Science.gov

Sample records for access control system

  1. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  2. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  3. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  4. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  5. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  6. Speed control system for an access gate

    SciTech Connect

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  7. Emergency access for online personally controlled health records system.

    PubMed

    Zhang, Yuan; Dhileepan, Sunethra; Schmidt, Matthew; Zhong, Sheng

    2012-09-01

    A personally controlled health records (PCHR) system allows a patient user to share his/her health records with trusted physicians by manually granting them the access privilege to his/her online records. However, it presents the problem of emergency access in situations where the user is physically unable to grant the access and the access is required by an Emergency Room (ER) physician who does not have the privilege at that moment. To deal with such a problem, we introduce an online polling system to provide the emergency access control to PCHR systems. For each emergency access request, the access privilege is controlled according to the combined opinions of the patient's preset emergency contacts and other online registered physicians. Because our system is based on the demographic number of the physician community nationwide, it provides a stable emergency access control at all times.

  8. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  9. Context-Based E-Health System Access Control Mechanism

    NASA Astrophysics Data System (ADS)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  10. Health information system access control redesign - rationale and method.

    PubMed

    Moselle, Kenneth A

    2011-01-01

    This paper addresses the question of why a health service system might find it necessary to re-engineer the access control model that mediates the interaction of clinicians with health information systems. Factors that lead to increasingly complexity of the access control models are delineated, and consequences of that complexity are identified. Strategies are presented to address these factors, and a stepwise procedure is suggested to structure the access control model re-engineering process.

  11. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  12. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  13. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  14. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  15. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  16. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  17. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  18. Healthcare professionals' experiences with EHR-system access control mechanisms.

    PubMed

    Faxvaag, Arild; Johansen, Trond S; Heimly, Vigdis; Melby, Line; Grimsmo, Anders

    2011-01-01

    Access control mechanisms might influence on the information seeking and documentation behavior of clinicians. In this study, we have surveyed healthcare professionals in nursing homes and hospitals on their attitudes to, and experiences with using access control mechanisms. In some situations, the access control mechanisms of the EHR system made clinicians postpone documentation work. Their practice of reading what others have documented was also influenced. Not all clinicians logged out of the system when they left a workstation, and some clinicians reported to do some of their documentation work in the name of others. The reported practices might have implications for the safety of the patient.

  19. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  20. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  1. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  2. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection. PMID:26262204

  3. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  4. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  5. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  6. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  7. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  8. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  9. Safety systems and access control in the National Ignition Facility.

    PubMed

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  10. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal...

  11. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  12. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  13. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  14. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  15. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  16. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  17. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  18. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  19. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  20. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  1. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  2. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  3. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  4. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  5. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  6. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  7. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  8. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  9. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  10. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  11. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  12. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  13. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  14. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  15. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  16. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  17. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  18. Generalized access control strategies for integrated services token passing systems

    NASA Astrophysics Data System (ADS)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  19. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  20. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  1. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  2. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  3. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  4. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  5. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final Rule; correction. SUMMARY: The Copyright Office makes a nonsubstantial correction to its regulation announcing...

  6. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  7. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  8. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  9. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  10. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    NASA Astrophysics Data System (ADS)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  11. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  12. Preliminary assessment of Tongue Drive System in medium term usage for computer access and wheelchair control.

    PubMed

    Yousefi, Behnaz; Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless, wearable assistive technology that enables individuals with severe motor impairments access computers, drive wheelchairs, and control their environments using tongue motion. In this paper, we have evaluated the TDS performance as a computer input device using ISO9241-9 standard tasks for pointing and selecting, based on the well known Fitts' Law, and as a powered wheelchair controller through an obstacle course navigation task. Nine able-bodied subjects who already had tongue piercing participated in this trial over 5 sessions during 5 weeks, allowing us to study the TDS learning process and its current limiting factors. Subjects worn tongue rings made of titanium in the form of a barbell with a small rare earth magnetic tracer hermetically sealed inside the upper ball. Comparing the results between 1(st) and 5(th) sessions showed that subjects' performance improved in all the measures through 5 sessions, demonstrating the effects of learning. PMID:22255650

  13. Privacy-aware access control for video data in intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Vagts, Hauke; Jakoby, Andreas

    2012-06-01

    Surveillance systems became powerful. Objects can be identified and intelligent surveillance services can generate events when a specific situation occurs. Such surveillance services can be organized in a Service Oriented Architecture (SOA) to fulfill surveillance tasks for specific purposes. Therefore the services process information on a high level, e.g., just the position of an object. Video data is still required to visualize a situation to an operator and is required as evidence in court. Processing of personal related and sensitive information threatens privacy. To protect the user and to be compliant with legal requirements it must be ensured that sensitive information can only be processed for a defined propose by specific users or services. This work proposes an architecture for Access Control that enforces the separation of data between different surveillance tasks. Access controls are enforced at different levels: for the users starting the tasks, for the services within the tasks processing data stored in central store or calculated by other services and for sensor related services that extract information out of the raw data and provide them.

  14. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  15. Iterative algorithm analysis for phase-only diffractive control access system

    NASA Astrophysics Data System (ADS)

    Mihailescu, Mona; Preda, Alexandru; Cojoc, Dan; Scarlat, Eugen; Preda, Liliana

    2007-08-01

    A new architecture with two phases-only diffractive elements and one decryption mask for optical control access system is presented. Only three different persons which keep this element have the permission to access together. The Iterative Fourier Transform Algorithm (IFTA) is analyzed for phase-only diffractive optical elements (PODE) design with different constraints in the input and output plane and the optimal variant is chosen for better image quality in the output plane (big value for diffraction efficiency and small value for merit function and signal to noise ratio). For higher security we propose different incident waves. That are compared with the case when the first phase-only diffractive element and decryption masks are designed together in an extended iteration and the output images of them (first desired image) is taken over the second phase-only diffractive element. In order to increase security level, this finally PODE are designed to increase some parts from the first desired image. Only with this condition the key image on the detector is formed.

  16. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    NASA Astrophysics Data System (ADS)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  17. On-Line Remote Catalog Access and Circulation Control System. Part I: Functional Specifications. Part II: User's Manual.

    ERIC Educational Resources Information Center

    International Business Machines Corp., Gaithersburg, MD. Data Processing Div.

    The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…

  18. An efficient key-management scheme for hierarchical access control in e-medicine system.

    PubMed

    Wu, Shuhua; Chen, Kefei

    2012-08-01

    In e-medicine system, the sharing of patients' medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.'s scheme proposed most recently, the time complexity and the required storage space is reduced significantly. Moreover, it provides provable security, and is easy to implement. Therefore, our scheme is more suitable for e-medicine system.

  19. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  20. Accessibility Is the Mother of Invention: When It Comes to an Innovative Hand Control System

    ERIC Educational Resources Information Center

    Exceptional Parent, 2007

    2007-01-01

    This article features Sure Grip hand control, an innovative hand control system created by Keith Howell, the President and founder of Howell Ventures LTD. Howell was in his early teens when he experienced an accident that resulted in his quadriplegia. From that point on, Howell set about to manufacture a set of controls that would emulate the…

  1. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  2. ACCESS: Detector Control and Performance

    NASA Astrophysics Data System (ADS)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  3. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  4. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  5. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  6. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  7. Automated Computer Access Request System

    NASA Technical Reports Server (NTRS)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  8. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    NASA Astrophysics Data System (ADS)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  9. Performance of a Frequency-Hopped Real-Time Remote Control System in a Multiple Access Scenario

    NASA Astrophysics Data System (ADS)

    Cervantes, Frank

    A recent trend is observed in the context of the radio-controlled aircrafts and automobiles within the hobby grade category and Unmanned Aerial Vehicles (UAV) applications moving to the well-known Industrial, Scientific and Medical (ISM) band. Based on this technological fact, the present thesis evaluates an individual user performance by featuring a multiple-user scenario where several point-to-point co-located real-time Remote Control (RC) applications operate using Frequency Hopping Spread Spectrum (FHSS) as a medium access technique in order to handle interference efficiently. Commercial-off-the-shelf wireless transceivers ready to operate in the ISM band are considered as the operational platform supporting the above-mentioned applications. The impact of channel impairments and of different critical system engineering issues, such as working with real clock oscillators and variable packet duty cycle, are considered. Based on the previous, simulation results allowed us to evaluate the range of variation for those parameters for an acceptable system performance under Multiple Access (MA) environments.

  10. Apparatus, method and system to control accessibility of platform resources based on an integrity level

    DOEpatents

    Jenkins, Chris; Pierson, Lyndon G.

    2016-10-25

    Techniques and mechanism to selectively provide resource access to a functional domain of a platform. In an embodiment, the platform includes both a report domain to monitor the functional domain and a policy domain to identify, based on such monitoring, a transition of the functional domain from a first integrity level to a second integrity level. In response to a change in integrity level, the policy domain may configure the enforcement domain to enforce against the functional domain one or more resource accessibility rules corresponding to the second integrity level. In another embodiment, the policy domain automatically initiates operations in aid of transitioning the platform from the second integrity level to a higher integrity level.

  11. Access control mechanisms for distributed healthcare environments.

    PubMed

    Sergl-Pommerening, Marita

    2004-01-01

    Today's IT-infrastructure provides more and more possibilities to share electronic patient data across several healthcare organizations and hospital departments. A strong requirement is sufficient data protection and security measures complying with the medical confidentiality and the data protection laws of each state or country like the European directive on data protection or the U.S. HIPAA privacy rule. In essence, the access control mechanisms and authorization structures of information systems must be able to realize the Need-To-Access principle. This principle can be understood as a set of context-sensitive access rules, regarding the patient's path across the organizations. The access control mechanisms of today's health information systems do not sufficiently satisfy this requirement, because information about participation of persons or organizations is not available within each system in a distributed environment. This problem could be solved by appropriate security services. The CORBA healthcare domain standard contains such a service for obtaining authorization decisions and administrating access decision policies (RAD). At the university hospital of Mainz we have developed an access control system (MACS), which includes the main functionality of the RAD specification and the access control logic that is needed for such a service. The basic design principles of our approach are role-based authorization, user rights with static and dynamic authorization data, context rules and the separation of three cooperating servers that provide up-to-date knowledge about users, roles and responsibilities. This paper introduces the design principles and the system design and critically evaluates the concepts based on practical experience.

  12. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  13. Controlling Access to Suicide Means

    PubMed Central

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  14. Hubble Space Telescope Telemetry Access using the Vision 2000 Control Center System (CCS)

    NASA Astrophysics Data System (ADS)

    Miebach, M.; Dolensky, M.

    Major changes to the Space Telescope Ground Systems are presently in progres s. The main objectives of the re-engineering effort, \\htmladdnormallinkfoot{ Vision 2000}{http://vision.hst.nasa.gov/}, are to reduce development and operation costs for the remaining years of S pace Telescope's lifetime. Costs are reduced by the use of commercial off the s helf (COTS) products wherever possible. Part of CCS is a Space Telescope Engineering Data Store, the design of which is based on modern Data Warehouse technology. The purpose of this data store i s to provide a common data source for telemet Some of the capabilities of CCS will be illustrated: sample of real-time dat a pages and plots of selected historical telemetry points.

  15. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  16. The Comparative Analysis of Main Access Control Technologies

    NASA Astrophysics Data System (ADS)

    Zhang, Su; Niu, Li; Chen, Jing

    Effective access control security design is an important precondition for the stable running of an information system. So it's necessary to establish a well-designed security mechanism to ensure the security of the system. This paper analysis and compares the main access control theories.

  17. Satellite multiple access systems for mobile communication

    NASA Technical Reports Server (NTRS)

    Lewis, J. L.

    1979-01-01

    This paper considers multiple access techniques for a mobile radio system which incorporates a geosynchronous orbiting satellite repeater through which mobile terminals communicate. The communication capacities of FDMA, TDMA and CDMA systems are examined for a 4 MHz bandwidth system to serve up to 10,000 users. An FDMA system with multibeam coverage is analyzed in detail. The system includes an order-wire network for demand-access control and reassignment of satellite channels. Satellite and terminal configurations are developed to a block diagram level and system costs and implementation requirements are discussed.

  18. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  19. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  20. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  1. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  2. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  3. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  4. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  5. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  6. Formal Description of Trust-based Access Control

    NASA Astrophysics Data System (ADS)

    Xiaoning, Ma

    Different from traditional access control technologies, such as discretionary access control, mandatory access control, role-based access control, trust-based access control can solve the problem of uncertainty, risk and vulnerability coming from authorization. In this paper, strict definition and formal description of trust-based access control is defined.

  7. Remotely Accessible Management System (RAMS).

    ERIC Educational Resources Information Center

    Wood, Rex

    Oakland Schools, an Intermediate School District for Administration, operates a Remotely Accessible Management System (RAMS). RAMS is composed of over 100 computer programs, each of which performs procedures on the files of the 28 local school districts comprising the constituency of Oakland Schools. This regional service agency covers 900 square…

  8. What's Hot--and Not--in Card Access Systems.

    ERIC Educational Resources Information Center

    Sturgeon, Julie

    2002-01-01

    Describes four uses of newer card access systems on college campuses: stored value, entitlement, access control, and vending. Discusses the continued reluctance of schools to move to cards containing computer chips rather than simply magnetic stripes. (EV)

  9. Application-Defined Decentralized Access Control.

    PubMed

    Xu, Yuanzhong; Dunn, Alan M; Hofmann, Owen S; Lee, Michael Z; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%-9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications' security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes.

  10. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  11. Preservation Film: Platform for Digital Access Systems.

    ERIC Educational Resources Information Center

    Jones, C. Lee

    Preservation efforts for an increasingly digitally oriented future have turned to advanced and improved methods of preservation on microfilm, which has a life expectancy of more than 500 years when properly prepared, stored, and managed, and can support a wide range of digital access systems. Computer controlled cameras can provide significantly…

  12. Role-based access control model for GIS

    NASA Astrophysics Data System (ADS)

    Pan, Yuqing; Sheng, Yehua; Zhou, Jieyu

    2007-06-01

    Access control of Geographical Information System (GIS) has more complex spatial constraints than the general MIS system, it makes the classic role-based access control model(RBAC) can't be used in GIS. To achieve an effective Access Control Model for GIS, an extension model of the RBAC is presented in the paper. Firstly, this paper introduce the three kinds spatial constraints that included layer constraints, region constraints and spatial object constraints; Then the paper expanded the basic RBAC model, added regional class, layers class and so on; Finally, the paper has given the system RABC control model as well as the realization method in view of GIS. An extension model of the RBAC is applicable to mobile computing, wireless access and system about location is concluded by analyzing.

  13. Fast Access Data Acquisition System

    SciTech Connect

    Dr. Vladimir Katsman

    1998-03-17

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  14. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  15. Integrated semiconductor-magnetic random access memory system

    NASA Technical Reports Server (NTRS)

    Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)

    2001-01-01

    The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.

  16. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  17. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  18. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  19. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  20. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  1. The linked medical data access control framework.

    PubMed

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  2. Data Access System for Hydrology

    NASA Astrophysics Data System (ADS)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  3. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  4. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  5. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  6. Implementing context and team based access control in healthcare intranets.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users.

  7. A Digitally Addressable Random-Access Image Selector and Random-Access Audio System.

    ERIC Educational Resources Information Center

    Bitzer, Donald L.; And Others

    The requirements of PLATO IV, a computer based education system at the University of Illinois, have led to the development of an improved, digitally addressable, random access image selector and a digitally addressable, random access audio device. Both devices utilize pneumatically controlled mechanical binary adders to position the mecahnical…

  8. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  9. Distributed Access to Administrative Systems.

    ERIC Educational Resources Information Center

    Carson, Eugene

    1987-01-01

    Administrators, faculty, and staff should have electronic access to records needed to perform their jobs, and students should have access to their own records--course registration and addresses. User-directed analysis and reporting are discussed and the security and audit issues are examined. (Author/MLW)

  10. ACCESS Sub-system Performance

    NASA Astrophysics Data System (ADS)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  11. Easy Access: Auditing the System Network

    ERIC Educational Resources Information Center

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  12. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  13. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Control of public access. 420.53 Section....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and unauthorized, unescorted access to explosive hazard facilities or other hazard areas not otherwise...

  14. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  15. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  16. Situation-Based Access Control: privacy management via modeling of patient data access scenarios.

    PubMed

    Peleg, Mor; Beimel, Dizza; Dori, Dov; Denekamp, Yaron

    2008-12-01

    Access control is a central problem in privacy management. A common practice in controlling access to sensitive data, such as electronic health records (EHRs), is Role-Based Access Control (RBAC). RBAC is limited as it does not account for the circumstances under which access to sensitive data is requested. Following a qualitative study that elicited access scenarios, we used Object-Process Methodology to structure the scenarios and conceive a Situation-Based Access Control (SitBAC) model. SitBAC is a conceptual model, which defines scenarios where patient's data access is permitted or denied. The main concept underlying this model is the Situation Schema, which is a pattern consisting of the entities Data-Requestor, Patient, EHR, Access Task, Legal-Authorization, and Response, along with their properties and relations. The various data access scenarios are expressed via Situation Instances. While we focus on the medical domain, the model is generic and can be adapted to other domains.

  17. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  18. Concurrency and Time in Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Chiang, Chia-Chu; Bayrak, Coskun

    Role-based access control (RBAC) has been proposed as an alternative solution for expressing access control policies. The generalized temporal RBAC (GTRBAC) extends RBAC by adding time in order to support timed based access control policies. However, GTRBAC does not address certain issues of concurrency such as, synchronization. We propose an approach to the expressions of time and concurrency in RBAC based on timed Petri nets. A formal verification method for access control policies is also proposed.

  19. Digital Autonomous Terminal Access Communication (DATAC) system

    NASA Technical Reports Server (NTRS)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  20. CONTROL SYSTEM

    DOEpatents

    Shannon, R.H.; Williamson, H.E.

    1962-10-30

    A boiling water type nuclear reactor power system having improved means of control is described. These means include provisions for either heating the coolant-moderator prior to entry into the reactor or shunting the coolantmoderator around the heating means in response to the demand from the heat engine. These provisions are in addition to means for withdrawing the control rods from the reactor. (AEC)

  1. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  2. Embedded systems for supporting computer accessibility.

    PubMed

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol. PMID:26294501

  3. Components of the airport access system

    NASA Technical Reports Server (NTRS)

    1978-01-01

    The organizations and agencies which make up or influence the airport access system are examined. These include the airport, the airline industry, the public and private transit agencies which provide ground access to the airport, and the regulatory agencies which affect all of these organizations and their actions. Each component, with the exception of the regulatory agencies is described in terms of its legal status, its sources of funds, and the nature of its relationship with the other components. Conclusions regarding the system components' effects on airport access and recommendations for changes which appear practical are presented.

  4. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site,...

  5. Common Control System Vulnerability

    SciTech Connect

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  6. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  7. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  8. Cryptographic Enforcement of Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Crampton, Jason

    Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, using role-based access control policies rather than information flow policies. In this paper, we provide an alternative formulation of role-based access control that enables us to apply existing cryptographic schemes to core and hierarchical role-based access control policies. We then show that special cases of our cryptographic enforcement schemes for role-based access control are equivalent to cryptographic enforcement schemes for temporal access control and to ciphertext-policy and key-policy attribute-based encryption schemes. Finally, we describe how these special cases can be extended to support richer forms of temporal access control and attribute-based encryption.

  9. Distributed Access View Integrated Database (DAVID) system

    NASA Technical Reports Server (NTRS)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  10. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  11. Federal Family Education Loan Information System. Weak Computer Controls Increase Risk of Unauthorized Access to Sensitive Data. Report to the Secretary of Education.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Accounting and Information Management Div.

    This report presents an evaluation of the general controls over the Federal Family Education Loan Program (FFELP) information system maintained and operated by a contractor for the U.S. Department of Education (ED), which administers FFELP. The evaluation found that ED's general controls over the FFELP information system did not adequately protect…

  12. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  13. A voice password system for access security

    SciTech Connect

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  14. MFTF supervisory control system

    NASA Astrophysics Data System (ADS)

    1980-12-01

    A computerized supervisory control system is being developed for the Mirror Fusion Test Facility. The system includes nine Perkin-Elmer 7/32 and 8/32 computers connected by a block of common core memory (128 kilobytes). The network is a disk designed for reliability and redundancy. If one computer goes down, the local-control micro-processors that it controls are switched to another computer in a matter of seconds. The control consoles permit operators to open and close valves, start or stop pumps, and adjust operating levels. The experiment is controlled by two superconsoles and five satellite consoles. The software, written in PASCAL, contains such subsystems as organizing the computers into a network, operating the consoles and accessing the data base.

  15. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  16. NSLS control system upgrade status

    SciTech Connect

    Smith, J.; Ramamoorthy, S.; Tang, Y.; Flannigan, J.; Sathe, S.; Keane, J.; Krinsky, S.

    1993-07-01

    The NSLS control system initially installed in 1978 has undergone several modifications but the basic system architecture remained relatively unchanged. The need for faster response, increased reliability and better diagnostics made the control system upgrade a priority. Since the NSLS runs continuously, major changes to the control system are difficult. The upgrade plan had to allow continuous incremental changes to the control system without having any detrimental effect on operations. The plan had to provide for immediate improvement in a few key areas, such as data access rates, and be complete in a short time. At present, most accelerator operations utilize the upgraded control system.

  17. A study of multiple access schemes in satellite control network

    NASA Astrophysics Data System (ADS)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  18. Obstacle Characterization in a Geocrowdsourced Accessibility System

    NASA Astrophysics Data System (ADS)

    Qin, H.; Aburizaiza, A. O.; Rice, R. M.; Paez, F.; Rice, M. T.

    2015-08-01

    Transitory obstacles - random, short-lived and unpredictable objects - are difficult to capture in any traditional mapping system, yet they have significant negative impacts on the accessibility of mobility- and visually-impaired individuals. These transitory obstacles include sidewalk obstructions, construction detours, and poor surface conditions. To identify these obstacles and assist the navigation of mobility- and visually- impaired individuals, crowdsourced mapping applications have been developed to harvest and analyze the volunteered obstacles reports from local students, faculty, staff, and residents. In this paper, we introduce a training program designed and implemented for recruiting and motivating contributors to participate in our geocrowdsourced accessibility system, and explore the quality of geocrowdsourced data with a comparative analysis methodology.

  19. 42 CFR 431.834 - Access to records: Claims processing assessment systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834 Access to records: Claims processing assessment systems. The agency, upon written request, must provide HHS staff with access to all records pertaining to its MQC claims processing assessment system...

  20. 42 CFR 431.834 - Access to records: Claims processing assessment systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834 Access to records: Claims processing assessment systems. The agency, upon written request, must provide HHS staff with access to all records pertaining to its MQC claims processing assessment system...

  1. 42 CFR 431.834 - Access to records: Claims processing assessment systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834 Access to records: Claims processing assessment systems. The agency, upon written request, must provide HHS staff with access to all records pertaining to its MQC claims processing assessment system...

  2. Extending a Role Graph for Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Asakura, Yoshiharu; Nakamoto, Yukikazu

    Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.

  3. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  4. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  5. Access Control Is More than Security.

    ERIC Educational Resources Information Center

    Fickes, Michael

    2002-01-01

    Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)

  6. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  7. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  8. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  9. BIOPACK: the ground controlled late access biological research facility.

    PubMed

    van Loon, Jack J W A

    2004-03-01

    Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.

  10. Performance of random multiple access transmission system

    NASA Technical Reports Server (NTRS)

    Phinainitisart, N.; Wu, W. W.

    1990-01-01

    The performance of the Random Multiple Access (RMA) technique, applied to a direct terminal-to-terminal link with a large number of potential users, is determined. The average signal-to-noise ratio (SNR) is derived. Under Gaussian assumption, the approximation of the probability of error is given. The analysis shows that the system performance is affected by the sequence length, the number of simultaneous users, and the number of cochannel symbols, but is not sensitive to the thermal noise. The performance of using very small aperture antenna for both transmitting and receiving without a hub station is given.

  11. Science information systems: Archive, access, and retrieval

    NASA Technical Reports Server (NTRS)

    Campbell, William J.

    1991-01-01

    The objective of this research is to develop technology for the automated characterization and interactive retrieval and visualization of very large, complex scientific data sets. Technologies will be developed for the following specific areas: (1) rapidly archiving data sets; (2) automatically characterizing and labeling data in near real-time; (3) providing users with the ability to browse contents of databases efficiently and effectively; (4) providing users with the ability to access and retrieve system independent data sets electronically; and (5) automatically alerting scientists to anomalies detected in data.

  12. Decentralized energy systems for clean electricity access

    NASA Astrophysics Data System (ADS)

    Alstone, Peter; Gershenson, Dimitry; Kammen, Daniel M.

    2015-04-01

    Innovative approaches are needed to address the needs of the 1.3 billion people lacking electricity, while simultaneously transitioning to a decarbonized energy system. With particular focus on the energy needs of the underserved, we present an analytic and conceptual framework that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. A historical analysis shows that the present day is a unique moment in the history of electrification where decentralized energy networks are rapidly spreading, based on super-efficient end-use appliances and low-cost photovoltaics. We document how this evolution is supported by critical and widely available information technologies, particularly mobile phones and virtual financial services. These disruptive technology systems can rapidly increase access to basic electricity services and directly inform the emerging Sustainable Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, inclusive energy systems.

  13. 50 CFR 600.420 - Control system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Confidentiality of Statistics § 600.420 Control system... statistics required by an FMP. The control system: (1) Identifies those persons who have access to the statistics. (2) Contains procedures to limit access to confidential data to authorized users. (3)...

  14. 50 CFR 600.420 - Control system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Confidentiality of Statistics § 600.420 Control system... statistics required by an FMP. The control system: (1) Identifies those persons who have access to the statistics. (2) Contains procedures to limit access to confidential data to authorized users. (3)...

  15. Attacking the information access problem with expert systems

    NASA Technical Reports Server (NTRS)

    Ragusa, James M.; Orwig, Gary W.

    1991-01-01

    The results of applications research directed at finding an improved method of storing and accessing information are presented. Twelve microcomputer-based expert systems shells and five laser-optical formats have been studied, and the general and specific methods of interfacing these technologies are being tested in prototype systems. Shell features and interfacing capabilities are discussed, and results from the study of five laser-optical formats are recounted including the video laser, compact, and WORM disks, and laser cards and film. Interfacing, including laser disk device driver interfacing, is discussed and it is pointed out that in order to control the laser device from within the expert systems application, the expert systems shell must be able to access the device driver software. Potential integrated applications are investigated and an initial list is provided including consumer services, travel, law enforcement, human resources, marketing, and education and training.

  16. Remote access of modem by digital control

    NASA Technical Reports Server (NTRS)

    Lopez, H.

    1976-01-01

    Semiautomated system enables operator to measure overall quality of communications link between console (point A) and far-end location (point B). By transmitting test pattern from point A, receiving it at point B, and transmitting back to point A in loopback, unassisted operator can evaluate overall link performance.

  17. Accessible Gaming through Mainstreaming Kinetic Controller

    NASA Astrophysics Data System (ADS)

    Garrido, Yolanda; Marco, Álvaro; Segura, Joaquín; Blanco, Teresa; Casas, Roberto

    Leisure is a very important aspect in our everyday life; and gaming is one of the main ways to it. Depending on the particular situation of each person, the way of playing could be very different. Motivation, preferences, skills, knowledge are some of the factors that influences this experience. When the person has a disability, additional agents come to scene such as cognitive level and mobility. Besides the design of the game, these factors clearly affect how the person interacts with the game; its user interface. In this paper we present a tool that allows people with disabilities to play games with a normalized user interface. This tool a) manages several wireless kinetic remote controllers, e.g. the Wiimotes; b) can be configured to capture any voluntary movements users could do and c) convert them into the specific inputs required by existing adapted games. As a result, users with disabilities can experience and enjoy games that were previously inaccessible to them.

  18. Multi-access laser communications transceiver system

    NASA Technical Reports Server (NTRS)

    Ross, Monte (Inventor); Lokerson, Donald C. (Inventor); Fitzmaurice, Michael W. (Inventor); Meyer, Daniel D. (Inventor)

    1993-01-01

    A satellite system for optical communications such as a multi-access laser transceiver system. Up to six low Earth orbiting satellites send satellite data to a geosynchronous satellite. The data is relayed to a ground station at the Earth's surface. The earth pointing geosynchronous satellite terminal has no gimbal but has a separate tracking mechanism for tracking each low Earth orbiting satellite. The tracking mechanism has a ring assembly rotatable about an axis coaxial with the axis of the field of view of the geosynchronous satellite and a pivotable arm mounted for pivotal movement on the ring assembly. An optical pickup mechanism at the end of each arm is positioned for optical communication with one of the orbiting satellites by rotation of the ring.

  19. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  20. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures that... develop, test, and implement the relevant risk management controls and supervisory procedures...

  1. D0 Cryo System Control System Autodialer

    SciTech Connect

    Urbin, J.; /Fermilab

    1990-04-17

    The DO cryogenic system is controlled by a TI565-PLC based control system. This allows the system to be unmanned when in steady state operation. System experts will need to be contacted when system parameters exceed normal operating points and reach alarm setpoints. The labwide FIRUS system provides one alarm monitor and communication link. An autodialer provides a second and more flexible alarm monitor and communication link. The autodialer monitors contact points in the control system and after receiving indication of an alarm accesses a list of experts which it calls until it receives an acknowledgement. There are several manufacturers and distributors of autodialer systems. This EN explains the search process the DO cryo group used to fmd an autodialer system that fit the cryo system's needs and includes information and specs for the unit we chose.

  2. Method and device for maximizing memory system bandwidth by accessing data in a dynamically determined order

    NASA Technical Reports Server (NTRS)

    Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Klenke, Robert (Inventor); Schwab, Andrew J. (Inventor); Moyer, Stephen A. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor)

    2000-01-01

    A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.

  3. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  4. Interactive water monitoring system accessible by cordless telephone

    NASA Astrophysics Data System (ADS)

    Volpicelli, Richard; Andeweg, Pierre; Hagar, William G.

    1985-12-01

    A battery-operated, microcomputer-controlled monitoring device linked with a cordless telephone has been developed for remote measurements. This environmental sensor is self-contained and collects and processes data according to the information sent to its on-board computer system. An RCA model 1805 microprocessor forms the basic controller with a program encoded in memory for data acquisition and analysis. Signals from analog sensing devices used to monitor the environment are converted into digital signals and stored in random access memory of the microcomputer. This remote sensing system is linked to the laboratory by means of a cordless telephone whose base unit is connected to regular telephone lines. This offshore sensing system is simply accessed by a phone call originating from a computer terminal in the laboratory. Data acquisition is initiated upon request: Information continues to be processed and stored until the computer is reprogrammed by another phone call request. Information obtained may be recalled by a phone call after the desired environmental measurements are finished or while they are in progress. Data sampling parameters may be reset at any time, including in the middle of a measurement cycle. The range of the system is limited only by existing telephone grid systems and by the transmission characteristics of the cordless phone used as a communications link. This use of a cordless telephone, coupled with the on-board computer system, may be applied to other field studies requiring data transfer between an on-site analytical system and the laboratory.

  5. Ground Control System Description Document

    SciTech Connect

    Eric Loros

    2001-07-31

    The Ground Control System contributes to the safe construction and operation of the subsurface facility, including accesses and waste emplacement drifts, by maintaining the configuration and stability of the openings during construction, development, emplacement, and caretaker modes for the duration of preclosure repository life. The Ground Control System consists of ground support structures installed within the subsurface excavated openings, any reinforcement made to the rock surrounding the opening, and inverts if designed as an integral part of the system. The Ground Control System maintains stability for the range of geologic conditions expected at the repository and for all expected loading conditions, including in situ rock, construction, operation, thermal, and seismic loads. The system maintains the size and geometry of operating envelopes for all openings, including alcoves, accesses, and emplacement drifts. The system provides for the installation and operation of sensors and equipment for any required inspection and monitoring. In addition, the Ground Control System provides protection against rockfall for all subsurface personnel, equipment, and the engineered barrier system, including the waste package during the preclosure period. The Ground Control System uses materials that are sufficiently maintainable and that retain the necessary engineering properties for the anticipated conditions of the preclosure service life. These materials are also compatible with postclosure waste isolation performance requirements of the repository. The Ground Control System interfaces with the Subsurface Facility System for operating envelopes, drift orientation, and excavated opening dimensions, Emplacement Drift System for material compatibility, Monitored Geologic Repository Operations Monitoring and Control System for ground control instrument readings, Waste Emplacement/Retrieval System to support waste emplacement operations, and the Subsurface Excavation System

  6. Secondary retention of rubber dam: effective moisture control access considerations.

    PubMed

    Liebenberg, W H

    1995-04-01

    Primary rubber dam retention affects attachment of the latex sheet to the anchor teeth bordering the isolated working field. Secondary rubber dam retention is the provision of an effective seal at the dam-tooth junction, which is essential to the maintenance of adequate access and moisture control within the working field. Practical hints are offered to optimize access and moisture control through well-planned and properly executed secondary retention of classic rubber dam applications. In addition, innovative solutions to the limitations of general field isolation, which pertain mostly to secondary retention of the unrestrained buccal and lingual curtains of the slit dam, are introduced.

  7. Controlling user access to electronic resources without password

    SciTech Connect

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  8. The AMSC network control system

    NASA Technical Reports Server (NTRS)

    Garner, William B.

    1990-01-01

    The American Mobile Satellite Corporation (AMSC) is going to construct, launch, and operate a satellite system in order to provide mobile satellite services to the United States. AMSC is going to build, own, and operate a Network Control System (NCS) for managing the communications usage of the satellites, and to control circuit switched access between mobile earth terminals and feeder-link earth stations. An overview of the major NCS functional and performance requirements, the control system physical architecture, and the logical architecture is provided.

  9. The AMSC network control system

    NASA Astrophysics Data System (ADS)

    Garner, William B.

    The American Mobile Satellite Corporation (AMSC) is going to construct, launch, and operate a satellite system in order to provide mobile satellite services to the United States. AMSC is going to build, own, and operate a Network Control System (NCS) for managing the communications usage of the satellites, and to control circuit switched access between mobile earth terminals and feeder-link earth stations. An overview of the major NCS functional and performance requirements, the control system physical architecture, and the logical architecture is provided.

  10. Flexible format, computer accessed telemetry system

    NASA Technical Reports Server (NTRS)

    Easton, R. A.; Hilbert, E. E.

    1973-01-01

    With this system, it is possible to sample and generate two or more simultaneous formats; one can be transmitted to ground station in real time, and other is stored for later transmission. Sensor output comparison data, plus information to control format, compression algorithm, and allowable degree of sensor activity, are stored in memory.

  11. Use of CDMA access technology in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ramasastry, Jay; Wiedeman, Bob

    1995-01-01

    Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.

  12. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  13. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  14. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  15. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  16. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  17. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  18. Multiple access capacity trade-offs for a Ka-band personal access satellite system

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled; Motamedi, Masoud

    1990-01-01

    System capability is critical to the economic viability of a personal satellite communication system. Ka band has significant potential to support a high capacity multiple access system because of the availability of bandwidth. System design tradeoffs are performed and multiple access schemes are compared with the design goal of achieving the highest capacity and efficiency. Conclusions regarding the efficiency of the different schemes and the achievable capacities are given.

  19. Cancer Data Access System (CDAS) | Division of Cancer Prevention

    Cancer.gov

    The Cancer Data Access System (CDAS) is a web portal that facilitates access to PLCO data. Investigators can register with CDAS and request access to data collected through December 31, 2009 for the first 13 years of participation for each subject in the PLCO trial. Newly diagnosed cancers and deaths continue to be collected and will be available in the future. |

  20. A semi-automated vascular access system for preclinical models

    NASA Astrophysics Data System (ADS)

    Berry-Pusey, B. N.; Chang, Y. C.; Prince, S. W.; Chu, K.; David, J.; Taschereau, R.; Silverman, R. W.; Williams, D.; Ladno, W.; Stout, D.; Tsao, T. C.; Chatziioannou, A.

    2013-08-01

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice.

  1. Remotely Accessed Vehicle Traffic Management System

    NASA Astrophysics Data System (ADS)

    Al-Alawi, Raida

    2010-06-01

    The ever increasing number of vehicles in most metropolitan cities around the world and the limitation in altering the transportation infrastructure, led to serious traffic congestion and an increase in the travelling time. In this work we exploit the emergence of novel technologies such as the internet, to design an intelligent Traffic Management System (TMS) that can remotely monitor and control a network of traffic light controllers located at different sites. The system is based on utilizing Embedded Web Servers (EWS) technology to design a web-based TMS. The EWS located at each intersection uses IP technology for communicating remotely with a Central Traffic Management Unit (CTMU) located at the traffic department authority. Friendly GUI software installed at the CTMU will be able to monitor the sequence of operation of the traffic lights and the presence of traffic at each intersection as well as remotely controlling the operation of the signals. The system has been validated by constructing a prototype that resembles the real application.

  2. Propulsive Reaction Control System Model

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Phan, Linh H.; Serricchio, Frederick; San Martin, Alejandro M.

    2011-01-01

    This software models a propulsive reaction control system (RCS) for guidance, navigation, and control simulation purposes. The model includes the drive electronics, the electromechanical valve dynamics, the combustion dynamics, and thrust. This innovation follows the Mars Science Laboratory entry reaction control system design, and has been created to meet the Mars Science Laboratory (MSL) entry, descent, and landing simulation needs. It has been built to be plug-and-play on multiple MSL testbeds [analysis, Monte Carlo, flight software development, hardware-in-the-loop, and ATLO (assembly, test and launch operations) testbeds]. This RCS model is a C language program. It contains two main functions: the RCS electronics model function that models the RCS FPGA (field-programmable-gate-array) processing and commanding of the RCS valve, and the RCS dynamic model function that models the valve and combustion dynamics. In addition, this software provides support functions to initialize the model states, set parameters, access model telemetry, and access calculated thruster forces.

  3. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  4. InfoTrac: An Inhouse Computer-Access System.

    ERIC Educational Resources Information Center

    Carney, Richard

    1985-01-01

    InfoTrac is a laserdisc system that provides local computer-access to Information Access Company's periodical databases and offers libraries an extensive, self-contained reference system. The system, which employs an IBM PC microcomputer, a Hewlett-Packard Thinkjet printer, and a Pioneer videodisc player, provides advantages of online searching at…

  5. Control system design method

    DOEpatents

    Wilson, David G.; Robinett, III, Rush D.

    2012-02-21

    A control system design method and concomitant control system comprising representing a physical apparatus to be controlled as a Hamiltonian system, determining elements of the Hamiltonian system representation which are power generators, power dissipators, and power storage devices, analyzing stability and performance of the Hamiltonian system based on the results of the determining step and determining necessary and sufficient conditions for stability of the Hamiltonian system, creating a stable control system based on the results of the analyzing step, and employing the resulting control system to control the physical apparatus.

  6. 50 CFR 600.420 - Control system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... statistics required by an FMP. The control system: (1) Identifies those persons who have access to the... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Control system. 600.420 Section 600.420..., DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Confidentiality of Statistics § 600.420 Control...

  7. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  8. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  9. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  10. REVIEW: Widespread access to predictive models in the motor system: a short review

    NASA Astrophysics Data System (ADS)

    Davidson, Paul R.; Wolpert, Daniel M.

    2005-09-01

    Recent behavioural and computational studies suggest that access to internal predictive models of arm and object dynamics is widespread in the sensorimotor system. Several systems, including those responsible for oculomotor and skeletomotor control, perceptual processing, postural control and mental imagery, are able to access predictions of the motion of the arm. A capacity to make and use predictions of object dynamics is similarly widespread. Here, we review recent studies looking at the predictive capacity of the central nervous system which reveal pervasive access to forward models of the environment.

  11. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  12. Program Retrieval/Dissemination: A Solid State Random Access System.

    ERIC Educational Resources Information Center

    Weeks, Walter O., Jr.

    The trend toward greater flexibility in educational methods has led to a need for better and more rapid access to a variety of aural and audiovisual resource materials. This in turn has demanded the development of a flexible, reliable system of hardware designed to aid existing distribution methods in providing such access. The system must be…

  13. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  14. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  15. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  16. Global Access-controlled Transfer e-frame (GATe)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, asmore » well as provides reporting capabilities.« less

  17. ISABELLE control system

    SciTech Connect

    Humphrey, J W; Frankel, R S; Niederer, J A

    1980-01-01

    Design principles for the Brookhaven ISABELLE control intersecting storage ring accelerator are described. Principal features include a locally networked console and control computer complex, a system wide process data highway, and intelligent local device controllers. Progress to date is summarized.

  18. Control System Damps Vibrations

    NASA Technical Reports Server (NTRS)

    Kopf, E. H., Jr.; Brown, T. K.; Marsh, E. L.

    1983-01-01

    New control system damps vibrations in rotating equipment with help of phase-locked-loop techniques. Vibrational modes are controlled by applying suitable currents to drive motor. Control signals are derived from sensors mounted on equipment.

  19. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  20. ACCESS: Design and Sub-System Performance

    NASA Technical Reports Server (NTRS)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; McCandliss, Stephan R.; Rasucher, Bernard J.; Kimble, Randy A.; Kruk, Jeffrey W.; Pelton, Russell; Mott, D. Brent; Wen, Hiting; Foltz, Roger; Quijada, Manuel A.; Gum, Jeffery S.; Gardner, Jonathan P.; Kahle, Duncan M.; Benford, Dominic J.; Woodgate, Bruce E.; Wright, Edward L.; Feldman, Paul D.; Hart, Murdock; Moos, H. Warren; Reiss, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, W. V.; Sahnow, David J.

    2012-01-01

    Establishing improved spectrophotometric standards is important for a broad range of missions and is relevant to many astrophysical problems. ACCESS, "Absolute Color Calibration Experiment for Standard Stars", is a series of rocket-borne sub-orbital missions and ground-based experiments designed to enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 -1.7 micrometer bandpass.

  1. PDX diagnostic control system

    SciTech Connect

    Mika, R.

    1981-01-01

    This paper describes a computer-base diagnostic control system operating on the PDX Tokamak. The prime function of the system is to control mechanical positioning devices associated with various diagnostics including Thomson Scattering, X-Ray Pulse Height Analyzer, Rotating Scanning Monochromator, Fast Ion Detection Experiment, Bolometers and Plasma Limiters. The diagnostic control system consists of a PDP-11/34 computer, a CAMAC system partitioned between the PDX control room and the PDX machine area, and special electronic control modules developed at PPL. The special modules include a digital closed loop motor controller and user interface control panel for control and status display. A standard control panel was developed for interfacing each system user with the PDP-11/34 computer, through specially developed CAMAC modules.

  2. Access Control of Cloud Service Based on UCON

    NASA Astrophysics Data System (ADS)

    Danwei, Chen; Xiuli, Huang; Xunyi, Ren

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. This paper introduces cloud computing and cloud service firstly, and then gives cloud services access control model based on UCON and negotiation technologies, and also designs the negotiation module.

  3. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  4. Boiler control systems engineering

    SciTech Connect

    Gilman, J.

    2005-07-01

    The book provides in-depth coverage on how to safely and reliably control the firing of a boiler. Regardless of the capacity or fuel, certain fundamental control systems are required for boiler control. Large utility systems are more complex due to the number of burners and the overall capacity and equipment. This book covers engineering details on control systems and provides specific examples of boiler control including configuration and tuning. References to requirements are based on the 2004 NFPA 85 along with other ISA standards. Detailed chapters cover: Boiler fundamentals including piping and instrument diagrams (P&IDs) and a design basis checklist; Control of boilers, from strategies and bumpless transfer to interlock circuitry and final control elements; Furnace draft; Feedwater; Coal-fired boilers; Fuel and air control; Steam temperature; Burner management systems; Environment; and Control valve sizing. 2 apps.

  5. Segment alignment control system

    NASA Technical Reports Server (NTRS)

    Aubrun, JEAN-N.; Lorell, Ken R.

    1988-01-01

    The segmented primary mirror for the LDR will require a special segment alignment control system to precisely control the orientation of each of the segments so that the resulting composite reflector behaves like a monolith. The W.M. Keck Ten Meter Telescope will utilize a primary mirror made up of 36 actively controlled segments. Thus the primary mirror and its segment alignment control system are directly analogous to the LDR. The problems of controlling the segments in the face of disturbances and control/structures interaction, as analyzed for the TMT, are virtually identical to those for the LDR. The two systems are briefly compared.

  6. Intelligent flight control systems

    NASA Technical Reports Server (NTRS)

    Stengel, Robert F.

    1993-01-01

    The capabilities of flight control systems can be enhanced by designing them to emulate functions of natural intelligence. Intelligent control functions fall in three categories. Declarative actions involve decision-making, providing models for system monitoring, goal planning, and system/scenario identification. Procedural actions concern skilled behavior and have parallels in guidance, navigation, and adaptation. Reflexive actions are spontaneous, inner-loop responses for control and estimation. Intelligent flight control systems learn knowledge of the aircraft and its mission and adapt to changes in the flight environment. Cognitive models form an efficient basis for integrating 'outer-loop/inner-loop' control functions and for developing robust parallel-processing algorithms.

  7. A secure network access system for mobile IPv6

    NASA Astrophysics Data System (ADS)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  8. Intermittent Control Systems

    ERIC Educational Resources Information Center

    Montgomery, Thomas L.; And Others

    1975-01-01

    The technique of intermittent control systems for air quality control as developed and used by the Tennessee Valley Authority is investigated. Although controversial, all Tennessee Valley Authority sulfur dioxide elimination programs are scheduled to be operational this year. Existing or anticipated intermittent control systems are identified. (BT)

  9. Automated Serials Control System.

    ERIC Educational Resources Information Center

    Pan, Elizabeth

    In 1967, the New York State Library at Albany (NYSL) developed a tape-oriented, off-line serials control system for 10,000 active titles. The system would perform all the serials control functions: bibliographic control, check-in of current receipts, claiming for gaps in receipts and late issues, binding notification for completed sets,…

  10. New User Interface Capabilities for Control Systems

    SciTech Connect

    Kasemir, Kay

    2009-01-01

    Latest technologies promise new control system User Interface (UI) features and greater interoperability of applications. New developments using Java and Eclipse aim to unify diverse control systems and make communication between applications seamless. Web based user interfaces can improve portability and remote access. Modern programming tools improve efficiency, support testing and facilitate shared code. This paper will discuss new developments aimed at improving control system interfaces and their development environment.

  11. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    PubMed

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care.

  12. JT-60 Control System

    SciTech Connect

    Yonekawa, I.; Kawamata, Y.; Totsuka, T.; Akasaka, H.; Sueoka, M.; Kurihara, K.; Kimura, T.

    2002-09-15

    The present status of the JT-60U control system is reported including its original design concept, the progress of the system, and various modifications since the JT-60 upgrade. This control system has features of a functionally distributed and hierarchical structure, using CAMAC interfaces initially, which have been replaced by versatile module Europe (VME)-bus interfaces, and a protective interlock system composed of both software and hard-wired interlock logics. Plant monitoring and control are performed by efficient data communication through CAMAC highways and Ethernet with TCP/IP protocols. Sequential control of plasma discharges is executed by a combination of a remodeled VME-bus system and a timing system. A real-time plasma control system and a human interface system have been continuously modified corresponding to the progress of JT-60U experiments.

  13. BCH codes for large IC random-access memory systems

    NASA Technical Reports Server (NTRS)

    Lin, S.; Costello, D. J., Jr.

    1983-01-01

    In this report some shortened BCH codes for possible applications to large IC random-access memory systems are presented. These codes are given by their parity-check matrices. Encoding and decoding of these codes are discussed.

  14. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  15. Cancer Data Access System (CDAS) | Division of Cancer Prevention

    Cancer.gov

    The Cancer Data Access System (CDAS) is a submission and tracking system for the use of data from the National Lung Screening Trial (NLST) and the Prostate, Lung, Colorectal and Ovarian (PLCO) Cancer Screening Trial.Interested investigators can register with CDAS and request access to data from either screening trial. All requests are reviewed by NCI trial leadership. Upon approval, investigators will be granted access to the requested data for a limited period. | Submission and tracking for data from the National Lung Screening Trial (NLST) and the Prostate, Lung, Colorectal and Ovarian Cancer Screening Trial (PLCO).

  16. Advanced multiple access concepts in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ananasso, Fulvio

    1990-01-01

    Some multiple access strategies for Mobile Satellite Systems (MSS) are discussed. These strategies were investigated in the context of three separate studies conducted for the International Maritime Satellite Organization (INMARSAT) and the European Space Agency (ESA). Satellite-Switched Frequency Division Multiple Access (SS-FDMA), Code Division Multiple Access (CDMA), and Frequency-Addressable Beam architectures are addressed, discussing both system and technology aspects and outlining advantages and drawbacks of either solution with associated relevant hardware issues. An attempt is made to compare the considered option from the standpoint of user terminal/space segment complexity, synchronization requirements, spectral efficiency, and interference rejection.

  17. Man-computer Inactive Data Access System (McIDAS). [design, development, fabrication, and testing

    NASA Technical Reports Server (NTRS)

    1973-01-01

    A technical description is given of the effort to design, develop, fabricate, and test the two dimensional data processing system, McIDAS. The system has three basic sections: an access and data archive section, a control section, and a display section. Areas reported include hardware, system software, and applications software.

  18. Control and optimization system

    DOEpatents

    Xinsheng, Lou

    2013-02-12

    A system for optimizing a power plant includes a chemical loop having an input for receiving an input parameter (270) and an output for outputting an output parameter (280), a control system operably connected to the chemical loop and having a multiple controller part (230) comprising a model-free controller. The control system receives the output parameter (280), optimizes the input parameter (270) based on the received output parameter (280), and outputs an optimized input parameter (270) to the input of the chemical loop to control a process of the chemical loop in an optimized manner.

  19. Intelligent Control Systems Research

    NASA Technical Reports Server (NTRS)

    Loparo, Kenneth A.

    1994-01-01

    Results of a three phase research program into intelligent control systems are presented. The first phase looked at implementing the lowest or direct level of a hierarchical control scheme using a reinforcement learning approach assuming no a priori information about the system under control. The second phase involved the design of an adaptive/optimizing level of the hierarchy and its interaction with the direct control level. The third and final phase of the research was aimed at combining the results of the previous phases with some a priori information about the controlled system.

  20. The ILC control system.

    SciTech Connect

    Carwardine, J.; Saunders, C.; Arnold, N.; Lenkszus, F.; Rehlich, K.; Simrock, S.; Banerjee, b.; Chase, B.; Gottschalk, E.; Joireman, P.; Kasley, P.; Lackey, S.; McBride, P.; Pavlicek, V.; Patrick, J.; Votava, M.; Wolbers, S.; Furukawa, K.; Michizono, S.; Larson, R.S.; Downing, R.; DESY; FNAL; SLAC

    2007-01-01

    Since the last ICALEPCS, a small multi-region team has developed a reference design model for a control system for the International Linear Collider as part of the ILC Global Design Effort. The scale and performance parameters of the ILC accelerator require new thinking in regards to control system design. Technical challenges include the large number of accelerator systems to be controlled, the large scale of the accelerator facility, the high degree of automation needed during accelerator operations, and control system equipment requiring 'Five Nines' availability. The R&D path for high availability touches the control system hardware, software, and overall architecture, and extends beyond traditional interfaces into the technical systems. Software considerations for HA include fault detection through exhaustive out-of-band monitoring and automatic state migration to redundant systems, while the telecom industry's emerging ATCA standard - conceived, specified, and designed for High Availability - is being evaluated for suitability for ILC front-end electronics.

  1. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  2. A selection system for identifying accessible sites in target RNAs.

    PubMed Central

    Pan, W H; Devlin, H F; Kelley, C; Isom, H C; Clawson, G A

    2001-01-01

    Although ribozymes offer tremendous potential for posttranscriptionally controlling expression of targeted genes, their utility is often limited by the accessibility of the targeted regions within the RNA transcripts. Here we describe a method that identifies RNA regions that are accessible to oligonucleotides. Based on this selection protocol, we show that construction of hammerhead ribozymes targeted to the identified regions results in catalytic activities that are consistently and substantially greater than those of ribozymes designed on the basis of computer modeling. Identification of accessible sites should also be widely applicable to design of antisense oligonucleotides and DNAzymes. PMID:11345439

  3. The implementation of wireless access in EPON system

    NASA Astrophysics Data System (ADS)

    Chang, Yuguang; Liu, Deming; Wu, Guangsheng

    2008-11-01

    Ethernet Passive Optical Network(EPON) is one of the most promising fibre-based access techniques which has been more and more widely used in today's access networks. In this paper, we proposed to integrate WLAN technology with EPON to provide wireless service in EPON network. First of all, theoretical analysis is given to support the feasibility of integrating WLAN technology into EPON system. Then, the architecture of the integrated system is descried. The key point of the plan is that an integrated ONU and WLAN BS called ONU-WLAN AP is setup in the system instead of a standard ONU. This is also the main difference between proposed system and a normal EPON system. The ONU-WLAN AP can provide both wired access and wireless access to the end users. System design and implementation is discussed in the following paragraph. Transmission experiments and results of the proposed plan are also described in this paper. The experimental results show that the average traffic throughput of the system could reach to approximate 20Mbps. Finally, conclusions are drawn out: The proposed system can work properly. The integrated system could be a costeffective plan for broadband access network.

  4. Launch system design for access to space

    NASA Technical Reports Server (NTRS)

    Barnes, Corbin

    1994-01-01

    Here, a hybrid launch system is developed. The hybrid launch system combines the lower operating cost advantage of an non-man-rated SSTO (Single Stage to Orbit) MLV (Medium Launch Vehicle) with the crew survivability advantage of a ballistic escape pod. Ultimately, it was found that a non-man-made MLV is configured the same as a man-rated MLV and offers no significant savings in operational cost. However, addition of the proposed escape system would increase the crew survivability rate of the SSTO while incurring only a small cost per pound payload penalty.

  5. Controlled Access under Review: Improving the Governance of Genomic Data Access

    PubMed Central

    Shabani, Mahsa; Dyke, Stephanie O. M.; Joly, Yann; Borry, Pascal

    2015-01-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  6. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  7. Control system design guide

    SciTech Connect

    Sellers, David; Friedman, Hannah; Haasl, Tudi; Bourassa, Norman; Piette, Mary Ann

    2003-05-01

    The ''Control System Design Guide'' (Design Guide) provides methods and recommendations for the control system design process and control point selection and installation. Control systems are often the most problematic system in a building. A good design process that takes into account maintenance, operation, and commissioning can lead to a smoothly operating and efficient building. To this end, the Design Guide provides a toolbox of templates for improving control system design and specification. HVAC designers are the primary audience for the Design Guide. The control design process it presents will help produce well-designed control systems that achieve efficient and robust operation. The spreadsheet examples for control valve schedules, damper schedules, and points lists can streamline the use of the control system design concepts set forth in the Design Guide by providing convenient starting points from which designers can build. Although each reader brings their own unique questions to the text, the Design Guide contains information that designers, commissioning providers, operators, and owners will find useful.

  8. Hysteresis-based congestion control at the B-ISDN access

    NASA Astrophysics Data System (ADS)

    Wissing, Johannes

    1993-11-01

    Multiplexing of bursty sources and refined congestion control strategies are still the subject of numerous research activities. Broadband applications with very high peak-to-mean bitrate ratio and long silence periods like still picture video gave rise to different ideas of rate control at the B-ISDN network access. Contributions on Input Rate Control for source coded traffic as well as on Server Rate Control within a LAN/ATM Interworking Unit have recently been presented. This paper addresses a congestion avoidance strategy at the network access regarding the aggregated traffic of bursty sources. Depending on the number of active sources as well as on certain defined congestion levels the cell rate at the network access is controlled. The proposed analytical approach is based on the model of uniform and continuous arrival and service. The selected underlying Markov chain contains `split' states in order to handle the congestion correlation. The proposed model is extended to an adaptive Non-Markov system where the buffer filling level is evaluated using a switching hysteresis. This type of congestion measurement turns out to be very useful for an adaptive rate control mechanism that guarantees a certain quality of service while still achieving a good statistical gain. The analytical approach is confirmed by results of a computer simulation that is extended to the more complex case of adaptive rate control.

  9. Novel microsatellite control system

    SciTech Connect

    Moore, K.R.; Frigo, J.R.; Tilden, M.W.

    1996-12-31

    The authors are developing extremely simple yet quite capable analog pulse-coded neural networks for smaller-faster-cheaper spacecraft attitude and control systems. They will demonstrate a prototype microsatellite that uses the novel control system to autonomously stabilize itself in the ambient magnetic field and point itself at the brightest available light source.

  10. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  11. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  12. Open Access: How Is Scholarly Information Service System Going?

    NASA Astrophysics Data System (ADS)

    Xia, Nanqiang; Zhang, Yaokun

    Open access movement has resulted in a change of the entire scholarly communication environment. Scholarly information service system (SISS) had a significant change which is represented in the emergency of various open access publishing mode and diversification of integrated value-added service providers. This paper analyzed this change, and discussed how academic library should react to the change; also some possible impacts on scientific communication were discussed.

  13. Control system retrofit guidelines

    SciTech Connect

    Stoddard, L.E.; Gil, L.F. )

    1992-07-01

    This report has been prepared by Black Veatch for the Electric Power Research Institute under Contract RP2710-16. This project has been a part of an EPRI program to enhance computer and control technology applications for the utility industry. It is estimated that the utility industry will spend 500 million dollars in the next two years for control system enhancement projects. The need for such enhancement results from a combination of the age and obsolescence of the control systems in existing fossil-fired plants, the decision by utilities to extend the lifetime of those plants, the changes in operating strategies, and the continued development of control systems with expanded capabilities. Opportunities for control system retrofits are myriad; therefore, utilities are faced with complex decisions as to how best to use the limited financial resources available for such projects. To assist utilities in making these decisions, the Electric Power Research Institute (EPRI) has retained Black Veatch and Sargent Lundy to develop a set of control system retrofit guideline documents. The guidelines are in a three-volume format. Volume I--Control System Retrofit Project Methodology; Volume II--Control System Technical Assessment; and Volume III--Utility Case Studies. Volume II (this document) gives guidance in the technical assessment for a retrofit, and has been prepared by Black Veatch under EPRI RP2710-16. The combination of these guideline documents gives utilities the necessary guidance to perform a retrofit project in a straightforward, cost-effective manner.

  14. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  15. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  16. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  17. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... establish, document, and maintain a system of risk management controls and supervisory procedures...

  18. Drone Control System

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Drones, subscale vehicles like the Firebees, and full scale retired military aircraft are used to test air defense missile systems. The DFCS (Drone Formation Control System) computer, developed by IBM (International Business Machines) Federal Systems Division, can track ten drones at once. A program called ORACLS is used to generate software to track and control Drones. It was originally developed by Langley and supplied by COSMIC (Computer Software Management and Information Center). The program saved the company both time and money.

  19. PRESSURE SYSTEM CONTROL

    DOEpatents

    Esselman, W.H.; Kaplan, G.M.

    1961-06-20

    The control of pressure in pressurized liquid systems, especially a pressurized liquid reactor system, may be achieved by providing a bias circuit or loop across a closed loop having a flow restriction means in the form of an orifice, a storage tank, and a pump connected in series. The subject invention is advantageously utilized where control of a reactor can be achieved by response to the temperature and pressure of the primary cooling system.

  20. Digital flight control systems

    NASA Technical Reports Server (NTRS)

    Caglayan, A. K.; Vanlandingham, H. F.

    1977-01-01

    The design of stable feedback control laws for sampled-data systems with variable rate sampling was investigated. These types of sampled-data systems arise naturally in digital flight control systems which use digital actuators where it is desirable to decrease the number of control computer output commands in order to save wear and tear of the associated equipment. The design of aircraft control systems which are optimally tolerant of sensor and actuator failures was also studied. Detection of the failed sensor or actuator must be resolved and if the estimate of the state is used in the control law, then it is also desirable to have an estimator which will give the optimal state estimate even under the failed conditions.

  1. Power Systems Control Architecture

    SciTech Connect

    James Davidson

    2005-01-01

    A diagram provided in the report depicts the complexity of the power systems control architecture used by the national power structure. It shows the structural hierarchy and the relationship of the each system to those other systems interconnected to it. Each of these levels provides a different focus for vulnerability testing and has its own weaknesses. In evaluating each level, of prime concern is what vulnerabilities exist that provide a path into the system, either to cause the system to malfunction or to take control of a field device. An additional vulnerability to consider is can the system be compromised in such a manner that the attacker can obtain critical information about the system and the portion of the national power structure that it controls.

  2. The cryogenic control system of BEPCII

    NASA Astrophysics Data System (ADS)

    Li, Gang; Wang, Ke-Xiang; Zhao, Ji-Jiu; Yue, Ke-Juan; Dai, Ming-Hui; Huang, Yi-Ling; Jiang, Bo

    2008-04-01

    A superconducting cryogenic system has been designed and deployed in the Beijing Electron- Positron Collider Upgrade Project (BEPCII). The system consists of a Siemens PLC (S7-PLC, Programmable Logic Controller) for the compressor control, an Allen Bradley (AB) PLC for the cryogenic equipments, and the Experimental Physics and Industrial Control System (EPICS) that integrates the PLCs. The system fully automates the superconducting cryogenic control with process control, PID (Proportional-Integral-Differential) control loops, real-time data access and data storage, alarm handler and human machine interface. It is capable of automatic recovery as well. This paper describes the BEPCII cryogenic control system, data communication between S7-PLC and EPICS Input/Output Controllers (IOCs), and the integration of the flow control, the low level interlock, the AB-PLC, and EPICS.

  3. IGISOL control system modernization

    NASA Astrophysics Data System (ADS)

    Koponen, J.; Hakala, J.

    2016-06-01

    Since 2010, the IGISOL research facility at the Accelerator laboratory of the University of Jyväskylä has gone through major changes. Comparing the new IGISOL4 facility to the former IGISOL3 setup, the size of the facility has more than doubled, the length of the ion transport line has grown to about 50 m with several measurement setups and extension capabilities, and the accelerated ions can be fed to the facility from two different cyclotrons. The facility has evolved to a system comprising hundreds of manual, pneumatic and electronic devices. These changes have prompted the need to modernize also the facility control system taking care of monitoring and transporting the ion beams. In addition, the control system is also used for some scientific data acquisition tasks. Basic guidelines for the IGISOL control system update have been remote control, safety, usability, reliability and maintainability. Legacy components have had a major significance in the control system hardware and for the renewed control system software the Experimental Physics and Industrial Control System (EPICS) has been chosen as the architectural backbone.

  4. Load Control System Reliability

    SciTech Connect

    Trudnowski, Daniel

    2015-04-03

    This report summarizes the results of the Load Control System Reliability project (DOE Award DE-FC26-06NT42750). The original grant was awarded to Montana Tech April 2006. Follow-on DOE awards and expansions to the project scope occurred August 2007, January 2009, April 2011, and April 2013. In addition to the DOE monies, the project also consisted of matching funds from the states of Montana and Wyoming. Project participants included Montana Tech; the University of Wyoming; Montana State University; NorthWestern Energy, Inc., and MSE. Research focused on two areas: real-time power-system load control methodologies; and, power-system measurement-based stability-assessment operation and control tools. The majority of effort was focused on area 2. Results from the research includes: development of fundamental power-system dynamic concepts, control schemes, and signal-processing algorithms; many papers (including two prize papers) in leading journals and conferences and leadership of IEEE activities; one patent; participation in major actual-system testing in the western North American power system; prototype power-system operation and control software installed and tested at three major North American control centers; and, the incubation of a new commercial-grade operation and control software tool. Work under this grant certainly supported the DOE-OE goals in the area of “Real Time Grid Reliability Management.”

  5. ISAIA: Interoperable Systems for Archival Information Access

    NASA Technical Reports Server (NTRS)

    Hanisch, Robert J.

    2002-01-01

    The ISAIA project was originally proposed in 1999 as a successor to the informal AstroBrowse project. AstroBrowse, which provided a data location service for astronomical archives and catalogs, was a first step toward data system integration and interoperability. The goals of ISAIA were ambitious: '...To develop an interdisciplinary data location and integration service for space science. Building upon existing data services and communications protocols, this service will allow users to transparently query hundreds or thousands of WWW-based resources (catalogs, data, computational resources, bibliographic references, etc.) from a single interface. The service will collect responses from various resources and integrate them in a seamless fashion for display and manipulation by the user.' Funding was approved only for a one-year pilot study, a decision that in retrospect was wise given the rapid changes in information technology in the past few years and the emergence of the Virtual Observatory initiatives in the US and worldwide. Indeed, the ISAIA pilot study was influential in shaping the science goals, system design, metadata standards, and technology choices for the virtual observatory. The ISAIA pilot project also helped to cement working relationships among the NASA data centers, US ground-based observatories, and international data centers. The ISAIA project was formed as a collaborative effort between thirteen institutions that provided data to astronomers, space physicists, and planetary scientists. Among the fruits we ultimately hoped would come from this project would be a central site on the Web that any space scientist could use to efficiently locate existing data relevant to a particular scientific question. Furthermore, we hoped that the needed technology would be general enough to allow smaller, more-focused community within space science could use the same technologies and standards to provide more specialized services. A major challenge to searching

  6. 40 CFR 35.2110 - Access to individual systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Access to individual systems. 35.2110 Section 35.2110 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL... the systems at all reasonable times for such purposes as inspection, monitoring, building,...

  7. 40 CFR 35.2110 - Access to individual systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Access to individual systems. 35.2110 Section 35.2110 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL... the systems at all reasonable times for such purposes as inspection, monitoring, building,...

  8. 40 CFR 35.2110 - Access to individual systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Access to individual systems. 35.2110 Section 35.2110 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL... the systems at all reasonable times for such purposes as inspection, monitoring, building,...

  9. Open Access: A User Information System. Professional Paper Series, #6.

    ERIC Educational Resources Information Center

    Gleason, Bernard W.

    Focusing on the need for information systems that provide faculty, staff, and students with open access to all necessary information resources, this paper begins by discussing the issues involved in developing such systems. A review of the traditional environment looks at the traditional centralized resources versus the current trend toward…

  10. Accessing the Food Systems in Urban and Rural Minnesotan Communities

    ERIC Educational Resources Information Center

    Smith, Chery; Miller, Hannah

    2011-01-01

    Objective: Explore how urban and rural Minnesotans access the food system and to investigate whether community infrastructure supports a healthful food system. Design: Eight (4 urban and 4 rural) focus groups were conducted. Setting and Participants: Eight counties with urban influence codes of 1, 2, 4, 5, 8, and 10. Fifty-nine (urban, n = 27;…

  11. 61. View of TR spiral access stair system from transmitter ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    61. View of TR spiral access stair system from transmitter building no. 102 mezzanine level; note elevator door on right. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  12. What is system control?

    SciTech Connect

    Hirst, E.; Kirby, B.

    1999-11-01

    Just as the aviation industry needs air-traffic controllers to manage the movement of airplanes for safety and commerce, so too, the electricity industry requires system operators. The electrical-system-control functions encompass a range of activities that support commercial transactions and maintain bulk-power reliability. As part of a project for the Edison Electric Institute, the authors examined the functions and costs of system control and the issues that need to be resolved in a restructured electricity industry (Hirst and Kirby 1998).

  13. Hippo Experiment Data Access and Subseting System

    NASA Astrophysics Data System (ADS)

    Krassovski, M.; Hook, L.; Boden, T.

    2014-12-01

    HIAPER Pole-to-Pole Observations (HIPPO) was an NSF- and NOAA-funded, multi-year global airborne research project to survey the latitudinal and vertical distribution of greenhouse and related gases, and aerosols. Project scientists and support staff flew five month-long missions over the Pacific Basin on the NSF/NCAR Gulfstream V, High-performance Instrumented Airborne Platform for Environmental Research (HIAPER) aircraft between January 2009 and September 2011, spread throughout the annual cycle, from the surface to 14 km in altitude, and from 87°N to 67°S. Data from the HIPPO study of greenhouse gases and aerosols are now available to the atmospheric research community and the public. This comprehensive dataset provides the first high-resolution vertically resolved measurements of over 90 unique atmospheric species from nearly pole-to-pole over the Pacific Ocean across all seasons. The suite of atmospheric trace gases and aerosols is pertinent to understanding the carbon cycle and challenging global climate models. This dataset will provide opportunities for research across a broad spectrum of Earth sciences, including those analyzing the evolution in time and space of the greenhouse gases that affect global climate. The Carbon Dioxide Information Analysis Center (CDIAC) at Oak Ridge National Laboratory (ORNL) provides data management support for the HIPPO experiment including long-term data storage and dissemination. CDIAC has developed a relational database to house HIPPO merged 10-second meteorology, atmospheric chemistry, and aerosol data. This data set provides measurements from all Missions, 1 through 5, that took place from January of 2009 to September 2011. This presentation introduces newly build database and web interface, reflects the present state and functionality of the HIPPO Database and Exploration System as well as future plans for expansion and inclusion of combined discrete flask and GC sample GHG, Halocarbon, and hydrocarbon data.

  14. Access, responsibility, and funding: A systems thinking approach to universal access to oral health.

    PubMed

    Werhane, Patricia H

    2006-11-01

    Universal access to oral health care is a justifiable demand for a number of disparate but morally sound reasons. Nevertheless, that conclusion, however reached, has not solved the problem of the lack of access. Market forces, scarcity of funding, and lack of clarity as to who is responsible for ensuring that oral care is available seem to present insurmountable difficulties. I shall argue that these are not irresolvable problems, but the resolution has to take place through the tool of systems thinking and a systemic approach to moral imagination. Taking the lead from Susan Wolf's and Linda Emanuel's work on systems thinking, and developing ideas from work on mental models and moral imagination, I shall argue that what is often missing in discussions and demands for universal access to oral health care is a morally imaginative systemic approach that takes into account the multi-perspective dynamics involved in health care today. Moral imagination may encourage sound, broad-based, more inclusive moral thinking and moral judgment without ignoring the critical roles and responsibilities each of us has as professionals, providers, payers, or patients, without which change will not take place at all.

  15. Access, responsibility, and funding: A systems thinking approach to universal access to oral health.

    PubMed

    Werhane, Patricia H

    2006-11-01

    Universal access to oral health care is a justifiable demand for a number of disparate but morally sound reasons. Nevertheless, that conclusion, however reached, has not solved the problem of the lack of access. Market forces, scarcity of funding, and lack of clarity as to who is responsible for ensuring that oral care is available seem to present insurmountable difficulties. I shall argue that these are not irresolvable problems, but the resolution has to take place through the tool of systems thinking and a systemic approach to moral imagination. Taking the lead from Susan Wolf's and Linda Emanuel's work on systems thinking, and developing ideas from work on mental models and moral imagination, I shall argue that what is often missing in discussions and demands for universal access to oral health care is a morally imaginative systemic approach that takes into account the multi-perspective dynamics involved in health care today. Moral imagination may encourage sound, broad-based, more inclusive moral thinking and moral judgment without ignoring the critical roles and responsibilities each of us has as professionals, providers, payers, or patients, without which change will not take place at all. PMID:17106032

  16. Distributed joint power and access control algorithm for secondary spectrum sharing

    NASA Astrophysics Data System (ADS)

    Li, Hongyan; Chen, Enqing; Fu, Hongliang

    2010-08-01

    Based on interference temperature model, the problem of efficient secondary spectrum sharing is formulated as a power optimization problem with some constraints at physical layer. These constraints and optimization objective limit a feasible power vector set which leads to the need of access control besides power control. In this paper, we consider the decentralized cognitive radio network scenario where short-term data service is required, and the problem of distributed joint power and access control is studied to maximize the total secondary system throughput, subject to Quality of Service (QoS) constraints from individual secondary users and interference temperature limit (ITL) from primary system. Firstly, a pricing-based game model was used to solve distributed power allocation optimization problem in both high and low signal to interference noise ratio (SINR) scenarios. Secondly, when not all the secondary links can be supported with their QoS requirement and ITL, a distributed joint power and access control algorithm was introduced to find the allowable links which results in maximum network throughput with all the constraints satisfied, and the convergence performance is tested by simulations.

  17. Flight control actuation system

    NASA Technical Reports Server (NTRS)

    Wingett, Paul T. (Inventor); Gaines, Louie T. (Inventor); Evans, Paul S. (Inventor); Kern, James I. (Inventor)

    2004-01-01

    A flight control actuation system comprises a controller, electromechanical actuator and a pneumatic actuator. During normal operation, only the electromechanical actuator is needed to operate a flight control surface. When the electromechanical actuator load level exceeds 40 amps positive, the controller activates the pneumatic actuator to offset electromechanical actuator loads to assist the manipulation of flight control surfaces. The assistance from the pneumatic load assist actuator enables the use of an electromechanical actuator that is smaller in size and mass, requires less power, needs less cooling processes, achieves high output forces and adapts to electrical current variations. The flight control actuation system is adapted for aircraft, spacecraft, missiles, and other flight vehicles, especially flight vehicles that are large in size and travel at high velocities.

  18. Flight control actuation system

    NASA Technical Reports Server (NTRS)

    Wingett, Paul T. (Inventor); Gaines, Louie T. (Inventor); Evans, Paul S. (Inventor); Kern, James I. (Inventor)

    2006-01-01

    A flight control actuation system comprises a controller, electromechanical actuator and a pneumatic actuator. During normal operation, only the electromechanical actuator is needed to operate a flight control surface. When the electromechanical actuator load level exceeds 40 amps positive, the controller activates the pneumatic actuator to offset electromechanical actuator loads to assist the manipulation of flight control surfaces. The assistance from the pneumatic load assist actuator enables the use of an electromechanical actuator that is smaller in size and mass, requires less power, needs less cooling processes, achieves high output forces and adapts to electrical current variations. The flight control actuation system is adapted for aircraft, spacecraft, missiles, and other flight vehicles, especially flight vehicles that are large in size and travel at high velocities.

  19. NUCLEAR REACTOR CONTROL SYSTEM

    DOEpatents

    Epler, E.P.; Hanauer, S.H.; Oakes, L.C.

    1959-11-01

    A control system is described for a nuclear reactor using enriched uranium fuel of the type of the swimming pool and other heterogeneous nuclear reactors. Circuits are included for automatically removing and inserting the control rods during the course of normal operation. Appropriate safety circuits close down the nuclear reactor in the event of emergency.

  20. Access 5 - Step 1: Human Systems Integration Program Plan (HSIPP)

    NASA Technical Reports Server (NTRS)

    2005-01-01

    This report describes the Human System Interface (HSI) analysis, design and test activities that will be performed to support the development of requirements and design guidelines to facilitate the incorporation of High Altitude Long Endurance (HALE) Remotely Operated Aircraft (ROA) at or above FL400 in the National Airspace System (NAS). These activities are required to support the design and development of safe, effective and reliable ROA operator and ATC interfaces. This plan focuses on the activities to be completed for Step 1 of the ACCESS 5 program. Updates to this document will be made for each of the four ACCESS 5 program steps.

  1. Computer vector multiprocessing control with multiple access memory and priority conflict resolution method

    SciTech Connect

    Chen, S.S.; Schiffleger, A.J.

    1990-02-13

    This patent describes a multiprocessor memory system. It comprises: a central memory comprised of a plurality of independently addressable memory banks organized into a plurality of sections each accessible through a plurality of access paths; a plurality of processing machines; each of the processing machine including a plurality of ports for generating memory references to any one of the central memory sections; and conflict resolution means interfacing each of the ports to each of the central memory sections through the central memory access paths. The resolution means for receiving references from the ports and coordinating and controlling the procession of the references along to the access paths. The conflict resolution means comprising a plurality of conflict resolution circuits corresponding in number to the memory sections, each of the circuits receiving the references to its corresponding section from any one of the ports and selectively conveying the references to the access paths for the corresponding section. The circuits each including; means for checking the readiness of the memory banks to be referenced and holding a reference to a busy one of the banks until the bank is ready to be referenced; means for detecting when more than one of the references is pending to the same bank simultaneously and holding all but one of the simultaneously pending references; and means communicating with the ports and the other of the conflict resolution circuits to cause one of the ports referencing the memory to suspend generation of further references when a reference from the referencing port is being held.

  2. Turbocharger control system

    SciTech Connect

    Yogo, K.; Nomura, I.

    1987-04-21

    A turbocharger control system is described utilizing a carburetor system. This system includes a carburetor having an air-fuel induction passage, a fuel supply passage for supplying fuel to the air-fuel induction passage, and a turbocharger compressor impeller disposed upstream of a throttle valve and compressing an air-fuel mixture flow delivered to an engine intake manifold. The turbocharger control system comprises: a surge tank provided in the intake manifold; an air control valve including means for controlling an air bleeding amount supplied to the air induction passage in response to changes in pressure of the surge tank. The air control valve further comprises a valve housing having an end wall and including a first, second and third chamber formed therein. A diaphragm has a valve member for controlling communication between the second chamber and the third chamber in response to a pressure existing in the first chamber, a spring biasing the diaphragm in a direction such that the valve member is maintained in a closed position against the pressure in the first chamber. A valve seat plate is in contact with the valve member. The first chamber is connected with the surge tank and the second chamber is connected with the fuel supply passage, and the third chamber is connected with atmosphere. The first chamber is defined by a valve housing of the air control valve, the end wall and the diaphragm and the valve member has a tapered form.

  3. Computer controlled antenna system

    NASA Technical Reports Server (NTRS)

    Raumann, N. A.

    1972-01-01

    The application of small computers using digital techniques for operating the servo and control system of large antennas is discussed. The advantages of the system are described. The techniques were evaluated with a forty foot antenna and the Sigma V computer. Programs have been completed which drive the antenna directly without the need for a servo amplifier, antenna position programmer or a scan generator.

  4. Access to medicines from a health system perspective

    PubMed Central

    Bigdeli, Maryam; Jacobs, Bart; Tomson, Goran; Laing, Richard; Ghaffar, Abdul; Dujardin, Bruno; Van Damme, Wim

    2013-01-01

    Most health system strengthening interventions ignore interconnections between systems components. In particular, complex relationships between medicines and health financing, human resources, health information and service delivery are not given sufficient consideration. As a consequence, populations' access to medicines (ATM) is addressed mainly through fragmented, often vertical approaches usually focusing on supply, unrelated to the wider issue of access to health services and interventions. The objective of this article is to embed ATM in a health system perspective. For this purpose, we perform a structured literature review: we examine existing ATM frameworks, review determinants of ATM and define at which level of the health system they are likely to occur; we analyse to which extent existing ATM frameworks take into account access constraints at different levels of the health system. Our findings suggest that ATM barriers are complex and interconnected as they occur at multiple levels of the health system. Existing ATM frameworks only partially address the full range of ATM barriers. We propose three essential paradigm shifts that take into account complex and dynamic relationships between medicines and other components of the health system. A holistic view of demand-side constraints in tandem with consideration of multiple and dynamic relationships between medicines and other health system resources should be applied; it should be recognized that determinants of ATM are rooted in national, regional and international contexts. These are schematized in a new framework proposing a health system perspective on ATM. PMID:23174879

  5. Accessing and Sharing Data Using the CUAHSI Hydrologic Information System

    NASA Astrophysics Data System (ADS)

    Tarboton, D. G.; Horsburgh, J. S.; Whiteaker, T. L.; Maidment, D. R.; Zaslavsky, I.

    2008-12-01

    The Consortium of Universities for the Advancement of Hydrologic Science, Inc (CUAHSI) has a Hydrologic Information System (HIS) project, which is developing infrastructure to support the sharing of hydrologic data through web services and tools for data discovery, access and publication. Centralized data services support access to National Datasets such as the USGS National Water Information System (NWIS) and SNOTEL, in a standard way. Distributed data services allow users to establish their own server and publish their data through CUAHSI HIS web services. Once such a data service is registered within HIS Central, it becomes searchable and accessible through the centralized discovery and data access tools. The HIS is founded upon an information model for observations at stationary points that supports its data services. This is implemented as both XML and relational database schema for transmission and storage of data respectively. WaterML is the XML based data transmission model that underlies the machine to machine communications, while the Observations Data Model (ODM) is a relational database model for persistent data storage. Web services support access to hydrologic data stored in ODM and transmitted using WaterML directly from applications software such as Excel, MATLAB and ArcGIS that have Simple Object Access Protocol (SOAP) capability. A significant value of web services derives from the capability to use them from within a user's preferred analysis environment, rather than requiring a user to learn new software. This allows a user to work with data from national and academic sources, almost as though it was on their local disk. This poster will be computer-based with internet access for demonstration of HIS tools and functionality.

  6. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  7. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  8. Intelligent traffic control system using PLC

    NASA Astrophysics Data System (ADS)

    Barz, C.; Todea, C.; Latinovic, T.; Preradovic, D. M.; Deaconu, S.; Berdie, A.

    2016-08-01

    The paper presents the traffic control system controlled through a PLC which takes the signals from different sensors on roads. The global system developed ensures the coordination of four intersections, setting a path that respects coordination type green light, the integration of additional sensors, the implementation of probes radar to inform traffic participants about recommended speed for accessing the green state located in the intersection that will follow to cross.

  9. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  10. Access to care for Chagas disease in the United States: a health systems analysis.

    PubMed

    Manne-Goehler, Jennifer; Reich, Michael R; Wirtz, Veronika J

    2015-07-01

    There are 300,000 estimated cases of Chagas disease in the United States but limited data on access to care. This study analyzed trends in access to care for Chagas disease in the United States and assessed the national and state barriers to access. Data on cases in blood donors and drug releases were obtained from the AABB (formerly American Association of Blood Banks) and U.S. Centers for Disease Control and Prevention (CDC), respectively. Semi-structured in-depth interviews were conducted with 30 key informants at the national level and in five states where treatment had been released. Interview responses were analyzed according to the health systems dimensions of regulation, financing, payment, organization, and persuasion. Data indicate that 1,908 cases were identified in the blood donation system from 2007 to 2013 and that CDC released 422 courses of benznidazole or nifurtimox during this period. The barriers to access at the national level include limited diagnostic and institutionalized referral and care processes, lack of financing for patient-care activities, and limited awareness and training among providers. This study demonstrates that access to treatment of Chagas disease in the United States is limited. The lack of licensing is only one of several barriers to access, highlighting the need for a health systems perspective when scaling up access to these essential medicines.

  11. CNEOST Control Software System

    NASA Astrophysics Data System (ADS)

    Wang, Xin; Zhao, Hai-bin; Xia, Yan; Lu, Hao; Li, Bin

    2016-01-01

    In 2013, CNEOST (China Near Earth Object Survey Telescope) adapted its hardware system for the new CCD camera. Based on the new system architecture, the control software is re-designed and implemented. The software system adopts the messaging mechanism based on the WebSocket protocol, and possesses good flexibility and expansibility. The user interface based on the responsive web design has realized the remote observations under both desktop and mobile devices. The stable operation of the software system has greatly enhanced the operation efficiency while reducing the complexity, and has also made a successful attempt for the future system design of telescope and telescope cloud.

  12. CNEOST Control Software System

    NASA Astrophysics Data System (ADS)

    Wang, X.; Zhao, H. B.; Xia, Y.; Lu, H.; Li, B.

    2015-03-01

    In 2013, CNEOST (China Near Earth Object Survey Telescope) adapted its hardware system for the new CCD camera. Based on the new system architecture, the control software is re-designed and implemented. The software system adopts the message passing mechanism via WebSocket protocol, and improves its flexibility, expansibility, and scalability. The user interface with responsive web design realizes the remote operating under both desktop and mobile devices. The stable operating of software system has greatly enhanced the operation efficiency while reducing the complexity, and has also made a successful attempt for the future system design of telescope and telescope cloud.

  13. A novel IPTV program multiplex access system to EPON

    NASA Astrophysics Data System (ADS)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  14. An Information System to Access Status Information of the LHCb Online

    NASA Astrophysics Data System (ADS)

    Frank, M.; Gaspar, C.

    2012-12-01

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  15. Public Access Online Library System (OLS) User's Guide.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Information Management and Services Div.

    How to access and search using the Online Library System (OLS) is described. The OLS is a computerized list of bibliographic citations compiled by the library network of the Environmental Protection Agency (EPA). It consists of several related databases and can be used by anyone to search for books, documents, journals, and other materials. In…

  16. 48 CFR 2452.239-70 - Access to HUD systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Fingerprint Check, and obtain a PIV Card prior to being permitted access to any such system in performance of..., “Questionnaire for Non-Sensitive Positions,” FD 258 (Fingerprint Chart), and a partial Optional Form (OF) 306... successfully cleared an FBI National Criminal History Fingerprint Check, and HUD has initiated the...

  17. 45 CFR 95.615 - Access to systems and records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION-GRANT PROGRAMS (PUBLIC ASSISTANCE, MEDICAL ASSISTANCE AND STATE CHILDREN'S HEALTH INSURANCE... (FFP) Specific Conditions for Ffp § 95.615 Access to systems and records. In accordance with 45 CFR..., including design developments, operation, and cost records of contractors and subcontractors at...

  18. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  19. Neural Flight Control System

    NASA Technical Reports Server (NTRS)

    Gundy-Burlet, Karen

    2003-01-01

    The Neural Flight Control System (NFCS) was developed to address the need for control systems that can be produced and tested at lower cost, easily adapted to prototype vehicles and for flight systems that can accommodate damaged control surfaces or changes to aircraft stability and control characteristics resulting from failures or accidents. NFCS utilizes on a neural network-based flight control algorithm which automatically compensates for a broad spectrum of unanticipated damage or failures of an aircraft in flight. Pilot stick and rudder pedal inputs are fed into a reference model which produces pitch, roll and yaw rate commands. The reference model frequencies and gains can be set to provide handling quality characteristics suitable for the aircraft of interest. The rate commands are used in conjunction with estimates of the aircraft s stability and control (S&C) derivatives by a simplified Dynamic Inverse controller to produce virtual elevator, aileron and rudder commands. These virtual surface deflection commands are optimally distributed across the aircraft s available control surfaces using linear programming theory. Sensor data is compared with the reference model rate commands to produce an error signal. A Proportional/Integral (PI) error controller "winds up" on the error signal and adds an augmented command to the reference model output with the effect of zeroing the error signal. In order to provide more consistent handling qualities for the pilot, neural networks learn the behavior of the error controller and add in the augmented command before the integrator winds up. In the case of damage sufficient to affect the handling qualities of the aircraft, an Adaptive Critic is utilized to reduce the reference model frequencies and gains to stay within a flyable envelope of the aircraft.

  20. Quantum Random Access Codes Using Single d-Level Systems.

    PubMed

    Tavakoli, Armin; Hameedi, Alley; Marques, Breno; Bourennane, Mohamed

    2015-05-01

    Random access codes (RACs) are used by a party to, with limited communication, access an arbitrary subset of information held by another party. Quantum resources are known to enable RACs that break classical limitations. Here, we study quantum and classical RACs with high-level communication. We derive average performances of classical RACs and present families of high-level quantum RACs. Our results show that high-level quantum systems can significantly increase the advantage of quantum RACs over their classical counterparts. We demonstrate our findings in an experimental realization of a quantum RAC with four-level communication.

  1. The ARAC client system: network-based access to ARAC

    SciTech Connect

    Leach, M J; Sumikawa, D; Webster, C

    1999-07-12

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components.

  2. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  3. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  4. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  5. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  6. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  7. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  8. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  9. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  10. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  11. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  12. Well valve control system

    SciTech Connect

    Schwendemann, K.L.; McCracken, O.W.; Mondon, C.G.; Wortham, L.C.

    1987-01-13

    A system is described for controlling well testing through an upper and lower test string with a subsea test tree connected therebetween and latch means to release the upper test string from the subsea test tree comprising: a. first and second selectively programmable microprocessor means; b. means for storing system operating limits in each microprocessor means; c. means for changing the operating limits in response to changes in well conditions; d. means for communicating operating fluid pressure to the subsurface test tree and the latch means; e. solenoid pilot valves controlling the flow of the operating fluid pressure to the subsea test tree and the latch means; f. the first microprocessor means located at a central control console; g. the second microprocessor means located near the solenoid valves; h. means for transmitting signals between the first and second microprocessor means and validating the accuracy of the signals; and i. electronic circuits to control operation of the solenoid valves in response to validated signals.

  13. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  14. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access... Prescriptions § 1311.125 Requirements for establishing logical access control—Individual practitioner. (a) At... his two-factor authentication credential to satisfy the logical access controls. The second...

  15. Does the public deserve free access to climate system science?

    NASA Astrophysics Data System (ADS)

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  16. SERVOMOTOR CONTROL SYSTEM

    DOEpatents

    MacNeille, S.M.

    1958-12-01

    Control systems for automatic positioning of an electric motor operated vapor valve are described which is operable under the severe conditions existing in apparatus for electro-magnetlcally separating isotopes. In general, the system includes a rotor for turning the valve comprising two colls mounted mutually perpendicular to each other and also perpendicular to the magnetic field of the isotope separating apparatus. The coils are furnished with both a-c and d- c current by assoclate control circuitry and a position control is provided for varying the ratlo of the a-c currents in the coils and at the same time, but in an inverse manner, the ratio between the d-c currents in the coils is varied. With the present system the magnitude of the motor torque is constant for all valves of the rotor orientatlon angle.

  17. NASA Access Mechanism - Graphical user interface information retrieval system

    NASA Technical Reports Server (NTRS)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  18. NASA access mechanism: Graphical user interface information retrieval system

    NASA Technical Reports Server (NTRS)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  19. Sulfur rate control system

    SciTech Connect

    Bell, T.A.; Mullendore, M.G.; Kleinfeldt, T.E.; Walker, H.G. Jr.

    1993-07-20

    A sulfur rate control system is described for substantially optimizing particulate removal performance of an electrostatic precipitator in fluid communication with a flue carrying combustion products of a fossil fuel, comprising: an electrostatic precipitator having an inlet for receiving a flue gas: means for injecting sulfur trioxide into a flue for mixing with said flue gas at a location preceding entry of said flue gas into said electrostatic precipitator, said injection of sulfur trioxide being varied responsive to a proportional control signal; and, control means coupled to both said flue and said sulfur trioxide injection means for generating said proportional control signal, said control means including (1) means for measuring a sulfur dioxide concentration quantity in said flue gas at a location preceding said sulfur trioxide injection means, (2) means for measuring a flow rate of particulates in said flue gas at a location preceding said sulfur trioxide injection means, and (3) a controller for calculating a ratio between said sulfur dioxide concentration quantity and said flow rate of particulates, said ratio calculating controller having a first input coupled to said sulfur dioxide measuring means and a second input coupled to said particulate flow rate measuring means for generating said proportional control signal in proportion to a difference between a predetermined value and said ratio between said sulfur dioxide concentration quantity and said flow rate of particulates, said ratio controller having an output coupled to said sulfur trioxide injection means for maximizing particulate removal efficiency of said electrostatic precipitator.

  20. Modern tandem control systems

    NASA Astrophysics Data System (ADS)

    Lutz, J. R.; Marsaudon, J. C.

    1993-04-01

    Nowadays, tandem electrostatic accelerators can benefit greatly from the growing possibilities provided by modern control facilities. Controlling an electrostatic accelerator first requires the solution of technological problems raised by the necessity of fitting inside the tank equipment which is highly stressed by the physical environment. Then, these controls can take advantage of new techniques which appear on the market. Present computer technology provides cheap powerful workstations for efficient operator interfacing, and new modular and distributed control concepts have been developed for general use in experimental physics, in data acquisition and in control systems. The general trend towards standardization is now accepted for both hardware and software and this brings benefits to the designer and the user.

  1. Spacelab environmental control system

    NASA Technical Reports Server (NTRS)

    Mitchell, K. L.; Sessions, B. W.; Turner, L. D.

    1976-01-01

    This paper describes the NASA/MSFC thermal control activities performed in support of the European design and development of the Spacelab environmental control system (ECS) and the integration of the ECS with experiments and with the Shuttle Orbiter. Thermal interfaces with the Orbiter are reviewed, including payload bay temperature profiles for the long module and pallet Spacelab configuration for the on-orbit mission phase. Thermal designs and predicted thermal performance are also reviewed for the module air cooling systems and specific experiment interfaces, such as the experiment dedicated heat exchanger and rack cooling.

  2. REACTOR CONTROL SYSTEM

    DOEpatents

    MacNeill, J.H.; Estabrook, J.Y.

    1960-05-10

    A reactor control system including a continuous tape passing through a first coolant passageway, over idler rollers, back through another parallel passageway, and over motor-driven rollers is described. Discrete portions of fuel or poison are carried on two opposed active sections of the tape. Driving the tape in forward or reverse directions causes both active sections to be simultaneously inserted or withdrawn uniformly, tending to maintain a more uniform flux within the reactor. The system is particularly useful in mobile reactors, where reduced inertial resistance to control rod movement is important.

  3. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  4. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority.

  5. Controlling cogeneration systems

    SciTech Connect

    Petro, J.

    1985-03-01

    The interest in cogeneration and peakshaving systems has grown rapidly as the cost of energy has driven large users to look to other means to supply their electrical demand more economically. Likewise, utilities faced with rising fuel costs and plants operating at near-full capacities are turning to cogenerators to reduce their peak demand loads. The federal government, through the Federal Energy Regulatory Commission, has promoted this situation by enacting rules that encourage cogeneration and remove obstacles that are deterring its use. It appears that in the 1980s, a larger percentage of onsite power installations are being decided on for economic reasons, rather than solely for the need for standby power. A review of recent cogeneration installations verifies this opinion, since they are being installed in places where standby power is not required nor would be considered in normal circumstances. Integral with the basic cogeneration and peak-shaving systems are the switchgear and its associated controls. Controls can range from the relatively basic ones for a manually-operated system to complex ones for a highlyautomated, highly-monitored system. No cookbook solution can determine the exact controls required for either of these types of applications. It remains the responsibility of the system designer to specify controls that are adequate.

  6. A human rights view on access to controlled substances for medical purposes under the international drug control framework.

    PubMed

    Gispen, Marie Elske C

    2013-11-01

    The world is confronted with a major public health deficit caused by poor access to controlled essential medicines under the international drug control framework. This is affecting millions of patients on a daily basis and resulting in numerous human rights violations. The present review contextualises this deficit from a human rights perspective. Drug control efforts are informed by a twofold objective stemming from the double nature of scheduled substances: free access for medical purposes should be ensured, though non-medical use of substances such as opium should be restricted. The international drug control framework is, in theory, based on this twofold notion, however at the level of interpretation, monitoring, and implementation, a one-sided emphasis is demonstrated. By tracing a parallel between the obligations of states under the international drug control framework and those that derive from human rights law, the review shows that the two systems seem incoherent and conflicting in nature and flags the importance of cross-disciplinary research into drug control and human rights.

  7. L-band and SHF multiple access schemes for the MSAT system

    NASA Technical Reports Server (NTRS)

    Razi, Michael; Shoamanesh, Alireza; Azarbar, Bahman

    1988-01-01

    The first generation of the Canadian Mobile Satellite (MSAT) system, planned to be operational in the early 1990s, will provide voice and data services to land, aeronautical, and maritime mobile terminals within the Canadian land mass and its territorial waters. The system will be managed by a centralized Demand Assignment Multiple Access (DAMA) control system. Users will request a communication channel by communicating with the DAMA Control System (DCS) via the appropriate signalling channels. Several access techniques for both L-band and SHF signalling channels have been investigated. For the L-band, Slotted Aloha (SA) and Reservation Aloha (RA), combined with a token scheme, are discussed here. The results of Telesat studies to date indicate that SA, when combined with token scheme, provides the most efficient access and resource management tool in a mobile propagation environment. For SHF signalling channels, slim time division multiple access (TDMA) and SA have been considered as the most suitable candidate schemes. In view of the operational environment of the SHF links, provision of a very short channel access delay and a relatively high packet success rate are highly desirable. Studies carried out generally favor slim-TDMA as the most suitable approach for SHF signalling channels.

  8. Personal Access Satellite System (PASS) study. Fiscal year 1989 results

    NASA Technical Reports Server (NTRS)

    Sue, Miles K. (Editor)

    1990-01-01

    The Jet Propulsion Laboratory is exploring the potential and feasibility of a personal access satellite system (PASS) that will offer the user greater freedom and mobility than existing or currently planned communications systems. Studies performed in prior years resulted in a strawman design and the identification of technologies that are critical to the successful implementation of PASS. The study efforts in FY-89 were directed towards alternative design options with the objective of either improving the system performance or alleviating the constraints on the user terminal. The various design options and system issues studied this year and the results of the study are presented.

  9. Distributed magnetic field positioning system using code division multiple access

    NASA Technical Reports Server (NTRS)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  10. Alternative multiple-access techniques for mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Smith, Patrick O.; Geraniotis, Evaggelos

    1989-01-01

    The use of Code Division Multiple Access (CDMA) to satisfy the diverse requirements of a generic (land, maritime, aeronautical) mobile satellite system (MSS) network design is discussed. Comparisons between CDMA and Frequency Division Multiple Access (FDMA) show that a CDMA network design can support significantly more voice channel allocations than FDMA when relatively simple CDMA correlation receivers are employed, provided that there is sufficient space segment equivalent isotropically radiated power (EIRP). The use of more advanced CDMA receivers can improve the spectral and power efficiency. Although the use of CDMA may not gain immediate and widespread support in the international MSS community, provision for the use of CDMA for a domestic system in the U.S., and possibly for a regional system throughout North America, is likely.

  11. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  12. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  13. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  14. Accessing files in an Internet: The Jade file system

    NASA Technical Reports Server (NTRS)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  15. Accessing files in an internet - The Jade file system

    NASA Technical Reports Server (NTRS)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  16. Electric turbocompound control system

    DOEpatents

    Algrain, Marcelo C.

    2007-02-13

    Turbocompound systems can be used to affect engine operation using the energy in exhaust gas that is driving the available turbocharger. A first electrical device acts as a generator in response to turbocharger rotation. A second electrical device acts as a motor to put mechanical power into the engine, typically at the crankshaft. Apparatus, systems, steps, and methods are described to control the generator and motor operations to control the amount of power being recovered. This can control engine operation closer to desirable parameters for given engine-related operating conditions compared to actual. The electrical devices can also operate in "reverse," going between motor and generator functions. This permits the electrical device associated with the crankshaft to drive the electrical device associated with the turbocharger as a motor, overcoming deficient engine operating conditions such as associated with turbocharger lag.

  17. Timing control system

    NASA Technical Reports Server (NTRS)

    Wiker, Gordon A. (Inventor); Wells, Jr., George H. (Inventor)

    1989-01-01

    A timing control system is disclosed which is particularly useful in connection with simulated mortar shells. Special circuitry is provided to assure that the shell does not overshoot, but rather detonates early in case of an improper condition; this ensures that ground personnel will not be harmed by a delayed detonation. The system responds to an externally applied frequency control code which is configured to avoid any confusion between different control modes. A premature detonation routine is entered in case an improper time-setting signal is entered, or if the shell is launched before completion of the time-setting sequence. Special provisions are also made for very early launch situations and improper detonator connections. An alternate abort mode is provided to discharge the internal power supply without a detonation in a manner that can be externally monitored, thereby providing a mechanism for non-destructive testing. The abort mode also accelerates the timing function for rapid testing.

  18. Timing Control System

    NASA Technical Reports Server (NTRS)

    Wiker, Gordon A. (Inventor); Wells, George H., Jr. (Inventor)

    1987-01-01

    A timing control system is disclosed which is particularly useful in connection with simulated mortar shells. Special circuitry is provided to assure that the shell does not over shoot, but rather detonates early in case of an improper condition; this ensures that ground personnel will not be harmed by a delayed detonation. The system responds to an externally applied frequency control code which is configured to avoid any confusion between different control modes. A premature detonation routine is entered in case an improper time-setting signal is entered, or if the shell is launched before completion of the time-setting sequence. Special provisions are also made for very early launch situations and improper detonator connections. An alternate abort mode is provided to discharge the internal power supply without a detonation in a manner that can be externally monitored, thereby providing a mechanism for non-destructive testing. The abort mode also accelerates the timing function for rapid testing.

  19. Cryogenic Control System

    SciTech Connect

    Goloborod'ko, S.; /Fermilab

    1989-02-27

    The control system (CS) for the cryogenic arrangement of the DO Liquid Argon Calorimeter consists of a Texas instruments 560/565 Programmable Logical Controller (PLC), two remote bases with Remote Base Controllers and a corresponding set of input/output (I/O) modules, and a PC AST Premium 286 (IBM AT Compatible). The PLC scans a set of inputs and provides a set of outputs based on a ladder logic program and PID control loops. The inputs are logic or analog (current, voltage) signals from equipment status switches or transducers. The outputs are logic or analog (current or voltage) signals for switching solenoids and positioning pneumatic actuators. Programming of the PLC is preformed by using the TISOFT2/560/565 package, which is installed in the PC. The PC communicates to the PLC through a serial RS232 port and provides operator interface to the cryogenic process using Xpresslink software.

  20. Telerobot control system

    NASA Technical Reports Server (NTRS)

    Backes, Paul G. (Inventor); Tso, Kam S. (Inventor)

    1993-01-01

    This invention relates to an operator interface for controlling a telerobot to perform tasks in a poorly modeled environment and/or within unplanned scenarios. The telerobot control system includes a remote robot manipulator linked to an operator interface. The operator interface includes a setup terminal, simulation terminal, and execution terminal for the control of the graphics simulator and local robot actuator as well as the remote robot actuator. These terminals may be combined in a single terminal. Complex tasks are developed from sequential combinations of parameterized task primitives and recorded teleoperations, and are tested by execution on a graphics simulator and/or local robot actuator, together with adjustable time delays. The novel features of this invention include the shared and supervisory control of the remote robot manipulator via operator interface by pretested complex tasks sequences based on sequences of parameterized task primitives combined with further teleoperation and run-time binding of parameters based on task context.

  1. A Quality of Context-Aware Approach to Access Control in Pervasive Environments

    NASA Astrophysics Data System (ADS)

    Toninelli, Alessandra; Corradi, Antonio; Montanari, Rebecca

    The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users to share resources anywhere and anytime, but makes access control a crucial issue. User/device mobility and heterogeneity, together with network topology and conditions variability, complicate access control and call for novel solutions to dynamically adapt access decisions to the different operating conditions. Several research efforts have emerged in recent years that propose to exploit context-awareness to control access to resources based on context visibility and changes. Context-based access control requires, however, to take into account the quality of context information used to drive access decisions (QoC). Quality of context has in fact a profound impact on the correct behavior of any context-aware access control framework. Using context information with insufficient quality might increase the risk of incorrect access control decisions, thus leading to dangerous security breaches in resource sharing. In this paper we propose a QoC-aware approach to access control for anywhere, anytime resource sharing. The paper describes the design, implementation and evaluation of the Proteus policy framework, which combines two design guidelines to enable dynamic adaptation of policies depending on context changes: context-awareness with QoC guarantees and semantic technologies to allow high-level description of context/policy specification and reasoning about context/policies.

  2. Photovoltaic system controller

    SciTech Connect

    Gerken, K.F.; Sullivan, R.A.

    1989-12-19

    This patent describes a photovoltaic system controller for utilization with a photovoltaic power system including at least a photovoltaic array, a system battery adapted to be charged by the array and a load adapted to be powered by the battery. The controller comprising a microprocessor having an erasable programmable memory. The microprocessor having means to receive input data from the array, the battery and the load. The microprocessor having means to evaluate the input data in relation to at least one predetermined setpoint, the microprocessor in response to the evaluation being adapted to disconnect the battery from the array or to disconnect the load from the battery. The setpoint being adapted to be adjusted to a second setpoint by adjustment means, and the erasable programmable memory being adapted to be changed whereby the evaluation performed by the microprocessor is also changed.

  3. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  4. Dynamitron control systems

    NASA Astrophysics Data System (ADS)

    Lisanti, Thomas F.

    2005-12-01

    The Dynamitron control system utilizes the latest personal computer technology in control circuitry and components. Both the DPC-2000 and newer Millennium series of control systems make use of their modular architecture in both software and hardware to keep up with customer and engineering demands. This also allows the main structure of the software to remain constant for the user while software drivers are easily changed as hardware demands are modified and improved. The system is presented as four units; the Remote I/O (Input/Output), Local Analog and Digital I/O, Operator Interface and the Main Computer. The operator is provided with a selection of many informative screen displays. The control program handles all graphic screen displays and the updating of these screens directly; it does not communicate to a display terminal. This adds to the quick response and excellent operator feedback received while operating the accelerator. The CPU also has the ability to store and record all process variable setpoints for each product that will be treated. All process parameters are printed to a report at regular intervals during a process run for record keeping.

  5. Management control system description

    SciTech Connect

    Bence, P. J.

    1990-10-01

    This Management Control System (MCS) description describes the processes used to manage the cost and schedule of work performed by Westinghouse Hanford Company (Westinghouse Hanford) for the US Department of Energy, Richland Operations Office (DOE-RL), Richland, Washington. Westinghouse Hanford will maintain and use formal cost and schedule management control systems, as presented in this document, in performing work for the DOE-RL. This MCS description is a controlled document and will be modified or updated as required. This document must be approved by the DOE-RL; thereafter, any significant change will require DOE-RL concurrence. Westinghouse Hanford is the DOE-RL operations and engineering contractor at the Hanford Site. Activities associated with this contract (DE-AC06-87RL10930) include operating existing plant facilities, managing defined projects and programs, and planning future enhancements. This document is designed to comply with Section I-13 of the contract by providing a description of Westinghouse Hanford's cost and schedule control systems used in managing the above activities. 5 refs., 22 figs., 1 tab.

  6. Web-Accessible Scientific Workflow System for Performance Monitoring

    SciTech Connect

    Roelof Versteeg; Roelof Versteeg; Trevor Rowe

    2006-03-01

    We describe the design and implementation of a web accessible scientific workflow system for environmental monitoring. This workflow environment integrates distributed, automated data acquisition with server side data management and information visualization through flexible browser based data access tools. Component technologies include a rich browser-based client (using dynamic Javascript and HTML/CSS) for data selection, a back-end server which uses PHP for data processing, user management, and result delivery, and third party applications which are invoked by the back-end using webservices. This environment allows for reproducible, transparent result generation by a diverse user base. It has been implemented for several monitoring systems with different degrees of complexity.

  7. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  8. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  9. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  10. The UMC control system

    SciTech Connect

    Dallard, K.E.; Adams, R.J.

    1983-05-01

    The control system for the Central Cormorant Underwater Manifold Centre (UMC) is an important step forward in developing the technology of subsea production. It provides reliable, fast operation of over 250 UMC valves and sensors at a distance of 7 kilometres. Included in the paper is an overview of the complete control system with selected components described in more detail. Principal guidelines which shaped the final design configuration are also discussed and problems encountered during design and manufacture are highlighted. The paper stresses the thorough testing that was an essential requirement prior to installation. Finally, general conclusions are drawn about the approach taken which would be of benefit to similar projects in the future.

  11. Vehicle speed control system

    SciTech Connect

    Yoshida, D.; Tanno, T.; Fukunaga, T.

    1987-06-16

    This patent describes a vehicle speed control system for performing vehicle speed control by controlling the displacement of at least one of a hydraulic pump and a hydraulic motor of a hydraulic transmission through an electric servo device, comprising: vehicle speed setting means for generating a voltage signal corresponding to a vehicle speed to be set; compensating means interposed between the vehicle speed setting means and the electric servo device, the compensating means comprising a first delay element; and second delay element having a response characteristic slower than that of the first delay element. A selecting means for judging as to whether a voltage signal changed by the operation of the vehicle speed setting means represents an acceleration command or a deceleration command and for selecting the first delay element when the voltage signal represents an acceleration command and for selecting the second delay element when the voltage signal represents a deceleration command.

  12. ACCESS Earth: Promoting Accessibility to Earth System Science for Students with Disabilities

    NASA Astrophysics Data System (ADS)

    Locke, S. M.; Cohen, L.; Lightbody, N.

    2001-05-01

    ACCESS Earth is an intensive summer institute for high school students with disabilities and their teachers that is designed to encourage students with disabilities to consider careers in earth system science. Participants study earth system science concepts at a Maine coastal estuary, using Geographic Information Systems, remote sensing, and field observations to evaluate the impacts of climate change, sea level rise, and development on coastal systems. Teachers, students, and scientists work together to adapt field and laboratory activities for persons with disabilities, including those with mobility and visual impairments. Other sessions include demonstrations of assistive technology, career discussions, and opportunities for students to meet with successful scientists with disabilities from throughout the U.S. The summer institute is one of several programs in development at the University of Southern Maine to address the problem of underrepresentation of people with disabilities in the earth sciences. Other projects include a mentoring program for high school students, a web-based clearinghouse of resources for teaching earth sciences to students with disabilities, and guidebooks for adaptation of popular published earth system science curricula for disabled learners.

  13. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials.

  14. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    NASA Astrophysics Data System (ADS)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  15. Incoherent control of locally controllable quantum systems

    SciTech Connect

    Dong Daoyi; Zhang Chenbin; Rabitz, Herschel; Pechen, Alexander; Tarn, T.-J.

    2008-10-21

    An incoherent control scheme for state control of locally controllable quantum systems is proposed. This scheme includes three steps: (1) amplitude amplification of the initial state by a suitable unitary transformation, (2) projective measurement of the amplified state, and (3) final optimization by a unitary controlled transformation. The first step increases the amplitudes of some desired eigenstates and the corresponding probability of observing these eigenstates, the second step projects, with high probability, the amplified state into a desired eigenstate, and the last step steers this eigenstate into the target state. Within this scheme, two control algorithms are presented for two classes of quantum systems. As an example, the incoherent control scheme is applied to the control of a hydrogen atom by an external field. The results support the suggestion that projective measurements can serve as an effective control and local controllability information can be used to design control laws for quantum systems. Thus, this scheme establishes a subtle connection between control design and controllability analysis of quantum systems and provides an effective engineering approach in controlling quantum systems with partial controllability information.

  16. Turbocharger control system

    SciTech Connect

    Fujawa, C.S.; Masteller, S.B.

    1986-06-10

    A turbocharger control system is described for an engine having a turbocharger with a variable output compressor driven by a variable input turbine, the compressor boosting the pressure of an input manifold of the engine and the turbine being run from the exhaust gases of the engine. The control system consists of: a computing circuit including input circuit means for receiving input signals representative of operational parameters of the engine, programmable memory means for storing predetermined tabular data and sequential and computational instructions, processor means responsive to the memory means for receiving the input signals and generating output signals as a function of the input signals, tabular data, and instructions, and output circuit means for outputing the plurality of output signals, sensor means connected to the engine and the computing circuit for sensing the pressure in the manifold, the temperature of the exhaust gases, the speed of the engine, and position of the throttle, compressor and turbine actuators of the engine and generating signals representative thereof; and actuator means connected to the output circuit means for controlling the position of the actuators in response to predetermined ones of the output signals, respectively; the computing circuit, sensor means, and actuator means defining a turbine control loop for regulating the input of the exhaust gasses to the turbine as a function of the error difference between an optimum manifold pressure of the engine and the actual manifold pressure of the engine; and a compressor control loop for regulating the output of air flow from the compressor as a function of the speed and acceleration of the engine.

  17. A Rewritable, Random-Access DNA-Based Storage System

    NASA Astrophysics Data System (ADS)

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  18. A Rewritable, Random-Access DNA-Based Storage System.

    PubMed

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-01-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications. PMID:26382652

  19. A Rewritable, Random-Access DNA-Based Storage System.

    PubMed

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-18

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  20. A Model for Systemic Control

    NASA Astrophysics Data System (ADS)

    Schwaninger, Markus; Ambroz, Kristjan; Olaya, Camilo

    2006-06-01

    Where should one begin with a design for the self-control of social systems? That is the question addressed by this paper. The traditional concepts of control rest on the feedback loop; control is essential to the attainment of goals. However, the simple feedback loop is insufficient for the modeling of a control system for an organization or other social system. For those systems, which search for multiple goals, it is necessary to design multilevel control systems incorporating the notion of pre-control. This eminently anticipatory function has hardly been considered by past research. Pre-control as understood here is a higher-order control that takes place between different logical levels of a control system. The Model of Systemic Control (MSC), a framework for multilevel control with pre-control relationships, is expounded and illustrated by means of a System Dynamics model.

  1. MIRADAS control system

    NASA Astrophysics Data System (ADS)

    Rosich Minguell, Josefina; Garzón Lopez, Francisco

    2012-09-01

    The Mid-resolution InfRAreD Astronomical Spectrograph (MIRADAS, a near-infrared multi-object echelle spectrograph operating at spectral resolution R=20,000 over the 1-2.5μm bandpass) was selected in 2010 by the Gran Telescopio Canarias (GTC) partnership as the next-generation near-infrared spectrograph for the world's largest optical/infrared telescope, and is being developed by an international consortium. The MIRADAS consortium includes the University of Florida, Universidad de Barcelona, Universidad Complutense de Madrid, Instituto de Astrofísica de Canarias, Institut de Física d'Altes Energies, Institut d'Estudis Espacials de Catalunya and Universidad Nacional Autónoma de México. This paper shows an overview of the MIRADAS control software, which follows the standards defined by the telescope to permit the integration of this software on the GTC Control System (GCS). The MIRADAS Control System is based on a distributed architecture according to a component model where every subsystem is selfcontained. The GCS is a distributed environment written in object oriented C++, which runs components in different computers, using CORBA middleware for communications. Each MIRADAS observing mode, including engineering, monitoring and calibration modes, will have its own predefined sequence, which are executed in the GCS Sequencer. These sequences will have the ability of communicating with other telescope subsystems.

  2. Crawling the Control System

    SciTech Connect

    Theodore Larrieu

    2009-10-01

    Information about accelerator operations and the control system resides in various formats in a variety of places on the lab network. There are operating procedures, technical notes, engineering drawings, and other formal controlled documents. There are programmer references and API documentation generated by tools such as doxygen and javadoc. There are the thousands of electronic records generated by and stored in databases and applications such as electronic logbooks, training materials, wikis, and bulletin boards and the contents of text-based configuration files and log files that can also be valuable sources of information. The obvious way to aggregate all these sources is to index them with a search engine that users can then query from a web browser. Toward this end, the Google "mini" search appliance was selected and implemented because of its low cost and its simple web-based configuration and management. In addition to crawling and indexing electronic documents, the appliance provides an API that has been used to supplement search results with live control system data such as current values of EPICS process variables and graphs of recent data from the archiver.

  3. OASIS: A Data Fusion System Optimized for Access to Distributed Archives

    NASA Astrophysics Data System (ADS)

    Berriman, G. B.; Kong, M.; Good, J. C.

    2002-05-01

    The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.

  4. CONTROL ROOM WITH SPRINKLER SYSTEM CONTROLS, INCLUDING MANUAL CONTROL BOXES ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    CONTROL ROOM WITH SPRINKLER SYSTEM CONTROLS, INCLUDING MANUAL CONTROL BOXES FOR THE VENTILATION SYSTEM AND A PLC SWITCH FOR AUTOMATIC CO (CARBON MONOXIDE) SYSTEM. THE AIR TESTING SYSTEM IS FREE STANDING AND THE FANS ARE COMPUTER-OPERATED. - Alaskan Way Viaduct and Battery Street Tunnel, Seattle, King County, WA

  5. Internal Control, Auditing, and the Automated Acquisitions System.

    ERIC Educational Resources Information Center

    Hawks, Carol Pitts

    1990-01-01

    Discusses issues and procedures involved in auditing the automated acquisitions system at Ohio State University Libraries. The audit process is explained, internal controls within the system are identified, general control mechanisms such as limited electronic access are discussed, and application control mechanisms that relate to specific…

  6. BLTC control system software

    SciTech Connect

    Logan, J.B., Fluor Daniel Hanford

    1997-02-10

    This is a direct revision to Rev. 0 of the BLTC Control System Software. The entire document is being revised and released as HNF-SD-FF-CSWD-025, Rev 1. The changes incorporated by this revision include addition of a feature to automate the sodium drain when removing assemblies from sodium wetted facilities. Other changes eliminate locked in alarms during cold operation and improve the function of the Oxygen Analyzer. See FCN-620498 for further details regarding these changes. Note the change in the document number prefix, in accordance with HNF-MD-003.

  7. Smog control system

    SciTech Connect

    Eichhorn, C.D.

    1992-01-01

    A smog control system is designed comprised of fans or blowers which are located to introduce air into a smog particle destruction chamber operated with laser energy. The smog particles are broken down and the air is passed into a filtering chamber which may adopt the form of a liquid charcoal chamber. The air may be bubbled through the liquid charcoal and the effluent may then be passed into a freshening agent chamber. The air may then pass as an effluent from the freshening agent chamber. A liquid charcoal supply may be connected to the liquid charcoal chamber and the recovered liquid charcoal which has been spent may be reused for other purposes.

  8. Tethered Satellite System control system design

    NASA Technical Reports Server (NTRS)

    Tomlin, Donald D.; Mowery, David K.; Bodley, Carl S.

    1989-01-01

    This paper discusses the control aspects of the Tethered Satellite System mission. The deployer controls system uses length-error and tension-error feedback to control in-plane libration, length, and length rate. The satellite's reaction control system is used to augment tether tension, control rates and attitude about the tether axis, and to damp in-plane and out-of-plane libration. The orbiter's reaction control system is also used to control in-plane and out-of-plane libration. Results of simulations are presented for the flight portion of the Tethered Satellite System mission.

  9. Airflow control system

    DOEpatents

    Motszko, Sean Ronald; McEnaney, Ryan Patrick; Brush, Jeffrey Alan; Zimmermann, Daniel E.

    2007-03-13

    A dual airflow control system for an environment having a first air zone and a second air zone. The system includes a first input device operable to generate a first input signal indicative of a desired airflow to the first zone and a second input device operable to generate a second input signal indicative of a desired airflow to the second zone. First and second flow regulators are configured to regulate airflow to the first and second zones, respectively, such that the first and second regulators selectively provide the airflow to each of the first and second zones based on the first and second input signals. A single actuator is associated with the first and second flow regulators. The actuator is operable to simultaneously actuate the first and second flow regulators based on an input from the first and second input devices to allow the desired airflows to the first and the second zones.

  10. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  11. Patient-centred access to health care: conceptualising access at the interface of health systems and populations

    PubMed Central

    2013-01-01

    Background Access is central to the performance of health care systems around the world. However, access to health care remains a complex notion as exemplified in the variety of interpretations of the concept across authors. The aim of this paper is to suggest a conceptualisation of access to health care describing broad dimensions and determinants that integrate demand and supply-side-factors and enabling the operationalisation of access to health care all along the process of obtaining care and benefiting from the services. Methods A synthesis of the published literature on the conceptualisation of access has been performed. The most cited frameworks served as a basis to develop a revised conceptual framework. Results Here, we view access as the opportunity to identify healthcare needs, to seek healthcare services, to reach, to obtain or use health care services, and to actually have a need for services fulfilled. We conceptualise five dimensions of accessibility: 1) Approachability; 2) Acceptability; 3) Availability and accommodation; 4) Affordability; 5) Appropriateness. In this framework, five corresponding abilities of populations interact with the dimensions of accessibility to generate access. Five corollary dimensions of abilities include: 1) Ability to perceive; 2) Ability to seek; 3) Ability to reach; 4) Ability to pay; and 5) Ability to engage. Conclusions This paper explains the comprehensiveness and dynamic nature of this conceptualisation of access to care and identifies relevant determinants that can have an impact on access from a multilevel perspective where factors related to health systems, institutions, organisations and providers are considered with factors at the individual, household, community, and population levels. PMID:23496984

  12. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  13. Online Learning Flight Control for Intelligent Flight Control Systems (IFCS)

    NASA Technical Reports Server (NTRS)

    Niewoehner, Kevin R.; Carter, John (Technical Monitor)

    2001-01-01

    The research accomplishments for the cooperative agreement 'Online Learning Flight Control for Intelligent Flight Control Systems (IFCS)' include the following: (1) previous IFC program data collection and analysis; (2) IFC program support site (configured IFC systems support network, configured Tornado/VxWorks OS development system, made Configuration and Documentation Management Systems Internet accessible); (3) Airborne Research Test Systems (ARTS) II Hardware (developed hardware requirements specification, developing environmental testing requirements, hardware design, and hardware design development); (4) ARTS II software development laboratory unit (procurement of lab style hardware, configured lab style hardware, and designed interface module equivalent to ARTS II faceplate); (5) program support documentation (developed software development plan, configuration management plan, and software verification and validation plan); (6) LWR algorithm analysis (performed timing and profiling on algorithm); (7) pre-trained neural network analysis; (8) Dynamic Cell Structures (DCS) Neural Network Analysis (performing timing and profiling on algorithm); and (9) conducted technical interchange and quarterly meetings to define IFC research goals.

  14. Pennsylvania Spatial Data Access and Online Advanced Spatial Information Systems

    NASA Astrophysics Data System (ADS)

    Lin, H.; Petersen, G.; Kelly, M.; Day, R.

    2002-05-01

    The Pennsylvania Spatial Data Access system (PASDA) is Pennsylvania's official geospatial information clearinghouse and the Commonwealth's node on the National Spatial Data Infrastructure. The PASDA clearinghouse provides for the widespread sharing of geospatial data, eliminates the creation of redundant data sets, and serves as a resource for locating data throughout the Commonwealth through its comprehensive standardized data storage, online free download, interactive mapping tools, and metadata/documentation efforts. PASDA also serves as a primary member of the Geography Network, a node of the National Biological Information Infrastructure for fisheries and aquatic resources, and provides several WebGIS applications such as Pennsylvania Explorer and Pennsylvania Interactive Watershed Atlas. With PASDA data delivery and access mechanisms in place, we are further building Online Advanced Spatial Information Systems (OASIS) for 1) geospatial data mining and knowledge discovery and 2) intelligent spatial decision support. The OASIS intends to integrate artificial intelligence, spatial modeling, data mining tools, and expert systems into PASDA so that a mechanism for transforming geospatial data into information, synthesizing geospatial knowledge, and supporting spatial decision-making may be developed.

  15. Alarm Management System for the D/3 Distributed Control System

    1997-03-19

    As industrial processes continue to grow in size and complexity, the Distrubuted Control Systems that automate and monitor these processes expand in a like manner. This increase in control system complexity has resulted in ever increasing numbers of alarms presented to the operator. The challenge for today's control system designer is to find innovative ways to present alarm information to the operator such that despite the large number of alarms, the operator is able tomore » quickly assess the status of the plant and immediately respond to the most critical alarms in a timely manner. This software package, designed and developed for the Savannah River Site Replacement High Level Waste Evaporator/Waste Removal Distributed Control System installed on the H-Area Tank Farm, provides an alarm system which utilizes the annunciator (SKID) panel as a means of statusing the plant and providing single keystroke access to the display on which an alarm resides.« less

  16. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  17. FPGA based Smart Wireless MIMO Control System

    NASA Astrophysics Data System (ADS)

    Usman Ali, Syed M.; Hussain, Sajid; Akber Siddiqui, Ali; Arshad, Jawad Ali; Darakhshan, Anjum

    2013-12-01

    In our present work, we have successfully designed, and developed an FPGA based smart wireless MIMO (Multiple Input & Multiple Output) system capable of controlling multiple industrial process parameters such as temperature, pressure, stress and vibration etc. To achieve this task we have used Xilin x Spartan 3E FPGA (Field Programmable Gate Array) instead of conventional microcontrollers. By employing FPGA kit to PC via RF transceivers which has a working range of about 100 meters. The developed smart system is capable of performing the control task assigned to it successfully. We have also provided a provision to our proposed system that can be accessed for monitoring and control through the web and GSM as well. Our proposed system can be equally applied to all the hazardous and rugged industrial environments where a conventional system cannot work effectively.

  18. Electrical impedance tomography system: an open access circuit design

    PubMed Central

    Soleimani, Manuchehr

    2006-01-01

    Background This paper reports a simple 2-D system for electrical impedance tomography EIT, which works efficiently and is low cost. The system has been developed in the Sharif University of Technology Tehran-Iran (for the author's MSc Project). Methods The EIT system consists of a PC in which an I/O card is installed with an external current generator, a multiplexer, a power supply and a phantom with an array of electrodes. The measurement system provides 12-bit accuracy and hence, suitable data acquisition software has been prepared accordingly. The synchronous phase detection method has been implemented for voltage measurement. Different methods of image reconstruction have been used with this instrument to generate electrical conductivity images. Results The results of simulation and real measurement of the system are presented. The reconstruction programs were written in MATLAB and the data acquisition software in C++. The system has been tested with both static and dynamic mode in a 2-D domain. Better results have been produced in the dynamic mode of operation, due to the cancellation of errors. Conclusion In the spirit of open access publication the design details of this simple EIT system are made available here. PMID:16672061

  19. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  20. Computer network access to scientific information systems for minority universities

    NASA Astrophysics Data System (ADS)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  1. Optically controlled welding system

    NASA Technical Reports Server (NTRS)

    Gordon, Stephen S. (Inventor)

    1988-01-01

    An optically controlled welding system wherein a welding torch having through-the-torch viewing capabilities is provided with an optical beam splitter to create a transmitted view and a reflective view of a welding operation. These views are converted to digital signals which are then processed and utilized by a computerized robotic welder to make the welding torch responsive thereto. Other features include an actively cooled electrode holder which minimizes a blocked portion of the view by virtue of being constructed of a single spoke or arm, and a weld pool contour detector comprising a laser beam directed onto the weld pool with the position of specular radiation reflected therefrom, being characteristic of a penetrated or unpenetrated condition of the weld pool.

  2. Optically controlled welding system

    NASA Technical Reports Server (NTRS)

    Gordon, Stephen S. (Inventor)

    1989-01-01

    An optically controlled welding system (10) wherein a welding torch (12) having through-the-torch viewing capabilities is provided with an optical beam splitter (56) to create a transmitted view and a reflective view of a welding operation. These views are converted to digital signals which are then processed and utilized by a computerized robotic welder (15) to make the welding torch responsive thereto. Other features includes an actively cooled electrode holder (26) which minimizes a blocked portion of the view by virtue of being constructed of a single spoke or arm (28) and a weld pool contour detector (14) comprising a laser beam directed onto the weld pool with the position of specular radiation reflected therefrom being characteristic of a penetrated or unpenetrated condition of the weld pool.

  3. Pollution control system

    SciTech Connect

    Voliva, B.H.; Bernstein, I.B.

    1984-09-25

    A pollution control system is disclosed wherein condensable pollutants are removed from a high-temperature gas stream by counterflow contact in a vertical tower with downwardly flowing, relatively cool absorbent oil. The absorbent is at a sufficiently low temperature so as to rapidly condense a portion of the pollutants in order to form a fog of fine droplets of pollutant entrained by the gas stream, which fog is incapable of being absorbed by the absorbent. The remainder of the condensable pollutants is removed by downwardly flowing absorbent oil, and the gas and entrained fog are directed from the tower to gas/droplet separation means, such as an electrostatic precipitator. The fog is thereby separated from the gas and substantially pollutant-free gas is discharged to the atmosphere.

  4. 75 FR 30845 - Request Voucher for Grant Payment and Line of Credit Control System (LOCCS) Voice Response System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-02

    ... and Line of Credit Control System (LOCCS) Voice Response System Access Authorization. OMB Approval... URBAN DEVELOPMENT Request Voucher for Grant Payment and Line of Credit Control System (LOCCS) Voice Response System Access Authorization AGENCY: Office of the Chief Information Officer, HUD. ACTION:...

  5. Generic device controller for accelerator control systems

    SciTech Connect

    Mariotti, R.; Buxton, W.; Frankel, R.; Hoff, L.

    1987-01-01

    A new distributed intelligence control system has become operational at the AGS for transport, injection, and acceleration of heavy ions. A brief description of the functionality of the physical devices making up the system is given. An attempt has been made to integrate the devices for accelerator specific interfacing into a standard microprocessor system, namely, the Universal Device Controller (UDC). The main goals for such a generic device controller are to provide: local computing power; flexibility to configure; and real time event handling. The UDC assemblies and software are described. (LEW)

  6. Introduction to the Personal Access Satellite System Study

    NASA Technical Reports Server (NTRS)

    Sue, Miles K.

    1990-01-01

    A recent study by the National Telecommunications and Information Administration (NTIA) has concluded that the 21st century will be the age of information in which the telecommunication infrastructure will be vital to the social and economic well being of society. To meet the challenge of the coming age, JPL has been performing studies on a personal access satellite system (PASS) for the 21st century. The PASS study can be traced back to a study in which the technical feasibility and potential applications of a high frequency, low data rate satellite system were identified using small fixed terminals. Herein, the PASS concept is described along with the strawman design. Then the key challenges are identified along with possible solutions. Finally, the plan for the future is summarized from the key results.

  7. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  8. On Restructurable Control System Theory

    NASA Technical Reports Server (NTRS)

    Athans, M.

    1983-01-01

    The state of stochastic system and control theory as it impacts restructurable control issues is addressed. The multivariable characteristics of the control problem are addressed. The failure detection/identification problem is discussed as a multi-hypothesis testing problem. Control strategy reconfiguration, static multivariable controls, static failure hypothesis testing, dynamic multivariable controls, fault-tolerant control theory, dynamic hypothesis testing, generalized likelihood ratio (GLR) methods, and adaptive control are discussed.

  9. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  10. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  11. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  12. Turbocharger control system

    SciTech Connect

    Kawabata, Y.

    1987-02-17

    This patent describes a turbocharger control system utilized in an internal combustion engine having a turbocharger turbine with a downstream passage, a combustion chamber, an exhaust treatment device, an actuator, a link mechanism connected to the actuator, a compressor, and a throttle valve. The engine also has an engine intake manifold, air flow passage means leading from the compressor to the throttle valve and an exhaust passage leading from the combustion chamber. The system comprises: bypass passage means connecting the exhaust passage leading from the combustion chamber to the turbocharger turbine with the downstream passage of the turbine so as to connect the combustion chamber directly to the exhaust treatment device around the turbine; a waste gate valve connected to the actuator by means of the link mechanism so as to close the bypass passage wherein the actuator comprises a first chamber continuously communicating with atmospheric pressure, a second chamber connected to the air flow passage means leading from the compressor to the throttle valve, and a third chamber connected to the engine intake manifold; first spring means interposed in the first chamber for biasing the waste gate valve toward a closed position; and second spring means interposed in the third chamber and having a stronger spring load characteristic than the first spring means for biasing the waste gate valve towards an opened position.

  13. Division 1137 property control system

    SciTech Connect

    Pastor, D.J.

    1982-01-01

    An automated data processing property control system was developed by Mobile and Remote Range Division 1137. This report describes the operation of the system and examines ways of using it in operational planning and control.

  14. Environment control system

    DOEpatents

    Sammarone, Dino G.

    1978-01-01

    A system for controlling the environment of an enclosed area in nuclear reactor installations. The system permits the changing of the environment from nitrogen to air, or from air to nitrogen, without the release of any radioactivity or process gas to the outside atmosphere. In changing from a nitrogen to an air environment, oxygen is inserted into the enclosed area at the same rate which the nitrogen-oxygen gas mixture is removed from the enclosed area. The nitrogen-oxygen gas mixture removed from the enclosed area is mixed with hydrogen, the hydrogen recombining with the oxygen present in the gas to form water. The water is then removed from the system and, if it contains any radioactive products, can be utilized to form concrete, which can then be transferred to a licensed burial site. The process gas is purified further by stripping it of carbon dioxide and then distilling it to remove any xenon, krypton, and other fission or non-condensable gases. The pure nitrogen is stored as either a cryogenic liquid or a gas. In changing from an air to nitrogen environment, the gas is removed from the enclosed area, mixed with hydrogen to remove the oxygen present, dried, passed through adsorption beds to remove any fission gases, and reinserted into the enclosed area. Additionally, the nitrogen stored during the nitrogen to air change, is inserted into the enclosed area, the nitrogen from both sources being inserted into the enclosed area at the same rate as the removal of the gas from the containment area. As designed, the amount of nitrogen stored during the nitrogen to air change substantially equals that required to replace oxygen removed during an air to nitrogen change.

  15. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... Exchange Commission 17 CFR Part 240 Risk Management Controls for Brokers or Dealers With Market Access... Regulations#0;#0; ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls.... The required financial risk management controls and supervisory procedures must be reasonably...

  16. e-VLBI Access Point (eAXP) - a centralized control and EGAE configuration / management application

    NASA Astrophysics Data System (ADS)

    Ruszczyk, Chester Whitney, Alan

    Setting up experiments to utilize Experiment Guided Adaptive Endpoint (EGAE) and e-VLBI is presently a complex and time intensive process requiring scientific, Mark5 and networking knowledge. There is no central access to point to configure and manage all of these aspects of an experiment. The e-VLBI Access Point (eAXP) is a centralized control plane management tool that offers a GUI interface to augment the command line interface presently being used to set up and conduct experiments. eAXP contains three major toolsets: one to set up and execute an experiment using real-time or non-real time modes; the second to configure and manage EGAE; and a third to view statistics of the experiments. Initially the overall system architecture for eAXP is presented, followed by details of the Experiment Profiler toolset including screen shots of the system presently being tested. This will be followed by how eAXP will support real-time modes interfacing to the Dynamic Resource Allocation over GMPLS Optical Network (DRAGON) resource management project.

  17. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  18. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  19. Environmental control system

    SciTech Connect

    Foley, P. N.; Turbard, A. M.

    1985-05-21

    An environmental control system for controlling the environmental conditions in a swimming pool hall 1 comprises a heat pump having a multi-section evaporator 8, compressors 23a and 23b and a multi-section condensor 18. In the day-time, the dry bulb temperature in the pool hall is maintained by circulating space air through a duct 3 to the evaporator 8 where the latent heat is recovered from the moisture laden air. This heat is rejected via the condensor 18 either to the now drier recirculated air or fresh air from an inlet 13 or a mixture of air from the two sources. In a night mode of operation, circulation of space air through the duct 3 is prevented and instead it is recirculated via a direct recirculation duct 53 and is heated by the condensor 18, the heat used to do this being recovered from outside air inducted into the evaporator 8 via an inlet 50. In order to prevent frosting of the evaporator when the outside air temperature is too low, a damper 52 may be opened to allow some space air to pass through the evaporator 8 and raise its temperature. In order to increase the heat recovery capability of the compressor, storage tank 56 is used to collect waste water from showers etc. and also from backwash through the pool water filter and when this tank is full, its water is chilled by means of a water chiller 15 in parallel with the evaporator and the heat so recovered is rejected to the re-circulating space air by means of the condensor 18.

  20. Aircraft control system

    NASA Technical Reports Server (NTRS)

    Kendall, Greg T. (Inventor); Morgan, Walter R. (Inventor)

    2010-01-01

    A span-loaded, highly flexible flying wing, having horizontal control surfaces mounted aft of the wing on extended beams to form local pitch-control devices. Each of five spanwise wing segments of the wing has one or more motors and photovoltaic arrays, and produces its own lift independent of the other wing segments, to minimize inter-segment loads. Wing dihedral is controlled by separately controlling the local pitch-control devices consisting of a control surface on a boom, such that inboard and outboard wing segment pitch changes relative to each other, and thus relative inboard and outboard lift is varied.

  1. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  2. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  3. Nurses' knowledge and practice of vascular access infection control in haemodialysis patients in the Republic of Ireland.

    PubMed

    Higgins, Margaret; Evans, David S

    2008-06-01

    Vascular access hygiene is an integral component of haemodialysis care. Ensuring nurses possess sufficient knowledge and utilise recommended guidelines on infection control is essential for safe practice and patient safety. The study aimed to investigate nurses' knowledge and practice of vascular access infection control among adult haemodialysis patients in the Republic of Ireland. A confidential self-completion questionnaire was sent to all 190 qualified nurses employed in nine haemodialysis units in the Republic of Ireland, which assessed knowledge and behaviour in infection control. Although 92% of respondents reported that policies had been developed by their units and 47% had received infection control education in the previous year, knowledge and adherence to best practice demonstrated significant scope for improvement. The study recommended the development of standard guidelines and regular reviews and updates of policies. Systems should also be developed to ensure a high level of compliance. PMID:18498567

  4. System for controlling apnea

    SciTech Connect

    Holzrichter, John F

    2015-05-05

    An implanted stimulation device or air control device are activated by an external radar-like sensor for controlling apnea. The radar-like sensor senses the closure of the air flow cavity, and associated control circuitry signals (1) a stimulator to cause muscles to open the air passage way that is closing or closed or (2) an air control device to open the air passage way that is closing or closed.

  5. Networked control of microgrid system of systems

    NASA Astrophysics Data System (ADS)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  6. Title III Evaluation for the Access Road System

    SciTech Connect

    H.R. Montalv

    1998-07-28

    The objective of this evaluation is to provide recommendations to ensure consistency between the technical baseline requirements, baseline design, and the as-constructed Access Roads. Recommendations for resolving discrepancies between the as-constructed system, the technical baseline requirements, and the baseline design are included in this report. Cost and Schedule estimates are provided for all recommended modifications. This report does not address items which do not meet current safety or code requirements. These items are identified to the CMO and immediate action is taken to correct the situation. The report does identify safety and code items for which the A/E is recommending improvements. The recommended improvements will exceed the minimum requirements of applicable code and safety guide lines. These recommendations are intended to improve and enhance the operation and maintenance of the facility.

  7. The Nimbus F Random Access Measurement System /RAMS/

    NASA Technical Reports Server (NTRS)

    Coates, J. L.

    1975-01-01

    In 1974, the Random Access Measurement System (RAMS) will be launched aboard the Nimbus F satellite as part of the Tropical Wind, Energy Conversion, and Reference Level Experiment (TWERLE). This paper describes operation and performance of the RAMS instrument, which will provide a means of tracking and collecting data from a large number of instrumented platforms. In operation, the RAMS will perform satellite onboard processing of up to eight simultaneous platform transmissions, following search and detection of the randomly received platform transmissions in a compressed-time expanded-frequency domain. The processed data is stored aboard the satellite for readout every 108 minutes (orbital period), and platform locational coordinates and/or velocity components are determined in a central ground data processing facility.

  8. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  9. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  10. Spacecraft component heater control system

    NASA Technical Reports Server (NTRS)

    Bachtel, Frederick D. (Inventor); Owen, James W. (Inventor)

    1989-01-01

    A heater control circuit is disclosed as being constructed in a single integrated circuit, with the integrated circuit conveniently mounted proximate to a spacecraft component requiring temperature control. Redundant heater controllers control power applied to strip heaters disposed to provide heat to a component responsive to sensed temperature from temperature sensors. Signals from these sensors are digitized and compared with a dead band temperature and set point temperature stored in memory to generate an error signal if the sensed temperature is outside the parameter stored in the memory. This error signal is utilized by a microprocessor to selectively instruct the heater controllers to apply power to the strip heaters. If necessary, the spacecraft central processor may access or interrogate the microprocessor in order to alter the set point temperature and dead band temperature range to obtain operational data relating to the operation of an integrated circuit for relaying to the ground control, or to switch off faulty components.

  11. LAPAROSCOPIC SALPINGECTOMY IN TWO CAPTIVE LEOPARDS (PANTHERA PARDUS) USING A SINGLE PORTAL ACCESS SYSTEM.

    PubMed

    Hartman, Marthinus J; Monnet, Eric; Kirberger, Robert M; Schoeman, Johan P

    2015-12-01

    Laparoscopic salpingectomy was performed in two adult leopards (Panthera pardus) using a single portal access system, with a multicannulated single-incision laparoscopic surgery port, without any complications. The poorly developed ovarian bursa provided easy access to the uterine tube for salpingectomy. Laparoscopic salpingectomy can be safely performed in the leopard using a single portal access system.

  12. LAPAROSCOPIC SALPINGECTOMY IN TWO CAPTIVE LEOPARDS (PANTHERA PARDUS) USING A SINGLE PORTAL ACCESS SYSTEM.

    PubMed

    Hartman, Marthinus J; Monnet, Eric; Kirberger, Robert M; Schoeman, Johan P

    2015-12-01

    Laparoscopic salpingectomy was performed in two adult leopards (Panthera pardus) using a single portal access system, with a multicannulated single-incision laparoscopic surgery port, without any complications. The poorly developed ovarian bursa provided easy access to the uterine tube for salpingectomy. Laparoscopic salpingectomy can be safely performed in the leopard using a single portal access system. PMID:26667558

  13. Distributed systems status and control

    NASA Technical Reports Server (NTRS)

    Kreidler, David; Vickers, David

    1990-01-01

    Concepts are investigated for an automated status and control system for a distributed processing environment. System characteristics, data requirements for health assessment, data acquisition methods, system diagnosis methods and control methods were investigated in an attempt to determine the high-level requirements for a system which can be used to assess the health of a distributed processing system and implement control procedures to maintain an accepted level of health for the system. A potential concept for automated status and control includes the use of expert system techniques to assess the health of the system, detect and diagnose faults, and initiate or recommend actions to correct the faults. Therefore, this research included the investigation of methods by which expert systems were developed for real-time environments and distributed systems. The focus is on the features required by real-time expert systems and the tools available to develop real-time expert systems.

  14. SPring-8 beamline control system.

    PubMed

    Ohata, T; Konishi, H; Kimura, H; Furukawa, Y; Tamasaku, K; Nakatani, T; Tanabe, T; Matsumoto, N; Ishii, M; Ishikawa, T

    1998-05-01

    The SPring-8 beamline control system is now taking part in the control of the insertion device (ID), front end, beam transportation channel and all interlock systems of the beamline: it will supply a highly standardized environment of apparatus control for collaborative researchers. In particular, ID operation is very important in a third-generation synchrotron light source facility. It is also very important to consider the security system because the ID is part of the storage ring and is therefore governed by the synchrotron ring control system. The progress of computer networking systems and the technology of security control require the development of a highly flexible control system. An interlock system that is independent of the control system has increased the reliability. For the beamline control system the so-called standard model concept has been adopted. VME-bus (VME) is used as the front-end control system and a UNIX workstation as the operator console. CPU boards of the VME-bus are RISC processor-based board computers operated by a LynxOS-based HP-RT real-time operating system. The workstation and the VME are linked to each other by a network, and form the distributed system. The HP 9000/700 series with HP-UX and the HP 9000/743rt series with HP-RT are used. All the controllable apparatus may be operated from any workstation. PMID:15263588

  15. McIDAS III - A modern interactive data access and analysis system. [Man computer Interactive Data Access System

    NASA Technical Reports Server (NTRS)

    Suomi, V. E.; Fox, R.; Limaye, S. S.; Smith, W. L.

    1983-01-01

    A powerful facility for meteorological analysis called the Man Computer Interactive Data Access System (McIDAS) was designed and implemented in the early 1970's at the Space Science and Engineering Center of the University of Wisconsin-Madison. Hardware and software experience gained via extensive use of that facility and its derivatives have led to a newer implementation of McIDAS on a larger computer with significant enhancements to the supporting McIDAS software. McIDAS allows remote and local access to a wide range of data from satellites and conventional observations, time lapse displays of imagery data, overlaid graphics, and current and past meteorological data. Available software allows one to perform analysis of a wide range of digital images as well as temperature and moisture sounding data obtained from satellites. McIDAS can generate multicolor composites of conventional and satellite weather data, radar and forecast data in a wide variety of two- and three-dimensional displays as well as time lapse movies of these analyses. These and other capabilities are described in this paper.

  16. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    PubMed Central

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  17. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  18. "An On-Line Access System for TRMM Data"

    NASA Technical Reports Server (NTRS)

    Rui, Hualan

    1999-01-01

    The Tropical Rainfall Measuring Mission (TRMM), jointly sponsored by the National Aeronautics and Space Administration (NASA) of United States and the National Space Development Agency (NASDA) of Japan, provides visible, infrared, and microwave observations of tropical and subtropical rain system. The satellite observations are complemented by ground radar and rain gauge measurements to validate satellite rain estimation techniques. TRMM satellite was launched on November 27, 1997(EST). Data from TRMM are being archived, processed, and disseminated by DAAC at the Goddard Space Flight Center (GSFC) of NASA. The Goddard DAAC has been archiving Tropical Rainfall Measuring Mission (TRMM) data since the launch. The TRMM level 1 and level 2 products first have been released to public on June 15, 1998. Now, most of TRMM products, including some ground validation products are released to public. TRMM data are useful for forecast model research, disaster mitigation, climatological studies, agricultural predictions, and many other applications. An online system or user interface is designed for easy, friendly, and quick display, access, and ordering of the TRMM data. Components, features, and limitations of the system will be discussed and demonstrated. The TRMM standard products and variety of the subsets and ancillary data will be shown, and their availability will be discussed.

  19. Power System Trade Studies for the Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Kohout, Lisa, L.

    2008-01-01

    A Lunar Lander Preparatory Study (LLPS) was undertaken for NASA's Lunar Lander Pre-Project in 2006 to explore a wide breadth of conceptual lunar lander designs. Civil servant teams from nearly every NASA center responded with dozens of innovative designs that addressed one or more specific lander technical challenges. Although none of the conceptual lander designs sought to solve every technical design issue, each added significantly to the technical database available to the Lunar Lander Project Office as it began operations in 2007. As part of the LLPS, a first order analysis was performed to identify candidate power systems for the ascent and descent stages of the Lunar Surface Access Module (LSAM). A power profile by mission phase was established based on LSAM subsystem power requirements. Using this power profile, battery and fuel cell systems were modeled to determine overall mass and volume. Fuel cell systems were chosen for both the descent and ascent stages due to their low mass. While fuel cells looked promising based on these initial results, several areas have been identified for further investigation in subsequent studies, including the identification and incorporation of peak power requirements into the analysis, refinement of the fuel cell models to improve fidelity and incorporate ongoing technology developments, and broadening the study to include solar power.

  20. Supervisory control systems

    NASA Technical Reports Server (NTRS)

    Sheridan, T. B.

    1974-01-01

    The various functions of a computer are considered that serve in connecting the man, with his displays and controls, to an external environment, manipulator activators and the interoceptors that are in the actuators, and to the interosensors and the motors or the actuators to drive the sensors. Projected is an improved exoskeleton mechanism with computer control and some supervisory control that may give a quadriplegic the ability to walk and run around.

  1. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  2. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  3. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  4. Nanoscale control designs for systems.

    PubMed

    Chen, Yung-Yue

    2014-02-01

    Nanoscale control is the science of the control of objects at dimensions with 100 nm or less and the manipulation of them at this level of precision. The desired attributes of systems under nanoscale control design are extreme high resolution, accuracy, stability, and fast response. An important perspective of investigation in nanoscale control design includes system modeling and precision control devices and materials at a nanoscale dimension, i.e., design of nanopositioners. Nanopositioners are mechatronic systems with an ultraprecise resolution down to a fraction of an atomic diameter and developed to move objects over a small range in nanoscale dimension. After reviewing a lot of existing literatures for nanoscale control designs, the way to successful nanoscale control is accurate position sensing and feedback control of the motion. An overview of nanoscale identification, linear, and nonlinear control technologies, and devices that are playing a key role in improving precision, accuracy, and response of operation of these systems are introduced in this research.

  5. Controls of maglev suspension systems

    SciTech Connect

    Cai, Y.; Zhu, S.; Chen, S.S.; Rote, D.M.

    1993-06-01

    This study investigates alternative control designs of maglev vehicle suspension systems. Active and semi-active control law designs are introduced into primary and secondary suspensions of maglev vehicles. A one-dimensional vehicle with two degrees of freedom, to simulate the German Transrapid Maglev System, is used for suspension control designs. The transient and frequency responses of suspension systems and PSDs of vehicle accelerations are calculated to evaluate different control designs. The results show that active and semi-active control designs indeed improve the response of vehicle and provide an acceptable ride comfort for maglev systems.

  6. Analysis of multiple access techniques in multi-satellite and multi-spot mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Corazza, Giovanni E.; Ferrarelli, Carlo; Vatalaro, Francesco

    1995-01-01

    In this paper the analysis of mobile satellite systems adopting constellations of multi-spot satellites over non-geostationary orbits is addressed. A link design procedure is outlined, taking into account system spectrum efficiency, probability of bit error and outage probability. A semi-analytic approach to the evaluation of outage probability in the presence of fading and imperfect power control is described, and applied to single channel per carrier (SCPC) and code division multiple access (CDMA) techniques. Some results are shown for the Globalstar, Iridium and Odyssey orbital configurations.

  7. Fluid delivery control system

    DOEpatents

    Hoff, Brian D.; Johnson, Kris William; Algrain, Marcelo C.; Akasam, Sivaprasad

    2006-06-06

    A method of controlling the delivery of fluid to an engine includes receiving a fuel flow rate signal. An electric pump is arranged to deliver fluid to the engine. The speed of the electric pump is controlled based on the fuel flow rate signal.

  8. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  9. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  10. The ATLAS Detector Control System

    NASA Astrophysics Data System (ADS)

    Lantzsch, K.; Arfaoui, S.; Franz, S.; Gutzwiller, O.; Schlenker, S.; Tsarouchas, C. A.; Mindur, B.; Hartert, J.; Zimmermann, S.; Talyshev, A.; Oliveira Damazio, D.; Poblaguev, A.; Braun, H.; Hirschbuehl, D.; Kersten, S.; Martin, T.; Thompson, P. D.; Caforio, D.; Sbarra, C.; Hoffmann, D.; Nemecek, S.; Robichaud-Veronneau, A.; Wynne, B.; Banas, E.; Hajduk, Z.; Olszowska, J.; Stanecka, E.; Bindi, M.; Polini, A.; Deliyergiyev, M.; Mandic, I.; Ertel, E.; Marques Vinagre, F.; Ribeiro, G.; Santos, H. F.; Barillari, T.; Habring, J.; Huber, J.; Arabidze, G.; Boterenbrood, H.; Hart, R.; Iakovidis, G.; Karakostas, K.; Leontsinis, S.; Mountricha, E.; Ntekas, K.; Filimonov, V.; Khomutnikov, V.; Kovalenko, S.; Grassi, V.; Mitrevski, J.; Phillips, P.; Chekulaev, S.; D'Auria, S.; Nagai, K.; Tartarelli, G. F.; Aielli, G.; Marchese, F.; Lafarguette, P.; Brenner, R.

    2012-12-01

    The ATLAS experiment is one of the multi-purpose experiments at the Large Hadron Collider (LHC) at CERN, constructed to study elementary particle interactions in collisions of high-energy proton beams. Twelve different sub detectors as well as the common experimental infrastructure are controlled and monitored by the Detector Control System (DCS) using a highly distributed system of 140 server machines running the industrial SCADA product PVSS. Higher level control system layers allow for automatic control procedures, efficient error recognition and handling, manage the communication with external systems such as the LHC controls, and provide a synchronization mechanism with the ATLAS data acquisition system. Different databases are used to store the online parameters of the experiment, replicate a subset used for physics reconstruction, and store the configuration parameters of the systems. This contribution describes the computing architecture and software tools to handle this complex and highly interconnected control system.

  11. Autorotation flight control system

    NASA Technical Reports Server (NTRS)

    Bachelder, Edward N. (Inventor); Lee, Dong-Chan (Inventor); Aponso, Bimal L. (Inventor)

    2011-01-01

    The present invention provides computer implemented methodology that permits the safe landing and recovery of rotorcraft following engine failure. With this invention successful autorotations may be performed from well within the unsafe operating area of the height-velocity profile of a helicopter by employing the fast and robust real-time trajectory optimization algorithm that commands control motion through an intuitive pilot display, or directly in the case of autonomous rotorcraft. The algorithm generates optimal trajectories and control commands via the direct-collocation optimization method, solved using a nonlinear programming problem solver. The control inputs computed are collective pitch and aircraft pitch, which are easily tracked and manipulated by the pilot or converted to control actuator commands for automated operation during autorotation in the case of an autonomous rotorcraft. The formulation of the optimal control problem has been carefully tailored so the solutions resemble those of an expert pilot, accounting for the performance limitations of the rotorcraft and safety concerns.

  12. Operating System For Numerically Controlled Milling Machine

    NASA Technical Reports Server (NTRS)

    Ray, R. B.

    1992-01-01

    OPMILL program is operating system for Kearney and Trecker milling machine providing fast easy way to program manufacture of machine parts with IBM-compatible personal computer. Gives machinist "equation plotter" feature, which plots equations that define movements and converts equations to milling-machine-controlling program moving cutter along defined path. System includes tool-manager software handling up to 25 tools and automatically adjusts to account for each tool. Developed on IBM PS/2 computer running DOS 3.3 with 1 MB of random-access memory.

  13. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  14. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  15. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  16. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  17. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  18. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  19. Advanced Propulsion Systems for Low-Cost Access to Space

    NASA Technical Reports Server (NTRS)

    Whitlow, Woodrow, Jr.

    2004-01-01

    NASA's Space Access Goal Ensure the provision of space access and improve it by increasing safety, reliability, and affordability. (1) The launch phase continues to be the highest risk period of any space mission. (2) Launch costs remain an obstacle to the complete utilization of space for research, exploration, and commercial purposes (3) Improving the Nation's access to space through the application of new technology is one of NASA's primary roles.

  20. "What Page, Miss?" Enhancing Text Accessibility with DAISY (Digital Accessible Information SYstem)

    ERIC Educational Resources Information Center

    Spooner, Sue

    2014-01-01

    Introduction: The provision of specially formatted materials is a complex and increasingly difficult task, given the extensive and burgeoning range of texts and resources available for classroom use. The need to extend the provision of accessible formats to include digital resources (in addition to braille, audio, and large print) led to a study…

  1. Percutaneous inner-ear access via an image-guided industrial robot system.

    PubMed

    Baron, S; Eilers, H; Munske, B; Toennies, J L; Balachandran, R; Labadie, R F; Ortmaier, T; Webster, R J

    2010-01-01

    Image-guided robots have been widely used for bone shaping and percutaneous access to interventional sites. However, due to high-accuracy requirements and proximity to sensitive nerves and brain tissues, the adoption of robots in inner-ear surgery has been slower. In this paper the authors present their recent work towards developing two image-guided industrial robot systems for accessing challenging inner-ear targets. Features of the systems include optical tracking of the robot base and tool relative to the patient and Kalman filter-based data fusion of redundant sensory information (from encoders and optical tracking systems) for enhanced patient safety. The approach enables control of differential robot positions rather than absolute positions, permitting simplified calibration procedures and reducing the reliance of the system on robot calibration in order to ensure overall accuracy. Lastly, the authors present the results of two phantom validation experiments simulating the use of image-guided robots in inner-ear surgeries such as cochlear implantation and petrous apex access.

  2. Percutaneous inner-ear access via an image-guided industrial robot system

    PubMed Central

    Baron, S; Eilers, H; Munske, B; Toennies, JL; Balachandran, R; Labadie, RF; Ortmaier, T; Webster, RJ

    2014-01-01

    Image-guided robots have been widely used for bone shaping and percutaneous access to interventional sites. However, due to high-accuracy requirements and proximity to sensitive nerves and brain tissues, the adoption of robots in inner-ear surgery has been slower. In this paper the authors present their recent work towards developing two image-guided industrial robot systems for accessing challenging inner-ear targets. Features of the systems include optical tracking of the robot base and tool relative to the patient and Kalman filter-based data fusion of redundant sensory information (from encoders and optical tracking systems) for enhanced patient safety. The approach enables control of differential robot positions rather than absolute positions, permitting simplified calibration procedures and reducing the reliance of the system on robot calibration in order to ensure overall accuracy. Lastly, the authors present the results of two phantom validation experiments simulating the use of image-guided robots in inner-ear surgeries such as cochlear implantation and petrous apex access. PMID:20718268

  3. Moving Object Control System

    NASA Technical Reports Server (NTRS)

    Arndt, G. Dickey (Inventor); Carl, James R. (Inventor)

    2001-01-01

    A method is provided for controlling two objects relatively moveable with respect to each other. A plurality of receivers are provided for detecting a distinctive microwave signal from each of the objects and measuring the phase thereof with respect to a reference signal. The measured phase signal is used to determine a distance between each of the objects and each of the plurality of receivers. Control signals produced in response to the relative distances are used to control the position of the two objects.

  4. The Effects of Hands Free Communication Devices on Clinical Communication: Balancing Communication Access Needs with User Control

    PubMed Central

    Richardson, Joshua E.; Ash, Joan S.

    2008-01-01

    Hands Free Communication Device (HFCD) systems are a relatively new information and communication technology. HFCD systems enable clinicians to directly contact and communicate with one another using wearable, voice-controlled badges that are VoIP-based (voice-over IP) and are linked to one another over a wireless local area network (WLAN). This qualitative study utilized a grounded theory, multiple perspectives approach to understand how the use of HFCDs affected communication in the hospitals that implemented them. The study generated five themes revolving around HFCDs’ impact on communication. This paper specifically focuses on two of those themes: Communication Access and Control. PMID:18999046

  5. NuDat system for access to nuclear data

    SciTech Connect

    Dunford, C.L.; Kinsey, R.R.

    1998-07-07

    The NuDat program provides a user with access to nuclear properties and to some nuclear reaction data. The program operates on DEC VMS operating systems and on PC`s with Microsoft operating systems. The program has four user interfaces, all having the same content and functionality. These interfaces are Web, Video and Sequential for VMS. The PC interface is identical to the VMS Video interface. Forms are used to supply the type of data the user desires, the retrieval parameters, the output format, and the sort order of the data. The program and associated database is used in basic research, particularly for the systematic study of nuclear properties. It is also a useful tool for applied research to identify radiations from radionuclides contained in environmental samples, or from those produced by neutron or charged particle activation. The NuDat database is derived from several databases maintained by the National Nuclear Data Center. The databases are the Adopted Levels and Gammas data sets from ENSDF, the Nuclear Wallet Cards, Decay Radiations derived from ENSDF decay data sets processed by RADLIST, and Thermal Neutron Cross Sections.

  6. A telerobotic digital controller system

    NASA Technical Reports Server (NTRS)

    Brown, Richard J.

    1992-01-01

    This system is a network of joint mounted dual axes digital servo-controllers (DDSC), providing control of various joints and end effectors of different robotic systems. This report provides description of and user required information for the Digital Controller System Network (DSCN) and, in particular, the DDSC, Model DDSC-2, developed to perform the controller functions. The DDSC can control 3 phase brushless or brush type DC motors, requiring up to 8 amps. Only four wires, two for power and 2 for serial communication, are required, except for local sensor and motor connections. This highly capable, very flexible, programmable servo-controller, contained on a single, compact printed circuit board measuring only 4.5 x 5.1 inches, is applicable to control systems of all types from sub-arc second precision pointing to control of robotic joints and end effectors. This document concentrates on the robotic applications for the DDSC.

  7. Alarm system for a nuclear control complex

    DOEpatents

    Scarola, Kenneth; Jamison, David S.; Manazir, Richard M.; Rescorl, Robert L.; Harmon, Daryl L.

    1994-01-01

    An advanced control room complex for a nuclear power plant, including a discrete indicator and alarm system (72) which is nuclear qualified for rapid response to changes in plant parameters and a component control system (64) which together provide a discrete monitoring and control capability at a panel (14-22, 26, 28) in the control room (10). A separate data processing system (70), which need not be nuclear qualified, provides integrated and overview information to the control room and to each panel, through CRTs (84) and a large, overhead integrated process status overview board (24). The discrete indicator and alarm system (72) and the data processing system (70) receive inputs from common plant sensors and validate the sensor outputs to arrive at a representative value of the parameter for use by the operator during both normal and accident conditions, thereby avoiding the need for him to assimilate data from each sensor individually. The integrated process status board (24) is at the apex of an information hierarchy that extends through four levels and provides access at each panel to the full display hierarchy. The control room panels are preferably of a modular construction, permitting the definition of inputs and outputs, the man machine interface, and the plant specific algorithms, to proceed in parallel with the fabrication of the panels, the installation of the equipment and the generic testing thereof.

  8. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    NASA Astrophysics Data System (ADS)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  9. Towards human-centric visual access control for clinical data management.

    PubMed

    Fahl, Sascha; Harbach, Marian; Smith, Matthew

    2012-01-01

    We propose a novel human-centric, visual, and context-aware access control (AC) system for distributed clinical data management and health information systems. Human-centricity in this context means that medical staff should be able to configure AC rules, both in a timesaving and reliable manner. Since medical data often includes (meta-) information about a patient, it is essential that an AC system includes the patient into the AC process. To cater for the strong security needs in the medical domain, both the AC policy creation by medical staff as well as the patient-interaction feature need to be taken into account. While traditional AC systems offer sufficient security in theory, they lack in comfort and flexibility and as a result find no widespread acceptance with non tech-savvy users. Distributed medical institutions could enormously benefit from the opportunity of dynamic AC configuration at an end-user level while adhering to legal, ethical or other privacy requirements. Hence, this paper presents a human-centric visual AC model for medical data, addressing usability, information security and patient interaction. PMID:22874293

  10. TARA control, data acquisition and analysis system

    SciTech Connect

    Gaudreau, M.P.J.; Sullivan, J.D.; Fredian, T.W.; Karcher, C.A.; Sevillano, E.; Stillerman, J.; Thomas, P.

    1983-12-01

    The MIT tandem mirror (TARA) control, data acquisition and analysis system consists of two major parts: (1) a Gould 584 industrial programmable controller (PC) to control engineering functions; and (2) a VAX 11/750 based data acquisition and analysis system for physics analysis. The PC is designed for use in harsh industrial environments and has proven to be a reliable and cost-effective means for automated control. The PC configuration is dedicated to control tasks on the TARA magnet, vacuum, RF, neutral beam, diagnostics, and utility systems. The data transfer functions are used to download system operating parameters from menu selectable tables. Real time status reports are provided to video terminals and as blocks of data to the host computer for storage. The data acquisition and analysis system for TARA was designed to provide high throughput and ready access to data from earlier runs. The adopted design uses pre-existing software packages in a system which is simple, coherent, fast, and which requires a minimum of new software development. The computer configuration is a VAX 11/750 running VMS with 124 M byte massbus disk and 1.4 G byte unibus disk subsystem.

  11. Tests Of Helicopter Control System

    NASA Technical Reports Server (NTRS)

    Hilbert, Kathryn B.; Lebacqz, J. Victor; Hindson, William S.

    1988-01-01

    Advanced control systems being developed for rotorcraft. Report discusses aspects of development of multivariable, explicit-model-following control system for CH-47B fly-by-wire helicopter. Project part of recent trend toward use of highly-augmented, high-gain flight-control systems to assist pilots of military helicopters in performance of demanding tasks and to improve handling qualities of aircraft.

  12. Generic Observatory Control System

    NASA Astrophysics Data System (ADS)

    Pearson, M.; Ritchie, I.

    2013-09-01

    EOS has developed systems over many years to support research into Space Situational Awareness (SSA) and Satellite Laser Ranging (SLR). These systems are based upon a software architecture that simplifies systems development with the goals of supporting multiple missions at low-cost. To date the software architecture has supported local, remote and international operation of the Space Research Centre facilities at Mt. Stromlo, Australia in both manual and automatic modes. The design objectives of this software architecture are discussed in the context of future development paths aimed at lowering systems integration costs even further, and enabling participation in international SSA networks.

  13. The CARIBU EBIS control and synchronization system

    NASA Astrophysics Data System (ADS)

    Dickerson, Clayton; Peters, Christopher

    2015-01-01

    The Californium Rare Isotope Breeder Upgrade (CARIBU) Electron Beam Ion Source (EBIS) charge breeder has been built and tested. The bases of the CARIBU EBIS electrical system are four voltage platforms on which both DC and pulsed high voltage outputs are controlled. The high voltage output pulses are created with either a combination of a function generator and a high voltage amplifier, or two high voltage DC power supplies and a high voltage solid state switch. Proper synchronization of the pulsed voltages, fundamental to optimizing the charge breeding performance, is achieved with triggering from a digital delay pulse generator. The control system is based on National Instruments realtime controllers and LabVIEW software implementing Functional Global Variables (FGV) to store and access instrument parameters. Fiber optic converters enable network communication and triggering across the platforms.

  14. The CARIBU EBIS control and synchronization system

    SciTech Connect

    Dickerson, Clayton Peters, Christopher

    2015-01-09

    The Californium Rare Isotope Breeder Upgrade (CARIBU) Electron Beam Ion Source (EBIS) charge breeder has been built and tested. The bases of the CARIBU EBIS electrical system are four voltage platforms on which both DC and pulsed high voltage outputs are controlled. The high voltage output pulses are created with either a combination of a function generator and a high voltage amplifier, or two high voltage DC power supplies and a high voltage solid state switch. Proper synchronization of the pulsed voltages, fundamental to optimizing the charge breeding performance, is achieved with triggering from a digital delay pulse generator. The control system is based on National Instruments realtime controllers and LabVIEW software implementing Functional Global Variables (FGV) to store and access instrument parameters. Fiber optic converters enable network communication and triggering across the platforms.

  15. Access to Sign Language Interpreters in the Criminal Justice System.

    ERIC Educational Resources Information Center

    Miller, Katrina R.

    2001-01-01

    This study surveyed 46 professional sign language interpreters working in criminal justice settings and evaluated 22 cases to evaluate access issues for individuals with hearing impairments. Recommendations to increase the accessibility of interpreting services included providing ongoing awareness training to criminal justice personnel and…

  16. NUCLEAR REACTOR CONTROL SYSTEM

    DOEpatents

    Howard, D.F.; Motta, E.E.

    1961-06-27

    A method for controlling the excess reactivity in a nuclear reactor throughout the core life while maintaining the neutron flux distribution at the desired level is described. The control unit embodies a container having two electrodes of different surface area immersed in an electrolytic solution of a good neutron sbsorbing metal ion such as boron, gadolinium, or cadmium. Initially, the neutron absorber is plated on the larger electrode to control the greater neutron flux of a freshly refueled core. As the fuel burns up, the excess reactivity decreases and the neutron absorber is then plated onto the smaller electrode so that the number of neutrons absorbed also decreases. The excess reactivity in the core may thus be maintained without the introduction of serious perturbations in the neutron flux distributibn.

  17. Effects of automatic/controlled access processes on semantic memory in Alzheimer's disease.

    PubMed

    Arroyo-Anlló, Eva M; Bellouard, Stéphanie; Ingrand, Pierre; Gil, Roger

    2011-01-01

    This study examines the impact of automatic/controlled access processes on the semantic network in 30 patients with Alzheimer's disease (AD). The AD group was compared with a control group using a battery of neuropsychological tests, a variation of Hodges's semantic testing battery, designed to assess semantic knowledge. The AD group had markedly lower scores than the normal group on each semantic test, but with a different degree of deterioration depending on the nature of the processes (controlled/automatic) in accessing the semantic network. AD patients had poorer performances on the explicit semantic tasks mainly involving controlled-process access (e.g., the WAIS Similarities Subtest) than those involving mainly automatic-process access (e.g., the Verbal Automatism test). Analyses of confidence intervals allowed a gradient of impaired performances in increasing order to be elaborated: a) the Verbal Automatism test, b) the WAIS Vocabulary Subtest, c) the WAIS Information Subtest, d) the Letter Fluency Task, e) Naming as a Response to Definition, f) the Category Fluency Task, g) the WAIS Similarities Subtest, and h) the Oral Denomination 80 Test. The results of our study suggest that explicit semantic tasks needing passive or automatic processes to access semantic memory would be better preserved in AD. PMID:21471640

  18. Single port access surgery with a novel Port Camera system.

    PubMed

    Terry, Benjamin S; Schoen, Jonathan; Mills, Zachary; Rentschler, Mark E

    2012-06-01

    In this work, the authors designed, built, and tested a novel port camera system for single port access (SPA) laparoscopic surgery. This SPA Port Camera device integrates the monitor, laparoscopic camera, and light source into an inexpensive, portable cannula port. The device uses a 2-channel SPA port inserted through an umbilical incision, similar to traditional SPA. After insertion into a channel, the device deploys a small camera module and LED lamp in vivo. An integrated, on-patient LCD provides the view of the surgical site. The design intent of the port camera is to enhance SPA by (a) reducing the size of the SPA port through the elimination of the dedicated laparoscope channel; (b) reducing equipment cost by integrating an inexpensive CMOS sensor and LED lamp at the port tip; (c) eliminating the need for an assistant who operates the laparoscope; and (d) mechanically coupling the camera, tool port, and on-patient LCD screen. The effectiveness of the device was evaluated by comparing the video performance with a leading industry laparoscope and by performing a user evaluation study and live porcine surgery with the device. Effectiveness of the device was mixed. Overall video system performance of the device is better than an industry standard high-definition laparoscope, implying that significant cost savings over a traditional system are possible. Participant study results suggest that simulated laparoscopic tasks are as efficient with the SPA Port Camera as they are with a typical SPA configuration. However, live surgery revealed several shortcomings of the SPA Port Camera.

  19. AUTOMATIC FREQUENCY CONTROL SYSTEM

    DOEpatents

    Hansen, C.F.; Salisbury, J.D.

    1961-01-10

    A control is described for automatically matching the frequency of a resonant cavity to that of a driving oscillator. The driving oscillator is disconnected from the cavity and a secondary oscillator is actuated in which the cavity is the frequency determining element. A low frequency is mixed with the output of the driving oscillator and the resultant lower and upper sidebands are separately derived. The frequencies of the sidebands are compared with the secondary oscillator frequency. deriving a servo control signal to adjust a tuning element in the cavity and matching the cavity frequency to that of the driving oscillator. The driving oscillator may then be connected to the cavity.

  20. Dissecting the genetic control of natural variation in salt tolerance of Arabidopsis thaliana accessions

    PubMed Central

    Katori, Taku; Ikeda, Akiro; Iuchi, Satoshi; Kobayashi, Masatomo; Shinozaki, Kazuo; Maehashi, Kenji; Sakata, Yoichi; Tanaka, Shigeo; Taji, Teruaki

    2010-01-01

    Many accessions (ecotypes) of Arabidopsis have been collected. Although few differences exist among their nucleotide sequences, these subtle differences induce large genetic variation in phenotypic traits such as stress tolerance and flowering time. To understand the natural variability in salt tolerance, large-scale soil pot experiments were performed to evaluate salt tolerance among 350 Arabidopsis thaliana accessions. The evaluation revealed a wide variation in the salt tolerance among accessions. Several accessions, including Bu-5, Bur-0, Ll-1, Wl-0, and Zu-0, exhibited marked stress tolerance compared with a salt-sensitive experimental accession, Col-0. The salt-tolerant accessions were also evaluated by agar plate assays. The data obtained by the large-scale assay correlated well with the results of a salt acclimation (SA) assay, in which plants were transferred to high-salinity medium following placement on moderate-salinity medium for 7 d. Genetic analyses indicated that the salt tolerance without SA is a quantitative trait under polygenic control, whereas salt tolerance with SA is regulated by a single gene located on chromosome 5 that is common among the markedly salt-tolerant accessions. These results provide important information for understanding the mechanisms underlying natural variation of salt tolerance in Arabidopsis. PMID:20080827

  1. The CARMA Control System

    NASA Astrophysics Data System (ADS)

    Gwon, C.; Beard, A. D.; Daniel, P.; Hobbs, R.; Scott, S. L.; Kraybill, J. C.; Leitch, E.; Mehringer, D. M.; Plante, R.; Amarnath, N. S.; Pound, M. W.; Rauch, K. P.; Teuben, P. J.

    2004-07-01

    The Combined Array for Research in Millimeter-wave Astronomy (CARMA) will be the combination of the BIMA, OVRO, and SZA millimeter arrays. With first light scheduled for 2005, CARMA will be the first heterogeneous millimeter array, combining antennas varying from 3.5 m to 10.4 m in diameter. The controls for CARMA involve creating a uniform interface for all antennas. The antennas are grouped into five independently-controlled sub-arrays, which will be used for scientific observations, engineering, or maintenance. The sub-arrays are controlled by two components: the Sub-array Command Processor (SCP) and the Sub-array Tracker (SAT). While each sub-array has a dedicated SCP for handling command processing, a single SAT computes and distributes slowly varying parameters to the necessary sub-arrays. The sub-array interface uses CORBA distributed objects to physically separate the user interface from the array. This allows for stability in the core engine controlling the array while enabling flexibility in the user interface implementation.

  2. The APS control system network

    SciTech Connect

    Sidorowicz, K.V.; McDowell, W.P.

    1995-12-31

    The APS accelerator control system is a distributed system consisting of operator interfaces, a network, and computer-controlled interfaces to hardware. This implementation of a control system has come to be called the {open_quotes}Standard Model.{close_quotes} The operator interface is a UNDC-based workstation with an X-windows graphical user interface. The workstation may be located at any point on the facility network and maintain full functionality. The function of the network is to provide a generalized communication path between the host computers, operator workstations, input/output crates, and other hardware that comprise the control system. The crate or input/output controller (IOC) provides direct control and input/output interfaces for each accelerator subsystem. The network is an integral part of all modem control systems and network performance will determine many characteristics of a control system. This paper will describe the overall APS network and examine the APS control system network in detail. Metrics are provided on the performance of the system under various conditions.

  3. Advanced flight control system study

    NASA Technical Reports Server (NTRS)

    Mcgough, J.; Moses, K.; Klafin, J. F.

    1982-01-01

    The architecture, requirements, and system elements of an ultrareliable, advanced flight control system are described. The basic criteria are functional reliability of 10 to the minus 10 power/hour of flight and only 6 month scheduled maintenance. A distributed system architecture is described, including a multiplexed communication system, reliable bus controller, the use of skewed sensor arrays, and actuator interfaces. Test bed and flight evaluation program are proposed.

  4. National Ignition Facility integrated computer control system

    SciTech Connect

    Van Arsdall, P.J., LLNL

    1998-06-01

    The NIF design team is developing the Integrated Computer Control System (ICCS), which is based on an object-oriented software framework applicable to event-driven control systems. The framework provides an open, extensible architecture that is sufficiently abstract to construct future mission-critical control systems. The ICCS will become operational when the first 8 out of 192 beams are activated in mid 2000. The ICCS consists of 300 front-end processors attached to 60,000 control points coordinated by a supervisory system. Computers running either Solaris or VxWorks are networked over a hybrid configuration of switched fast Ethernet and asynchronous transfer mode (ATM). ATM carries digital motion video from sensors to operator consoles. Supervisory software is constructed by extending the reusable framework components for each specific application. The framework incorporates services for database persistence, system configuration, graphical user interface, status monitoring, event logging, scripting language, alert management, and access control. More than twenty collaborating software applications are derived from the common framework. The framework is interoperable among different kinds of computers and functions as a plug-in software bus by leveraging a common object request brokering architecture (CORBA). CORBA transparently distributes the software objects across the network. Because of the pivotal role played, CORBA was tested to ensure adequate performance.

  5. Dual pressure displacement control system

    SciTech Connect

    Louis, J.E.; Klocke, C.C.

    1988-02-02

    This patent describes a dual pressure servo control system for a variable displacement hydraulic unit having displacement setting means positioned by a hydraulic servo mechanism. The hydraulic unit is provided with main loop lines at least one of which is capable of being subjected to high main loop pressure during operation of the hydraulic unit, a control line including a displacement control valve providing a controlled flow of fluid under pressure to the servo mechanism, and a source of fluid under pressure for the control line comprising a low pressure source connected to the control line through a check valve and high pressure source comprising of a high pressure control line connected to the control line downstream of the check valve. The high pressure control line includes a flow restriction limiting flow to the control line means and generating a significant flow induced pressure drop in the high pressure control line once movement in the servo mechanism is initiated.

  6. Electromagnetic Sensor-Guided Enteral Access Systems: A Literature Review.

    PubMed

    Smithard, David; Barrett, Nicholas A; Hargroves, David; Elliot, Stuart

    2015-06-01

    Enteral feeding is the nutritional support of choice for acutely ill patients with functional gastrointestinal tracts who are unable to swallow. Several benefits including reduced mortality and length of hospital stay have been associated with early initiation of enteral feeding. However, misplacement of conventional nasoenteric tubes is relatively common and can result in complications including pneumothorax. In addition, the need to confirm the position by X-ray can delay the start of using the tube. Eliminating these delays can help patients start feeding, and minimise the adverse impact on initiating hydration and medication. The purpose of this review was to critically examine whether electromagnetic sensor-guided enteral access systems (EMS-EAS) can help overcome the challenges of conventional nasoenteric feeding tube placement and confirmation. The Royal Society of Medicine's library performed two searches on Medline (1946-March 2014) and Embase (1947-March 2014) covering all papers on Cortrak or electromagnetic or magnetic guidance systems for feeding tubes in adults. Results from the literature search found an agreement between the radiographic and EMS-EAS confirmation of placement. EMS-EAS virtually eliminated the risk of misplacement and pneumothorax was not reported. In addition, studies showed a small decrease in the number of X-rays with EMS-EAS and a reduced average time to start feeding compared with blind placement. This review suggests that EMS-EAS reduces several complications associated with the misplacement of nasoenteric feeding tubes, and that there could be considerable improvements in mortality, morbidity, patient experience and cost if EMS-EAS is used instead of conventional methods.

  7. Internal crankcase ventilation system with easily accessible PCV valve

    SciTech Connect

    Balsley, R.L.

    1986-07-29

    A crankcase ventilation system is described having a flow limiting PCV valve and means defining and internal passage between a crankcase and a cylinder charge induction means of an engine, the system comprising an engine valve cover forming a part of the internal passage defining means and having an exterior wall, a cavity in the cover wall and forming a portion of the internal passage, the wall further including valve mounting means surrounding the passage and receiving the valve and a valve body seal in position to control flow through the mounting means and passage and an opening through the wall to the housing exterior and generally opposite the mounting means for removing and replacing a valve on the mounting means, and closure means normally closing the opening and preventing air leakage therethrough into the induction system, the closure means engaging the valve to maintain its installed position within the wall cavity and being openable to permit removal of the PCV valve.

  8. Dynamically controlled crystal growth system

    NASA Technical Reports Server (NTRS)

    Bray, Terry L. (Inventor); Kim, Larry J. (Inventor); Harrington, Michael (Inventor); DeLucas, Lawrence J. (Inventor)

    2002-01-01

    Crystal growth can be initiated and controlled by dynamically controlled vapor diffusion or temperature change. In one aspect, the present invention uses a precisely controlled vapor diffusion approach to monitor and control protein crystal growth. The system utilizes a humidity sensor and various interfaces under computer control to effect virtually any evaporation rate from a number of different growth solutions simultaneously by means of an evaporative gas flow. A static laser light scattering sensor can be used to detect aggregation events and trigger a change in the evaporation rate for a growth solution. A control/follower configuration can be used to actively monitor one chamber and accurately control replicate chambers relative to the control chamber. In a second aspect, the invention exploits the varying solubility of proteins versus temperature to control the growth of protein crystals. This system contains miniature thermoelectric devices under microcomputer control that change temperature as needed to grow crystals of a given protein. Complex temperature ramps are possible using this approach. A static laser light scattering probe also can be used in this system as a non-invasive probe for detection of aggregation events. The automated dynamic control system provides systematic and predictable responses with regard to crystal size. These systems can be used for microgravity crystallization projects, for example in a space shuttle, and for crystallization work under terrestial conditions. The present invention is particularly useful for macromolecular crystallization, e.g. for proteins, polypeptides, nucleic acids, viruses and virus particles.

  9. MIAPS: a web-based system for remotely accessing and presenting medical images.

    PubMed

    Shen, Hualei; Ma, Dianfu; Zhao, Yongwang; Sun, Hailong; Sun, Sujun; Ye, Rongwei; Huang, Lei; Lang, Bo; Sun, Yan

    2014-01-01

    MIAPS (medical image access and presentation system) is a web-based system designed for remotely accessing and presenting DICOM image. MIAPS is accessed with web browser through the Internet. MIAPS provides four features: DICOM image retrieval, maintenance, presentation and output. MIAPS does not intent to replace sophisticated commercial and open source packages, but it provides a web-based solution for teleradiology and medical image sharing. The system has been evaluated by 39 hospitals in China for 10 months.

  10. Control systems on Lie groups.

    NASA Technical Reports Server (NTRS)

    Jurdjevic, V.; Sussmann, H. J.

    1972-01-01

    The controllability properties of systems which are described by an evolution equation in a Lie group are studied. The revelant Lie algebras induced by a right invariant system are singled out, and the basic properties of attainable sets are derived. The homogeneous case and the general case are studied, and results are interpreted in terms of controllability. Five examples are given.

  11. Virtual Control Systems Environment (VCSE)

    ScienceCinema

    Atkins, Will

    2016-07-12

    Will Atkins, a Sandia National Laboratories computer engineer discusses cybersecurity research work for process control systems. Will explains his work on the Virtual Control Systems Environment project to develop a modeling and simulation framework of the U.S. electric grid in order to study and mitigate possible cyberattacks on infrastructure.

  12. Virtual Control Systems Environment (VCSE)

    SciTech Connect

    Atkins, Will

    2012-10-08

    Will Atkins, a Sandia National Laboratories computer engineer discusses cybersecurity research work for process control systems. Will explains his work on the Virtual Control Systems Environment project to develop a modeling and simulation framework of the U.S. electric grid in order to study and mitigate possible cyberattacks on infrastructure.

  13. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  14. Computer Interfaces for User Access to Heterogeneous Information-Retrieval Systems.

    ERIC Educational Resources Information Center

    Marcus, Richard S.; Reintjes, J. Francis

    A translating-computer-interface approach to providing a common, or virtual-system, mode of access to a network of heterogeneous online bibliographic retrieval systems has been investigated. Enhanced access to such systems by end users has been demonstrated through test usage of an experimental interface. A table-driven, rule-based message…

  15. Access, Retention and Progression of Black Students Through the Two-Tier Florida Higher Education System.

    ERIC Educational Resources Information Center

    Grigg, Charles M.

    This study addresses the question of whether a State system of higher education based on different tiers (a community college system and a State university system) provides equal access and opportunity for minority students. Specifically, the study investigates access distribution, retention, and progression of minority students using Florida…

  16. Development of biotechnology control systems.

    PubMed

    Romeu, F J

    1995-03-01

    Advances in genetic engineering have generated great interest in biotechnology systems. Modern fermentation processes have a more scientific basis and can be optimized more quickly by utilizing instrumentation and control technology that permits increasing yield and product quality. The automation technology, to a large extent, can determine the degree of success of growing microorganisms. The automation system in modern biotechnology facilities includes a number of leading technologies such as sensors, indicators, data acquisition, distributed control, programmable control, communications, data base management, on-line data analysis techniques and application software. Modern computer systems have made fermentation processes easier and more accurate by performing tasks such as on-line analysis, statistical process control and supervisory control, while microprocessor-based distributed process controllers perform direct digital control, batch and sequencing control. This paper addresses technical issues related to the development of instrumentation and control systems that integrate these technologies through methodologies that permit the timely generation of the documentation and drawings that specify the control system for procurement, installation, commissioning, validation and operation.

  17. Control principles of complex systems

    NASA Astrophysics Data System (ADS)

    Liu, Yang-Yu; Barabási, Albert-László

    2016-07-01

    A reflection of our ultimate understanding of a complex system is our ability to control its behavior. Typically, control has multiple prerequisites: it requires an accurate map of the network that governs the interactions between the system's components, a quantitative description of the dynamical laws that govern the temporal behavior of each component, and an ability to influence the state and temporal behavior of a selected subset of the components. With deep roots in dynamical systems and control theory, notions of control and controllability have taken a new life recently in the study of complex networks, inspiring several fundamental questions: What are the control principles of complex systems? How do networks organize themselves to balance control with functionality? To address these questions here recent advances on the controllability and the control of complex networks are reviewed, exploring the intricate interplay between the network topology and dynamical laws. The pertinent mathematical results are matched with empirical findings and applications. Uncovering the control principles of complex systems can help us explore and ultimately understand the fundamental laws that govern their behavior.

  18. Learning from a cluster randomized controlled trial to improve healthcare workers’ access to prevention and care for tuberculosis and HIV in Free State, South Africa: the pivotal role of information systems

    PubMed Central

    Yassi, Annalee; Adu, Prince A.; Nophale, Letshego; Zungu, Muzimkhulu

    2016-01-01

    Background Occupational tuberculosis (TB) continues to plague the healthcare workforce in South Africa. A 2-year cluster randomized controlled trial was therefore launched in 27 public hospitals in Free State province, to better understand how a combined workforce and workplace program can improve health of the healthcare workforce. Objective This mid-term evaluation aimed to analyze how well the intervention was being implemented, seek evidence of impact or harm, and draw lessons. Methods Both intervention and comparison sites had been instructed to conduct bi-annual and issue-based infection control assessments (when healthcare workers [HCW] are diagnosed with TB) and offer HCWs confidential TB and HIV counseling and testing, TB treatment and prophylaxis for HIV-positive HCWs. Intervention sites were additionally instructed to conduct quarterly workplace assessments, and also offer HCWs HIV treatment at their occupational health units (OHUs). Trends in HCW mortality, sick-time, and turnover rates (2005–2014) were analyzed from the personnel salary database (‘PERSAL’). Data submitted by the OHUs were also analyzed. Open-ended questionnaires were then distributed to OHU HCWs and in-depth interviews conducted at 17 of the sites to investigate challenges encountered. Results OHUs reported identifying and treating 23 new HCW cases of TB amongst the 1,372 workers who used the OHU for HIV and/or TB services; 39 new cases of HIV were also identified and 108 known-HIV-positive HCWs serviced. Although intervention-site workforces used these services significantly more than comparison-site healthcare staff (p<0.001), the data recorded were incomplete for both the intervention and comparison OHUs. An overall significant decline in mortality and turnover rates was documented over this period, but no significant differences between intervention and comparison sites; sick-time data proved unreliable. Severe OHU workload as well as residual confidentiality concerns

  19. From System Expansion to System Contraction: Access to Higher Education in Poland

    ERIC Educational Resources Information Center

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  20. Aircraft control system

    NASA Technical Reports Server (NTRS)

    Lisoski, Derek L. (Inventor); Kendall, Greg T. (Inventor)

    2007-01-01

    A solar rechargeable, long-duration, span-loaded flying wing, having no fuselage or rudder. Having a two-hundred foot wingspan that mounts photovoltaic cells on most all of the wing's top surface, the aircraft uses only differential thrust of its eight propellers to turn, pitch and yaw. The wing is configured to deform under flight loads to position the propellers such that the control can be achieved. Each of five segments of the wing has one or more motors and photovoltaic arrays, and produces its own lift independent of the other segments, to avoid loading them. Five two-sided photovoltaic arrays, in all, are mounted on the wing, and receive photovoltaic energy both incident on top of the wing, and which is incident also from below, through a bottom, transparent surface.

  1. Microprocessor control of photovoltaic systems

    NASA Technical Reports Server (NTRS)

    Millner, A. R.; Kaufman, D. L.

    1984-01-01

    The present low power CMOS microprocessor controller for photovoltaic power systems possesses three programs, which are respectively intended for (1) conventional battery-charging systems with state-of-charge estimation and sequential shedding of subarrays and loads, (2) maximum power-controlled battery-charging systems, and (3) variable speed dc motor drives. Attention is presently given to the development of this terrestrial equipment for spacecraft use.

  2. Emission control system

    NASA Technical Reports Server (NTRS)

    Parrish, Clyde F. (Inventor)

    2008-01-01

    Methods and apparatus utilizing hydrogen peroxide are useful to reduce NOx, SOx and mercury (or other heavy metal) emissions from combustion flue gas streams. Continuous concentration of hydrogen peroxide to levels approaching or exceeding propellant-grade hydrogen peroxide facilitates increased system efficiency. In this manner, combustion flue gas streams can be treated for the removal of NOx, SOx and heavy metals, while isolating useful by-products streams of sulfuric acid and nitric acid as well as solids for the recovery of the heavy metals.

  3. 28 CFR 16.101 - Exemption of U.S. Marshals Service Systems-limited access, as indicated.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRODUCTION OR DISCLOSURE OF MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16... aids efforts of law enforcement officials to prevent, control or reduce crime. Access to records would... in an unwarranted invasion of the personal privacy of collateral record subjects or other third...

  4. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  5. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  6. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  7. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... violation of section 337 in the infringement of certain patents. 73 FR 75131. The principal respondent was... order. 75 FR 44989-90 (July 30, 2010). The Commission also issued cease and desist orders against those... COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers...

  8. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  9. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... materials; 44 U.S.C. 2111, 44 U.S.C. 2201 et seq., and 36 CFR part 1270 for Presidential records; and 44 U.S.C. 2111 note and 36 CFR part 1275 for Nixon Presidential materials. ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What controls access...

  10. Control of Access to Memory: The Use of Task Interference as a Behavioral Probe

    ERIC Educational Resources Information Center

    Loft, Shayne; Humphreys, Michael S.; Whitney, Susannah J.

    2008-01-01

    Directed forgetting and prospective memory methods were combined to examine differences in the control of memory access. Between studying two lists of target words, participants were either instructed to forget the first list, or to continue remembering the first list. After study participants performed a lexical decision task with an additional…

  11. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  12. 50 CFR 648.92 - Effort-control program for monkfish limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for monkfish limited access vessels. 648.92 Section 648.92 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT... UNITED STATES Management Measures for the NE Multispecies and Monkfish Fisheries § 648.92...

  13. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  14. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  15. Fast access control of the head positioning using a digital signal processor

    NASA Astrophysics Data System (ADS)

    Hasegawa, Susumu; Mizoshita, Yoshifumi; Ueno, Takahisa; Takaishi, Kazuhiko

    1990-08-01

    We have developed a new digital servo controller for a 5"hard disk drive which has average access time of 10 ms for a 25 mm stroke. To obtain this fast access speed, we used a state estimator with a new acceleration irajectory model. The estimator and trajectory generator are implemented using a digital signal processor. There are two problems for fast access control: motor coil inductance and the mechanical resonance of the actuator and disk enclosure. To solve these problems and to achieve precise head positioning, we developed the following control method. To solve the voice coil motor inductance and actuator resonance problems, we used a new acceleration trajectory model which is not affected by the coil inductance when the head moves quickly. This design is based on an optinial control theory which minimizes the square of differentiated acceleration. By using this new trajectory model, the high harmonics of actuator drive are damped and the residual vibration ofactuator immediately after access is decreased.

  16. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  17. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  18. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  19. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  20. Circulation Control in NASA's Vehicle Systems

    NASA Technical Reports Server (NTRS)

    Rich, Paul; McKinley, Bob; Jones, Greg

    2005-01-01

    Specific to the application of any technology to a vehicle, such as circulation control, it is important to understand the process that NASA is using to set its direction in research and development. To see how circulation control fits into any given NASA program requires the reader to understand NASA's Vehicle Systems (VS) Program. The VS Program recently celebrated its first year of existence with an annual review - an opportunity to look back on accomplishments, solicit feedback, expand national advocacy and support for the program, and recognize key contributions. Since its formation last year, Vehicle Systems has coordinated seven existing entities in a streamlined aeronautics research effort. It invests in vehicle technologies to protect the environment, make air travel more accessible and affordable for Americans, enable exploration through new aerospace missions, and augment national security. This past year has seen a series of valuable partnerships with industry, academia, and government agencies to make crucial aeronautics advances and assure America s future in flight.