining genome-wide association mapping, linkage mapping in an experimental F2 population, and transgenic complementation, we reveal that HMA3 is the sole major locus responsible for the variation in leaf Cd accumulation we observe in this diverse population of A. thaliana accessions. Analysis of the predicted amino acid sequence of HMA3 from 149 A. thaliana accessions reveals the existence of 10 major natural protein haplotypes. Association of these haplotypes with leaf Cd accumulation and genetics complementation experiments indicate that 5 of these haplotypes are active and 5 are inactive, and that elevated leaf Cd accumulation is associated with the reduced function of HMA3 caused by a nonsense mutation and polymorphisms that change two specific amino acids. PMID:22969436

  12. Solid fuel use is associated with anemia in children.

    PubMed

    Accinelli, Roberto A; Leon-Abarca, Juan A

    2017-10-01

    Over 3 billion people use solid fuels as a means of energy and heating source, and ~ 50% of households burn them in inefficient, poorly ventilated stoves. In 2010, ~ 43% of the 640 million preschool children in 220 countries suffered from a certain degree of anemia, with iron deficiency as the main cause in developed countries whereas its causes remained multifactorial in the undeveloped group. In this study, we explore the relations of country-wide variables that might affect the people's health status (from socioeconomic status to more specific variables such as water access). We found independent relationship between solid fuel use and anemia in children under five years old (p < 0.0001), taking into account the prevalence of anemia in pregnant woman and the access to improved water sources. Countries in which the population uses solid fuel the most have over three times higher anemia rates in children than countries with the lowest prevalence of solid fuels use. There is still a complex relationship between solid fuels use and anemia, as reflected in its worldwide significance (p < 0.05) controlled for measles immunization, tobacco consumption, anemia in pregnant mothers, girl's primary education, life expectancy and improved water access but not (p > 0.05) when weighing for sanitation access or income per capita. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Complex dynamics of semantic memory access in reading

    PubMed Central

    Baggio, Giosué; Fonseca, André

    2012-01-01

    Understanding a word in context relies on a cascade of perceptual and conceptual processes, starting with modality-specific input decoding, and leading to the unification of the word's meaning into a discourse model. One critical cognitive event, turning a sensory stimulus into a meaningful linguistic sign, is the access of a semantic representation from memory. Little is known about the changes that activating a word's meaning brings about in cortical dynamics. We recorded the electroencephalogram (EEG) while participants read sentences that could contain a contextually unexpected word, such as ‘cold’ in ‘In July it is very cold outside’. We reconstructed trajectories in phase space from single-trial EEG time series, and we applied three nonlinear measures of predictability and complexity to each side of the semantic access boundary, estimated as the onset time of the N400 effect evoked by critical words. Relative to controls, unexpected words were associated with larger prediction errors preceding the onset of the N400. Accessing the meaning of such words produced a phase transition to lower entropy states, in which cortical processing becomes more predictable and more regular. Our study sheds new light on the dynamics of information flow through interfaces between sensory and memory systems during language processing. PMID:21715401

  14. Patient attitudes regarding healthcare utilization and referral: a descriptive comparison in African- and Caucasian Americans with chronic pain.

    PubMed Central

    Green, Carmen R.; Baker, Tamara A.; Ndao-Brumblay, S. Khady

    2004-01-01

    The purpose of this study was to evaluate healthcare utilization and referral patterns for pain management services in a racially and ethnically diverse population. A study-specific mail survey was directed at African- (N=324) and Caucasian Americans (N=300) receiving chronic pain treatment at a tertiary care pain center to address their healthcare access, referral, and utilization patterns. Overall, 46% (N=286) responded, with the majority of respondents being Caucasian Americans (57%) and women (68%). The majority (58%) reported asking their physicians to refer them to a pain physician. African Americans were more likely to report that chronic pain was a major reason for financial problems. They made significantly more visits to the emergency room for pain care. African Americans agreed more that ethnicity and culture affected access to healthcare and pain management. They also tended to agree more than Caucasian Americans that pain medication could not control pain. These results demonstrate significant differences in healthcare utilization, access, and attitudes amongst African- and Caucasian Americans receiving chronic pain management. In light of the socioeconomic and health consequences of chronic pain, these results suggest the need for further studies addressing variability in pain care access and utilization in diverse populations. PMID:14746352

  15. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  16. 46 CFR 154.320 - Cargo control stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...

  17. 46 CFR 154.320 - Cargo control stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...

  18. Method and apparatus for managing access to a memory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DeBenedictis, Erik

    A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operationalmore » memory layout reduces an amount of energy consumed by the processor to perform the computing job.« less

  19. Trends in communicative access solutions for children with cerebral palsy.

    PubMed

    Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom

    2014-08-01

    Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.

  20. 49 CFR 179.400-16 - Access to inner tank.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Access to inner tank. 179.400-16 Section 179.400... MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) SPECIFICATIONS FOR TANK CARS Specification for Cryogenic Liquid Tank Car Tanks and Seamless Steel Tanks (Classes DOT-113 and 107A) § 179.400...

  1. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  2. Race and time from diagnosis to radical prostatectomy: does equal access mean equal timely access to the operating room?--Results from the SEARCH database.

    PubMed

    Bañez, Lionel L; Terris, Martha K; Aronson, William J; Presti, Joseph C; Kane, Christopher J; Amling, Christopher L; Freedland, Stephen J

    2009-04-01

    African American men with prostate cancer are at higher risk for cancer-specific death than Caucasian men. We determine whether significant delays in management contribute to this disparity. We hypothesize that in an equal-access health care system, time interval from diagnosis to treatment would not differ by race. We identified 1,532 African American and Caucasian men who underwent radical prostatectomy (RP) from 1988 to 2007 at one of four Veterans Affairs Medical Centers that comprise the Shared Equal-Access Regional Cancer Hospital (SEARCH) database with known biopsy date. We compared time from biopsy to RP between racial groups using linear regression adjusting for demographic and clinical variables. We analyzed risk of potential clinically relevant delays by determining odds of delays >90 and >180 days. Median time interval from diagnosis to RP was 76 and 68 days for African Americans and Caucasian men, respectively (P = 0.004). After controlling for demographic and clinical variables, race was not associated with the time interval between diagnosis and RP (P = 0.09). Furthermore, race was not associated with increased risk of delays >90 (P = 0.45) or >180 days (P = 0.31). In a cohort of men undergoing RP in an equal-access setting, there was no significant difference between racial groups with regard to time interval from diagnosis to RP. Thus, equal-access includes equal timely access to the operating room. Given our previous finding of poorer outcomes among African Americans, treatment delays do not seem to explain these observations. Our findings need to be confirmed in patients electing other treatment modalities and in other practice settings.

  3. Balancing access to health data and privacy: a review of the issues and approaches for the future.

    PubMed

    Lane, Julia; Schur, Claudia

    2010-10-01

    There has been a dramatic increase in the types of microdata, and this holds great promise for health services research. However, legislative efforts to protect individual privacy have reduced the flow of health care data for research purposes and increased costs and delays, affecting the quality of analysis. This paper provides an overview of the challenges raised by concerns about data confidentiality in the context of health services research, the current methodologies used to ensure data security, and a description of one successful approach to balancing access and privacy. Materials and Methods. We analyze the issues of access and privacy using a conceptual framework based on balancing the risk of reidentification with the utility associated with data analysis. The guiding principle should be to generate released data that are as close to the maximum acceptable risk as possible. HIPAA and other privacy measures can perhaps be seen as having had the effect of lowering the "maximum acceptable risk" level and rendering some data unreleasable. We discuss the levels of risk and utility associated with different types of data used in health services research and the ability to link data from multiple sources as well as current models of data sharing and their limitations. One particularly compelling approach is to establish a remote access "data enclave," where statistical protections are applied to the data, technical protections ensure compliance with data-sharing requirements, and operational controls limit researchers' access to the data they need for their specific research questions. We recommend reducing delays in access to data for research, increasing the use of remote access data enclaves, and disseminating knowledge and promulgating standards for best practices related to data protection. © Health Research and Educational Trust.

  4. A novel asynchronous access method with binary interfaces

    PubMed Central

    2008-01-01

    Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation. PMID:18959797

  5. Pharmacology podcasts: a qualitative study of non-medical prescribing students' use, perceptions and impact on learning.

    PubMed

    Meade, Oonagh; Bowskill, Dianne; Lymn, Joanne S

    2011-01-11

    There is growing research on student use of podcasts in academic settings. However, there is little in-depth research focusing on student experience of podcasts, in particular in terms of barriers to, and facilitators of, podcast use and students' perceptions of the usefulness of podcasts as learning tools. This study aimed to explore the experiences of non-medical prescribing students who had access to podcasts of key pharmacology lectures as supplementary learning tools to their existing course materials. Semi-structured interviews were carried out with seven non-medical prescribing students (average age = 43 years), all of whom were nurses, who had access to seven podcasts of key pharmacology lectures. These podcasts took the form of downloadable audio lecture recordings available through the virtual learning environment WebCT. Low, medium and high users of the podcasts took part in the interviews in order to access a variety of student experiences. Interview data was analysed using thematic template analysis to identify key themes surrounding student experience of podcast availability, particularly in relation to barriers to and facilitators of podcast use, and students' experiences of podcasts as a learning tool. Students used podcasts for a variety of reasons such as revisiting lectures, preparing for exams, to clarify or revise specific topics and, to a lesser extent, to catch up on a missed lecture. Barriers to podcast use centred mainly around technological issues. Lack of experience of the technology required to access podcasts proved a barrier for some students. A lack of access to suitable technology was also a reported barrier. Family assistance and I.T. assistance from the university helped facilitate students' use of the podcasts. Students found that using podcasts allowed them to have greater control over their learning and to gauge their learning needs, as well as helping them build their understanding of a complex topic. Students used podcasts for a variety of reasons. Barriers to podcasts use were generally related to technological issues. Students often found that once assistance had been gained regarding these technological issues, they accessed the podcasts more easily. Students felt that access to podcasts added value to their learning materials by allowing them to better manage their learning and build their understanding. Podcasts represent a valuable additional learning tool for this specific group of older students.

  6. Pharmacology podcasts: a qualitative study of non-medical prescribing students' use, perceptions and impact on learning

    PubMed Central

    2011-01-01

    Background There is growing research on student use of podcasts in academic settings. However, there is little in-depth research focusing on student experience of podcasts, in particular in terms of barriers to, and facilitators of, podcast use and students' perceptions of the usefulness of podcasts as learning tools. This study aimed to explore the experiences of non-medical prescribing students who had access to podcasts of key pharmacology lectures as supplementary learning tools to their existing course materials. Methods Semi-structured interviews were carried out with seven non-medical prescribing students (average age = 43 years), all of whom were nurses, who had access to seven podcasts of key pharmacology lectures. These podcasts took the form of downloadable audio lecture recordings available through the virtual learning environment WebCT. Low, medium and high users of the podcasts took part in the interviews in order to access a variety of student experiences. Interview data was analysed using thematic template analysis to identify key themes surrounding student experience of podcast availability, particularly in relation to barriers to and facilitators of podcast use, and students' experiences of podcasts as a learning tool. Results Students used podcasts for a variety of reasons such as revisiting lectures, preparing for exams, to clarify or revise specific topics and, to a lesser extent, to catch up on a missed lecture. Barriers to podcast use centred mainly around technological issues. Lack of experience of the technology required to access podcasts proved a barrier for some students. A lack of access to suitable technology was also a reported barrier. Family assistance and I.T. assistance from the university helped facilitate students' use of the podcasts. Students found that using podcasts allowed them to have greater control over their learning and to gauge their learning needs, as well as helping them build their understanding of a complex topic. Conclusions Students used podcasts for a variety of reasons. Barriers to podcasts use were generally related to technological issues. Students often found that once assistance had been gained regarding these technological issues, they accessed the podcasts more easily. Students felt that access to podcasts added value to their learning materials by allowing them to better manage their learning and build their understanding. Podcasts represent a valuable additional learning tool for this specific group of older students. PMID:21223547

  7. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  8. Integrated semiconductor-magnetic random access memory system

    NASA Technical Reports Server (NTRS)

    Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)

    2001-01-01

    The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.

  9. Shared Memory Parallelization of an Implicit ADI-type CFD Code

    NASA Technical Reports Server (NTRS)

    Hauser, Th.; Huang, P. G.

    1999-01-01

    A parallelization study designed for ADI-type algorithms is presented using the OpenMP specification for shared-memory multiprocessor programming. Details of optimizations specifically addressed to cache-based computer architectures are described and performance measurements for the single and multiprocessor implementation are summarized. The paper demonstrates that optimization of memory access on a cache-based computer architecture controls the performance of the computational algorithm. A hybrid MPI/OpenMP approach is proposed for clusters of shared memory machines to further enhance the parallel performance. The method is applied to develop a new LES/DNS code, named LESTool. A preliminary DNS calculation of a fully developed channel flow at a Reynolds number of 180, Re(sub tau) = 180, has shown good agreement with existing data.

  10. Design of the Wind Tunnel Model Communication Controller Board. Degree awarded by Christopher Newport Univ. on Dec. 1998

    NASA Technical Reports Server (NTRS)

    Wilson, William C.

    1999-01-01

    The NASA Langley Research Center's Wind Tunnel Reinvestment project plans to shrink the existing data acquisition electronics to fit inside a wind tunnel model. Space limitations within a model necessitate a distributed system of Application Specific Integrated Circuits (ASICs) rather than a centralized system based on PC boards. This thesis will focus on the design of the prototype of the communication Controller board. A portion of the communication Controller board is to be used as the basis of an ASIC design. The communication Controller board will communicate between the internal model modules and the external data acquisition computer. This board is based around an Field Programmable Gate Array (FPGA), to allow for reconfigurability. In addition to the FPGA, this board contains buffer Random Access Memory (RAM), configuration memory (EEPROM), drivers for the communications ports, and passive components.

  11. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  12. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  13. Improving glycemic control with the adjunct use of a data management software program.

    PubMed

    Reed, Charles C; Richa, Jacqueline M; Berndt, Andrea E; Beadle, Randy D; Gerhardt, Susan D; Stewart, Ronald; Corneille, Michael

    2012-01-01

    Published studies have supported the implementation of tight glucose control (TGC) programs to improve patient outcomes and reduce mortality rates. However, measuring a program's efficiency is challenging, because of a lack of systems that capture data, allow access to data, and support analysis and interpretation in a near prospective time frame. We hypothesized that providing clinicians access to real-time blood glucose (BG) results reports could improve the efficacy of our TGC program. We performed a retrospective review of BG data during a 12-month period in a surgical trauma intensive care unit at a level I trauma center. A unit-specific insulin algorithm was used throughout the study. We compared BG values before and after the implementation of a data management software program that allowed clinicians access to real-time BG results reports. Reports were run daily and weekly to monitor the unit's TGC program. A total of 70 616 BG values from 1044 patients were analyzed. An overall decrease was observed in the BG level mean, from 121 mg/dL to 112 mg/dL (P < .001), as well as a decrease in the aggregated mean across patients, from 132 mg/dL to 119 mg/dL (P < .001), after implementation of the software. The percentage of values within the target range of 80 to 110 mg/dL increased from 38.9% to 50.4% (P < .001). The percentage of BG values less than 70 increased from 2.7% to 3.4% (P < .001). However, the percentage of severe hypoglyce-mic episodes (≤ 40 mg/dL) remained unchanged. Access to real-time aggregated BG data reports through the use of a data management software program improved the efficacy of our TGC program.

  14. 46 CFR 154.320 - Cargo control stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Arrangements § 154.320 Cargo control stations. (a) Cargo control stations must be above the weather deck. (b) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...

  15. 46 CFR 154.320 - Cargo control stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Arrangements § 154.320 Cargo control stations. (a) Cargo control stations must be above the weather deck. (b) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...

  16. 46 CFR 154.320 - Cargo control stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Arrangements § 154.320 Cargo control stations. (a) Cargo control stations must be above the weather deck. (b) If a cargo control station is in accommodation, service, or control spaces or has access to such a space, the station must: (1) Be a gas safe space; (2) Have an access to the space that meets § 154.330...

  17. Two signs indicative of successful access in nuclear medicine cerebrospinal fluid diversionary shunt studies.

    PubMed

    Bermo, Mohammed S; Khalatbari, Hedieh; Parisi, Marguerite T

    2018-05-08

    Successful shunt access is the first step in a properly performed nuclear medicine cerebrospinal fluid (CSF) shunt study. To determine the significance of the radiotracer configuration at the injection site during initial nuclear medicine CSF shunt imaging and the lack of early systemic radiotracer activity as predictors of successful shunt access. With Institutional Review Board approval, three nuclear medicine physicians performed a retrospective review of all consecutive CSF shunt studies performed in children at our institution in 2015. Antecedent nuclear medicine CSF shunt studies in these patients were also assessed and included in the review. The appearance of the reservoir site immediately after radiotracer injection was classified as either figure-of-eight or round/ovoid configuration. The presence or absence of early systemic distribution of the tracer on the 5-min static images was noted and separately evaluated. A total of 98 nuclear medicine ventriculoperitoneal CSF shunt studies were evaluated. Figure-of-eight configuration was identified in 87% of studies and, when present, had 93% sensitivity, 78% specificity, 92% accuracy, 98% positive predictive value (PPV) and 54% negative predictive value (NPV) as a predictor of successful shunt access. Early systemic activity was absent in 89 of 98 studies. Lack of early systemic distribution of the radiotracer had 98% sensitivity, 78% specificity, 96% accuracy, 98% PPV and 78% NPV as a predictor of successful shunt access. Figure-of-eight configuration in conjunction with the absence of early systemic tracer activity had 99% PPV for successful shunt access. Figure-of-eight configuration at the injection site or lack of early systemic radiotracer activity had moderate specificity for successful shunt access. Specificity and PPV significantly improved when both signs were combined in assessment.

  18. Using routinely collected health data for surveillance, quality improvement and research: Framework and key questions to assess ethics, privacy and data access.

    PubMed

    De Lusignan, Simon; Liyanage, Harshana; Di Iorio, Concetta Tania; Chan, Tom; Liaw, Siaw-Teng

    2016-01-19

    The use of health data for public health, surveillance, quality improvement and research is crucial to improve health systems and health care. However, bodies responsible for privacy and ethics often limit access to routinely collected health data. Ethical approvals, issues around protecting privacy and data access are often dealt with by different layers of regulations, making approval processes appear disjointed. To create a comprehensive framework for defining the ethical and privacy status of a project and for providing guidance on data access. The framework comprises principles and related questions. The core of the framework will be built using standard terminology definitions such as ethics-related controlled vocabularies and regional directives. It is built in this way to reduce ambiguity between different definitions. The framework is extensible: principles can be retired or added to, as can their related questions. Responses to these questions should allow data processors to define ethical issues, privacy risk and other unintended consequences. The framework contains three steps: (1) identifying possible ethical and privacy principles relevant to the project; (2) providing ethics and privacy guidance questions that inform the type of approval needed; and (3) assessing case-specific ethics and privacy issues. The outputs from this process should inform whether the balance between public interests and privacy breach and any ethical considerations are tipped in favour of societal benefits. If they are then this should be the basis on which data access is permitted. Tightly linking ethical principles to governance and data access may help maintain public trust.

  19. Identification of Regulatory DNA Elements Using Genome-wide Mapping of DNase I Hypersensitive Sites during Tomato Fruit Development.

    PubMed

    Qiu, Zhengkun; Li, Ren; Zhang, Shuaibin; Wang, Ketao; Xu, Meng; Li, Jiayang; Du, Yongchen; Yu, Hong; Cui, Xia

    2016-08-01

    Development and ripening of tomato fruit are precisely controlled by transcriptional regulation, which depends on the orchestrated accessibility of regulatory proteins to promoters and other cis-regulatory DNA elements. This accessibility and its effect on gene expression play a major role in defining the developmental process. To understand the regulatory mechanism and functional elements modulating morphological and anatomical changes during fruit development, we generated genome-wide high-resolution maps of DNase I hypersensitive sites (DHSs) from the fruit tissues of the tomato cultivar "Moneymaker" at 20 days post anthesis as well as break stage. By exploring variation of DHSs across fruit development stages, we pinpointed the most likely hypersensitive sites related to development-specific genes. By detecting binding motifs on DHSs of these development-specific genes or genes in the ascorbic acid biosynthetic pathway, we revealed the common regulatory elements contributing to coordinating gene transcription of plant ripening and specialized metabolic pathways. Our results contribute to a better understanding of the regulatory dynamics of genes involved in tomato fruit development and ripening. Copyright © 2016 The Author. Published by Elsevier Inc. All rights reserved.

  20. Experimental Directory Structure (Exdir): An Alternative to HDF5 Without Introducing a New File Format

    PubMed Central

    Dragly, Svenn-Arne; Hobbi Mobarhan, Milad; Lepperød, Mikkel E.; Tennøe, Simen; Fyhn, Marianne; Hafting, Torkel; Malthe-Sørenssen, Anders

    2018-01-01

    Natural sciences generate an increasing amount of data in a wide range of formats developed by different research groups and commercial companies. At the same time there is a growing desire to share data along with publications in order to enable reproducible research. Open formats have publicly available specifications which facilitate data sharing and reproducible research. Hierarchical Data Format 5 (HDF5) is a popular open format widely used in neuroscience, often as a foundation for other, more specialized formats. However, drawbacks related to HDF5's complex specification have initiated a discussion for an improved replacement. We propose a novel alternative, the Experimental Directory Structure (Exdir), an open specification for data storage in experimental pipelines which amends drawbacks associated with HDF5 while retaining its advantages. HDF5 stores data and metadata in a hierarchy within a complex binary file which, among other things, is not human-readable, not optimal for version control systems, and lacks support for easy access to raw data from external applications. Exdir, on the other hand, uses file system directories to represent the hierarchy, with metadata stored in human-readable YAML files, datasets stored in binary NumPy files, and raw data stored directly in subdirectories. Furthermore, storing data in multiple files makes it easier to track for version control systems. Exdir is not a file format in itself, but a specification for organizing files in a directory structure. Exdir uses the same abstractions as HDF5 and is compatible with the HDF5 Abstract Data Model. Several research groups are already using data stored in a directory hierarchy as an alternative to HDF5, but no common standard exists. This complicates and limits the opportunity for data sharing and development of common tools for reading, writing, and analyzing data. Exdir facilitates improved data storage, data sharing, reproducible research, and novel insight from interdisciplinary collaboration. With the publication of Exdir, we invite the scientific community to join the development to create an open specification that will serve as many needs as possible and as a foundation for open access to and exchange of data. PMID:29706879

Top