Sucurovic, Snezana; Milutinovic, Veljko
2008-01-01
The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
NASA Astrophysics Data System (ADS)
Park, Chang-Seop; Kang, Hyun-Sun
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
A service-oriented data access control model
NASA Astrophysics Data System (ADS)
Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali
2017-01-01
The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Cost comparison of competing local distribution systems for communication satellite traffic
NASA Technical Reports Server (NTRS)
Dopfel, F. E.
1979-01-01
The boundaries of market areas which favor various means for distributing communications satellite traffic are considered. The distribution methods considered are: control Earth station with cable access, rooftop Earth stations, Earth station with radio access, and various combinations of these methods. The least cost system for a hypothetical region described by number of users and the average cable access mileage is discussed. The region is characterized by a function which expresses the distribution of users. The results indicate that the least cost distribution is central Earth station with cable access for medium to high density areas of a region combined with rooftop Earth stations or (for higher volumes) radio access for remote users.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Access control and privacy in large distributed systems
NASA Technical Reports Server (NTRS)
Leiner, B. M.; Bishop, M.
1986-01-01
Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.
Yi, Meng; Chen, Qingkui; Xiong, Neal N
2016-11-03
This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
NASA Astrophysics Data System (ADS)
Gou, Kaiyu; Gan, Chaoqin; Zhang, Xiaoyu; Zhang, Yuchao
2018-03-01
An optical time-and-wavelength-division-multiplexing metro-access network (TWDM-MAN) is proposed and demonstrated in this paper. By the reuse of tangent-ring optical distribution network and the design of distributed control mechanism, ONUs needing to communicate with each other can be flexibly accessed to successfully make up three kinds of reconfigurable networks. By the nature advantage of ring topology in protection, three-level comprehensive protections covering both feeder and distribution fibers are also achieved. Besides, a distributed wavelength allocation (DWA) is designed to support efficient parallel upstream transmission. The analyses including capacity, congestion and transmission simulation show that this network has a great performance.
Empowering citizens with access control mechanisms to their personal health resources.
Calvillo, J; Román, I; Roa, L M
2013-01-01
Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms are essential keys for this approach and they are accomplished by using semantic technologies (i.e., ontologies, rule languages, and inference engines). The results are mainly focused on the security and access control of the proposed scenario. An ontology has been designed and developed for the POVO covering the terminology of the scenario and easing the automation of administration tasks. Over that ontology, an access control mechanism based on rule languages allows specifying access control policies, and an inference engine performs the decision making process automatically. The usability of solutions to ease administration tasks to the SoC is improved by the Me-As-An-Admin (M3A) application. This guides the SoC through the specification of personal access control policies to his/her distributed resources by using semantic technologies (e.g., metamodeling, model-to-text transformations, etc.). All results are developed as services and included in an architecture in accordance with standards and principles of openness and interoperability. Current technology can bring health, social and well-being care actually centered on citizens, and granting each person the management of his/her health information. However, the application of technology without adopting methodologies or normalized guidelines will reduce the interoperability of solutions developed, failing in the development of advanced services and improved scenarios for health delivery. Standards and reference architectures can be cornerstones for future-proof and powerful developments. Finally, not only technology must follow citizen-centric approaches, but also the gaps needing legislative efforts that support these new paradigms of healthcare delivery must be identified and addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Security in the CernVM File System and the Frontier Distributed Database Caching System
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.
2014-06-01
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.
Distributed reservation control protocols for random access broadcasting channels
NASA Technical Reports Server (NTRS)
Greene, E. P.; Ephremides, A.
1981-01-01
Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.
Yi, Meng; Chen, Qingkui; Xiong, Neal N.
2016-01-01
This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dykstra, D.; Blomer, J.
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFSmore » and Frontier.« less
48 CFR 5.102 - Availability of solicitations.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Disclosure would compromise the national security (e.g., would result in disclosure of classified information, or information subject to export controls) or create other security risks. The fact that access to... information that requires additional controls to monitor access and distribution (e.g., technical data...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-20
... initiated a rulemaking proceeding in accordance with provisions added by the Digital Millennium Copyright... available in digital copies. Proponent: The Open Book Alliance. 2. Literary works, distributed electronically, that: (1) Contain digital rights management and/or other access controls which either prevent the...
The E-Book: Pipe Dream or Potential Disaster?
ERIC Educational Resources Information Center
Dorman, David
1999-01-01
Discusses the development of electronic books and considers marketing and distribution, rights management, and technical standards. Economic and institutional relationships, copyrights, Extensible Markup Language (XML), access to content, free access versus fees, preservation versus loss of control over long-term storage and access, and trusted…
An improved AVC strategy applied in distributed wind power system
NASA Astrophysics Data System (ADS)
Zhao, Y. N.; Liu, Q. H.; Song, S. Y.; Mao, W.
2016-08-01
Traditional AVC strategy is mainly used in wind farm and only concerns about grid connection point, which is not suitable for distributed wind power system. Therefore, this paper comes up with an improved AVC strategy applied in distributed wind power system. The strategy takes all nodes of distribution network into consideration and chooses the node having the most serious voltage deviation as control point to calculate the reactive power reference. In addition, distribution principles can be divided into two conditions: when wind generators access to network on single node, the reactive power reference is distributed according to reactive power capacity; when wind generators access to network on multi-node, the reference is distributed according to sensitivity. Simulation results show the correctness and reliability of the strategy. Compared with traditional control strategy, the strategy described in this paper can make full use of generators reactive power output ability according to the distribution network voltage condition and improve the distribution network voltage level effectively.
Application of total distributed control system in car-body inspection
NASA Astrophysics Data System (ADS)
Yang, Xueyou; Ren, Dahai; Wang, Zhong; Ye, Shenghua; Lu, Hongbo; Duan, Jilin
1996-08-01
An application of distributed control system in Autocar-body Visual Inspection Station is presented in the paper, a distributed control system using PC as the host processor and single-chip microcomputer as the slave controller is proposed. In this paper, the physical interface of the control network and the relevant hardware are introduced. Meanwhile, a minute research on data communication is performed, relevant protocols on data framing, instruction codes and channel access methods have been laid down and part of related software is presented.
A development framework for artificial intelligence based distributed operations support systems
NASA Technical Reports Server (NTRS)
Adler, Richard M.; Cottman, Bruce H.
1990-01-01
Advanced automation is required to reduce costly human operations support requirements for complex space-based and ground control systems. Existing knowledge based technologies have been used successfully to automate individual operations tasks. Considerably less progress has been made in integrating and coordinating multiple operations applications for unified intelligent support systems. To fill this gap, SOCIAL, a tool set for developing Distributed Artificial Intelligence (DAI) systems is being constructed. SOCIAL consists of three primary language based components defining: models of interprocess communication across heterogeneous platforms; models for interprocess coordination, concurrency control, and fault management; and for accessing heterogeneous information resources. DAI applications subsystems, either new or existing, will access these distributed services non-intrusively, via high-level message-based protocols. SOCIAL will reduce the complexity of distributed communications, control, and integration, enabling developers to concentrate on the design and functionality of the target DAI system itself.
Wood, Eric; Duran, Adam; Kelly, Kenneth
2016-09-27
In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wood, Eric; Duran, Adam; Kelly, Kenneth
In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less
Embedded diagnostic, prognostic, and health management system and method for a humanoid robot
NASA Technical Reports Server (NTRS)
Barajas, Leandro G. (Inventor); Strawser, Philip A (Inventor); Sanders, Adam M (Inventor); Reiland, Matthew J (Inventor)
2013-01-01
A robotic system includes a humanoid robot with multiple compliant joints, each moveable using one or more of the actuators, and having sensors for measuring control and feedback data. A distributed controller controls the joints and other integrated system components over multiple high-speed communication networks. Diagnostic, prognostic, and health management (DPHM) modules are embedded within the robot at the various control levels. Each DPHM module measures, controls, and records DPHM data for the respective control level/connected device in a location that is accessible over the networks or via an external device. A method of controlling the robot includes embedding a plurality of the DPHM modules within multiple control levels of the distributed controller, using the DPHM modules to measure DPHM data within each of the control levels, and recording the DPHM data in a location that is accessible over at least one of the high-speed communication networks.
Object-oriented design for accelerator control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stok, P.D.V. van der; Berk, F. van den; Deckers, R.
1994-02-01
An object-oriented design for the distributed computer control system of the accelerator ring EUTERPE is presented. Because of the experimental nature of the ring, flexibility is of the utmost importance. The object-oriented principles have contributed considerably to the flexibility of the design incorporating multiple views, multi-level access and distributed surveillance.
Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs
NASA Astrophysics Data System (ADS)
Zhu, Yanfeng; Niu, Zhisheng
Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.
Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks
NASA Astrophysics Data System (ADS)
Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie
2008-12-01
Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.
Off-the-shelf Control of Data Analysis Software
NASA Astrophysics Data System (ADS)
Wampler, S.
The Gemini Project must provide convenient access to data analysis facilities to a wide user community. The international nature of this community makes the selection of data analysis software particularly interesting, with staunch advocates of systems such as ADAM and IRAF among the users. Additionally, the continuing trends towards increased use of networked systems and distributed processing impose additional complexity. To meet these needs, the Gemini Project is proposing the novel approach of using low-cost, off-the-shelf software to abstract out both the control and distribution of data analysis from the functionality of the data analysis software. For example, the orthogonal nature of control versus function means that users might select analysis routines from both ADAM and IRAF as appropriate, distributing these routines across a network of machines. It is the belief of the Gemini Project that this approach results in a system that is highly flexible, maintainable, and inexpensive to develop. The Khoros visualization system is presented as an example of control software that is currently available for providing the control and distribution within a data analysis system. The visual programming environment provided with Khoros is also discussed as a means to providing convenient access to this control.
Automatic Control and Data Acquisition System for Combustion Laboratory Applications.
1982-10-01
O VPI Access~.ion FCr- 1473 2 UNCLASSIFIED Approved for public release; distribution unlimited JAutomatic Control and Data Acquisition System for...unit. The CPU/ROK board includes a 16 bit microprocessor chip which decodes and executes all in- structions, and controls all data transfers. The 12K...in the limited memory space of 32K of the HP-85 33 ACQDTA’ 1) Controls DevicesCRAIN ,2) Acquires Photodiods Output$ 3) Stores Data o Disc 1
First Experiences Using XACML for Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit
2003-01-01
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-02
... request vouchers for distribution of grant funds using the automated Voice Response System (VRS). An... Payment and Line of Credit Control System (LOCCS) Voice Response System Access Authorization AGENCY... subject proposal. Payment request vouchers for distribution of grant funds using the automated Voice...
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
Group Membership Based Authorization to CADC Resources
NASA Astrophysics Data System (ADS)
Damian, A.; Dowler, P.; Gaudet, S.; Hill, N.
2012-09-01
The Group Membership Service (GMS), implemented at the Canadian Astronomy Data Centre (CADC), is a prototype of what could eventually be an IVOA standard for a distributed and interoperable group membership protocol. Group membership is the core authorization concept that enables teamwork and collaboration amongst astronomers accessing distributed resources and services. The service integrates and complements other access control related IVOA standards such as single-sign-on (SSO) using X.509 proxy certificates and the Credential Delegation Protocol (CDP). The GMS has been used at CADC for several years now, initially as a subsystem and then as a stand-alone Web service. It is part of the authorization mechanism for controlling the access to restricted Web resources as well as the VOSpace service hosted by the CADC. We present the role that GMS plays within the access control system at the CADC, including the functionality of the service and how the different CADC services make use of it to assert user authorization to resources. We also describe the main advantages and challenges of using the service as well as future work to increase its robustness and functionality.
Cardea: Dynamic Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2004-01-01
Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.
NASA Technical Reports Server (NTRS)
Turner, Horace Q.; Harper, David F.
1991-01-01
The distribution of NASTRAN User Manual information has been difficult because of the delay in printing and difficulty in identification of all the users. This has caused many users not to have the current information for the release of NASTRAN that could be available to them. The User Manual updates have been supplied with the NASTRAN Releases, but distribution within organizations was not coordinated with access to releases. The Executive Control, Case Control, and Bulk Data sections are supplied in machine readable format with the 91 Release of NASTRAN. This information is supplied on the release tapes in ASCII format, and a FORTRAN program to access this information is supplied on the release tapes. This will allow each user to have immediate access to User Manual level documentation with the release. The sections on utilities, plotting, and substructures are expected to be prepared for the 92 Release.
NASA Technical Reports Server (NTRS)
Mejzak, R. S.
1980-01-01
The distributed processing concept is defined in terms of control primitives, variables, and structures and their use in performing a decomposed discrete Fourier transform (DET) application function. The design assumes interprocessor communications to be anonymous. In this scheme, all processors can access an entire common database by employing control primitives. Access to selected areas within the common database is random, enforced by a hardware lock, and determined by task and subtask pointers. This enables the number of processors to be varied in the configuration without any modifications to the control structure. Decompositional elements of the DFT application function in terms of tasks and subtasks are also described. The experimental hardware configuration consists of IMSAI 8080 chassis which are independent, 8 bit microcomputer units. These chassis are linked together to form a multiple processing system by means of a shared memory facility. This facility consists of hardware which provides a bus structure to enable up to six microcomputers to be interconnected. It provides polling and arbitration logic so that only one processor has access to shared memory at any one time.
SAFE: SPARQL Federation over RDF Data Cubes with Access Control.
Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh
2017-02-01
Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as well as legacy linked datasets. We show that SAFE enables granular graph-level access control over distributed clinical RDF data cubes and efficiently reduces the source selection and overall query execution time when compared with general-purpose SPARQL query federation engines in the targeted setting.
Commercialization and Field Distribution of Smart Pedestrian Call Signals
DOT National Transportation Integrated Search
2010-06-01
The research on this project resulted in a new design for an accessible pedestrian system (APS) that uses Ethernet communications to implement a distributed control system. Present APS designs represent a safety risk factor by APS systems having unde...
The equipment access software for a distributed UNIX-based accelerator control system
NASA Astrophysics Data System (ADS)
Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé
1994-12-01
This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.
NASA Astrophysics Data System (ADS)
Donoho, N.; Graumann, A.; McNamara, D. P.
2015-12-01
In this presentation we will highlight access and availability of NOAA satellite data for near real time (NRT) and retrospective product users. The presentation includes an overview of the current fleet of NOAA satellites and methods of data distribution and access to hundreds of imagery and products offered by the Environmental Satellite Processing Center (ESPC) and the Comprehensive Large Array-data Stewardship System (CLASS). In particular, emphasis on the various levels of services for current and past observations will be presented. The National Environmental Satellite, Data, and Information Service (NESDIS) is dedicated to providing timely access to global environmental data from satellites and other sources. In special cases, users are authorized direct access to NESDIS data distribution systems for environmental satellite data and products. Other means of access include publicly available distribution services such as the Global Telecommunication System (GTS), NOAA satellite direct broadcast services and various NOAA websites and ftp servers, including CLASS. CLASS is NOAA's information technology system designed to support long-term, secure preservation and standards-based access to environmental data collections and information. The National Centers for Environmental Information (NCEI) is responsible for the ingest, quality control, stewardship, archival and access to data and science information. This work will also show the latest technology improvements, enterprise approach and future plans for distribution of exponentially increasing data volumes from future NOAA missions. A primer on access to NOAA operational satellite products and services is available at http://www.ospo.noaa.gov/Organization/About/access.html. Access to post-operational satellite data and assorted products is available at http://www.class.noaa.gov
Distributed control system in a car-body inspection station
NASA Astrophysics Data System (ADS)
Yang, Xueyou; Ren, Dahai; Ye, Shenghua; Lu, Hongbo; Duan, Jilin
1997-06-01
In this paper, a distributed control network in autocar-body visual inspection station is presented in which PC is used as the host processor and single-chip microcomputers are employed as slave controllers. The physical interface of the control network and the relevant hardware are introduced in this paper. Meanwhile, a minute research on data communication is performed, relevant protocols on data framing, instruction codes and channel access methods have been laid down and part of related software is presented.
Zou, An-Min; Kumar, Krishna Dev
2012-07-01
This brief considers the attitude coordination control problem for spacecraft formation flying when only a subset of the group members has access to the common reference attitude. A quaternion-based distributed attitude coordination control scheme is proposed with consideration of the input saturation and with the aid of the sliding-mode observer, separation principle theorem, Chebyshev neural networks, smooth projection algorithm, and robust control technique. Using graph theory and a Lyapunov-based approach, it is shown that the distributed controller can guarantee the attitude of all spacecraft to converge to a common time-varying reference attitude when the reference attitude is available only to a portion of the group of spacecraft. Numerical simulations are presented to demonstrate the performance of the proposed distributed controller.
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
NASA Astrophysics Data System (ADS)
Sánchez-Artigas, Marc; García-López, Pedro
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
Autonomous Information Unit: Why Making Data Smart Can also Make Data Secured?
NASA Technical Reports Server (NTRS)
Chow, Edward T.
2006-01-01
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and self-manage. In our approach, we decompose data into smaller pieces and provide individualized protection. We also provide a policy control mechanism to allow 'smart' access control and context based re-assembly of the decomposed data. By combining smart policy with individually protected data, we are able to provide better protection of sensitive information and achieve more flexible access during emergency conditions. As a result, this new fine-grain protection mechanism can enable us to achieve better solutions for problems such as distributed information protection and identity theft.
Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha, Fatemeh; Mu, Yi
2016-05-01
Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Investigating the Spatial Dimension of Food Access.
Yenerall, Jackie; You, Wen; Hill, Jennie
2017-08-02
The purpose of this article is to investigate the sensitivity of food access models to a dataset's spatial distribution and the empirical definition of food access, which contributes to understanding the mixed findings of previous studies. Data was collected in the Dan River Region in the United States using a telephone survey for individual-level variables ( n = 784) and a store audit for the location of food retailers and grocery store quality. Spatial scanning statistics assessed the spatial distribution of obesity and detected a cluster of grocery stores overlapping with a cluster of obesity centered on a grocery store suggesting that living closer to a grocery store increased the likelihood of obesity. Logistic regression further examined this relationship while controlling for demographic and other food environment variables. Similar to the cluster analysis results, increased distance to a grocery store significantly decreased the likelihood of obesity in the urban subsample (average marginal effects, AME = -0.09, p -value = 0.02). However, controlling for grocery store quality nullified these results (AME = -0.12, p -value = 0.354). Our findings suggest that measuring grocery store accessibility as the distance to the nearest grocery store captures variability in the spatial distribution of the health outcome of interest that may not reflect a causal relationship between the food environment and health.
Investigating the Spatial Dimension of Food Access
Yenerall, Jackie; You, Wen
2017-01-01
The purpose of this article is to investigate the sensitivity of food access models to a dataset’s spatial distribution and the empirical definition of food access, which contributes to understanding the mixed findings of previous studies. Data was collected in the Dan River Region in the United States using a telephone survey for individual-level variables (n = 784) and a store audit for the location of food retailers and grocery store quality. Spatial scanning statistics assessed the spatial distribution of obesity and detected a cluster of grocery stores overlapping with a cluster of obesity centered on a grocery store suggesting that living closer to a grocery store increased the likelihood of obesity. Logistic regression further examined this relationship while controlling for demographic and other food environment variables. Similar to the cluster analysis results, increased distance to a grocery store significantly decreased the likelihood of obesity in the urban subsample (average marginal effects, AME = −0.09, p-value = 0.02). However, controlling for grocery store quality nullified these results (AME = −0.12, p-value = 0.354). Our findings suggest that measuring grocery store accessibility as the distance to the nearest grocery store captures variability in the spatial distribution of the health outcome of interest that may not reflect a causal relationship between the food environment and health. PMID:28767093
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban
2017-01-01
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat. PMID:28758045
A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms
NASA Astrophysics Data System (ADS)
Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin
With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.
Stocker, Gernot; Rieder, Dietmar; Trajanoski, Zlatko
2004-03-22
ClusterControl is a web interface to simplify distributing and monitoring bioinformatics applications on Linux cluster systems. We have developed a modular concept that enables integration of command line oriented program into the application framework of ClusterControl. The systems facilitate integration of different applications accessed through one interface and executed on a distributed cluster system. The package is based on freely available technologies like Apache as web server, PHP as server-side scripting language and OpenPBS as queuing system and is available free of charge for academic and non-profit institutions. http://genome.tugraz.at/Software/ClusterControl
Graphs for information security control in software defined networks
NASA Astrophysics Data System (ADS)
Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.
2017-07-01
Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.
A hierarchical distributed control model for coordinating intelligent systems
NASA Technical Reports Server (NTRS)
Adler, Richard M.
1991-01-01
A hierarchical distributed control (HDC) model for coordinating cooperative problem-solving among intelligent systems is described. The model was implemented using SOCIAL, an innovative object-oriented tool for integrating heterogeneous, distributed software systems. SOCIAL embeds applications in 'wrapper' objects called Agents, which supply predefined capabilities for distributed communication, control, data specification, and translation. The HDC model is realized in SOCIAL as a 'Manager'Agent that coordinates interactions among application Agents. The HDC Manager: indexes the capabilities of application Agents; routes request messages to suitable server Agents; and stores results in a commonly accessible 'Bulletin-Board'. This centralized control model is illustrated in a fault diagnosis application for launch operations support of the Space Shuttle fleet at NASA, Kennedy Space Center.
NASA Astrophysics Data System (ADS)
Hirono, Masahiko; Nojima, Toshio
This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.
Secure distribution for high resolution remote sensing images
NASA Astrophysics Data System (ADS)
Liu, Jin; Sun, Jing; Xu, Zheng Q.
2010-09-01
The use of remote sensing images collected by space platforms is becoming more and more widespread. The increasing value of space data and its use in critical scenarios call for adoption of proper security measures to protect these data against unauthorized access and fraudulent use. In this paper, based on the characteristics of remote sensing image data and application requirements on secure distribution, a secure distribution method is proposed, including users and regions classification, hierarchical control and keys generation, and multi-level encryption based on regions. The combination of the three parts can make that the same remote sensing images after multi-level encryption processing are distributed to different permission users through multicast, but different permission users can obtain different degree information after decryption through their own decryption keys. It well meets user access control and security needs in the process of high resolution remote sensing image distribution. The experimental results prove the effectiveness of the proposed method which is suitable for practical use in the secure transmission of remote sensing images including confidential information over internet.
Extending key sharing: how to generate a key tightly coupled to a network security policy
NASA Astrophysics Data System (ADS)
Kazantzidis, Matheos
2006-04-01
Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.
NASA Technical Reports Server (NTRS)
2001-01-01
REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.
Advanced systems engineering and network planning support
NASA Technical Reports Server (NTRS)
Walters, David H.; Barrett, Larry K.; Boyd, Ronald; Bazaj, Suresh; Mitchell, Lionel; Brosi, Fred
1990-01-01
The objective of this task was to take a fresh look at the NASA Space Network Control (SNC) element for the Advanced Tracking and Data Relay Satellite System (ATDRSS) such that it can be made more efficient and responsive to the user by introducing new concepts and technologies appropriate for the 1997 timeframe. In particular, it was desired to investigate the technologies and concepts employed in similar systems that may be applicable to the SNC. The recommendations resulting from this study include resource partitioning, on-line access to subsets of the SN schedule, fluid scheduling, increased use of demand access on the MA service, automating Inter-System Control functions using monitor by exception, increase automation for distributed data management and distributed work management, viewing SN operational control in terms of the OSI Management framework, and the introduction of automated interface management.
NASA Technical Reports Server (NTRS)
Spiger, R. J.; Farrell, R. J.; Holcomb, G. A.
1982-01-01
The access schema developed to access both individual switch functions as well as automated or semiautomated procedures for the orbital maneuvering system and electrical power and distribution and control system discussed and the operation of the system is described. Feasibility tests and analyses used to define display parameters and to select applicable hardware choices for use in such a system are presented and the results are discussed.
Tuffner, Francis K [Richland, WA; Kintner-Meyer, Michael C. W. [Richland, WA; Hammerstrom, Donald J [West Richland, WA; Pratt, Richard M [Richland, WA
2012-05-22
Battery charging control methods, electric vehicle charging methods, battery charging apparatuses and rechargeable battery systems. According to one aspect, a battery charging control method includes accessing information regarding a presence of at least one of a surplus and a deficiency of electrical energy upon an electrical power distribution system at a plurality of different moments in time, and using the information, controlling an adjustment of an amount of the electrical energy provided from the electrical power distribution system to a rechargeable battery to charge the rechargeable battery.
Compliance and Functional Testing of IEEE 1451.1 for NCAP-to-NCAP Communications in a Sensor Network
NASA Technical Reports Server (NTRS)
Figueroa, Jorge; Gurkan, Deniz; Yuan, X.; Benhaddou, D.; Liu, H.; Singla, A.; Franzl, R.; Ma, H.; Bhatt, S.; Morris, J.;
2008-01-01
Distributed control in a networked environment is an irreplaceable feature in systems with remote sensors and actuators. Although distributed control was not originally designed to be networked, usage of off-the-shelf networking technologies has become so prevalent that control systems are desired to have access mechanisms similar to computer networks. However, proprietary transducer interfaces for network communications and distributed control overwhelmingly dominate this industry. Unless the lack of compatibility and interoperability among transducers is resolved, the mature level of access (that computer networking can deliver) will not be achieved in such networked distributed control systems. Standardization of networked transducer interfaces will enable devices from different manufacturers to talk to each other and ensure their plug-and-play capability. One such standard is the suite of IEEE 1451 for sensor network communication and transducer interfaces. The suite not only provides a standard interface for smart transducers, but also outlines the connection of an NCAP (network capable application processor) and transducers (through a transducer interface module TIM). This paper presents the design of the compliance testing of IEEE 1451.1 (referred to as Dot1) compatible NCAP-to-NCAP communications on a link-layer independent medium. The paper also represents the first demonstration of NCAP-to-NCAP communications with Dot1 compatibility: a tester NCAP and an NCAP under test (NUT).
ERIC Educational Resources Information Center
Heller, Monica
2014-01-01
The subject of multilingualism in institutions has long been a central interest in sociolinguistics, and it is worth asking why. The answer lies in the role of institutions in the modern nation state, a point made over and over again by Michel Foucault. Institutions control access to all the resources a state can distribute; it distributes them…
Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks
NASA Astrophysics Data System (ADS)
Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan
2018-01-01
In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.
NASA Technical Reports Server (NTRS)
Koeberlein, Ernest, III; Pender, Shaw Exum
1994-01-01
This paper describes the Multimission Telemetry Visualization (MTV) data acquisition/distribution system. MTV was developed by JPL's Multimedia Communications Laboratory (MCL) and designed to process and display digital, real-time, science and engineering data from JPL's Mission Control Center. The MTV system can be accessed using UNIX workstations and PC's over common datacom and telecom networks from worldwide locations. It is designed to lower data distribution costs while increasing data analysis functionality by integrating low-cost, off-the-shelf desktop hardware and software. MTV is expected to significantly lower the cost of real-time data display, processing, distribution, and allow for greater spacecraft safety and mission data access.
Geissbuhler, Antoine; Spahni, Stéphane; Assimacopoulos, André; Raetzo, Marc-André; Gobet, Gérard
2004-01-01
to design a community healthcare information network for all 450,000 citizen in the State of Geneva, Switzerland, connecting public and private healthcare professionals. Requirements include the decentralized storage of information at the source of its production, the creation of a virtual patient record at the time of the consultation, the control by the patient of the access rights to the information, and the interoperability with other similar networks at the national and european level. a participative approach and real-world pilot projects are used to design, test and validate key components of the network, including its technical architecture and the strategy for the management of access rights by the patients. a distributed architecture using peer-to-peer communication of information mediators can implement the various requirements while limiting to an absolute minimum the amount of centralized information. Access control can be managed by the patient with the help of a medical information mediator, the physician of trust.
NASA Astrophysics Data System (ADS)
Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko
We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.
Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks
Lu, Zhaoming; Pan, Qi; Wang, Luhan; Wen, Xiangming
2016-01-01
Because of the limited resources on radio access channels of third generation partnership projection (3GPP) network, one of the most challenging tasks posted by 3GPP cellular-based machine type communications (MTC) is congestion due to massive requests for connection to radio access network (RAN). In this paper, an overload control algorithm in 3GPP RAN is proposed, which proactively disperses the simultaneous access attempts in evenly distributed time window. Through periodic reservation strategy, massive access requests of MTC devices are dispersed in time, which reduces the probability of confliction of signaling. By the compensation and prediction mechanism, each device can communicate with MTC server with dynamic load of air interface. Numerical results prove that proposed method makes MTC applications friendly to 3GPP cellular network. PMID:27936011
Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks.
Lu, Zhaoming; Pan, Qi; Wang, Luhan; Wen, Xiangming
2016-01-01
Because of the limited resources on radio access channels of third generation partnership projection (3GPP) network, one of the most challenging tasks posted by 3GPP cellular-based machine type communications (MTC) is congestion due to massive requests for connection to radio access network (RAN). In this paper, an overload control algorithm in 3GPP RAN is proposed, which proactively disperses the simultaneous access attempts in evenly distributed time window. Through periodic reservation strategy, massive access requests of MTC devices are dispersed in time, which reduces the probability of confliction of signaling. By the compensation and prediction mechanism, each device can communicate with MTC server with dynamic load of air interface. Numerical results prove that proposed method makes MTC applications friendly to 3GPP cellular network.
33 CFR 106.265 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...
Evaluation of two school-based HIV prevention interventions in the border city of Tijuana, Mexico.
Martinez-Donate, Ana P; Hovell, Melbourne F; Zellner, Jennifer; Sipan, Carol L; Blumberg, Elaine J; Carrizosa, Claudia
2004-08-01
This research project examined the individual and combined effectiveness of an HIV prevention workshop and a free condom distribution program in four high schools in Tijuana, Mexico. Adolescents (N = 320) completed baseline measures on sexual practices and theoretical correlates and participated in a two-part study. In Study 1, students were randomly assigned to an HIV prevention workshop or a control condition, with a 3-month follow-up assessment. Results indicate three significant workshop benefits regarding HIV transmission by altering sexual initiation, access to condoms, and traditional beliefs regarding condoms. In Study 2, we set up a condom distribution program at two of the participating schools, and students completed a 6-month follow-up assessment. Results indicate that exposure to the workshop followed by access to the condom distribution program yielded two beneficial results for reducing HIV transmission: moderating sexual initiation and increasing condom acquisition. Access to the condom distribution program alone had no effects on behavioral and psychosocial correlates of HIV transmission. We discuss implications of these results.
Traffic handling capability of a broadband indoor wireless network using CDMA multiple access
NASA Astrophysics Data System (ADS)
Zhang, Chang G.; Hafez, H. M.; Falconer, David D.
1994-05-01
CDMA (code division multiple access) may be an attractive technique for wireless access to broadband services because of its multiple access simplicity and other appealing features. In order to investigate traffic handling capabilities of a future network providing a variety of integrated services, this paper presents a study of a broadband indoor wireless network supporting high-speed traffic using CDMA multiple access. The results are obtained through the simulation of an indoor environment and the traffic capabilities of the wireless access to broadband 155.5 MHz ATM-SONET networks using the mm-wave band. A distributed system architecture is employed and the system performance is measured in terms of call blocking probability and dropping probability. The impacts of the base station density, traffic load, average holding time, and variable traffic sources on the system performance are examined. The improvement of system performance by implementing various techniques such as handoff, admission control, power control and sectorization are also investigated.
Issues in Electronic Publishing.
ERIC Educational Resources Information Center
Meadow, Charles T.
1997-01-01
Discusses issues related to electronic publishing. Topics include writing; reading; production, distribution, and commerce; copyright and ownership of intellectual property; archival storage; technical obsolescence; control of content; equality of access; and cultural changes. (Author/LRW)
Emissions Control in Swirl Stabilized Spray Combusters, an Experimental and Computational Study
2007-02-01
dynamics and thus provide an attractive alternative for application in aircraft gas turbine engines. Triple Annular Research Swirler, which has been...octagonal combustor because it provided optical access for flame imaging while avoiding difficulty of drilling thermocouple access holes on the...indicated by the temperature distribution. c. OH* chemiluminescence image It is commonly accepted that CH* and OH* chemiluminescence represents reaction or
Packets Distributing Evolutionary Algorithm Based on PSO for Ad Hoc Network
NASA Astrophysics Data System (ADS)
Xu, Xiao-Feng
2018-03-01
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, a wireless packets distributing Evolutionary algorithm based on PSO (DPSO)for Ad Hoc Network is proposed. Firstly, parameters impact on performance of network are analyzed and researched to obtain network performance effective function. Secondly, the improved PSO Evolutionary Algorithm is used to solve the optimization problem from local to global in the process of network packets distributing. The simulation results show that the algorithm can ensure fairness and timeliness of network transmission, as well as improve ad hoc network resource integrated utilization efficiency.
Cunningham, James; Ainsworth, John
2017-01-01
The rise of distributed ledger technology, initiated and exemplified by the Bitcoin blockchain, is having an increasing impact on information technology environments in which there is an emphasis on trust and security. Management of electronic health records, where both conformation to legislative regulations and maintenance of public trust are paramount, is an area where the impact of these new technologies may be particularly beneficial. We present a system that enables fine-grained personalized control of third-party access to patients' electronic health records, allowing individuals to specify when and how their records are accessed for research purposes. The use of the smart contract based Ethereum blockchain technology to implement this system allows it to operate in a verifiably secure, trustless, and openly auditable environment, features crucial to health information systems moving forward.
Security in Distributed Collaborative Environments: Limitations and Solutions
NASA Astrophysics Data System (ADS)
Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel
The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.
OASIS: A Data Fusion System Optimized for Access to Distributed Archives
NASA Astrophysics Data System (ADS)
Berriman, G. B.; Kong, M.; Good, J. C.
2002-05-01
The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.
Distributed policy based access to networked heterogeneous ISR data sources
NASA Astrophysics Data System (ADS)
Bent, G.; Vyvyan, D.; Wood, David; Zerfos, Petros; Calo, Seraphin
2010-04-01
Within a coalition environment, ad hoc Communities of Interest (CoI's) come together, perhaps for only a short time, with different sensors, sensor platforms, data fusion elements, and networks to conduct a task (or set of tasks) with different coalition members taking different roles. In such a coalition, each organization will have its own inherent restrictions on how it will interact with the others. These are usually stated as a set of policies, including security and privacy policies. The capability that we want to enable for a coalition operation is to provide access to information from any coalition partner in conformance with the policies of all. One of the challenges in supporting such ad-hoc coalition operations is that of providing efficient access to distributed sources of data, where the applications requiring the data do not have knowledge of the location of the data within the network. To address this challenge the International Technology Alliance (ITA) program has been developing the concept of a Dynamic Distributed Federated Database (DDFD), also know as a Gaian Database. This type of database provides a means for accessing data across a network of distributed heterogeneous data sources where access to the information is controlled by a mixture of local and global policies. We describe how a network of disparate ISR elements can be expressed as a DDFD and how this approach enables sensor and other information sources to be discovered autonomously or semi-autonomously and/or combined, fused formally defined local and global policies.
Distributed PACS using distributed file system with hierarchical meta data servers.
Hiroyasu, Tomoyuki; Minamitani, Yoshiyuki; Miki, Mitsunori; Yokouchi, Hisatake; Yoshimi, Masato
2012-01-01
In this research, we propose a new distributed PACS (Picture Archiving and Communication Systems) which is available to integrate several PACSs that exist in each medical institution. The conventional PACS controls DICOM file into one data-base. On the other hand, in the proposed system, DICOM file is separated into meta data and image data and those are stored individually. Using this mechanism, since file is not always accessed the entire data, some operations such as finding files, changing titles, and so on can be performed in high-speed. At the same time, as distributed file system is utilized, accessing image files can also achieve high-speed access and high fault tolerant. The introduced system has a more significant point. That is the simplicity to integrate several PACSs. In the proposed system, only the meta data servers are integrated and integrated system can be constructed. This system also has the scalability of file access with along to the number of file numbers and file sizes. On the other hand, because meta-data server is integrated, the meta data server is the weakness of this system. To solve this defect, hieratical meta data servers are introduced. Because of this mechanism, not only fault--tolerant ability is increased but scalability of file access is also increased. To discuss the proposed system, the prototype system using Gfarm was implemented. For evaluating the implemented system, file search operating time of Gfarm and NFS were compared.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Tools for distributed application management
NASA Technical Reports Server (NTRS)
Marzullo, Keith; Cooper, Robert; Wood, Mark; Birman, Kenneth P.
1990-01-01
Distributed application management consists of monitoring and controlling an application as it executes in a distributed environment. It encompasses such activities as configuration, initialization, performance monitoring, resource scheduling, and failure response. The Meta system (a collection of tools for constructing distributed application management software) is described. Meta provides the mechanism, while the programmer specifies the policy for application management. The policy is manifested as a control program which is a soft real-time reactive program. The underlying application is instrumented with a variety of built-in and user-defined sensors and actuators. These define the interface between the control program and the application. The control program also has access to a database describing the structure of the application and the characteristics of its environment. Some of the more difficult problems for application management occur when preexisting, nondistributed programs are integrated into a distributed application for which they may not have been intended. Meta allows management functions to be retrofitted to such programs with a minimum of effort.
Tools for distributed application management
NASA Technical Reports Server (NTRS)
Marzullo, Keith; Wood, Mark; Cooper, Robert; Birman, Kenneth P.
1990-01-01
Distributed application management consists of monitoring and controlling an application as it executes in a distributed environment. It encompasses such activities as configuration, initialization, performance monitoring, resource scheduling, and failure response. The Meta system is described: a collection of tools for constructing distributed application management software. Meta provides the mechanism, while the programmer specifies the policy for application management. The policy is manifested as a control program which is a soft real time reactive program. The underlying application is instrumented with a variety of built-in and user defined sensors and actuators. These define the interface between the control program and the application. The control program also has access to a database describing the structure of the application and the characteristics of its environment. Some of the more difficult problems for application management occur when pre-existing, nondistributed programs are integrated into a distributed application for which they may not have been intended. Meta allows management functions to be retrofitted to such programs with a minimum of effort.
Waugh, M; Hraber, P; Weller, J; Wu, Y; Chen, G; Inman, J; Kiphart, D; Sobral, B
2000-01-01
The Phytophthora Genome Initiative (PGI) is a distributed collaboration to study the genome and evolution of a particularly destructive group of plant pathogenic oomycete, with the goal of understanding the mechanisms of infection and resistance. NCGR provides informatics support for the collaboration as well as a centralized data repository. In the pilot phase of the project, several investigators prepared Phytophthora infestans and Phytophthora sojae EST and Phytophthora sojae BAC libraries and sent them to another laboratory for sequencing. Data from sequencing reactions were transferred to NCGR for analysis and curation. An analysis pipeline transforms raw data by performing simple analyses (i.e., vector removal and similarity searching) that are stored and can be retrieved by investigators using a web browser. Here we describe the database and access tools, provide an overview of the data therein and outline future plans. This resource has provided a unique opportunity for the distributed, collaborative study of a genus from which relatively little sequence data are available. Results may lead to insight into how better to control these pathogens. The homepage of PGI can be accessed at http:www.ncgr.org/pgi, with database access through the database access hyperlink.
Network support for turn-taking in multimedia collaboration
NASA Astrophysics Data System (ADS)
Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.
1997-01-01
The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.
Can antibiotic use be both just and sustainable... or only more or less so?
Millar, Michael
2011-03-01
Antibiotic resistance threatens the capacity to treat life-threatening infections. If it is accepted that it will be many years (if not decades) until the production of new antibiotics overcomes current concerns with antibiotic resistance then ways to conserve the effectiveness of current antibiotics will have to be found. For many bacterial agents of infection levels of antibiotic resistance are directly dependent on the quantity of antibiotic prescribed. Antibiotics are currently underutilised in many parts of the world. If a just distribution of access to antibiotics requires equal access for individuals with equal need irrespective of wealth then responding to this requirement of justice has the potential to shorten the effective life of currently available antibiotics. Increasing the range and numbers of individuals treated with antibiotics would seem to threaten sustainability and also potentially undermine the access of future generations to cost-effective treatments for bacterial infection. The control of antibiotic resistance requires that the determinants of infectious disease transmission are addressed, such as poor housing, education and nutrition as well as the provision of antibiotics. The apparent tension between intragenerational justice and sustainability diminishes when the account of distributive justice extends beyond access to antibiotics and includes plural entitlements. Controlling antibiotic resistance requires more than the redistribution or reduction (in the overall use) of antibiotics.
Clark, Sierra; Berrang-Ford, Lea; Lwasa, Shuaib; Namanya, Didacus; Twesigomwe, Sabastian; Kulkarni, Manisha
2016-01-01
Major efforts for malaria prevention programs have gone into scaling up ownership and use of insecticidal mosquito nets, particularly in sub-Saharan Africa where the malaria burden is high. Socioeconomic inequities in access to long lasting insecticidal nets (LLINs) are reduced with free distributions of nets. However, the relationship between social factors and retention of nets after a free distribution has been less studied, particularly using a longitudinal approach. Our research aimed to estimate the ownership and use of LLINs, and examine the determinants of LLIN retention, within an Indigenous Batwa population after a free LLIN distribution. Two LLINs were given free of charge to each Batwa household in Kanungu District, Uganda in November 2012. Surveyors collected data on LLIN ownership and use through six cross-sectional surveys pre- and post-distribution. Household retention, within household access, and individual use of LLINs were assessed over an 18-month period. Socioeconomic determinants of household retention of LLINs post-distribution were modelled longitudinally using logistic regression with random effects. Direct house-to-house distribution of free LLINs did not result in sustainable increases in the ownership and use of LLINs. Three months post-distribution, only 73% of households owned at least one LLIN and this period also saw the greatest reduction in ownership compared to other study periods. Eighteen-months post distribution, only a third of households still owned a LLIN. Self-reported age-specific use of LLINs was generally higher for children under five, declined for children aged 6-12, and was highest for older adults aged over 35. In the model, household wealth was a significant predictor of LLIN retention, controlling for time and other variables. This research highlights on-going socioeconomic inequities in access to malaria prevention measures among the Batwa in southwestern Uganda, even after free distribution of LLINs, and provides critical information to inform local malaria programs on possible intervention entry-points to increase access and use among this marginalized population.
Indiva: a middleware for managing distributed media environment
NASA Astrophysics Data System (ADS)
Ooi, Wei-Tsang; Pletcher, Peter; Rowe, Lawrence A.
2003-12-01
This paper presents a unified set of abstractions and operations for hardware devices, software processes, and media data in a distributed audio and video environment. These abstractions, which are provided through a middleware layer called Indiva, use a file system metaphor to access resources and high-level commands to simplify the development of Internet webcast and distributed collaboration control applications. The design and implementation of Indiva are described and examples are presented to illustrate the usefulness of the abstractions.
A simple, effective media access protocol system for integrated, high data rate networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.
1992-01-01
The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).
Cardea: Providing Support for Dynamic Resource Access in a Distributed Computing Environment
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2003-01-01
The environment framing the modem authorization process span domains of administration, relies on many different authentication sources, and manages complex attributes as part of the authorization process. Cardea facilitates dynamic access control within this environment as a central function of an inter-operable authorization framework. The system departs from the traditional authorization model by separating the authentication and authorization processes, distributing the responsibility for authorization data and allowing collaborating domains to retain control over their implementation mechanisms. Critical features of the system architecture and its handling of the authorization process differentiate the system from existing authorization components by addressing common needs not adequately addressed by existing systems. Continuing system research seeks to enhance the implementation of the current authorization model employed in Cardea, increase the robustness of current features, further the framework for establishing trust and promote interoperability with existing security mechanisms.
Hu, Peter F; Xiao, Yan; Ho, Danny; Mackenzie, Colin F; Hu, Hao; Voigt, Roger; Martz, Douglas
2006-06-01
One of the major challenges for day-of-surgery operating room coordination is accurate and timely situation awareness. Distributed and secure real-time status information is key to addressing these challenges. This article reports on the design and implementation of a passive status monitoring system in a 19-room surgical suite of a major academic medical center. Key design requirements considered included integrated real-time operating room status display, access control, security, and network impact. The system used live operating room video images and patient vital signs obtained through monitors to automatically update events and operating room status. Images were presented on a "need-to-know" basis, and access was controlled by identification badge authorization. The system delivered reliable real-time operating room images and status with acceptable network impact. Operating room status was visualized at 4 separate locations and was used continuously by clinicians and operating room service providers to coordinate operating room activities.
Phase control in coherent population distribution in molecules
NASA Astrophysics Data System (ADS)
Datta, Avijit
2018-06-01
A chirped laser pulse transfers population from one level to another level accessible by one photon dipole transition. We have used a pair of phase-locked chirped pulses of same frequency instead of a single chirped pulse to achieve phase control over the population transfer and thus creating coherent population distribution in hydrogen molecule. Simultaneous actions of the phase controlled interference and rapid adiabatic passages due to chirped pulses lead to the control in population transfer from the ground X(v = 0, j = 0) level to the C(v = 2, j = 1) level. We have extended this two-level system to a three-level 1 + 1 ladder system for population transfer from the X level to the J(v = 2, j = 2) level via the C intermediate level using two pairs of phase-locked laser chirped pulses and have achieved laudable control over the coherent population distribution.
Integrating security in a group oriented distributed system
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth; Gong, LI
1992-01-01
A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.
RBAC Driven Least Privilege Architecture For Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hull, Julie; Markham, Mark
The concept of role based access control (RBAC) within the IT environment has been studied by researchers and was supported by NIST (circa 1992). This earlier work highlighted the benefits of RBAC which include reduced administrative workload and policies which are easier to analyze and apply. The goals of this research were to expand the application of RBAC in the following ways. Apply RBAC to the control systems environment: The typical RBAC model within the IT environment is used to control a user’s access to files. Within the control system environment files are replaced with measurement (e.g., temperature) and controlmore » (e.g. valve) points organized as a hierarchy of control assets (e.g. a boiler, compressor, refinery unit). Control points have parameters (e.g., high alarm limit, set point, etc.) associated with them. The RBAC model is extended to support access to points and their parameters based upon roles while at the same time allowing permissions for the points to be defined at the asset level or point level directly. In addition, centralized policy administration with distributed access enforcement mechanisms was developed to support the distributed architecture of distributed control systems and SCADA; Extend the RBAC model to include access control for software and devices: The established RBAC approach is to assign users to roles. This work extends that notion by first breaking the control system down into three layers 1) users, 2) software and 3) devices. An RBAC model is then created for each of these three layers. The result is that RBAC can be used to define machine-to-machine policy enforced via the IP security (IPsec) protocol. This highlights the potential to use RBAC for machine-to-machine connectivity within the internet of things; and Enable dynamic policy based upon the operating mode of the system: The IT environment is generally static with respect to policy. However, large cyber physical systems such as industrial controls have various operating modes (start-up, normal operation, emergency, shut-down and maintenance are typical). The policy enforcement architecture must be able to support changes in access permissions as the mode of the control system changes. For example an operator’s role may not allow the operator to shut down a pump during “normal operation” but that same operator role may be given permission to shut down the pump if the refinery transitions to “emergency” mode. The effectiveness of the approach was validated by applying it to the Experion Process Knowledge System. This is a large commercial industrial control system often used to control oil refineries and other assets within the oil and gas sector. As a by-product, other industries using Experion (Pharmaceuticals, Specialty Chemicals, etc.) also benefit from increased security. Policies representative of those that would be used within an oil refinery were created and validated against the RBAC model as implemented in the underlying SQL database. The administration of policy is simplified which in turn makes it practical for security administrators to specify policies which enforce least privilege. The result is a qualitative reduction in risk. The benefits of the enhanced RBAC model are clear and as a result. Honeywell is incorporating portions of the RBAC research into the 2014 release of Experion.« less
Scalable Trust of Next-Generation Management (STRONGMAN)
2004-10-01
remote logins might be policy controlled to allow only strongly encrypted IPSec tunnels to log in remotely, to access selected files, etc. The...and Angelos D. Keromytis. Drop-in Security for Distributed and Portable Computing Elements. Emerald Journal of Internet Research. Electronic...Security and Privacy, pp. 17-31, May 1999. [2] S. M. Bellovin. Distributed Firewalls. ; login : magazine, special issue on security, November 1999. [3] M
Distributed observing facility for remote access to multiple telescopes
NASA Astrophysics Data System (ADS)
Callegari, Massimo; Panciatici, Antonio; Pasian, Fabio; Pucillo, Mauro; Santin, Paolo; Aro, Simo; Linde, Peter; Duran, Maria A.; Rodriguez, Jose A.; Genova, Francoise; Ochsenbein, Francois; Ponz, J. D.; Talavera, Antonio
2000-06-01
The REMOT (Remote Experiment Monitoring and conTrol) project was financed by 1996 by the European Community in order to investigate the possibility of generalizing the remote access to scientific instruments. After the feasibility of this idea was demonstrated, the DYNACORE (DYNAmically, COnfigurable Remote Experiment monitoring and control) project was initiated as a REMOT follow-up. Its purpose is to develop software technology to support scientists in two different domains, astronomy and plasma physics. The resulting system allows (1) simultaneous multiple user access to different experimental facilities, (2) dynamic adaptability to different kinds of real instruments, (3) exploitation of the communication infrastructures features, (4) ease of use through intuitive graphical interfaces, and (5) additional inter-user communication using off-the-shelf projects such as video-conference tools, chat programs and shared blackboards.
Impacts on the Voltage Profile of DC Distribution Network with DG Access
NASA Astrophysics Data System (ADS)
Tu, J. J.; Yin, Z. D.
2017-07-01
With the development of electronic, more and more distributed generations (DGs) access into grid and cause the research fever of direct current (DC) distribution network. Considering distributed generation (DG) location and capacity have great impacts on voltage profile, so use IEEE9 and IEEE33 typical circuit as examples, with DGs access in centralized and decentralized mode, to compare voltage profile in alternating and direct current (AC/DC) distribution network. Introducing the voltage change ratio as an evaluation index, so gets the general results on voltage profile of DC distributed network with DG access. Simulation shows that, in the premise of reasonable location and capacity, DC distribution network is more suitable for DG access.
Vaccine production, distribution, access and uptake
Smith, Jon; Lipsitch, Marc; Almond, Jeffrey W.
2011-01-01
Making human vaccines available on a global scale requires the use of complex production methods, meticulous quality control and reliable distribution channels that ensure the products are potent and effective at their point of use. The technologies involved in manufacturing different types of vaccines may strongly influence vaccine cost, ease of industrial scale-up, stability and ultimately world-wide availability. Manufacturing complexity is compounded by the need for different formulations for different countries and age groups. Reliable vaccine production in appropriate quantities and at affordable prices is the cornerstone of developing global vaccination policies. However, ensuring optimal access and uptake also requires strong partnerships between private manufacturers, regulatory authorities and national and international public health services. For vaccines whose supplies are limited, either due to rapidly emerging diseases or longer-term mismatch of supply and demand, prioritizing target groups can increase vaccine impact. Focusing on influenza vaccines as an example that well illustrates many of the relevant points, this article considers current production, distribution, access and other factors that ultimately impact on vaccine uptake and population-level effectiveness. PMID:21664680
Vaccine production, distribution, access, and uptake.
Smith, Jon; Lipsitch, Marc; Almond, Jeffrey W
2011-07-30
For human vaccines to be available on a global scale, complex production methods, meticulous quality control, and reliable distribution channels are needed to ensure that the products are potent and effective at the point of use. The technologies used to manufacture different types of vaccines can strongly affect vaccine cost, ease of industrial scale-up, stability, and, ultimately, worldwide availability. The complexity of manufacturing is compounded by the need for different formulations in different countries and age-groups. Reliable vaccine production in appropriate quantities and at affordable prices is the cornerstone of developing global vaccination policies. However, to ensure optimum access and uptake, strong partnerships are needed between private manufacturers, regulatory authorities, and national and international public health services. For vaccines whose supply is insufficient to meet demand, prioritisation of target groups can increase the effect of these vaccines. In this report, we draw from our experience of vaccine development and focus on influenza vaccines as an example to consider production, distribution, access, and other factors that affect vaccine uptake and population-level effectiveness. Copyright © 2011 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Nativi, S.; Santoro, M.
2009-12-01
Currently, one of the major challenges for scientific community is the study of climate change effects on life on Earth. To achieve this, it is crucial to understand how climate change will impact on biodiversity and, in this context, several application scenarios require modeling the impact of climate change on distribution of individual species. In the context of GEOSS AIP-2 (Global Earth Observation System of Systems, Architecture Implementation Pilot- Phase 2), the Climate Change & Biodiversity thematic Working Group developed three significant user scenarios. A couple of them make use of a GEOSS-based framework to study the impact of climate change factors on regional species distribution. The presentation introduces and discusses this framework which provides an interoperability infrastructures to loosely couple standard services and components to discover and access climate and biodiversity data, and run forecast and processing models. The framework is comprised of the following main components and services: a)GEO Portal: through this component end user is able to search, find and access the needed services for the scenario execution; b)Graphical User Interface (GUI): this component provides user interaction functionalities. It controls the workflow manager to perform the required operations for the scenario implementation; c)Use Scenario controller: this component acts as a workflow controller implementing the scenario business process -i.e. a typical climate change & biodiversity projection scenario; d)Service Broker implementing Mediation Services: this component realizes a distributed catalogue which federates several discovery and access components (exposing them through a unique CSW standard interface). Federated components publish climate, environmental and biodiversity datasets; e)Ecological Niche Model Server: this component is able to run one or more Ecological Niche Models (ENM) on selected biodiversity and climate datasets; f)Data Access Transaction server: this component publishes the model outputs. The framework was successfully tested in two use scenarios of the GEOSS AIP-2 Climate Change and Biodiversity WG aiming to predict species distribution changes due to Climate Change factors, with the scientific patronage of the University of Colorado and the University of Alaska. The first scenario dealt with the Pikas specie regional distribution in the Great Basin area (North America). While, the second one concerned the modeling of the Arctic Food Chain species in the North Pole area -the relationships between different environmental parameters and Polar Bears distribution was analyzed. Results are published in the GEOSS AIP-2 web site: http://www.ogcnetwork.net/AIP2develop .
Comprehensive security framework for the communication and storage of medical images
NASA Astrophysics Data System (ADS)
Slik, David; Montour, Mike; Altman, Tym
2003-05-01
Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.
Emergency access to protected health records.
Künzi, Julien; Koster, Paul; Petković, Milan
2009-01-01
Digital Rights Management (DRM) schemes are receiving increased attention in the healthcare domain for the protection of sensitive health records as they offer security against insider attacks and advance protection features such as usage control. However, to be accepted by health care providers, a DRM solution has to fulfill specific healthcare requirements including emergency access. In this paper, we propose such DRM solution that can be deployed in highly distributed environments of electronic or personal health record infrastructures.
Parallel Systems Laboratory: Access, Allocation, and Control
1992-06-30
boog Eae...4d READ ISTRUCTIONSREPORT DOCUMENTATIO PAGE BEFOR COMPLETNG FORM I. REPORT NUMNER 2. GOVT ACCESSION NO 3- RECIPINT’S CATALOG NUMR9 . TITLE (an...a summary of the salient results of this research in capsule form which is followed by an extensive list of publications, dissertations and theses...because it provides the asymptotic use of currently wasted cycles. To do so, we examine a distribution of w(u It) in a very simple form and for
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
NASA Astrophysics Data System (ADS)
Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.
Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.
An Artificial Neural Network Control System for Spacecraft Attitude Stabilization
1990-06-01
NAVAL POSTGRADUATE SCHOOL Monterey, California ’-DTIC 0 ELECT f NMARO 5 191 N S, U, THESIS B . AN ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR...NO. NO. NO ACCESSION NO 11. TITLE (Include Security Classification) AN ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR SPACECRAFT ATTITUDE STABILIZATION...obsolete a U.S. G v pi.. iim n P.. oiice! toog-eo.5s43 i Approved for public release; distribution is unlimited. AN ARTIFICIAL NEURAL NETWORK CONTROL
Dedeurwaerdere, Tom
2010-01-01
Exchanges of microorganisms between culture collections, laboratories and researchers worldwide have historically occurred in an informal way. These informal exchanges have facilitated research activities, and, as a consequence, our knowledge and exploitation of microbial resources have advanced rapidly. During the last decades of the twentieth century, the increasing economic importance of biotechnology and the introduction of new legislation concerning the use of and access to biological resources has subjected exchanges of genetic resources to greater controls. Their access and distribution are more strictly regulated and, therefore, exchanges are becoming more and more formalized. This paper analyzes one of the main drivers of the movement toward more formal worldwide exchange regimes, which is increasing global interdependency of access to genetic resources. Its main finding is that formalization of exchange practices as such is not necessarily leading to more restrictive licensing conditions. The goal of further formalization and harmonization of institutional frameworks should therefore be to provide the broadest possible access to essential research materials (within the constraints set by biosecurity and quality management requirements), while maximizing the reciprocity benefits of access and exchange (which motivate the exchange practices to start with). (c) 2010 Elsevier Masson SAS. All rights reserved.
Virtual memory support for distributed computing environments using a shared data object model
NASA Astrophysics Data System (ADS)
Huang, F.; Bacon, J.; Mapp, G.
1995-12-01
Conventional storage management systems provide one interface for accessing memory segments and another for accessing secondary storage objects. This hinders application programming and affects overall system performance due to mandatory data copying and user/kernel boundary crossings, which in the microkernel case may involve context switches. Memory-mapping techniques may be used to provide programmers with a unified view of the storage system. This paper extends such techniques to support a shared data object model for distributed computing environments in which good support for coherence and synchronization is essential. The approach is based on a microkernel, typed memory objects, and integrated coherence control. A microkernel architecture is used to support multiple coherence protocols and the addition of new protocols. Memory objects are typed and applications can choose the most suitable protocols for different types of object to avoid protocol mismatch. Low-level coherence control is integrated with high-level concurrency control so that the number of messages required to maintain memory coherence is reduced and system-wide synchronization is realized without severely impacting the system performance. These features together contribute a novel approach to the support for flexible coherence under application control.
Milt, Austin W; Diebel, Matthew W; Doran, Patrick J; Ferris, Michael C; Herbert, Matthew; Khoury, Mary L; Moody, Allison T; Neeson, Thomas M; Ross, Jared; Treska, Ted; O'Hanley, Jesse R; Walter, Lisa; Wangen, Steven R; Yacobson, Eugene; McIntyre, Peter B
2018-03-08
Controlling invasive species is critical for conservation but can have unintended consequences for native species and divert resources away from other efforts. This dilemma occurs on a grand scale in the North American Great Lakes, where dams and culverts block tributary access to habitat of desirable fish species and are a lynchpin of long-standing efforts to limit ecological damage inflicted by the invasive, parasitic sea lamprey (Petromyzon marinus). Habitat restoration and sea-lamprey control create conflicting goals for managing aging infrastructure. We used optimization to minimize opportunity costs of habitat gains for 37 desirable migratory fishes that arose from restricting sea lamprey access (0-25% increase) when selecting barriers for removal under a limited budget (US$1-105 million). Imposing limits on sea lamprey habitat reduced gains in tributary access for desirable species by 15-50% relative to an unconstrained scenario. Additional investment to offset the effect of limiting sea-lamprey access resulted in high opportunity costs for 30 of 37 species (e.g., an additional US$20-80 million for lake sturgeon [Acipenser fulvescens]) and often required ≥5% increase in sea-lamprey access to identify barrier-removal solutions adhering to the budget and limiting access. Narrowly distributed species exhibited the highest opportunity costs but benefited more at less cost when small increases in sea-lamprey access were allowed. Our results illustrate the value of optimization in limiting opportunity costs when balancing invasion control against restoration benefits for diverse desirable species. Such trade-off analyses are essential to the restoration of connectivity within fragmented rivers without unleashing invaders. © 2018 Society for Conservation Biology.
Crino, O L; Buchanan, Katherine L; Trompf, Larissa; Mainwaring, Mark C; Griffith, Simon C
2017-04-01
The arid and semi-arid zones of Australia are characterized by highly variable and unpredictable environmental conditions which affect resources for flora and fauna. Environments which are highly unpredictable in terms of both resource access and distribution are likely to select for a variety of adaptive behavioral strategies, intrinsically linked to the physiological control of behavior. How unpredictable resource distribution has affected the coevolution of behavioral strategies and physiology has rarely been quantified, particularly not in Australian birds. We used a captive population of wild-derived zebra finches to test the relationships between behavioral strategies relating to food access and physiological responses to stress and body condition. We found that individuals that were in poorer body condition and had higher peak corticosterone levels entered baited feeders earlier in the trapping sequence of birds within the colony. We also found that individuals in poorer body condition fed in smaller social groups. Our data show that the foraging decisions which individuals make represent not only a trade-off between food access and risk of exposure, but their underlying physiological response to stress. Our data also suggest fundamental links between social networks and physiological parameters, which largely remain untested. These data demonstrate the fundamental importance of physiological mechanisms in controlling adaptive behavioral strategies and the dynamic interplay between physiological control of behavior and life-history evolution. Copyright © 2016 Elsevier Inc. All rights reserved.
Upconversion-based receivers for quantum hacking-resistant quantum key distribution
NASA Astrophysics Data System (ADS)
Jain, Nitin; Kanter, Gregory S.
2016-07-01
We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.
Clark, Sierra; Berrang-Ford, Lea; Lwasa, Shuaib; Namanya, Didacus; Twesigomwe, Sabastian; Kulkarni, Manisha
2016-01-01
Major efforts for malaria prevention programs have gone into scaling up ownership and use of insecticidal mosquito nets, particularly in sub-Saharan Africa where the malaria burden is high. Socioeconomic inequities in access to long lasting insecticidal nets (LLINs) are reduced with free distributions of nets. However, the relationship between social factors and retention of nets after a free distribution has been less studied, particularly using a longitudinal approach. Our research aimed to estimate the ownership and use of LLINs, and examine the determinants of LLIN retention, within an Indigenous Batwa population after a free LLIN distribution. Two LLINs were given free of charge to each Batwa household in Kanungu District, Uganda in November 2012. Surveyors collected data on LLIN ownership and use through six cross-sectional surveys pre- and post-distribution. Household retention, within household access, and individual use of LLINs were assessed over an 18-month period. Socioeconomic determinants of household retention of LLINs post-distribution were modelled longitudinally using logistic regression with random effects. Direct house-to-house distribution of free LLINs did not result in sustainable increases in the ownership and use of LLINs. Three months post-distribution, only 73% of households owned at least one LLIN and this period also saw the greatest reduction in ownership compared to other study periods. Eighteen-months post distribution, only a third of households still owned a LLIN. Self-reported age-specific use of LLINs was generally higher for children under five, declined for children aged 6–12, and was highest for older adults aged over 35. In the model, household wealth was a significant predictor of LLIN retention, controlling for time and other variables. This research highlights on-going socioeconomic inequities in access to malaria prevention measures among the Batwa in southwestern Uganda, even after free distribution of LLINs, and provides critical information to inform local malaria programs on possible intervention entry-points to increase access and use among this marginalized population. PMID:27145034
Ethernet access network based on free-space optic deployment technology
NASA Astrophysics Data System (ADS)
Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter
2004-06-01
The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.
A development framework for distributed artificial intelligence
NASA Technical Reports Server (NTRS)
Adler, Richard M.; Cottman, Bruce H.
1989-01-01
The authors describe distributed artificial intelligence (DAI) applications in which multiple organizations of agents solve multiple domain problems. They then describe work in progress on a DAI system development environment, called SOCIAL, which consists of three primary language-based components. The Knowledge Object Language defines models of knowledge representation and reasoning. The metaCourier language supplies the underlying functionality for interprocess communication and control access across heterogeneous computing environments. The metaAgents language defines models for agent organization coordination, control, and resource management. Application agents and agent organizations will be constructed by combining metaAgents and metaCourier building blocks with task-specific functionality such as diagnostic or planning reasoning. This architecture hides implementation details of communications, control, and integration in distributed processing environments, enabling application developers to concentrate on the design and functionality of the intelligent agents and agent networks themselves.
OCEAN-PC and a distributed network for ocean data
NASA Technical Reports Server (NTRS)
Mclain, Douglas R.
1992-01-01
The Intergovernmental Oceanographic Commission (IOC) wishes to develop an integrated software package for oceanographic data entry and access in developing countries. The software, called 'OCEAN-PC', would run on low cost PC microcomputers and would encourage and standardize: (1) entry of local ocean observations; (2) quality control of the local data; (3) merging local data with historical data; (4) improved display and analysis of the merged data; and (5) international data exchange. OCEAN-PC will link existing MS-DOS oceanographic programs and data sets with table-driven format conversions. Since many ocean data sets are now being distributed on optical discs (Compact Discs - Read Only Memory, CD-ROM, Mass et al. 1987), OCEAN-PC will emphasize access to CD-ROMs.
GEOSS AIP-2 Climate Change and Biodiversity Use Scenarios: Interoperability Infrastructures
NASA Astrophysics Data System (ADS)
Nativi, Stefano; Santoro, Mattia
2010-05-01
In the last years, scientific community is producing great efforts in order to study the effects of climate change on life on Earth. In this general framework, a key role is played by the impact of climate change on biodiversity. To assess this, several use scenarios require the modeling of climatological change impact on the regional distribution of biodiversity species. Designing and developing interoperability infrastructures which enable scientists to search, discover, access and use multi-disciplinary resources (i.e. datasets, services, models, etc.) is currently one of the main research fields for the Earth and Space Science Informatics. This presentation introduces and discusses an interoperability infrastructure which implements the discovery, access, and chaining of loosely-coupled resources in the climatology and biodiversity domains. This allows to set up and run forecast and processing models. The presented framework was successfully developed and experimented in the context of GEOSS AIP-2 (Global Earth Observation System of Systems, Architecture Implementation Pilot- Phase 2) Climate Change & Biodiversity thematic Working Group. This interoperability infrastructure is comprised of the following main components and services: a)GEO Portal: through this component end user is able to search, find and access the needed services for the scenario execution; b)Graphical User Interface (GUI): this component provides user interaction functionalities. It controls the workflow manager to perform the required operations for the scenario implementation; c)Use Scenario controller: this component acts as a workflow controller implementing the scenario business process -i.e. a typical climate change & biodiversity projection scenario; d)Service Broker implementing Mediation Services: this component realizes a distributed catalogue which federates several discovery and access components (exposing them through a unique CSW standard interface). Federated components publish climate, environmental and biodiversity datasets; e)Ecological Niche Model Server: this component is able to run one or more Ecological Niche Models (ENM) on selected biodiversity and climate datasets; f)Data Access Transaction server: this component publishes the model outputs. This framework was assessed in two use scenarios of GEOSS AIP-2 Climate Change and Biodiversity WG. Both scenarios concern the prediction of species distributions driven by climatological change forecasts. The first scenario dealt with the Pikas specie regional distribution in the Great Basin area (North America). While, the second one concerned the modeling of the Arctic Food Chain species in the North Pole area -the relationships between different environmental parameters and Polar Bears distribution was analyzed. The scientific patronage was provided by the University of Colorado and the University of Alaska, respectively. Results are published in the GEOSS AIP-2 web site: http://www.ogcnetwork.net/AIP2develop.
Liberal Learning and Management: A Mutually Beneficial Relationship.
ERIC Educational Resources Information Center
Butler, David W.
1986-01-01
Management, which generates wealth, determines the distribution of wealth, and helps control the direction and accessibility of careers in most developed countries, is a subject worthy of the humanities, and deserves to be pursued more aggressively as a point of contact among disciplines. (MSE)
The Challenge of Access: Using Road Construction as a Tool in Counterinsurgency
2011-06-10
northward, as shown in figure 9. Built by the United States in the 1950s, the dam and its downstream channels provide water for irrigation across the...12. DISTRIBUTION / AVAILABILITY STATEMENT Approved for Public Release; Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This...consolidated Russian control. It also brought Russia closer to an overriding strategic objective, the procurement of a warm water port from which to project
Simplified Key Management for Digital Access Control of Information Objects
2016-07-02
0001, Task BC-5-2283, “Architecture, Design of Services for Air Force Wide Distributed Systems,” for USAF HQ USAF SAF/CIO A6. The views, opinions...Challenges for Cloud Computing,” Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering and Computer Science 2011...P. Konieczny USAF HQ USAF SAF/CIO A6 11. SPONSOR’S / MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public
Quality Control Review of the Defense Logistics Agency Audit Organization
2014-12-19
Management Information Distribution and Access System ( MIDAS ). The auditors used data generated from MIDAS to analyze property receipt transaction...However, because there was no evaluation of the effectiveness of controls over MIDAS , the auditors may not have assessed audit risk adequately...Operations in Afghanistan, auditors used property receipt transaction data that were generated from MIDAS to determine whether the audited entity had
NASA Astrophysics Data System (ADS)
Chao, I.-Fen; Zhang, Tsung-Min
2015-06-01
Long-reach passive optical networks (LR-PONs) have been considered to be promising solutions for future access networks. In this paper, we propose a distributed medium access control (MAC) scheme over an advantageous LR-PON network architecture that reroutes the control information from and back to all ONUs through an (N + 1) × (N + 1) star coupler (SC) deployed near the ONUs, thereby overwhelming the extremely long propagation delay problem in LR-PONs. In the network, the control slot is designed to contain all bandwidth requirements of all ONUs and is in-band time-division-multiplexed with a number of data slots within a cycle. In the proposed MAC scheme, a novel profit-weight-based dynamic bandwidth allocation (P-DBA) scheme is presented. The algorithm is designed to efficiently and fairly distribute the amount of excess bandwidth based on a profit value derived from the excess bandwidth usage of each ONU, which resolves the problems of previously reported DBA schemes that are either unfair or inefficient. The simulation results show that the proposed decentralized algorithms exhibit a nearly three-order-of-magnitude improvement in delay performance compared to the centralized algorithms over LR-PONs. Moreover, the newly proposed P-DBA scheme guarantees low delay performance and fairness even when under attack by the malevolent ONU irrespective of traffic loads and burstiness.
Distributed Multiple Access Control for the Wireless Mesh Personal Area Networks
NASA Astrophysics Data System (ADS)
Park, Moo Sung; Lee, Byungjoo; Rhee, Seung Hyong
Mesh networking technologies for both high-rate and low-rate wireless personal area networks (WPANs) are under development by several standardization bodies. They are considering to adopt distributed TDMA MAC protocols to provide seamless user mobility as well as a good peer-to-peer QoS in WPAN mesh. It has been, however, pointed out that the absence of a central controller in the wireless TDMA MAC may cause a severe performance degradation: e. g., fair allocation, service differentiation, and admission control may be hard to achieve or can not be provided. In this paper, we suggest a new framework of resource allocation for the distributed MAC protocols in WPANs. Simulation results show that our algorithm achieves both a fair resource allocation and flexible service differentiations in a fully distributed way for mesh WPANs where the devices have high mobility and various requirements. We also provide an analytical modeling to discuss about its unique equilibrium and to compute the lengths of reserved time slots at the stable point.
76 FR 74753 - Authority To Manufacture and Distribute Postage Evidencing Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-01
... revision of the rules governing the inventory control processes of Postage Evidencing Systems (PES... destruction or disposal of all Postage Evidencing Systems and their components to enable accurate accounting...) Postage Evidencing System repair process--any physical or electronic access to the internal components of...
The use of twin-screen-based WIMPS in spacecraft control
NASA Astrophysics Data System (ADS)
Klim, R. D.
1990-10-01
The ergonomic problems of designing a sophisticated Windows Icons Mouse Pop-up (WIMP) based twin screen workstation are outlined. These same problems will be encountered by future spacecraft controllers. The design of a modern, advanced workstation for use on a distributed multicontrol center in a multisatellite control system is outlined. The system uses access control mechanisms to ensure that only authorized personnel can undertake certain operations on the workstation. Rules governing the use of windowing features, screen attributes, icons, keyboard and mouse in spacecraft control are discussed.
Heng, Somony; Durnez, Lies; Gryseels, Charlotte; Van Roey, Karel; Mean, Vanna; Uk, Sambunny; Siv, Sovannaroth; Grietens, Koen Peeters; Sochantha, Tho; Coosemans, Marc; Sluydts, Vincent
2015-11-24
The public health value of a vector control tool depends on its epidemiological efficacy, but also on its ease of implementation. This study describes an intensive distribution scheme of a topical repellent implemented in 2012 and 2013 for the purpose of a cluster-randomized trial using the existing public health system. The trial aimed to assess the effectiveness of repellents in addition to long-lasting insecticidal nets (LLIN) and occurred in a province of Cambodia. Determinants for accessibility and consumption of this tool were explored. 135 individuals were appointed to be repellent distributors in 57 villages. A 2-weekly bottle exchange programme was organized. Distributors recorded information regarding the amount of bottles exchanged, repellent leftover, and reasons for not complying in household data sheets. Distributor-household contact rates and average 2-weekly consumption of repellent were calculated. Household and distributors characteristics were obtained using questionnaires, surveying 50 households per cluster and all distributors. Regression models were used to explore associations between contact and consumption rates and determinants such as socio-economic status. Operational costs for repellent and net distribution were obtained from the MalaResT project and the provincial health department. A fourfold increase in distributor-household contact rates was observed in 2013 compared to 2012 (median2012 = 20 %, median2013 = 88.9 %). Consumption rate tripled over the 2-year study period (median2012 = 20 %, median2013 = 57.89 %). Contact rates were found to associate with district, commune and knowing the distributor, while consumption was associated with district and household head occupation. The annual operational cost per capita for repellent distribution was 31 times more expensive than LLIN distribution (USD 4.33 versus USD 0.14). After the existing public health system was reinforced with programmatic and logistic support, an intense 2-weekly distribution scheme of a vector control tool over a 2-year period was operated successfully in the field. Lack of associations with socio-economic status suggested that the free distribution strategy resulted in equitable access to repellents. The operational costs for the repellent distribution and exchange programme were much higher than LLIN distribution. Such effort could only be justified in the context of malaria elimination where these interventions are expected to be limited in time.
NASA Astrophysics Data System (ADS)
Chen, Ruey-Shun; Tsai, Yung-Shun; Tu, Arthur
In this study we propose a manufacturing control framework based on radio-frequency identification (RFID) technology and a distributed information system to construct a mass-customization production process in a loosely coupled shop-floor control environment. On the basis of this framework, we developed RFID middleware and an integrated information system for tracking and controlling the manufacturing process flow. A bicycle manufacturer was used to demonstrate the prototype system. The findings of this study were that the proposed framework can improve the visibility and traceability of the manufacturing process as well as enhance process quality control and real-time production pedigree access. Using this framework, an enterprise can easily integrate an RFID-based system into its manufacturing environment to facilitate mass customization and a just-in-time production model.
Serial Interface through Stream Protocol on EPICS Platform for Distributed Control and Monitoring
NASA Astrophysics Data System (ADS)
Das Gupta, Arnab; Srivastava, Amit K.; Sunil, S.; Khan, Ziauddin
2017-04-01
Remote operation of any equipment or device is implemented in distributed systems in order to control and proper monitoring of process values. For such remote operations, Experimental Physics and Industrial Control System (EPICS) is used as one of the important software tool for control and monitoring of a wide range of scientific parameters. A hardware interface is developed for implementation of EPICS software so that different equipment such as data converters, power supplies, pump controllers etc. could be remotely operated through stream protocol. EPICS base was setup on windows as well as Linux operating system for control and monitoring while EPICS modules such as asyn and stream device were used to interface the equipment with standard RS-232/RS-485 protocol. Stream Device protocol communicates with the serial line with an interface to asyn drivers. Graphical user interface and alarm handling were implemented with Motif Editor and Display Manager (MEDM) and Alarm Handler (ALH) command line channel access utility tools. This paper will describe the developed application which was tested with different equipment and devices serially interfaced to the PCs on a distributed network.
A High-Availability, Distributed Hardware Control System Using Java
NASA Technical Reports Server (NTRS)
Niessner, Albert F.
2011-01-01
Two independent coronagraph experiments that require 24/7 availability with different optical layouts and different motion control requirements are commanded and controlled with the same Java software system executing on many geographically scattered computer systems interconnected via TCP/IP. High availability of a distributed system requires that the computers have a robust communication messaging system making the mix of TCP/IP (a robust transport), and XML (a robust message) a natural choice. XML also adds the configuration flexibility. Java then adds object-oriented paradigms, exception handling, heavily tested libraries, and many third party tools for implementation robustness. The result is a software system that provides users 24/7 access to two diverse experiments with XML files defining the differences
Approximate Synchrony: An Abstraction for Distributed Almost Synchronous Systems
2015-05-29
finding bugs. Verification of the TSCH Protocol. Time Synchronized Channel Hopping (TSCH) is a Medium Access Control scheme that enables low power...allotted by the schedule and remain in sleep mode otherwise. In the ab- sence of precise time-synchronization, the time-slots across nodes would not be
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miranda, A.L.
1990-11-01
The market survey covers the water and wastewater pollution control systems market in the Philippines. The analysis contains statistical and narrative information on projected market demand, end-users; receptivity of Philippine consumers to U.S. products; the competitive situation, and market access (tariffs, non-tariff barriers, standards, taxes, distribution channels). It also contains key contact information.
Digitally Controlled ’Programmable’ Active Filters.
1985-12-01
Advisor: Sherif Michael Approved for public release; distribution is unlimited. U - ~ .%~ ~ % %’.4 ~ -. 4-. " %’ -. .4. z. . 4, ,4°*-4° -o - ’ SECURITY ...CLASSIFICATION O THI PAGE ff ,’- -""" REPORT DOCUMENTATION PAGE Ia REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a SECURITY CLASSIFICATION...ELEMENT NO. NO NO. ACCESSION NO. S 11 TITLE (Include Security ClassWfication) , DIGITALLY CONTROLLED "PROGRAMMABLE" ACTIVE FILTERS 1 PERSONAL AUTHOR
Essential Medicines: An Indian Perspective
Maiti, Rituparna; Bhatia, Vikas; Padhy, Biswa Mohan; Hota, Debasish
2015-01-01
The concept of defining essential medicines and establishing a list of them was aimed to improve the availability of affordable medicines for the world's poor. Access to essential medicines is a major determinant of health outcomes. Several countries have made substantial progress towards increasing access to essential medicines, but access to essential medicines in developing countries like India is not adequate. In this review we have tried to present the Indian scenario in respect to availability and accessibility of essential medicines over last one decade. To enhance the credibility of Indian healthcare system, procurement and delivery systems of essential medicines have to be strengthened through government commitment, careful selection, adequate public sector financing, efficient distribution systems, control on taxes and duties, and inculcating a culture of rational use of medicines in current and future prescribers. PMID:26435594
An object-based storage model for distributed remote sensing images
NASA Astrophysics Data System (ADS)
Yu, Zhanwu; Li, Zhongmin; Zheng, Sheng
2006-10-01
It is very difficult to design an integrated storage solution for distributed remote sensing images to offer high performance network storage services and secure data sharing across platforms using current network storage models such as direct attached storage, network attached storage and storage area network. Object-based storage, as new generation network storage technology emerged recently, separates the data path, the control path and the management path, which solves the bottleneck problem of metadata existed in traditional storage models, and has the characteristics of parallel data access, data sharing across platforms, intelligence of storage devices and security of data access. We use the object-based storage in the storage management of remote sensing images to construct an object-based storage model for distributed remote sensing images. In the storage model, remote sensing images are organized as remote sensing objects stored in the object-based storage devices. According to the storage model, we present the architecture of a distributed remote sensing images application system based on object-based storage, and give some test results about the write performance comparison of traditional network storage model and object-based storage model.
Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2007-01-01
This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.
NASA Astrophysics Data System (ADS)
Zaharov, A. A.; Nissenbaum, O. V.; Ponomaryov, K. Y.; Nesgovorov, E. S.
2018-01-01
In this paper we study application of Internet of Thing concept and devices to secure automated process control systems. We review different approaches in IoT (Internet of Things) architecture and design and propose them for several applications in security of automated process control systems. We consider an Attribute-based encryption in context of access control mechanism implementation and promote a secret key distribution scheme between attribute authorities and end devices.
PAD-MAC: Primary User Activity-Aware Distributed MAC for Multi-Channel Cognitive Radio Networks
Ali, Amjad; Piran, Md. Jalil; Kim, Hansoo; Yun, Jihyeok; Suh, Doug Young
2015-01-01
Cognitive radio (CR) has emerged as a promising technology to solve problems related to spectrum scarcity and provides a ubiquitous wireless access environment. CR-enabled secondary users (SUs) exploit spectrum white spaces opportunistically and immediately vacate the acquired licensed channels as primary users (PUs) arrive. Accessing the licensed channels without the prior knowledge of PU traffic patterns causes severe throughput degradation due to excessive channel switching and PU-to-SU collisions. Therefore, it is significantly important to design a PU activity-aware medium access control (MAC) protocol for cognitive radio networks (CRNs). In this paper, we first propose a licensed channel usage pattern identification scheme, based on a two-state Markov model, and then estimate the future idle slots using previous observations of the channels. Furthermore, based on these past observations, we compute the rank of each available licensed channel that gives SU transmission success assessment during the estimated idle slot. Secondly, we propose a PU activity-aware distributed MAC (PAD-MAC) protocol for heterogeneous multi-channel CRNs that selects the best channel for each SU to enhance its throughput. PAD-MAC controls SU activities by allowing them to exploit the licensed channels only for the duration of estimated idle slots and enables predictive and fast channel switching. To evaluate the performance of the proposed PAD-MAC, we compare it with the distributed QoS-aware MAC (QC-MAC) and listen-before-talk MAC schemes. Extensive numerical results show the significant improvements of the PAD-MAC in terms of the SU throughput, SU channel switching rate and PU-to-SU collision rate. PMID:25831084
DOE Office of Scientific and Technical Information (OSTI.GOV)
Papantoni-Kazakos, P.; Paterakis, M.
1988-07-01
For many communication applications with time constraints (e.g., transmission of packetized voice messages), a critical performance measure is the percentage of messages transmitted within a given amount of time after their generation at the transmitting station. This report presents a random-access algorithm (RAA) suitable for time-constrained applications. Performance analysis demonstrates that significant message-delay improvement is attained at the expense of minimal traffic loss. Also considered is the case of noisy channels. The noise effect appears at erroneously observed channel feedback. Error sensitivity analysis shows that the proposed random-access algorithm is insensitive to feedback channel errors. Window Random-Access Algorithms (RAAs) aremore » considered next. These algorithms constitute an important subclass of Multiple-Access Algorithms (MAAs); they are distributive, and they attain high throughput and low delays by controlling the number of simultaneously transmitting users.« less
Fujisaki, Koki; Hagihara, Fumi; Azukawa, Yoshihiro; Kaido, Masanori; Okuno, Tetsuro; Mise, Kazuyuki
2004-09-01
The natural variation of Arabidopsis thaliana in response to a bromovirus, Spring beauty latent virus (SBLV), was examined. Of 63 Arabidopsis accessions tested, all were susceptible when inoculated with SBLV, although there was a large degree of variation in symptom development. Most accessions, including Columbia (Col-0), were symptomless or developed only mild symptoms, but four accessions, including S96, showed severe symptoms of SBLV infection. Genetic analysis suggested that the difference in the responses of Col-0 and S96 to SBLV was controlled by a single semidominant locus. We have designated this locus SSB1 (symptom development by SBLV infection). By using genetic markers, SSB1 was mapped to chromosome IV. The patterns of distribution and accumulation of SBLV in sensitive accessions were similar to those in the insensitive accessions. In addition, symptom development in S96 by SBLV infection was critically interrupted by the presence of the NahG gene, which encodes salicylic acid (SA) hydroxylase. These data suggest that symptom development in A. thaliana controlled by SSB1 is independent of the efficiency of SBLV multiplication and is dependent on SA signaling.
NASA Technical Reports Server (NTRS)
Trimble, Jay
2017-01-01
For NASA's Resource Prospector (RP) Lunar Rover Mission, we are moving away from a control center concept, to a fully distributed operation utilizing control nodes, with decision support from anywhere via mobile devices. This operations concept will utilize distributed information systems, notifications, mobile data access, and optimized mobile data display for off-console decision support. We see this concept of operations as a step in the evolution of mission operations from a central control center concept to a mission operations anywhere concept. The RP example is part of a trend, in which mission expertise for design, development and operations is distributed across countries and across the globe. Future spacecraft operations will be most cost efficient and flexible by following this distributed expertise, enabling operations from anywhere. For the RP mission we arrived at the decision to utilize a fully distributed operations team, where everyone operates from their home institution, based on evaluating the following factors: the requirement for physical proximity for near-real time command and control decisions; the cost of distributed control nodes vs. a centralized control center; the impact on training and mission preparation of flying the team to a central location. Physical proximity for operational decisions is seldom required, though certain categories of decisions, such as launch abort, or close coordination for mission or safety-critical near-real-time command and control decisions may benefit from co-location. The cost of facilities and operational infrastructure has not been found to be a driving factor for location in our studies. Mission training and preparation benefit from having all operators train and operate from home institutions.
Distributed Storage Algorithm for Geospatial Image Data Based on Data Access Patterns.
Pan, Shaoming; Li, Yongkai; Xu, Zhengquan; Chong, Yanwen
2015-01-01
Declustering techniques are widely used in distributed environments to reduce query response time through parallel I/O by splitting large files into several small blocks and then distributing those blocks among multiple storage nodes. Unfortunately, however, many small geospatial image data files cannot be further split for distributed storage. In this paper, we propose a complete theoretical system for the distributed storage of small geospatial image data files based on mining the access patterns of geospatial image data using their historical access log information. First, an algorithm is developed to construct an access correlation matrix based on the analysis of the log information, which reveals the patterns of access to the geospatial image data. Then, a practical heuristic algorithm is developed to determine a reasonable solution based on the access correlation matrix. Finally, a number of comparative experiments are presented, demonstrating that our algorithm displays a higher total parallel access probability than those of other algorithms by approximately 10-15% and that the performance can be further improved by more than 20% by simultaneously applying a copy storage strategy. These experiments show that the algorithm can be applied in distributed environments to help realize parallel I/O and thereby improve system performance.
Distributed Computer Systems for the Republic of Turkish Navy.
1985-12-01
and the entire medium spectrum is consumed by the signal. Baseband LAN’s are typically accessed via a carrier sensed multi-access collision detect...Process IPrcoess 2 Cocr~un i cat i Ots B uffer Buffer 6.:,e~2er 1. t -s cessage c~.ur2:s I.essage okul.ks "r, Prcesse eroes pac: et 5packet S et t4Qet...control. a. Routing Routing is the decision process which determines the path a message follows from its source to its destina- tion. Some routing
VIEWCACHE: An incremental pointer-based access method for autonomous interoperable databases
NASA Technical Reports Server (NTRS)
Roussopoulos, N.; Sellis, Timos
1992-01-01
One of biggest problems facing NASA today is to provide scientists efficient access to a large number of distributed databases. Our pointer-based incremental database access method, VIEWCACHE, provides such an interface for accessing distributed data sets and directories. VIEWCACHE allows database browsing and search performing inter-database cross-referencing with no actual data movement between database sites. This organization and processing is especially suitable for managing Astrophysics databases which are physically distributed all over the world. Once the search is complete, the set of collected pointers pointing to the desired data are cached. VIEWCACHE includes spatial access methods for accessing image data sets, which provide much easier query formulation by referring directly to the image and very efficient search for objects contained within a two-dimensional window. We will develop and optimize a VIEWCACHE External Gateway Access to database management systems to facilitate distributed database search.
NIF ICCS network design and loading analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tietbohl, G; Bryant, R
The National Ignition Facility (NIF) is housed within a large facility about the size of two football fields. The Integrated Computer Control System (ICCS) is distributed throughout this facility and requires the integration of about 40,000 control points and over 500 video sources. This integration is provided by approximately 700 control computers distributed throughout the NIF facility and a network that provides the communication infrastructure. A main control room houses a set of seven computer consoles providing operator access and control of the various distributed front-end processors (FEPs). There are also remote workstations distributed within the facility that allow providemore » operator console functions while personnel are testing and troubleshooting throughout the facility. The operator workstations communicate with the FEPs which implement the localized control and monitoring functions. There are different types of FEPs for the various subsystems being controlled. This report describes the design of the NIF ICCS network and how it meets the traffic loads that will are expected and the requirements of the Sub-System Design Requirements (SSDR's). This document supersedes the earlier reports entitled Analysis of the National Ignition Facility Network, dated November 6, 1996 and The National Ignition Facility Digital Video and Control Network, dated July 9, 1996. For an overview of the ICCS, refer to the document NIF Integrated Computer Controls System Description (NIF-3738).« less
A personally controlled electronic health record for Australia
Pearce, Christopher; Bainbridge, Michael
2014-01-01
Objective On July 1, 2012 Australia launched a personally controlled electronic health record (PCEHR) designed around the needs of consumers. Using a distributed model and leveraging key component national eHealth infrastructure, the PCEHR is designed to enable sharing of any health information about a patient with them and any other health practitioner involved in their care to whom the patient allows access. This paper discusses the consumer-facing part of the program. Method Design of the system was through stakeholder consultation and the development of detailed requirements, followed by clinical design assurance. Results Patients are able to access any posted information through a web-accessible ‘consumer portal.’ Within the portal they are able to assert access controls on all or part of their record. The portal includes areas for consumers to record their own personal information. Discussion The PCEHR has the potential to transform the ability of patients to actively engage in their own healthcare, and to enable the emerging partnership model of health and healthcare in medicine. The ability to access health information traditionally kept within the closed walls of institutions also raises challenges for the profession, both in the language clinicians choose and the ethical issues raised by the changed roles and responsibilities. Conclusions The PCEHR is aimed at connecting all participants and their interventions, and is intended to become a system-wide activity. PMID:24650635
NASA Astrophysics Data System (ADS)
Clark, Nathan E.
2017-10-01
This paper explores from the view of the data recipient and user the complexities of creating a common licensing scheme for the access and use of satellite earth observation (EO) data in international disaster management (DM) activities. EO data contributions in major disaster events often involve numerous data providers with separate licensing mechanisms for controlling the access, uses, and distribution of data by the end users. A lack of standardization among the terminology, wording, and conditions within these licenses creates a complex legal environment for users, and often prevents them from using, sharing and combining datasets in an effective and timely manner. It also creates uncertainty among data providers as to the types of licensing controls that should be applied in disaster scenarios. This paper builds from an ongoing comparative analysis of the common and conflicting conditions among data licenses that must be addressed in order to facilitate easier access and use of EO data within the DM sector and offers recommendations towards the alignment of the structural and technical aspects of licenses among data providers.
T-LECS: The Control Software System for MOIRCS
NASA Astrophysics Data System (ADS)
Yoshikawa, T.; Omata, K.; Konishi, M.; Ichikawa, T.; Suzuki, R.; Tokoku, C.; Katsuno, Y.; Nishimura, T.
2006-07-01
MOIRCS (Multi-Object Infrared Camera and Spectrograph) is a new instrument for the Subaru Telescope. We present the system design of the control software system for MOIRCS, named T-LECS (Tohoku University - Layered Electronic Control System). T-LECS is a PC-Linux based network distributed system. Two PCs equipped with the focal plane array system operate two HAWAII2 detectors, respectively, and another PC is used for user interfaces and a database server. Moreover, these PCs control various devices for observations distributed on a TCP/IP network. T-LECS has three interfaces; interfaces to the devices and two user interfaces. One of the user interfaces is to the integrated observation control system (Subaru Observation Software System) for observers, and another one provides the system developers the direct access to the devices of MOIRCS. In order to help the communication between these interfaces, we employ an SQL database system.
Right-to-Try Investigational Therapies for Incurable Disorders.
Simmons, Zachary
2017-10-01
Patients with life-threatening disorders such as amyotrophic lateral sclerosis, for which only minimally effective medical therapies currently exist, often seek treatments not proven to be effective and not approved by regulatory agencies for use outside of experimental treatment trials. The expanded access (compassionate use) provisions of the US Food and Drug Administration (FDA) for access to such therapies are often perceived as being inadequate. In response, states have passed right-to-try laws designed to improve access to experimental therapies for patients willing to assume the risks associated with such treatments. This situation has resulted in conflicts between those who perceive access to such treatments as their right as autonomous individuals and those who believe that the principles of beneficence and nonmaleficence justify actions of physicians and regulators in controlling access to such treatments. A variety of factors also contribute to the inequitable distribution of such treatments. Better systems are needed to improve access to promising new treatments while protecting these vulnerable patients from the abuses associated with human research in the preregulatory era.
Augusto, Lia Giraldo da Silva; Gurgel, Idê Gomes Dantas; Câmara Neto, Henrique Fernandes; de Melo, Carlos Henrique; Costa, André Monteiro
2012-06-01
The scope of this article is to analyze the challenges involved in ensuring access to water for human consumption taking the international and national context into consideration. Based on the UN declaration that access to safe and clean drinking water is a fundamental human right, vulnerabilities are identified that can consist in restrictions to access to adequate supplies. The distribution of water and the population across the planet, pollution, inadequate policies and management lead to environmental injustice. The iniquity of access to water constitutes the contemporary water crisis. From the 1980s onwards, the transnational water market emerged for private control that occurs at three main levels: surface and underground water sources; bottled water; and public water supply services. The conflicts of the multiple uses of water resources, the market and environmental problems have contributed to rendering the health of the population and ecosystems vulnerable. Adequate public policies are essential to ensure the basic human right to access to safe and clean drinking water.
2008-03-01
unaltered during transmission and verified with data authentication. Data Freshness describes the ordering and currency of data. Strong freshness is a total...Advances in Cryptology — Crypto ’97, volume 1294 of Lecture Notes in Computer Science, pages 180–197. Springer-Verlag, Berlin, 1997. GS04. Saurabh
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-20
... manufacture, process or distribute industrial chemicals. Since other entities may also be interested, the..., 6, and 8 of the Toxic Substances Control Act (TSCA). Some of the information may be claimed or... evaluating the exposure of new chemical substances, including microorganisms and nanomaterials. They will...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... request vouchers for distribution of grant funds using the automated Voice Response System (VRS). An... Information Collection for Public Comment; Request Voucher for Grant Payment and Line of Credit Control System (LOCCS) Voice Response System Access AGENCY: Office of the Chief Financial Officer, HUD. ACTION: Notice...
On-Line Assessment: What, Why, How.
ERIC Educational Resources Information Center
Natal, Dottie
Recent increases in the speed and accessibility of computers and networks have made it possible to administer tests on-line. On-line assessment can be conducted in a controlled setting, such as a testing center, or distributed over local area networks or the Internet to libraries and student homes, allowing students the flexibility to complete…
Hogben, Matthew; Wimberly, Yolanda H; Moore, Sandra
2007-05-01
Periodically, the Centers for Disease Control and Prevention (CDC) produce guidelines for the treatment of sexually transmitted diseases (STDs) in the USA. To date, few evaluations of the dissemination of these guidelines exist. A paper and pencil survey was distributed via priority mail to a sample of Atlanta-area physicians, 416 (34%) of whom responded with complete data. Physicians were drawn from private practice, managed-care settings and public settings. In all, 85% of respondents treated STD, with a further 10% referring cases. Of those treating STD, 56% owned a copy of the 2002 CDC Treatment Guidelines, and 26% knew how to access them. The corresponding figures for physicians not treating STD were 25% and 30%. Of the physicians who did have copies, half had accessed the internet for their copies. Acquisition of, or the knowledge of how to acquire, the CDC STD Treatment Guidelines was widespread. The internet may be an effective and cost-saving means of disseminating the guidelines, although the continued need for print distribution should not be discounted.
Advanced teleprocessing systems
NASA Astrophysics Data System (ADS)
Kleinrock, L.; Gerla, M.
1982-09-01
This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.
Flexible distributed architecture for semiconductor process control and experimentation
NASA Astrophysics Data System (ADS)
Gower, Aaron E.; Boning, Duane S.; McIlrath, Michael B.
1997-01-01
Semiconductor fabrication requires an increasingly expensive and integrated set of tightly controlled processes, driving the need for a fabrication facility with fully computerized, networked processing equipment. We describe an integrated, open system architecture enabling distributed experimentation and process control for plasma etching. The system was developed at MIT's Microsystems Technology Laboratories and employs in-situ CCD interferometry based analysis in the sensor-feedback control of an Applied Materials Precision 5000 Plasma Etcher (AME5000). Our system supports accelerated, advanced research involving feedback control algorithms, and includes a distributed interface that utilizes the internet to make these fabrication capabilities available to remote users. The system architecture is both distributed and modular: specific implementation of any one task does not restrict the implementation of another. The low level architectural components include a host controller that communicates with the AME5000 equipment via SECS-II, and a host controller for the acquisition and analysis of the CCD sensor images. A cell controller (CC) manages communications between these equipment and sensor controllers. The CC is also responsible for process control decisions; algorithmic controllers may be integrated locally or via remote communications. Finally, a system server images connections from internet/intranet (web) based clients and uses a direct link with the CC to access the system. Each component communicates via a predefined set of TCP/IP socket based messages. This flexible architecture makes integration easier and more robust, and enables separate software components to run on the same or different computers independent of hardware or software platform.
Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment
Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel
2008-01-01
Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979
Alternative Architectures for Distributed Work in the National Airspace System
NASA Technical Reports Server (NTRS)
Smith, Philip J.; Billings, Charles E.; Chapman, Roger; Obradovich, Heintz; McCoy, C. Elaine; Orasanu, Judith
2000-01-01
The architecture for the National Airspace System (NAS) in the United States has evolved over time to rely heavily on the distribution of tasks and control authority in order to keep cognitive complexity manageable for any one individual. This paper characterizes a number of different subsystems that have been recently incorporated in the NAS. The goal of this discussion is to begin to identify the critical parameters defining the differences among alternative architectures in terms of the locus of control and in terms of access to relevant data and knowledge. At an abstract level, this analysis can be described as an effort to describe alternative "rules of the game" for the NAS.
Anantha, Ram Venkatesh; Parry, Neil; Vogt, Kelly; Jain, Vipan; Crawford, Silvie; Leslie, Ken
2014-01-01
Background Acute care surgical services provide comprehensive emergency general surgical care while potentially using health care resources more efficiently. We assessed the volume and distribution of emergency general surgery (EGS) procedures before and after the implementation of the Acute Care and Emergency Surgery Service (ACCESS) at a Canadian tertiary care hospital and its effect on surgeon billings. Methods This single-centre retrospective case–control study compared adult patients who underwent EGS procedures between July and December 2009 (pre-ACCESS), to those who had surgery between July and December 2010 (post-ACCESS). Case distribution was compared between day (7 am to 3 pm), evening (3 pm to 11 pm) and night (11 pm to 7 am). Frequencies were compared using the χ2 test. Results Pre-ACCESS, 366 EGS procedures were performed: 24% during the day, 55% in the evening and 21% at night. Post-ACCESS, 463 operations were performed: 55% during the day, 36% in the evening and 9% at night. Reductions in night-time and evening EGS were 57% and 36% respectively (p < 0.001). Total surgeon billings for operations pre- and post-ACCESS were $281 066 and $287 075, respectively: remuneration was $6008 higher post-ACCESS for an additional 97 cases (p = 0.003). Using cost-modelling analysis, post-ACCESS surgeon billing for appendectomies, segmental colectomies, laparotomies and cholecystectomies all declined by $67 190, $125 215, $66 362, and $84 913, respectively (p < 0.001). Conclusion Acute care surgical services have dramatically shifted EGS from nighttime to daytime. Cost-modelling analysis demonstrates that these services have cost-savings potential for the health care system without reducing overall surgeon billing. PMID:24666462
Anantha, Ram Venkatesh; Parry, Neil; Vogt, Kelly; Jain, Vipan; Crawford, Silvie; Leslie, Ken
2014-04-01
Acute care surgical services provide comprehensive emergency general surgical care while potentially using health care resources more efficiently. We assessed the volume and distribution of emergency general surgery (EGS) procedures before and after the implementation of the Acute Care and Emergency Surgery Service (ACCESS) at a Canadian tertiary care hospital and its effect on surgeon billings. This single-centre retrospective case-control study compared adult patients who underwent EGS procedures between July and December 2009 (pre-ACCESS), to those who had surgery between July and December 2010 (post-ACCESS). Case distribution was compared between day (7 am to 3 pm), evening (3 pm to 11 pm) and night (11 pm to 7 am). Frequencies were compared using the χ(2) test. Pre-ACCESS, 366 EGS procedures were performed: 24% during the day, 55% in the evening and 21% at night. Post-ACCESS, 463 operations were performed: 55% during the day, 36% in the evening and 9% at night. Reductions in night-time and evening EGS were 57% and 36% respectively (p < 0.001). Total surgeon billings for operations pre- and post-ACCESS were $281 066 and $287 075, respectively: remuneration was $6008 higher post-ACCESS for an additional 97 cases (p = 0.003). Using cost-modelling analysis, post-ACCESS surgeon billing for appendectomies, segmental colectomies, laparotomies and cholecystectomies all declined by $67 190, $125 215, $66 362, and $84 913, respectively (p < 0.001). Acute care surgical services have dramatically shifted EGS from nighttime to daytime. Cost-modelling analysis demonstrates that these services have cost-savings potential for the health care system without reducing overall surgeon billing.
Cholera risk factors, Papua New Guinea, 2010.
Rosewell, Alexander; Addy, Benita; Komnapi, Lucas; Makanda, Freda; Ropa, Berry; Posanai, Enoch; Dutta, Samir; Mola, Glen; Man, W Y Nicola; Zwi, Anthony; MacIntyre, C Raina
2012-11-05
Cholera is newly emergent in Papua New Guinea but may soon become endemic. Identifying the risk factors for cholera provides evidence for targeted prevention and control measures. We conducted a hospital-based case-control study to identify cholera risk factors. Using stool culture as the standard, we evaluated a cholera point of care test in the field. 176 participants were recruited: 54 cases and 122 controls. Independent risk factors for cholera were: being over 20 years of age (aOR 2.5; 95%CI 1.1, 5.4), defecating in the open air (or river) (aOR 4.5; 95% CI 1.4, 14.4) and knowing someone who travelled to a cholera affected area (aOR 4.1; 95%CI 1.6, 10.7); while the availability of soap for handwashing at home was protective (aOR 0.41; 95%CI 0.19, 0.87). Those reporting access to a piped water distribution system in the home were twice as likely to report the availability of soap for handwashing. The sensitivity and specificity of the rapid test were 72% (95% CI 47-90) and 71% (95%CI 44-90%). Improving population access to the piped water distribution system and sanitation will likely reduce transmission by enabling enhanced hygiene and limiting the contamination of water sources. The One step V. cholerae O1/O139 Antigen Test is of limited utility for clinical decision making in a hospital setting with access to traditional laboratory methods. Settlement dwellers and mobile populations of all age groups should be targeted for interventions in Papua New Guinea.
Cholera risk factors, Papua New Guinea, 2010
2012-01-01
Background Cholera is newly emergent in Papua New Guinea but may soon become endemic. Identifying the risk factors for cholera provides evidence for targeted prevention and control measures. Methods We conducted a hospital-based case–control study to identify cholera risk factors. Using stool culture as the standard, we evaluated a cholera point of care test in the field. Results 176 participants were recruited: 54 cases and 122 controls. Independent risk factors for cholera were: being over 20 years of age (aOR 2.5; 95%CI 1.1, 5.4), defecating in the open air (or river) (aOR 4.5; 95% CI 1.4, 14.4) and knowing someone who travelled to a cholera affected area (aOR 4.1; 95%CI 1.6, 10.7); while the availability of soap for handwashing at home was protective (aOR 0.41; 95%CI 0.19, 0.87). Those reporting access to a piped water distribution system in the home were twice as likely to report the availability of soap for handwashing. The sensitivity and specificity of the rapid test were 72% (95% CI 47–90) and 71% (95%CI 44–90%). Conclusions Improving population access to the piped water distribution system and sanitation will likely reduce transmission by enabling enhanced hygiene and limiting the contamination of water sources. The One step V. cholerae O1/O139 Antigen Test is of limited utility for clinical decision making in a hospital setting with access to traditional laboratory methods. Settlement dwellers and mobile populations of all age groups should be targeted for interventions in Papua New Guinea. PMID:23126504
Programming distributed memory architectures using Kali
NASA Technical Reports Server (NTRS)
Mehrotra, Piyush; Vanrosendale, John
1990-01-01
Programming nonshared memory systems is more difficult than programming shared memory systems, in part because of the relatively low level of current programming environments for such machines. A new programming environment is presented, Kali, which provides a global name space and allows direct access to remote data values. In order to retain efficiency, Kali provides a system on annotations, allowing the user to control those aspects of the program critical to performance, such as data distribution and load balancing. The primitives and constructs provided by the language is described, and some of the issues raised in translating a Kali program for execution on distributed memory systems are also discussed.
Prevention of postpartum hemorrhage at home birth in Afghanistan.
Sanghvi, Harshadkumar; Ansari, Nasratullah; Prata, Ndola J V; Gibson, Hannah; Ehsan, Aftab T; Smith, Jeffrey M
2010-03-01
To test the safety, acceptability, feasibility, and effectiveness of community-based education and distribution of misoprostol for prevention of postpartum hemorrhage at home birth in Afghanistan. A nonrandomized experimental control design in rural Afghanistan. A total of 3187 women participated: 2039 in the intervention group and 1148 in the control group. Of the 1421 women in the intervention group who took misoprostol, 100% correctly took it after birth, including 20 women with twin pregnancies. Adverse effect rates were unexpectedly lower in the intervention group than in the comparison group. Among women in the intervention group, 92% said they would use misoprostol in their next pregnancy. In the intervention area where community-based distribution of misoprostol was introduced, near-universal uterotonic coverage (92%) was achieved compared with 25% coverage in the control areas. In Afghanistan, community-based education and distribution of misoprostol is safe, acceptable, feasible, and effective. This strategy should be considered for other countries where access to skilled attendance is limited.
Wide-area-distributed storage system for a multimedia database
NASA Astrophysics Data System (ADS)
Ueno, Masahiro; Kinoshita, Shigechika; Kuriki, Makato; Murata, Setsuko; Iwatsu, Shigetaro
1998-12-01
We have developed a wide-area-distribution storage system for multimedia databases, which minimizes the possibility of simultaneous failure of multiple disks in the event of a major disaster. It features a RAID system, whose member disks are spatially distributed over a wide area. Each node has a device, which includes the controller of the RAID and the controller of the member disks controlled by other nodes. The devices in the node are connected to a computer, using fiber optic cables and communicate using fiber-channel technology. Any computer at a node can utilize multiple devices connected by optical fibers as a single 'virtual disk.' The advantage of this system structure is that devices and fiber optic cables are shared by the computers. In this report, we first described our proposed system, and a prototype was used for testing. We then discussed its performance; i.e., how to read and write throughputs are affected by data-access delay, the RAID level, and queuing.
Threshold-Based Random Charging Scheme for Decentralized PEV Charging Operation in a Smart Grid.
Kwon, Ojin; Kim, Pilkee; Yoon, Yong-Jin
2016-12-26
Smart grids have been introduced to replace conventional power distribution systems without real time monitoring for accommodating the future market penetration of plug-in electric vehicles (PEVs). When a large number of PEVs require simultaneous battery charging, charging coordination techniques have become one of the most critical factors to optimize the PEV charging performance and the conventional distribution system. In this case, considerable computational complexity of a central controller and exchange of real time information among PEVs may occur. To alleviate these problems, a novel threshold-based random charging (TBRC) operation for a decentralized charging system is proposed. Using PEV charging thresholds and random access rates, the PEVs themselves can participate in the charging requests. As PEVs with a high battery state do not transmit the charging requests to the central controller, the complexity of the central controller decreases due to the reduction of the charging requests. In addition, both the charging threshold and the random access rate are statistically calculated based on the average of supply power of the PEV charging system that do not require a real time update. By using the proposed TBRC with a tolerable PEV charging degradation, a 51% reduction of the PEV charging requests is achieved.
Threshold-Based Random Charging Scheme for Decentralized PEV Charging Operation in a Smart Grid
Kwon, Ojin; Kim, Pilkee; Yoon, Yong-Jin
2016-01-01
Smart grids have been introduced to replace conventional power distribution systems without real time monitoring for accommodating the future market penetration of plug-in electric vehicles (PEVs). When a large number of PEVs require simultaneous battery charging, charging coordination techniques have become one of the most critical factors to optimize the PEV charging performance and the conventional distribution system. In this case, considerable computational complexity of a central controller and exchange of real time information among PEVs may occur. To alleviate these problems, a novel threshold-based random charging (TBRC) operation for a decentralized charging system is proposed. Using PEV charging thresholds and random access rates, the PEVs themselves can participate in the charging requests. As PEVs with a high battery state do not transmit the charging requests to the central controller, the complexity of the central controller decreases due to the reduction of the charging requests. In addition, both the charging threshold and the random access rate are statistically calculated based on the average of supply power of the PEV charging system that do not require a real time update. By using the proposed TBRC with a tolerable PEV charging degradation, a 51% reduction of the PEV charging requests is achieved. PMID:28035963
Enabling analytical and Modeling Tools for Enhanced Disease Surveillance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dawn K. Manley
2003-04-01
Early detection, identification, and warning are essential to minimize casualties from a biological attack. For covert attacks, sick people are likely to provide the first indication of an attack. An enhanced medical surveillance system that synthesizes distributed health indicator information and rapidly analyzes the information can dramatically increase the number of lives saved. Current surveillance methods to detect both biological attacks and natural outbreaks are hindered by factors such as distributed ownership of information, incompatible data storage and analysis programs, and patient privacy concerns. Moreover, because data are not widely shared, few data mining algorithms have been tested on andmore » applied to diverse health indicator data. This project addressed both integration of multiple data sources and development and integration of analytical tools for rapid detection of disease outbreaks. As a first prototype, we developed an application to query and display distributed patient records. This application incorporated need-to-know access control and incorporated data from standard commercial databases. We developed and tested two different algorithms for outbreak recognition. The first is a pattern recognition technique that searches for space-time data clusters that may signal a disease outbreak. The second is a genetic algorithm to design and train neural networks (GANN) that we applied toward disease forecasting. We tested these algorithms against influenza, respiratory illness, and Dengue Fever data. Through this LDRD in combination with other internal funding, we delivered a distributed simulation capability to synthesize disparate information and models for earlier recognition and improved decision-making in the event of a biological attack. The architecture incorporates user feedback and control so that a user's decision inputs can impact the scenario outcome as well as integrated security and role-based access-control for communicating between distributed data and analytical tools. This work included construction of interfaces to various commercial database products and to one of the data analysis algorithms developed through this LDRD.« less
Data distribution service-based interoperability framework for smart grid testbed infrastructure
Youssef, Tarek A.; Elsayed, Ahmed T.; Mohammed, Osama A.
2016-03-02
This study presents the design and implementation of a communication and control infrastructure for smart grid operation. The proposed infrastructure enhances the reliability of the measurements and control network. The advantages of utilizing the data-centric over message-centric communication approach are discussed in the context of smart grid applications. The data distribution service (DDS) is used to implement a data-centric common data bus for the smart grid. This common data bus improves the communication reliability, enabling distributed control and smart load management. These enhancements are achieved by avoiding a single point of failure while enabling peer-to-peer communication and an automatic discoverymore » feature for dynamic participating nodes. The infrastructure and ideas presented in this paper were implemented and tested on the smart grid testbed. A toolbox and application programing interface for the testbed infrastructure are developed in order to facilitate interoperability and remote access to the testbed. This interface allows control, monitoring, and performing of experiments remotely. Furthermore, it could be used to integrate multidisciplinary testbeds to study complex cyber-physical systems (CPS).« less
Bounded and Unbounded Knowledge: Teaching and Learning in a Web 2 World
ERIC Educational Resources Information Center
Nagy, Judy; Bigum, Chris
2007-01-01
In the recent past, the proliferation of digitally available content heralded the beginning of serious problems for the business models of publishers. The ease with which content can be accessed, copied and distributed disrupts the control of those whose role has been to manage and profit from the intellectual property rights of content producers.…
Engineering Social Justice into Traffic Control for Self-Driving Vehicles?
Mladenovic, Milos N; McPherson, Tristram
2016-08-01
The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal access. Our central focus is on efficiency and equal access as desiderata for traffic control design. We explain the limitations of conventional traffic control in meeting these desiderata, and sketch a preliminary vision for a next-generation traffic control tailored to address better the demands of social justice. One component of this vision is cooperative, hierarchically distributed self-organization among vehicles. Another component of this vision is a priority system enabling selection of priority levels by the user for each vehicle trip in the network, based on the supporting structure of non-monetary credits.
The Fermilab Accelerator control system
NASA Astrophysics Data System (ADS)
Bogert, Dixon
1986-06-01
With the advent of the Tevatron, considerable upgrades have been made to the controls of all the Fermilab Accelerators. The current system is based on making as large an amount of data as possible available to many operators or end-users. Specifically there are about 100 000 separate readings, settings, and status and control registers in the various machines, all of which can be accessed by seventeen consoles, some in the Main Control Room and others distributed throughout the complex. A "Host" computer network of approximately eighteen PDP-11/34's, seven PDP-11/44's, and three VAX-11/785's supports a distributed data acquisition system including Lockheed MAC-16's left from the original Main Ring and Booster instrumentation and upwards of 1000 Z80, Z8002, and M68000 microprocessors in dozens of configurations. Interaction of the various parts of the system is via a central data base stored on the disk of one of the VAXes. The primary computer-hardware communication is via CAMAC for the new Tevatron and Antiproton Source; certain subsystems, among them vacuum, refrigeration, and quench protection, reside in the distributed microprocessors and communicate via GAS, an in-house protocol. An important hardware feature is an accurate clock system making a large number of encoded "events" in the accelerator supercycle available for both hardware modules and computers. System software features include the ability to save the current state of the machine or any subsystem and later restore it or compare it with the state at another time, a general logging facility to keep track of specific variables over long periods of time, detection of "exception conditions" and the posting of alarms, and a central filesharing capability in which files on VAX disks are available for access by any of the "Host" processors.
A back-pack shocker for collecting lamprey ammocoetes
Braem, Robert A.; Ebel, Wesley J.
1961-01-01
IN 1958, THE BUREAU OF COMMERCIAL FISHERIES began to use specific larvicides for sea lamprey control in streams tributary to the Great Lakes. The successful application of larvicides required treatment of all areas of the streams infested by sea lamprey ammocoetes. Intensive surveys were needed to determine distribution of the larvae. The use of electrical methods to determinelarval distribution has been described (Stauffer and Hansen 1958). A light portable shocker was needed for these surveys because of the difficulty of access to some of the watersheds tributary to Lake Superior.
Security and privacy issues of personal health.
Blobel, Bernd; Pharow, Peter
2007-01-01
While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.
A Review on Development Practice of Smart Grid Technology in China
NASA Astrophysics Data System (ADS)
Han, Liu; Chen, Wei; Zhuang, Bo; Shen, Hongming
2017-05-01
Smart grid has become an inexorable trend of energy and economy development worldwide. Since the development of smart grid was put forward in China in 2009, we have obtained abundant research results and practical experiences as well as extensive attention from international community in this field. This paper reviews the key technologies and demonstration projects on new energy connection forecasts; energy storage; smart substations; disaster prevention and reduction for power transmission lines; flexible DC transmission; distribution automation; distributed generation access and micro grid; smart power consumption; the comprehensive demonstration of power distribution and utilization; smart power dispatching and control systems; and the communication networks and information platforms of China, systematically, on the basis of 5 fields, i.e., renewable energy integration, smart power transmission and transformation, smart power distribution and consumption, smart power dispatching and control systems and information and communication platforms. Meanwhile, it also analyzes and compares with the developmental level of similar technologies abroad, providing an outlook on the future development trends of various technologies.
Derived virtual devices: a secure distributed file system mechanism
NASA Technical Reports Server (NTRS)
VanMeter, Rodney; Hotz, Steve; Finn, Gregory
1996-01-01
This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.
A Conceptual Design for a Reliable Optical Bus (ROBUS)
NASA Technical Reports Server (NTRS)
Miner, Paul S.; Malekpour, Mahyar; Torres, Wilfredo
2002-01-01
The Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) is a new family of fault-tolerant architectures under development at NASA Langley Research Center (LaRC). The SPIDER is a general-purpose computational platform suitable for use in ultra-reliable embedded control applications. The design scales from a small configuration supporting a single aircraft function to a large distributed configuration capable of supporting several functions simultaneously. SPIDER consists of a collection of simplex processing elements communicating via a Reliable Optical Bus (ROBUS). The ROBUS is an ultra-reliable, time-division multiple access broadcast bus with strictly enforced write access (no babbling idiots) providing basic fault-tolerant services using formally verified fault-tolerance protocols including Interactive Consistency (Byzantine Agreement), Internal Clock Synchronization, and Distributed Diagnosis. The conceptual design of the ROBUS is presented in this paper including requirements, topology, protocols, and the block-level design. Verification activities, including the use of formal methods, are also discussed.
Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian
2013-01-28
We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.
NASA Astrophysics Data System (ADS)
Deloose, I.; Pace, A.
1994-12-01
The two CERN isotope separators named ISOLDE have been running on the new Personal Computer (PC) based control system since April 1992. The new architecture that makes heavy use of the commercial software and hardware of the PC market has been implemented on the 1700 geographically distributed control channels of the two separators and their experimental area. Eleven MSDOS Intel-based PCs with approximately 80 acquisition and control boards are used to access the equipment and are controlled from three PCs running Microsoft Windows used as consoles through a Novell Local Area Network. This paper describes the interesting solutions found and discusses the reduced programming workload and costs that have been obtained.
Access, excess, and ethics--towards a sustainable distribution model for antibiotics.
Heyman, Gabriel; Cars, Otto; Bejarano, Maria-Teresa; Peterson, Stefan
2014-05-01
The increasing antibiotic resistance is a global threat to health care as we know it. Yet there is no model of distribution ready for a new antibiotic that balances access against excessive or inappropriate use in rural settings in low- and middle-income countries (LMICs) where the burden of communicable diseases is high and access to quality health care is low. Departing from a hypothetical scenario of rising antibiotic resistance among pneumococci, 11 stakeholders in the health systems of various LMICs were interviewed one-on-one to give their view on how a new effective antibiotic should be distributed to balance access against the risk of inappropriate use. Transcripts were subjected to qualitative 'framework' analysis. The analysis resulted in four main themes: Barriers to rational access to antibiotics; balancing access and excess; learning from other communicable diseases; and a system-wide intervention. The tension between access to antibiotics and rational use stems from shortcomings found in the health systems of LMICs. Constructing a sustainable yet accessible model of antibiotic distribution for LMICs is a task of health system-wide proportions, which is why we strongly suggest using systems thinking in future research on this issue.
Access, excess, and ethics—towards a sustainable distribution model for antibiotics
Heyman, Gabriel; Cars, Otto; Bejarano, Maria-Teresa
2014-01-01
The increasing antibiotic resistance is a global threat to health care as we know it. Yet there is no model of distribution ready for a new antibiotic that balances access against excessive or inappropriate use in rural settings in low- and middle-income countries (LMICs) where the burden of communicable diseases is high and access to quality health care is low. Departing from a hypothetical scenario of rising antibiotic resistance among pneumococci, 11 stakeholders in the health systems of various LMICs were interviewed one-on-one to give their view on how a new effective antibiotic should be distributed to balance access against the risk of inappropriate use. Transcripts were subjected to qualitative ‘framework’ analysis. The analysis resulted in four main themes: Barriers to rational access to antibiotics; balancing access and excess; learning from other communicable diseases; and a system-wide intervention. The tension between access to antibiotics and rational use stems from shortcomings found in the health systems of LMICs. Constructing a sustainable yet accessible model of antibiotic distribution for LMICs is a task of health system-wide proportions, which is why we strongly suggest using systems thinking in future research on this issue. PMID:24735111
40 CFR 1400.6 - Enhanced local access.
Code of Federal Regulations, 2011 CFR
2011-07-01
...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...
40 CFR 1400.6 - Enhanced local access.
Code of Federal Regulations, 2012 CFR
2012-07-01
...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...
40 CFR 1400.6 - Enhanced local access.
Code of Federal Regulations, 2013 CFR
2013-07-01
...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...
40 CFR 1400.6 - Enhanced local access.
Code of Federal Regulations, 2014 CFR
2014-07-01
...); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C...) OCA information. (1) LEPCs and related local government agencies are authorized and encouraged to...
Software-Enabled Distributed Network Governance: The PopMedNet Experience.
Davies, Melanie; Erickson, Kyle; Wyner, Zachary; Malenfant, Jessica; Rosen, Rob; Brown, Jeffrey
2016-01-01
The expanded availability of electronic health information has led to increased interest in distributed health data research networks. The distributed research network model leaves data with and under the control of the data holder. Data holders, network coordinating centers, and researchers have distinct needs and challenges within this model. The concerns of network stakeholders are addressed in the design and governance models of the PopMedNet software platform. PopMedNet features include distributed querying, customizable workflows, and auditing and search capabilities. Its flexible role-based access control system enables the enforcement of varying governance policies. Four case studies describe how PopMedNet is used to enforce network governance models. Trust is an essential component of a distributed research network and must be built before data partners may be willing to participate further. The complexity of the PopMedNet system must be managed as networks grow and new data, analytic methods, and querying approaches are developed. The PopMedNet software platform supports a variety of network structures, governance models, and research activities through customizable features designed to meet the needs of network stakeholders.
Replication Strategy for Spatiotemporal Data Based on Distributed Caching System
Xiong, Lian; Tao, Yang; Xu, Juan; Zhao, Lun
2018-01-01
The replica strategy in distributed cache can effectively reduce user access delay and improve system performance. However, developing a replica strategy suitable for varied application scenarios is still quite challenging, owing to differences in user access behavior and preferences. In this paper, a replication strategy for spatiotemporal data (RSSD) based on a distributed caching system is proposed. By taking advantage of the spatiotemporal locality and correlation of user access, RSSD mines high popularity and associated files from historical user access information, and then generates replicas and selects appropriate cache node for placement. Experimental results show that the RSSD algorithm is simple and efficient, and succeeds in significantly reducing user access delay. PMID:29342897
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pollet, J.
2006-07-01
This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less
Lu, Christine Y; Ritchie, Jan; Williams, Ken; Day, Ric
2007-01-01
Background In Australia, government-subsidised access to high-cost medicines is "targeted" to particular sub-sets of patients under the Pharmaceutical Benefits Scheme to achieve cost-effective use. In order to determine how this access system could be improved, the opinions of key stakeholders on access to biological agents for rheumatoid arthritis were explored. Methods Thirty-six semi-structured interviews were conducted with persons from relevant stakeholder groups. These were transcribed verbatim, and analysed thematically. Results Controlled access to expensive medicines was considered to be equitable and practical; however, there was disagreement as to the method of defining the target patient populations. Other concerns included timeliness of access, excessive bureaucracy, and the need for additional resources to facilitate the scheme. Collaboration between stakeholders was deemed important because it allows more equitable distribution of limited resources. The majority considered that stakeholder consultation should have been broader. Most wanted increased transparency of the decision-making process, ongoing and timely review of access criteria, and an increased provision of information for patients. More structured communication between stakeholders was proposed. Conclusion The Pharmaceutical Benefit Scheme is adapting to meet the changing needs of patients. Provision of subsidised access to high-cost medicines in a manner that is affordable for individuals and society, and that is equitable and efficiently managed is challenging. The views of stakeholders on targeted access to anti-rheumatic biological medicines in Australia acknowledged this challenge and provided a number of suggestions for modifications. These could serve as a basis to inform the debate on how to change the processes and policies so as to improve the scheme. PMID:18096055
VIEWCACHE: An incremental pointer-based access method for autonomous interoperable databases
NASA Technical Reports Server (NTRS)
Roussopoulos, N.; Sellis, Timos
1993-01-01
One of the biggest problems facing NASA today is to provide scientists efficient access to a large number of distributed databases. Our pointer-based incremental data base access method, VIEWCACHE, provides such an interface for accessing distributed datasets and directories. VIEWCACHE allows database browsing and search performing inter-database cross-referencing with no actual data movement between database sites. This organization and processing is especially suitable for managing Astrophysics databases which are physically distributed all over the world. Once the search is complete, the set of collected pointers pointing to the desired data are cached. VIEWCACHE includes spatial access methods for accessing image datasets, which provide much easier query formulation by referring directly to the image and very efficient search for objects contained within a two-dimensional window. We will develop and optimize a VIEWCACHE External Gateway Access to database management systems to facilitate database search.
Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F L; Utzinger, Jürg; Kristensen, Thomas K; Vounatsou, Penelope
2011-12-01
After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature'), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay.
NASA Technical Reports Server (NTRS)
Degaudenzi, R.; Elia, C.; Viola, R.
1990-01-01
Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.
Chuma, Jane; Okungu, Vincent; Ntwiga, Janet; Molyneux, Catherine
2010-03-16
Ensuring that the poor and vulnerable population benefit from malaria control interventions remains a challenge for malaria endemic countries. Until recently, ownership and use of insecticides treated nets (ITNs) in most countries was low and inequitable, although coverage has increased in countries where free ITN distribution is integrated into mass vaccination campaigns. In Kenya, free ITNs were distributed to children aged below five years in 2006 through two mass campaigns. High and equitable coverage were reported after the campaigns in some districts, although national level coverage remained low, suggesting that understanding barriers to access remains important. This study was conducted to explore barriers to ownership and use of ITNs among the poorest populations before and after the mass campaigns, to identify strategies for improving coverage, and to make recommendations on how increased coverage levels can be sustained. The study was conducted in the poorest areas of four malaria endemic districts in Kenya. Multiple data collection methods were applied including: cross-sectional surveys (n = 708 households), 24 focus group discussions and semi-structured interviews with 70 ITN suppliers. Affordability was reported as a major barrier to access but non-financial barriers were also shown to be important determinants. On the demand side key barriers to access included: mismatch between the types of ITNs supplied through interventions and community preferences; perceptions and beliefs on illness causes; physical location of suppliers and; distrust in free delivery and in the distribution agencies. Key barriers on the supply side included: distance from manufacturers; limited acceptability of ITNs provided through interventions; crowding out of the commercial sector and the price. Infrastructure, information and communication played a central role in promoting or hindering access. Significant resources have been directed towards addressing affordability barriers through providing free ITNs to vulnerable groups, but the success of these interventions depends largely on the degree to which other barriers to access are addressed. Only if additional efforts are directed towards addressing non-financial barriers to access, will high coverage levels be achieved and sustained.
DISTRIBUTED AND ACCUMULATED REINFORCEMENT ARRANGEMENTS: EVALUATIONS OF EFFICACY AND PREFERENCE
DELEON, ISER G.; CHASE, JULIE A.; FRANK-CRAWFORD, MICHELLE A.; CARREAU-WEBSTER, ABBEY B.; TRIGGS, MANDY M.; BULLOCK, CHRISTOPHER E.; JENNETT, HEATHER K.
2015-01-01
We assessed the efficacy of, and preference for, accumulated access to reinforcers, which allows uninterrupted engagement with the reinforcers but imposes an inherent delay required to first complete the task. Experiment 1 compared rates of task completion in 4 individuals who had been diagnosed with intellectual disabilities when reinforcement was distributed (i.e., 30-s access to the reinforcer delivered immediately after each response) and accumulated (i.e., 5-min access to the reinforcer after completion of multiple consecutive responses). Accumulated reinforcement produced response rates that equaled or exceeded rates during distributed reinforcement for 3 participants. Experiment 2 used a concurrent-chains schedule to examine preferences for each arrangement. All participants preferred delayed, accumulated access when the reinforcer was an activity. Three participants also preferred accumulated access to edible reinforcers. The collective results suggest that, despite the inherent delay, accumulated reinforcement is just as effective and is often preferred by learners over distributed reinforcement. PMID:24782203
Packet spacing : an enabling mechanism for delivering multimedia content in computational grids /
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feng, A. C.; Feng, W. C.; Belford, Geneva G.
2001-01-01
Streaming multimedia with UDP has become increasingly popular over distributed systems like the Internet. Scientific applications that stream multimedia include remote computational steering of visualization data and video-on-demand teleconferencing over the Access Grid. However, UDP does not possess a self-regulating, congestion-control mechanism; and most best-efort traflc is served by congestion-controlled TCF! Consequently, UDP steals bandwidth from TCP such that TCP$ows starve for network resources. With the volume of Internet traffic continuing to increase, the perpetuation of UDP-based streaming will cause the Internet to collapse as it did in the mid-1980's due to the use of non-congestion-controlled TCP. To address thismore » problem, we introduce the counterintuitive notion of inter-packet spacing with control feedback to enable UDP-based applications to perform well in the next-generation Internet and computational grids. When compared with traditional UDP-based streaming, we illustrate that our approach can reduce packet loss over SO% without adversely afecting delivered throughput. Keywords: network protocol, multimedia, packet spacing, streaming, TCI: UDlq rate-adjusting congestion control, computational grid, Access Grid.« less
Gershman, Jennifer A; Gershman, Jason A; Fass, Andrea D; Popovici, Ioana
2014-12-01
The purpose of this study is to assess Florida physicians' attitudes and knowledge toward accessing the state's prescription drug monitoring program (PDMP). Five thousand medical doctors and osteopathic physicians licensed in Florida were randomly selected for a voluntary and anonymous 15-question self-administered survey approved by the Institutional Review Board. Surveys were distributed through U.S. postal service mail. Likert-scale questions were used to assess prior knowledge (1 = none to 5 = excellent) and attitudes toward accessing the PDMP (1 = strongly disagree to 5 = strongly agree). The study yielded a response rate of 7.8%, 71.5% of whom agreed or strongly agreed that the PDMP is a useful tool. Among participants that have access and answered the PDMP usefulness question, 94.8% agree or strongly agree that it is a useful tool. There were 63 out of 64 physicians (98.4%) who conducted 25 or more searches who agreed or strongly agreed that the PDMP is a useful tool for monitoring patients' controlled substance histories. There were 72.5% of participants with access that answered the "doctor shopping" question who agreed that "doctor shopping" will decrease. Among the 64 most frequent PDMP users, 69.4% agreed or strongly agreed that they have prescribed fewer controlled substances after accessing the PDMP. The study revealed that a majority of participants believe that the PDMP is a useful tool for monitoring patients' controlled substance histories. More continuing education programs should be provided to Florida physicians to enhance their knowledge regarding PDMPs. Wiley Periodicals, Inc.
Device Access Abstractions for Resilient Information Architecture Platform for Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dubey, Abhishek; Karsai, Gabor; Volgyesi, Peter
An open application platform distributes the intelligence and control capability to local endpoints (or nodes) reducing total network traffic, improving speed of local actions by avoiding latency, and improving reliability by reducing dependencies on numerous devices and communication interfaces. The platform must be multi-tasking and able to host multiple applications running simultaneously. Given such a system, the core functions of power grid control systems include grid state determination, low level control, fault intelligence and reconfiguration, outage intelligence, power quality measurement, remote asset monitoring, configuration management, power and energy management (including local distributed energy resources, such as wind, solar and energymore » storage) can be eventually distributed. However, making this move requires extensive regression testing of systems to prove out new technologies, such as phasor measurement units (PMU). Additionally, as the complexity of the systems increase with the inclusion of new functionality (especially at the distribution and consumer levels), hidden coupling issues becomes a challenge with possible N-way interactions known and not known by device and application developers. Therefore, it is very important to provide core abstractions that ensure uniform operational semantics across such interactions. Here in this paper, we describe the pattern for abstracting device interactions we have developed for the RIAPS platform in the context of a microgrid control application we have developed.« less
Device Access Abstractions for Resilient Information Architecture Platform for Smart Grid
Dubey, Abhishek; Karsai, Gabor; Volgyesi, Peter; ...
2018-06-12
An open application platform distributes the intelligence and control capability to local endpoints (or nodes) reducing total network traffic, improving speed of local actions by avoiding latency, and improving reliability by reducing dependencies on numerous devices and communication interfaces. The platform must be multi-tasking and able to host multiple applications running simultaneously. Given such a system, the core functions of power grid control systems include grid state determination, low level control, fault intelligence and reconfiguration, outage intelligence, power quality measurement, remote asset monitoring, configuration management, power and energy management (including local distributed energy resources, such as wind, solar and energymore » storage) can be eventually distributed. However, making this move requires extensive regression testing of systems to prove out new technologies, such as phasor measurement units (PMU). Additionally, as the complexity of the systems increase with the inclusion of new functionality (especially at the distribution and consumer levels), hidden coupling issues becomes a challenge with possible N-way interactions known and not known by device and application developers. Therefore, it is very important to provide core abstractions that ensure uniform operational semantics across such interactions. Here in this paper, we describe the pattern for abstracting device interactions we have developed for the RIAPS platform in the context of a microgrid control application we have developed.« less
Contamination and Micropropulsion Technology
2012-07-01
23, 027101 (2011) Evaluation of active flow control applied to wind turbine blade section J. Renewable Sustainable Energy 2, 063101 (2010) Effect...field lines at high latitudes where solar wind electrons can readily access the upper atmosphere. The electron energy distribution in the auroral... slip behavior of n-hexadecane in large amplitude oscillatory shear flow via nonequilibrium molecular dynamic simulation J. Chem. Phys. 136, 104904
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sunderam, Vaidy S.
2007-01-09
The Harness project has developed novel software frameworks for the execution of high-end simulations in a fault-tolerant manner on distributed resources. The H2O subsystem comprises the kernel of the Harness framework, and controls the key functions of resource management across multiple administrative domains, especially issues of access and allocation. It is based on a “pluggable” architecture that enables the aggregated use of distributed heterogeneous resources for high performance computing. The major contributions of the Harness II project result in significantly enhancing the overall computational productivity of high-end scientific applications by enabling robust, failure-resilient computations on cooperatively pooled resource collections.
Use of EPANET solver to manage water distribution in Smart City
NASA Astrophysics Data System (ADS)
Antonowicz, A.; Brodziak, R.; Bylka, J.; Mazurkiewicz, J.; Wojtecki, S.; Zakrzewski, P.
2018-02-01
Paper presents a method of using EPANET solver to support manage water distribution system in Smart City. The main task is to develop the application that allows remote access to the simulation model of the water distribution network developed in the EPANET environment. Application allows to perform both single and cyclic simulations with the specified step of changing the values of the selected process variables. In the paper the architecture of application was shown. The application supports the selection of the best device control algorithm using optimization methods. Optimization procedures are possible with following methods: brute force, SLSQP (Sequential Least SQuares Programming), Modified Powell Method. Article was supplemented by example of using developed computer tool.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-27
... distribution, including youth access, and advertising and promotion restrictions issued under section 906(d) of... the sale and distribution, including youth access to, and the advertising and promotion of, cigarettes... access, and advertising and promotion of cigarettes and smokeless tobacco. The guidance recommends that...
NASA Astrophysics Data System (ADS)
Arenaccio, S.; Vernucci, A.; Padovani, R.; Arcidiacono, A.
Results of a detailed comparative performance assessment between two candidate access solutions for the provision of land-mobile services, i.e., FDMA and CDMA, for the European Land-Mobile Satellite Services (LMSS) provision are presented. The design of the CDMA access system and the network architecture, system procedures, network control, operation in fading environments, and implementation aspects of the system are described. The CDMA system is shown to yield superior traffic capability, despite the absence of polarization reuse due to payload design, especially in the second-generation era (multiple spot-beams). In this case, the advantage was found to be largely dependent on the traffic distribution across spot beams. Power control techniques are proposed to cope with the geographical disadvantage suffered by mobile stations located at the beam borders to compensate for fadings.
2013-01-01
This editorial introduces the 'Right time, Right place: improving access to health service through effective retention and distribution of health workers’ thematic series. This series draws from studies in a range of countries and provides new insights into what can be done to improve access to health through more effective human resources policies, planning and management. The primary focus is on health workforce distribution and retention. PMID:24274820
NASA Technical Reports Server (NTRS)
Moore, Reagan W.; Jagatheesan, Arun; Rajasekar, Arcot; Wan, Michael; Schroeder, Wayne
2004-01-01
The "Grid" is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are being built around the world as the next generation data handling systems for sharing, publishing, and preserving data residing on storage systems located in multiple administrative domains. A data grid provides logical namespaces for users, digital entities and storage resources to create persistent identifiers for controlling access, enabling discovery, and managing wide area latencies. This paper introduces data grids and describes data grid use cases. The relevance of data grids to digital libraries and persistent archives is demonstrated, and research issues in data grids and grid dataflow management systems are discussed.
Butts, Jessica; Ranaivoharimina, Harilala; Cotte, Annett H.; Ramarosandratana, Benjamin; Rabarijaona, Henintsoa; Tuseo, Luciano; Chang, Michelle; Vanden Eng, Jodi
2017-01-01
Background Madagascar conducted the first two phases of a national free mass distribution campaign of long-lasting insecticidal nets (LLINs) during a political crisis in 2009 aiming to achieve coverage of two LLINs per household as part of the National Malaria Control Strategy. The campaign targeted households in 19 out of 91 total health districts. Methods A community-based cross-sectional household survey using a three-stage cluster sample design was conducted four months post campaign to assess LLIN ownership, access and use. Multivariable logistic regression analysis was used to identify factors associated with household LLIN access and individual LLIN use. Results A total of 2211 households were surveyed representing 8867 people. At least one LLIN was present in 93.5% (95% confidence interval [CI], 91.6–95.5%) of households and 74.8% (95% CI, 71.0–78.6%) owned at least two LLINs. Access measured as the proportion of the population that could potentially be covered by household-owned LLINs was 77.2% (77.2% (95% CI, 72.9–81.3%) and LLIN use by all individuals was 84.2% (95% CI, 81.2–87.2%). LLIN use was associated with knowledge of insecticide treated net use to prevent malaria (OR = 3.58, 95% CI, 1.85–6.94), household ownership of more LLINs (OR 2.82, 95% CI 1.85–4.3), presence of children under five (OR = 2.05, 95% CI, 1.67–2.51), having traveled to the distribution point and receiving information about hanging a bednet (OR = 1.56, 95% CI, 1.41–1.74), and having received a post-campaign visit by a community mobilizer (OR = 1.75, 95% CI, 1.26–2.43). Lower LLIN use was associated with increasing household size (OR = 0.81 95% CI 0.77–0.85) and number of sleeping spaces (OR = 0.55, 95% CI, 0.44–0.68). Conclusions A large scale free mass LLIN distribution campaign was feasible and effective at achieving high LLIN access and use in Madagascar. Campaign process indicators highlighted potential areas for strengthening implementation to optimize access and equity. PMID:28850631
40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off... consequence analysis data elements. 1400.5 Section 1400.5 Protection of Environment ENVIRONMENTAL PROTECTION...
40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off... consequence analysis data elements. 1400.5 Section 1400.5 Protection of Environment ENVIRONMENTAL PROTECTION...
40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off... consequence analysis data elements. 1400.5 Section 1400.5 Protection of Environment ENVIRONMENTAL PROTECTION...
Distributed multiport memory architecture
NASA Technical Reports Server (NTRS)
Kohl, W. H. (Inventor)
1983-01-01
A multiport memory architecture is diclosed for each of a plurality of task centers connected to a command and data bus. Each task center, includes a memory and a plurality of devices which request direct memory access as needed. The memory includes an internal data bus and an internal address bus to which the devices are connected, and direct timing and control logic comprised of a 10-state ring counter for allocating memory devices by enabling AND gates connected to the request signal lines of the devices. The outputs of AND gates connected to the same device are combined by OR gates to form an acknowledgement signal that enables the devices to address the memory during the next clock period. The length of the ring counter may be effectively lengthened to any multiple of ten to allow for more direct memory access intervals in one repetitive sequence. One device is a network bus adapter which serially shifts onto the command and data bus, a data word (8 bits plus control and parity bits) during the next ten direct memory access intervals after it has been granted access. The NBA is therefore allocated only one access in every ten intervals, which is a predetermined interval for all centers. The ring counters of all centers are periodically synchronized by DMA SYNC signal to assure that all NBAs be able to function in synchronism for data transfer from one center to another.
Simione, Luca; Raffone, Antonino; Wolters, Gezinus; Salmas, Paola; Nakatani, Chie; Belardinelli, Marta Olivetti; van Leeuwen, Cees
2012-10-01
Two separate lines of study have clarified the role of selectivity in conscious access to visual information. Both involve presenting multiple targets and distracters: one simultaneously in a spatially distributed fashion, the other sequentially at a single location. To understand their findings in a unified framework, we propose a neurodynamic model for Visual Selection and Awareness (ViSA). ViSA supports the view that neural representations for conscious access and visuo-spatial working memory are globally distributed and are based on recurrent interactions between perceptual and access control processors. Its flexible global workspace mechanisms enable a unitary account of a broad range of effects: It accounts for the limited storage capacity of visuo-spatial working memory, attentional cueing, and efficient selection with multi-object displays, as well as for the attentional blink and associated sparing and masking effects. In particular, the speed of consolidation for storage in visuo-spatial working memory in ViSA is not fixed but depends adaptively on the input and recurrent signaling. Slowing down of consolidation due to weak bottom-up and recurrent input as a result of brief presentation and masking leads to the attentional blink. Thus, ViSA goes beyond earlier 2-stage and neuronal global workspace accounts of conscious processing limitations. PsycINFO Database Record (c) 2012 APA, all rights reserved.
Arroz, Jorge A H; Mendis, Chandana; Pinto, Liliana; Candrinho, Baltazar; Pinto, João; Martins, Maria do Rosário O
2017-10-25
The universal coverage bed nets campaign is a proven health intervention promoting increased access, ownership, and use of bed nets to reduce malaria burden. This article describes the intervention and implementation strategies that Mozambique carried out recently in order to improve access and increase demand for long-lasting insecticidal nets (LLINs). A before-and-after study with a control group was used during Stage I of the implementation process. The following strategies were tested in Stage I: (1) use of coupons during household registration; (2) use of stickers to identify the registered households; (3) new LLIN ascription formula (one LLIN for every two people). In Stage II, the following additional strategies were implemented: (4) mapping and micro-planning; (5) training; and (6) supervision. Odds ratio (OR) and 95% confidence interval (CI) were used to compare and establish differences between intervened and control districts in Stage I. Main outcomes were: percentage of LLINs distributed, percentage of target households benefited. In Stage I, 87.8% (302,648) of planned LLINs were distributed in the intervention districts compared to 77.1% (219,613) in the control districts [OR: 2.14 (95% CI 2.11-2.16)]. Stage I results also showed that 80.6% (110,453) of households received at least one LLIN in the intervention districts compared to 72.8% (87,636) in the control districts [OR: 1.56 (95% CI 1.53-1.59)]. In Stage II, 98.4% (3,536,839) of the allocated LLINs were delivered, covering 98.6% (1,353,827) of the registered households. Stage I results achieved better LLINs and household coverage in districts with the newly implemented strategies. The results of stage II were also encouraging. Additional strategies adaptation is required for a wide-country LLIN campaign.
Xiao, Yan; Dexter, Franklin; Hu, Peter; Dutton, Richard P
2008-02-01
On the day of surgery, real-time information of both room occupancy and activities within the operating room (OR) is needed for management of staff, equipment, and unexpected events. A status display system showed color OR video with controllable image quality and showed times that patients entered and exited each OR (obtained automatically). The system was installed and its use was studied in a 6-OR trauma suite and at four locations in a 19-OR tertiary suite. Trauma staff were surveyed for their perceptions of the system. Evidence of staff acceptance of distributed OR video included its operational use for >3 yr in the two suites, with no administrative complaints. Individuals of all job categories used the video. Anesthesiologists were the most frequent users for more than half of the days (95% confidence interval [CI] >50%) in the tertiary ORs. The OR charge nurses accessed the video mostly early in the day when the OR occupancy was high. In comparison (P < 0.001), anesthesiologists accessed it mostly at the end of the workday when occupancy was declining and few cases were starting. Of all 30-min periods during which the video was accessed in the trauma suite, many accesses (95% CI >42%) occurred in periods with no cases starting or ending (i.e., the video was used during the middle of cases). The three stated reasons for using video that had median surveyed responses of "very useful" were "to see if cases are finished," "to see if a room is ready," and "to see when cases are about to finish." Our nurses and physicians both accepted and used distributed OR video as it provided useful information, regardless of whether real-time display of milestones was available (e.g., through anesthesia information system data).
Storing, Browsing, Querying, and Sharing Data: the THREDDS Data Repository (TDR)
NASA Astrophysics Data System (ADS)
Wilson, A.; Lindholm, D.; Baltzer, T.
2005-12-01
The Unidata Internet Data Distribution (IDD) network delivers gigabytes of data per day in near real time to sites across the U.S. and beyond. The THREDDS Data Server (TDS) supports public browsing of metadata and data access via OPeNDAP enabled URLs for datasets such as these. With such large quantities of data, sites generally employ a simple data management policy, keeping the data for a relatively short term on the order of hours to perhaps a week or two. In order to save interesting data in longer term storage and make it available for sharing, a user must move the data herself. In this case the user is responsible for determining where space is available, executing the data movement, generating any desired metadata, and setting access control to enable sharing. This task sequence is generally based on execution of a sequence of low level operating system specific commands with significant user involvement. The LEAD (Linked Environments for Atmospheric Discovery) project is building a cyberinfrastructure to support research and education in mesoscale meteorology. LEAD orchestrations require large, robust, and reliable storage with speedy access to stage data and store both intermediate and final results. These requirements suggest storage solutions that involve distributed storage, replication, and interfacing to archival storage systems such as mass storage systems and tape or removable disks. LEAD requirements also include metadata generation and access in order to support querying. In support of both THREDDS and LEAD requirements, Unidata is designing and prototyping the THREDDS Data Repository (TDR), a framework for a modular data repository to support distributed data storage and retrieval using a variety of back end storage media and interchangeable software components. The TDR interface will provide high level abstractions for long term storage, controlled, fast and reliable access, and data movement capabilities via a variety of technologies such as OPeNDAP and gridftp. The modular structure will allow substitution of software components so that both simple and complex storage media can be integrated into the repository. It will also allow integration of different varieties of supporting software. For example, if replication is desired, replica management could be handled via a simple hash table or a complex solution such as Replica Locater Service (RLS). In order to ensure that metadata is available for all the data in the repository, the TDR will also generate THREDDS metadata when necessary. Users will be able to establish levels of access control to their metadata and data. Coupled with a THREDDS Data Server, both browsing via THREDDS catalogs and querying capabilities will be supported. This presentation will describe the motivating factors, current status, and future plans of the TDR. References: IDD: http://www.unidata.ucar.edu/content/software/idd/index.html THREDDS: http://www.unidata.ucar.edu/content/projects/THREDDS/tech/server/ServerStatus.html LEAD: http://lead.ou.edu/ RLS: http://www.isi.edu/~annc/papers/chervenakRLSjournal05.pdf
Network-based production quality control
NASA Astrophysics Data System (ADS)
Kwon, Yongjin; Tseng, Bill; Chiou, Richard
2007-09-01
This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.
Distributed and accumulated reinforcement arrangements: evaluations of efficacy and preference.
DeLeon, Iser G; Chase, Julie A; Frank-Crawford, Michelle A; Carreau-Webster, Abbey B; Triggs, Mandy M; Bullock, Christopher E; Jennett, Heather K
2014-01-01
We assessed the efficacy of, and preference for, accumulated access to reinforcers, which allows uninterrupted engagement with the reinforcers but imposes an inherent delay required to first complete the task. Experiment 1 compared rates of task completion in 4 individuals who had been diagnosed with intellectual disabilities when reinforcement was distributed (i.e., 30-s access to the reinforcer delivered immediately after each response) and accumulated (i.e., 5-min access to the reinforcer after completion of multiple consecutive responses). Accumulated reinforcement produced response rates that equaled or exceeded rates during distributed reinforcement for 3 participants. Experiment 2 used a concurrent-chains schedule to examine preferences for each arrangement. All participants preferred delayed, accumulated access when the reinforcer was an activity. Three participants also preferred accumulated access to edible reinforcers. The collective results suggest that, despite the inherent delay, accumulated reinforcement is just as effective and is often preferred by learners over distributed reinforcement. © Society for the Experimental Analysis of Behavior.
8. Perimeter acquisition radar power plant room #211, battery equipment ...
8. Perimeter acquisition radar power plant room #211, battery equipment room; showing battery racks. The dc power of these batteries is distributed to motor-control centers, the annunciator system, and fire alarm and tripping circuits - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Power Plant, In Limited Access Area, Southwest of PARB at end of Service Road B, Nekoma, Cavalier County, ND
DOE Office of Scientific and Technical Information (OSTI.GOV)
Youssef, Tarek A.; Elsayed, Ahmed T.; Mohammed, Osama A.
This study presents the design and implementation of a communication and control infrastructure for smart grid operation. The proposed infrastructure enhances the reliability of the measurements and control network. The advantages of utilizing the data-centric over message-centric communication approach are discussed in the context of smart grid applications. The data distribution service (DDS) is used to implement a data-centric common data bus for the smart grid. This common data bus improves the communication reliability, enabling distributed control and smart load management. These enhancements are achieved by avoiding a single point of failure while enabling peer-to-peer communication and an automatic discoverymore » feature for dynamic participating nodes. The infrastructure and ideas presented in this paper were implemented and tested on the smart grid testbed. A toolbox and application programing interface for the testbed infrastructure are developed in order to facilitate interoperability and remote access to the testbed. This interface allows control, monitoring, and performing of experiments remotely. Furthermore, it could be used to integrate multidisciplinary testbeds to study complex cyber-physical systems (CPS).« less
Clasen, Thomas F; Brown, Joseph; Collin, Simon; Suntura, Oscar; Cairncross, Sandy
2004-06-01
Ceramic water filters have been identified as one of the most promising and accessible technologies for treating water at the household level. In a six-month trial, water filters were distributed randomly to half of the 50 participating households in a rural community in Bolivia; the remaining households continued to use customary water handling practices and served as controls. In four rounds of sampling following distribution of the filters, 100% of the 96 water samples from the filter households were free of thermotolerant coliforms compared with 15.5% of the control household samples. Diarrheal disease risk for individuals in intervention households was 70% lower than for controls (95% confidence interval [CI] = 53-80%; P < 0.001). For children less than five years old, the reduction in risk was 83% (95% CI = 51-94%; P < 0.001). These results show that affordable ceramic water filters enable low-income households to treat and maintain the microbiologic quality of their drinking water.
In-house access to PACS images and related data through World Wide Web
NASA Astrophysics Data System (ADS)
Mascarini, Christian; Ratib, Osman M.; Trayser, Gerhard; Ligier, Yves; Appel, R. D.
1996-05-01
The development of a hospital wide PACS is in progress at the University Hospital of Geneva and several archive modules are operational since 1992. This PACS is intended for wide distribution of images to clinical wards. As the PACS project and the number of archived images grow rapidly in the hospital, it was necessary to provide an easy, more widely accessible and convenient access to the PACS database for the clinicians in the different wards and clinical units of the hospital. An innovative solution has been developed using tools such as Netscape navigator and NCSA World Wide Web server as an alternative to conventional database query and retrieval software. These tools present the advantages of providing an user interface which is the same independently of the platform being used (Mac, Windows, UNIX, ...), and an easy integration of different types of documents (text, images, ...). A strict access control has been added to this interface. It allows user identification and access rights checking, as defined by the in-house hospital information system, before allowing the navigation through patient data records.
Flexible services for the support of research.
Turilli, Matteo; Wallom, David; Williams, Chris; Gough, Steve; Curran, Neal; Tarrant, Richard; Bretherton, Dan; Powell, Andy; Johnson, Matt; Harmer, Terry; Wright, Peter; Gordon, John
2013-01-28
Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations. Initially devised by corporations with direct control over large amounts of computational resources, cloud computing is now being endorsed by organizations with limited resources or with a more articulated, less direct control over these resources. The challenge for these organizations is to leverage the benefits of cloud computing while dealing with limited and often widely distributed computing resources. This study focuses on the adoption of cloud computing by higher education institutions and addresses two main issues: flexible and on-demand access to a large amount of storage resources, and scalability across a heterogeneous set of cloud infrastructures. The proposed solutions leverage a federated approach to cloud resources in which users access multiple and largely independent cloud infrastructures through a highly customizable broker layer. This approach allows for a uniform authentication and authorization infrastructure, a fine-grained policy specification and the aggregation of accounting and monitoring. Within a loosely coupled federation of cloud infrastructures, users can access vast amount of data without copying them across cloud infrastructures and can scale their resource provisions when the local cloud resources become insufficient.
New control system for the 1.5m and 0.9m telescopes at Sierra Nevada Observatory
NASA Astrophysics Data System (ADS)
Costillo, Luis P.; Ramos, J. Luis; Ibáñez, J. Miguel; Aparicio, Beatriz; Herránz, Miguel; García, Antonio J.
2006-06-01
The Sierra Nevada Observatory (Granada, Spain) has a number of telescopes. Our study will focus on two Nasmyth telescopes with apertures of 1.5m and 0.9m and an equatorial mount. The system currently installed to control these telescopes is a 1995 centralized VME module. However, given the problems which have arisen due to the number of wires and other complications, we have decided to change this control module. We will control each telescope with a distributed control philosophy, using a serial linear communication bus between independent nodes, although all system capabilities are accessible from a central unit anywhere and at any time via internet. We have divided the tasks and have one node for alpha control, another for delta control, one for the dome, one for the focus and the central unit to interface with a pc. The nodes for alpha, delta and the dome will be used by means of FPGA's in order to efficiently sample the encoders and the control algorithms, and to generate the output for the motors and the servo. The focus will have a microcontroller, and the system is easy to expand in the event of the inclusion of more nodes. After having studied several fieldbus systems, we have opted for the CAN bus, because of its reliability and broadcasting possibilities. In this way, all the important information will be on the bus, and every node will be able to access the information at any time. This document explains the new design made in the IAA for the new consoles of control whose basic characteristics are, the distributed control, the hardware simplify, the cable remove, the safety and maintenance improve and facilitating the observation improving the interface with the user, and finally to prepare the system for the remote observation.
Meng, Xianzhi; Wells, Tyrone; Sun, Qining; ...
2015-06-19
Pretreatment is known to render biomass more reactive to cellulase by altering the chemical compositions as well as physical structures of biomass. Simons stain technique along with mercury porosimetry were applied on the acid, neutral, and alkaline pretreated materials to measure the accessible surface area of cellulose and pore size distribution of Populus. Results indicated that acid pretreatment is much more effective than water and alkaline pretreatment in terms of cellulose accessibility increase. Further investigation suggests that lignin does not dictate cellulose accessibility to the extent that hemicellulose does, but it does restrict xylan accessibility which in turn controls themore » access of cellulase to cellulose. The most interesting finding is that severe acid pretreatment significantly decreases the average pore size, i.e., 90% average size decrease could be observed after 60 min dilute acid pretreatment at 160 °C; moreover, the nano-pore space formed between coated microfibrils is increased after pretreatment, especially for the acid pretreatment, suggesting this particular type of biomass porosity is probably the most fundamental barrier to effective enzymatic hydrolysis.« less
Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun
2015-08-10
With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent.
Access Protocol For An Industrial Optical Fibre LAN
NASA Astrophysics Data System (ADS)
Senior, John M.; Walker, William M.; Ryley, Alan
1987-09-01
A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.
Lee, Kilhung
2010-01-01
This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270
Fixed-interval matching-to-sample: intermatching time and intermatching error runs1
Nelson, Thomas D.
1978-01-01
Four pigeons were trained on a matching-to-sample task in which reinforcers followed either the first matching response (fixed interval) or the fifth matching response (tandem fixed-interval fixed-ratio) that occurred 80 seconds or longer after the last reinforcement. Relative frequency distributions of the matching-to-sample responses that concluded intermatching times and runs of mismatches (intermatching error runs) were computed for the final matching responses directly followed by grain access and also for the three matching responses immediately preceding the final match. Comparison of these two distributions showed that the fixed-interval schedule arranged for the preferential reinforcement of matches concluding relatively extended intermatching times and runs of mismatches. Differences in matching accuracy and rate during the fixed interval, compared to the tandem fixed-interval fixed-ratio, suggested that reinforcers following matches concluding various intermatching times and runs of mismatches influenced the rate and accuracy of the last few matches before grain access, but did not control rate and accuracy throughout the entire fixed-interval period. PMID:16812032
Human rights versus legal control over women's reproductive self-determination.
Uberoi, Diya; de Bruyn, Maria
2013-06-14
States have a duty under international human rights law to protect people's health. Nonetheless, while some health-related policies and laws protect basic human rights, others violate fundamental rights when they criminalize, prohibit, and restrict access to necessary health services. For example, laws and regulations related to protection of life from conception, contraception, actions of pregnant women, and abortion can harm women and place women and health care providers in jeopardy of legal penalization. Given the adverse consequences of punitive and restrictive laws related to pregnancy, advocates, civil society groups, human rights groups, and government institutions must work together to promote, protect, and fulfill women's fundamental reproductive rights. Copyright © 2013 Uberoi and de Bruyn. This is an open access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
De Sousa, Paul A; Steeg, Rachel; Wachter, Elisabeth; Bruce, Kevin; King, Jason; Hoeve, Marieke; Khadun, Shalinee; McConnachie, George; Holder, Julie; Kurtz, Andreas; Seltmann, Stefanie; Dewender, Johannes; Reimann, Sascha; Stacey, Glyn; O'Shea, Orla; Chapman, Charlotte; Healy, Lyn; Zimmermann, Heiko; Bolton, Bryan; Rawat, Trisha; Atkin, Isobel; Veiga, Anna; Kuebler, Bernd; Serano, Blanca Miranda; Saric, Tomo; Hescheler, Jürgen; Brüstle, Oliver; Peitz, Michael; Thiele, Cornelia; Geijsen, Niels; Holst, Bjørn; Clausen, Christian; Lako, Majlinda; Armstrong, Lyle; Gupta, Shailesh K; Kvist, Alexander J; Hicks, Ryan; Jonebring, Anna; Brolén, Gabriella; Ebneth, Andreas; Cabrera-Socorro, Alfredo; Foerch, Patrik; Geraerts, Martine; Stummann, Tina C; Harmon, Shawn; George, Carol; Streeter, Ian; Clarke, Laura; Parkinson, Helen; Harrison, Peter W; Faulconbridge, Adam; Cherubin, Luca; Burdett, Tony; Trigueros, Cesar; Patel, Minal J; Lucas, Christa; Hardy, Barry; Predan, Rok; Dokler, Joh; Brajnik, Maja; Keminer, Oliver; Pless, Ole; Gribbon, Philip; Claussen, Carsten; Ringwald, Annette; Kreisel, Beate; Courtney, Aidan; Allsopp, Timothy E
2017-04-01
A fast track "Hot Start" process was implemented to launch the European Bank for Induced Pluripotent Stem Cells (EBiSC) to provide early release of a range of established control and disease linked human induced pluripotent stem cell (hiPSC) lines. Established practice amongst consortium members was surveyed to arrive at harmonised and publically accessible Standard Operations Procedures (SOPs) for tissue procurement, bio-sample tracking, iPSC expansion, cryopreservation, qualification and distribution to the research community. These were implemented to create a quality managed foundational collection of lines and associated data made available for distribution. Here we report on the successful outcome of this experience and work flow for banking and facilitating access to an otherwise disparate European resource, with lessons to benefit the international research community. ETOC: The report focuses on the EBiSC experience of rapidly establishing an operational capacity to procure, bank and distribute a foundational collection of established hiPSC lines. It validates the feasibility and defines the challenges of harnessing and integrating the capability and productivity of centres across Europe using commonly available resources currently in the field. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.
An All-Optical Access Metro Interface for Hybrid WDM/TDM PON Based on OBS
NASA Astrophysics Data System (ADS)
Segarra, Josep; Sales, Vicent; Prat, Josep
2007-04-01
A new all-optical access metro network interface based on optical burst switching (OBS) is proposed. A hybrid wavelength-division multiplexing/time-division multiplexing (WDM/TDM) access architecture with reflective optical network units (ONUs), an arrayed-waveguide-grating outside plant, and a tunable laser stack at the optical line terminal (OLT) is presented as a solution for the passive optical network. By means of OBS and a dynamic bandwidth allocation (DBA) protocol, which polls the ONUs, the available access bandwidth is managed. All the network intelligence and costly equipment is located at the OLT, where the DBA module is centrally implemented, providing quality of service (QoS). To scale this access network, an optical cross connect (OXC) is then used to attain a large number of ONUs by the same OLT. The hybrid WDM/TDM structure is also extended toward the metropolitan area network (MAN) by introducing the concept of OBS multiplexer (OBS-M). The network element OBS-M bridges the MAN and access networks by offering all-optical cross connection, wavelength conversion, and data signaling. The proposed innovative OBS-M node yields a full optical data network, interfacing access and metro with a geographically distributed access control. The resulting novel access metro architectures are nonblocking and, with an improved signaling, provide QoS, scalability, and very low latency. Finally, numerical analysis and simulations demonstrate the traffic performance of the proposed access scheme and all-optical access metro interface and architectures.
Query Health: standards-based, cross-platform population health surveillance
Klann, Jeffrey G; Buck, Michael D; Brown, Jeffrey; Hadley, Marc; Elmore, Richard; Weber, Griffin M; Murphy, Shawn N
2014-01-01
Objective Understanding population-level health trends is essential to effectively monitor and improve public health. The Office of the National Coordinator for Health Information Technology (ONC) Query Health initiative is a collaboration to develop a national architecture for distributed, population-level health queries across diverse clinical systems with disparate data models. Here we review Query Health activities, including a standards-based methodology, an open-source reference implementation, and three pilot projects. Materials and methods Query Health defined a standards-based approach for distributed population health queries, using an ontology based on the Quality Data Model and Consolidated Clinical Document Architecture, Health Quality Measures Format (HQMF) as the query language, the Query Envelope as the secure transport layer, and the Quality Reporting Document Architecture as the result language. Results We implemented this approach using Informatics for Integrating Biology and the Bedside (i2b2) and hQuery for data analytics and PopMedNet for access control, secure query distribution, and response. We deployed the reference implementation at three pilot sites: two public health departments (New York City and Massachusetts) and one pilot designed to support Food and Drug Administration post-market safety surveillance activities. The pilots were successful, although improved cross-platform data normalization is needed. Discussions This initiative resulted in a standards-based methodology for population health queries, a reference implementation, and revision of the HQMF standard. It also informed future directions regarding interoperability and data access for ONC's Data Access Framework initiative. Conclusions Query Health was a test of the learning health system that supplied a functional methodology and reference implementation for distributed population health queries that has been validated at three sites. PMID:24699371
Query Health: standards-based, cross-platform population health surveillance.
Klann, Jeffrey G; Buck, Michael D; Brown, Jeffrey; Hadley, Marc; Elmore, Richard; Weber, Griffin M; Murphy, Shawn N
2014-01-01
Understanding population-level health trends is essential to effectively monitor and improve public health. The Office of the National Coordinator for Health Information Technology (ONC) Query Health initiative is a collaboration to develop a national architecture for distributed, population-level health queries across diverse clinical systems with disparate data models. Here we review Query Health activities, including a standards-based methodology, an open-source reference implementation, and three pilot projects. Query Health defined a standards-based approach for distributed population health queries, using an ontology based on the Quality Data Model and Consolidated Clinical Document Architecture, Health Quality Measures Format (HQMF) as the query language, the Query Envelope as the secure transport layer, and the Quality Reporting Document Architecture as the result language. We implemented this approach using Informatics for Integrating Biology and the Bedside (i2b2) and hQuery for data analytics and PopMedNet for access control, secure query distribution, and response. We deployed the reference implementation at three pilot sites: two public health departments (New York City and Massachusetts) and one pilot designed to support Food and Drug Administration post-market safety surveillance activities. The pilots were successful, although improved cross-platform data normalization is needed. This initiative resulted in a standards-based methodology for population health queries, a reference implementation, and revision of the HQMF standard. It also informed future directions regarding interoperability and data access for ONC's Data Access Framework initiative. Query Health was a test of the learning health system that supplied a functional methodology and reference implementation for distributed population health queries that has been validated at three sites. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Heterogeneous distributed query processing: The DAVID system
NASA Technical Reports Server (NTRS)
Jacobs, Barry E.
1985-01-01
The objective of the Distributed Access View Integrated Database (DAVID) project is the development of an easy to use computer system with which NASA scientists, engineers and administrators can uniformly access distributed heterogeneous databases. Basically, DAVID will be a database management system that sits alongside already existing database and file management systems. Its function is to enable users to access the data in other languages and file systems without having to learn the data manipulation languages. Given here is an outline of a talk on the DAVID project and several charts.
The Implications of Lowering the Cost to Access Space on Airpower
2017-06-01
1 The Implications of Lowering the Cost to Access Space on Airpower Major Gabe Arrington School of Advanced Air and Space Studies...2017 DISTRIBUTION A: Approved for public release: distribution unlimited 2 Disclaimer Opinions, conclusions, and recommendations...implications that lowering the cost to access space will have on Airpower. The research conducted used predominantly qualitative research techniques to
Applications of Intelligent Technology to Power System Supervisory Control and Protection Systems
NASA Astrophysics Data System (ADS)
Nagata, Takeshi
Power system supervisory control and protection systems provide utilities with capabilities that are key to a planning business function, i.e., delivering power in a reliable and safe manner. A quality system solution is central to effective operation of a utility's most critical and costly generation, transmission, and distribution assets. The challenging issues for these systems today are not the same as they were few years ago. Today, there is much more placed on integration, use of new IT technologies, and access to information for more purposes. This article presents the topics of intelligent technology to the power system supervisory control and protection systems.
Selecting Lentil Accessions for Global Selenium Biofortification
Thavarajah, Dil; Abare, Alex; Mapa, Indika; Coyne, Clarice J.; Thavarajah, Pushparajah; Kumar, Shiv
2017-01-01
The biofortification of lentil (Lens culinaris Medikus.) has the potential to provide adequate daily selenium (Se) to human diets. The objectives of this study were to (1) determine how low-dose Se fertilizer application at germination affects seedling biomass, antioxidant activity, and Se uptake of 26 cultivated lentil genotypes; and (2) quantify the seed Se concentration of 191 lentil wild accessions grown in Terbol, Lebanon. A germination study was conducted with two Se treatments [0 (control) and 30 kg of Se/ha] with three replicates. A separate field study was conducted in Lebanon for wild accessions without Se fertilizer. Among cultivated lentil accessions, PI533690 and PI533693 showed >100% biomass increase vs. controls. Se addition significantly increased seedling Se uptake, with the greatest uptake (6.2 µg g−1) by PI320937 and the least uptake (1.1 µg g−1) by W627780. Seed Se concentrations of wild accessions ranged from 0 to 2.5 µg g−1; accessions originating from Syria (0–2.5 µg g−1) and Turkey (0–2.4 µg g−1) had the highest seed Se. Frequency distribution analysis revealed that seed Se for 63% of accessions was between 0.25 and 0.75 µg g−1, and thus a single 50 g serving of lentil has the potential to provide adequate dietary Se (20–60% of daily recommended daily allowance). As such, Se application during plant growth for certain lentil genotypes grown in low Se soils may be a sustainable Se biofortification solution to increase seed Se concentration. Incorporating a diverse panel of lentil wild germplasm into Se biofortification programs will increase genetic diversity for effective genetic mapping for increased lentil seed Se nutrition and plant productivity. PMID:28846602
NASA Astrophysics Data System (ADS)
Ye, Yu; Xiao, Jun; Wang, Hailong; Ye, Ziliang; Zhu, Hanyu; Zhao, Mervin; Wang, Yuan; Zhao, Jianhua; Yin, Xiaobo; Zhang, Xiang
2016-07-01
Electrically controlling the flow of charge carriers is the foundation of modern electronics. By accessing the extra spin degree of freedom (DOF) in electronics, spintronics allows for information processes such as magnetoresistive random-access memory. Recently, atomic membranes of transition metal dichalcogenides (TMDCs) were found to support unequal and distinguishable carrier distribution in different crystal momentum valleys. This valley polarization of carriers enables a new DOF for information processing. A variety of valleytronic devices such as valley filters and valves have been proposed, and optical valley excitation has been observed. However, to realize its potential in electronics it is necessary to electrically control the valley DOF, which has so far remained a significant challenge. Here, we experimentally demonstrate the electrical generation and control of valley polarization. This is achieved through spin injection via a diluted ferromagnetic semiconductor and measured through the helicity of the electroluminescence due to the spin-valley locking in TMDC monolayers. We also report a new scheme of electronic devices that combine both the spin and valley DOFs. Such direct electrical generation and control of valley carriers opens up new dimensions in utilizing both the spin and valley DOFs for next-generation electronics and computing.
NASA Astrophysics Data System (ADS)
Liu, Lu; Tong, Yibin; Zhao, Zhigang; Zhang, Xuefen
2018-03-01
Large-scale access of distributed residential photovoltaic (PV) in rural areas has solved the voltage problem to a certain extent. However, due to the intermittency of PV and the particularity of rural residents’ power load, the problem of low voltage in the evening peak remains to be resolved. This paper proposes to solve the problem by accessing residential energy storage. Firstly, the influence of access location and capacity of energy storage on voltage distribution in rural distribution network is analyzed. Secondly, the relation between the storage capacity and load capacity is deduced for four typical load and energy storage cases when the voltage deviation meets the demand. Finally, the optimal storage position and capacity are obtained by using PSO and power flow simulation.
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
NASA Astrophysics Data System (ADS)
Li, Fengjun; Luo, Bo; Liu, Peng; Squicciarini, Anna C.; Lee, Dongwon; Chu, Chao-Hsien
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and secure information sharing. However, most of the solutions proposed so far are built atop of conventional data warehousing or distributed database technologies.
An Evaluation of the Coupled LVT Concept.
1979-11-01
DISTRIBUT’ION/ AVAILABILIT Y CODES DIST AVAIL AND/ORt SPECIAL DATE ACCESSIONED DIST RIBUTION STAMP 81 7 17 006 DATE RECEIVED IN DTIC PHOTOGRAPH THIS...with the objective of improving the land and water performance. Recommendations are made for a coupling system and its controls and for an articulated...configuration. The advantages in land and water performance, as well as the drawbacks, are presented in comparison to single vehicles. The advantages
Privacy protection in HealthGrid: distributing encryption management over the VO.
Torres, Erik; de Alfonso, Carlos; Blanquer, Ignacio; Hernández, Vicente
2006-01-01
Grid technologies have proven to be very successful in tackling challenging problems in which data access and processing is a bottleneck. Notwithstanding the benefits that Grid technologies could have in Health applications, privacy leakages of current DataGrid technologies due to the sharing of data in VOs and the use of remote resources, compromise its widespreading. Privacy control for Grid technology has become a key requirement for the adoption of Grids in the Healthcare sector. Encrypted storage of confidential data effectively reduces the risk of disclosure. A self-enforcing scheme for encrypted data storage can be achieved by combining Grid security systems with distributed key management and classical cryptography techniques. Virtual Organizations, as the main unit of user management in Grid, can provide a way to organize key sharing, access control lists and secure encryption management. This paper provides programming models and discusses the value, costs and behavior of such a system implemented on top of one of the latest Grid middlewares. This work is partially funded by the Spanish Ministry of Science and Technology in the frame of the project Investigación y Desarrollo de Servicios GRID: Aplicación a Modelos Cliente-Servidor, Colaborativos y de Alta Productividad, with reference TIC2003-01318.
Software Support during a Control Room Upgrade
DOE Office of Scientific and Technical Information (OSTI.GOV)
Michele Joyce; Michael Spata; Thomas Oren
2005-09-21
In 2004, after 14 years of accelerator operations and commissioning, Jefferson Lab renovated its main control room. Changes in technology and lessons learned during those 14 years drove the control room redesign in a new direction, one that optimizes workflow and makes critical information and controls available to everyone in the control room. Fundamental changes in a variety of software applications were required to facilitate the new operating paradigm. A critical component of the new control room design is a large-format video wall that is used to make a variety of operating information available to everyone in the room. Analogmore » devices such as oscilloscopes and function generators are now displayed on the video wall through two crosspoint switchers: one for analog signals and another for video signals. A new software GUI replaces manual configuration of the oscilloscopes and function generators and helps automate setup. Monitoring screens, customized for the video wall, now make important operating information visible to everyone, not just a single operator. New alarm handler software gives any operator, on any workstation, access to all alarm handler functionality, and multiple users can now contribute to a single electronic logbook entry. To further support the shift to distributed access and control, many applications have been redesigned to run on servers instead of on individual workstations.« less
Access control mechanism of wireless gateway based on open flow
NASA Astrophysics Data System (ADS)
Peng, Rong; Ding, Lei
2017-08-01
In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.
Barriers to malaria control in rural south-west Timor-Leste: a qualitative analysis.
Neave, Penny E; Soares, Maria L
2014-01-01
Malaria is an important health problem in Timor-Leste. Although funding has been provided to reduce the burden of this disease, few studies have investigated whether this has improved malaria-related knowledge, management of symptoms, and treatment in rural communities. The aim of this study was to explore the perceptions and practices undertaken in relation to all aspects of malaria control by members of two rural communities in Timor-Leste. A qualitative study was undertaken in two rural hamlets in Timor-Leste. Research methods included transect walks, focus groups and semi-structured interviews. Content analysis was used to identify themes. The location of the hamlets near rice fields, leaking taps, inadequate water supplies and dumping of waste from the local hospital provided opportunities for mosquitoes to breed. Most participants were aware of the link between mosquitoes and malaria, but a lack of control over their environment was a major barrierto preventing malaria. The distribution ofbed nets had occurred once, and was the only intervention undertaken bythe National Malaria Control Programme. However, limiting the distribution of bed nets to pregnant women and children aged under 5 years had resulted in some focus group respondents believing that only those in these groups could be affected by malaria. Self-diagnosis and home treatmentwere common. Treatment for unresolved infections depended on access to transport funds, and belief in the power of traditional healers. Improvements in infrastructure, empowerment of rural communities, and better access to treatment are recommended if the incidence of malaria is to be reduced throughout the country.
Changing an automated drug inventory control system to a data base design.
Bradish, R A
1982-09-01
A pharmacy department's change from indexed sequential access files to a data base management system (DBMS) for purposes of automated inventory control is described. The DBMS has three main functional areas: (1) inventory ordering and accountability, (2) charging of interdepartmental and intradepartmental orders, and (3) data manipulation with report design for management control. There are seven files directly related to the inventory ordering and accountability area. Each record can be accessed directly or through another file. Information on the quantity of a drug on hand, drug(s) supplied by a specific vendor, status of a purchase order, or calculation of an estimated order quantity can be retrieved quickly. In the drug master file, two records contain a reorder point and safety-stock level that are determined by searching the entries in the order history file and vendor master file. The intradepartmental and interdepartmental orders section contains five files assigned to record and store information on drug distribution. All items removed from the stockroom and distributed are recorded, and reports can be generated for itemized bills, total cost by area, and as formatted files for the accounts payable department. The design, development, and implementation of the DBMS took approximately a year using a part-time pharmacist and minimal outside help, while the previous system required constant expensive help of a programmer/analyst. The DBMS has given the pharmacy department a flexible inventory management system with increased drug control, decreased operating expenses, increased use of department personnel, and the ability to develop and enhance other systems.
2008-09-01
NPS-OC-08-005 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA Approved for public release; distribution is...official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public...release; distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) A universally accessible web-based marine
An Attribute Based Access Control Framework for Healthcare System
NASA Astrophysics Data System (ADS)
Afshar, Majid; Samet, Saeed; Hu, Ting
2018-01-01
Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.
Device Oriented Project Controller
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dalesio, Leo; Kraimer, Martin
2013-11-20
This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions havemore » been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.« less
de Beyl, Celine Zegers; Kilian, Albert; Brown, Andrea; Sy-Ar, Mohamad; Selby, Richmond Ato; Randriamanantenasoa, Felicien; Ranaivosoa, Jocelyn; Zigirumugabe, Sixte; Gerberg, Lilia; Fotheringham, Megan; Lynch, Matthew; Koenker, Hannah
2017-08-10
Continuous distribution of insecticide-treated nets (ITNs) is thought to be an effective mechanism to maintain ITN ownership and access between or in the absence of mass campaigns, but evidence is limited. A community-based ITN distribution pilot was implemented and evaluated in Toamasina II District, Madagascar, to assess this new channel for continuous ITN distribution. Beginning 9 months after the December 2012 mass campaign, a community-based distribution pilot ran for an additional 9 months, from September 2013 to June 2014. Households requested ITN coupons from community agents in their village. After verification by the agents, households exchanged the coupon for an ITN at a distribution point. The evaluation was a two-stage cluster survey with a sample size of 1125 households. Counterfactual ITN ownership and access were calculated by excluding ITNs received through the community pilot. At the end of the pilot, household ownership of any ITN was 96.5%, population access to ITN was 81.5 and 61.5% of households owned at least 1 ITN for every 2 people. Without the ITNs provided through the community channel, household ownership of any ITN was estimated at 74.6%, population access to an ITN at 55.5%, and households that owned at least 1 ITN for 2 people at only 34.7%, 18 months after the 2012 campaign. Ownership of community-distributed ITNs was higher among the poorest wealth quintiles. Over 80% of respondents felt the community scheme was fair and simple to use. Household ITN ownership and population ITN access exceeded RBM targets after the 9-month community distribution pilot. The pilot successfully provided coupons and ITNs to households requesting them, particularly for the least poor wealth quintiles, and the scheme was well-perceived by communities. Further research is needed to determine whether community-based distribution can sustain ITN ownership and access over the long term, how continuous availability of ITNs affects household net replacement behaviour, and whether community-based distribution is cost-effective when combined with mass campaigns, or if used with other continuous channels instead of mass campaigns.
Analysis of the access patterns at GSFC distributed active archive center
NASA Technical Reports Server (NTRS)
Johnson, Theodore; Bedet, Jean-Jacques
1996-01-01
The Goddard Space Flight Center (GSFC) Distributed Active Archive Center (DAAC) has been operational for more than two years. Its mission is to support existing and pre Earth Observing System (EOS) Earth science datasets, facilitate the scientific research, and test Earth Observing System Data and Information System (EOSDIS) concepts. Over 550,000 files and documents have been archived, and more than six Terabytes have been distributed to the scientific community. Information about user request and file access patterns, and their impact on system loading, is needed to optimize current operations and to plan for future archives. To facilitate the management of daily activities, the GSFC DAAC has developed a data base system to track correspondence, requests, ingestion and distribution. In addition, several log files which record transactions on Unitree are maintained and periodically examined. This study identifies some of the users' requests and file access patterns at the GSFC DAAC during 1995. The analysis is limited to the subset of orders for which the data files are under the control of the Hierarchical Storage Management (HSM) Unitree. The results show that most of the data volume ordered was for two data products. The volume was also mostly made up of level 3 and 4 data and most of the volume was distributed on 8 mm and 4 mm tapes. In addition, most of the volume ordered was for deliveries in North America although there was a significant world-wide use. There was a wide range of request sizes in terms of volume and number of files ordered. On an average 78.6 files were ordered per request. Using the data managed by Unitree, several caching algorithms have been evaluated for both hit rate and the overhead ('cost') associated with the movement of data from near-line devices to disks. The algorithm called LRU/2 bin was found to be the best for this workload, but the STbin algorithm also worked well.
2010-01-01
Background An increasing knowledge of the global risk of malaria shows that the nations of the Americas have the lowest levels of Plasmodium falciparum and P. vivax endemicity worldwide, sustained, in part, by substantive integrated vector control. To help maintain and better target these efforts, knowledge of the contemporary distribution of each of the dominant vector species (DVS) of human malaria is needed, alongside a comprehensive understanding of the ecology and behaviour of each species. Results A database of contemporary occurrence data for 41 of the DVS of human malaria was compiled from intensive searches of the formal and informal literature. The results for the nine DVS of the Americas are described in detail here. Nearly 6000 occurrence records were gathered from 25 countries in the region and were complemented by a synthesis of published expert opinion range maps, refined further by a technical advisory group of medical entomologists. A suite of environmental and climate variables of suspected relevance to anopheline ecology were also compiled from open access sources. These three sets of data were then combined to produce predictive species range maps using the Boosted Regression Tree method. The predicted geographic extent for each of the following species (or species complex*) are provided: Anopheles (Nyssorhynchus) albimanus Wiedemann, 1820, An. (Nys.) albitarsis*, An. (Nys.) aquasalis Curry, 1932, An. (Nys.) darlingi Root, 1926, An. (Anopheles) freeborni Aitken, 1939, An. (Nys.) marajoara Galvão & Damasceno, 1942, An. (Nys.) nuneztovari*, An. (Ano.) pseudopunctipennis* and An. (Ano.) quadrimaculatus Say, 1824. A bionomics review summarising ecology and behaviour relevant to the control of each of these species was also compiled. Conclusions The distribution maps and bionomics review should both be considered as a starting point in an ongoing process of (i) describing the distributions of these DVS (since the opportunistic sample of occurrence data assembled can be substantially improved) and (ii) documenting their contemporary bionomics (since intervention and control pressures can act to modify behavioural traits). This is the first in a series of three articles describing the distribution of the 41 global DVS worldwide. The remaining two publications will describe those vectors found in (i) Africa, Europe and the Middle East and (ii) in Asia. All geographic distribution maps are being made available in the public domain according to the open access principles of the Malaria Atlas Project. PMID:20712879
Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope
2011-01-01
Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay. PMID:22180793
The D3 Middleware Architecture
NASA Technical Reports Server (NTRS)
Walton, Joan; Filman, Robert E.; Korsmeyer, David J.; Lee, Diana D.; Mak, Ron; Patel, Tarang
2002-01-01
DARWIN is a NASA developed, Internet-based system for enabling aerospace researchers to securely and remotely access and collaborate on the analysis of aerospace vehicle design data, primarily the results of wind-tunnel testing and numeric (e.g., computational fluid-dynamics) model executions. DARWIN captures, stores and indexes data; manages derived knowledge (such as visualizations across multiple datasets); and provides an environment for designers to collaborate in the analysis of test results. DARWIN is an interesting application because it supports high-volumes of data. integrates multiple modalities of data display (e.g., images and data visualizations), and provides non-trivial access control mechanisms. DARWIN enables collaboration by allowing not only sharing visualizations of data, but also commentary about and views of data. Here we provide an overview of the architecture of D3, the third generation of DARWIN. Earlier versions of DARWIN were characterized by browser-based interfaces and a hodge-podge of server technologies: CGI scripts, applets, PERL, and so forth. But browsers proved difficult to control, and a proliferation of computational mechanisms proved inefficient and difficult to maintain. D3 substitutes a pure-Java approach for that medley: A Java client communicates (though RMI over HTTPS) with a Java-based application server. Code on the server accesses information from JDBC databases, distributed LDAP security services, and a collaborative information system. D3 is a three tier-architecture, but unlike 'E-commerce' applications, the data usage pattern suggests different strategies than traditional Enterprise Java Beans - we need to move volumes of related data together, considerable processing happens on the client, and the 'business logic' on the server-side is primarily data integration and collaboration. With D3, we are extending DARWIN to handle other data domains and to be a distributed system, where a single login allows a user transparent access to test results from multiple servers and authority domains.
Fluctuations in Wikipedia access-rate and edit-event data
NASA Astrophysics Data System (ADS)
Kämpf, Mirko; Tismer, Sebastian; Kantelhardt, Jan W.; Muchnik, Lev
2012-12-01
Internet-based social networks often reflect extreme events in nature and society by drastic increases in user activity. We study and compare the dynamics of the two major complex processes necessary for information spread via the online encyclopedia ‘Wikipedia’, i.e., article editing (information upload) and article access (information viewing) based on article edit-event time series and (hourly) user access-rate time series for all articles. Daily and weekly activity patterns occur in addition to fluctuations and bursting activity. The bursts (i.e., significant increases in activity for an extended period of time) are characterized by a power-law distribution of durations of increases and decreases. For describing the recurrence and clustering of bursts we investigate the statistics of the return intervals between them. We find stretched exponential distributions of return intervals in access-rate time series, while edit-event time series yield simple exponential distributions. To characterize the fluctuation behavior we apply detrended fluctuation analysis (DFA), finding that most article access-rate time series are characterized by strong long-term correlations with fluctuation exponents α≈0.9. The results indicate significant differences in the dynamics of information upload and access and help in understanding the complex process of collecting, processing, validating, and distributing information in self-organized social networks.
Maintaining consistency in distributed systems
NASA Technical Reports Server (NTRS)
Birman, Kenneth P.
1991-01-01
In systems designed as assemblies of independently developed components, concurrent access to data or data structures normally arises within individual programs, and is controlled using mutual exclusion constructs, such as semaphores and monitors. Where data is persistent and/or sets of operation are related to one another, transactions or linearizability may be more appropriate. Systems that incorporate cooperative styles of distributed execution often replicate or distribute data within groups of components. In these cases, group oriented consistency properties must be maintained, and tools based on the virtual synchrony execution model greatly simplify the task confronting an application developer. All three styles of distributed computing are likely to be seen in future systems - often, within the same application. This leads us to propose an integrated approach that permits applications that use virtual synchrony with concurrent objects that respect a linearizability constraint, and vice versa. Transactional subsystems are treated as a special case of linearizability.
An, Xinliang; Brittelle, Mack S; Lauzier, Pascal T; Gord, James R; Roy, Sukesh; Chen, Guang-Hong; Sanders, Scott T
2015-11-01
This paper introduces temperature imaging by total-variation-based compressed sensing (CS) tomography of H2O vapor absorption spectroscopy. A controlled laboratory setup is used to generate a constant two-dimensional temperature distribution in air (a roughly Gaussian temperature profile with a central temperature of 677 K). A wavelength-tunable laser beam is directed through the known distribution; the beam is translated and rotated using motorized stages to acquire complete absorption spectra in the 1330-1365 nm range at each of 64 beam locations and 60 view angles. Temperature reconstructions are compared to independent thermocouple measurements. Although the distribution studied is approximately axisymmetric, axisymmetry is not assumed and simulations show similar performance for arbitrary temperature distributions. We study the measurement error as a function of number of beams and view angles used in reconstruction to gauge the potential for application of CS in practical test articles where optical access is limited.
Goldenberg, Shira M; Shoveller, Jean A; Ostry, Aleck C; Koehoorn, Mieke
2008-01-01
Northeastern British Columbia is undergoing rapid in-migration of young, primarily male workers in response to the "boom" in the oil/gas industries. Accompanying the boom is a rise in Chlamydia rates among youth, which exceed the provincial average by 22%. STI testing reduces the disease burden, contributing to STI prevention. 1) To document youths' perceptions regarding the socio-cultural and structural forces that affect young oil/gas workers' access to STI testing; 2) to gather service providers' perspectives on sexual health service delivery for workers; and 3) to develop recommendations to improve the accessibility of STI testing. We conducted ethnographic fieldwork (8 weeks) in a remote oil/gas community, including in-depth interviews with 25 young people (ages 15-25) and 14 health and social service providers. Participants identified limited opportunities to access testing, geographic isolation, and 'rigger' culture as three key categories inhibiting STI testing among oil/gas Workers. These results suggest the need for place-based approaches to STI control. Innovative outreach strategies are suggested to address oil/gas workers' needs, including a locally tailored STI awareness campaign, condom distribution, expanded clinic hours, and onsite STI testing.
Adjacency Matrix-Based Transmit Power Allocation Strategies in Wireless Sensor Networks
Consolini, Luca; Medagliani, Paolo; Ferrari, Gianluigi
2009-01-01
In this paper, we present an innovative transmit power control scheme, based on optimization theory, for wireless sensor networks (WSNs) which use carrier sense multiple access (CSMA) with collision avoidance (CA) as medium access control (MAC) protocol. In particular, we focus on schemes where several remote nodes send data directly to a common access point (AP). Under the assumption of finite overall network transmit power and low traffic load, we derive the optimal transmit power allocation strategy that minimizes the packet error rate (PER) at the AP. This approach is based on modeling the CSMA/CA MAC protocol through a finite state machine and takes into account the network adjacency matrix, depending on the transmit power distribution and determining the network connectivity. It will be then shown that the transmit power allocation problem reduces to a convex constrained minimization problem. Our results show that, under the assumption of low traffic load, the power allocation strategy, which guarantees minimal delay, requires the maximization of network connectivity, which can be equivalently interpreted as the maximization of the number of non-zero entries of the adjacency matrix. The obtained theoretical results are confirmed by simulations for unslotted Zigbee WSNs. PMID:22346705
The problems and promise of DNA barcodes for species diagnosis of primate biomaterials
Lorenz, Joseph G; Jackson, Whitney E; Beck, Jeanne C; Hanner, Robert
2005-01-01
The Integrated Primate Biomaterials and Information Resource (www.IPBIR.org) provides essential research reagents to the scientific community by establishing, verifying, maintaining, and distributing DNA and RNA derived from primate cell cultures. The IPBIR uses mitochondrial cytochrome c oxidase subunit I sequences to verify the identity of samples for quality control purposes in the accession, cell culture, DNA extraction processes and prior to shipping to end users. As a result, IPBIR is accumulating a database of ‘DNA barcodes’ for many species of primates. However, this quality control process is complicated by taxon specific patterns of ‘universal primer’ failure, as well as the amplification or co-amplification of nuclear pseudogenes of mitochondrial origins. To overcome these difficulties, taxon specific primers have been developed, and reverse transcriptase PCR is utilized to exclude these extraneous sequences from amplification. DNA barcoding of primates has applications to conservation and law enforcement. Depositing barcode sequences in a public database, along with primer sequences, trace files and associated quality scores, makes this species identification technique widely accessible. Reference DNA barcode sequences should be derived from, and linked to, specimens of known provenance in web-accessible collections in order to validate this system of molecular diagnostics. PMID:16214744
A Framework for WWW Query Processing
NASA Technical Reports Server (NTRS)
Wu, Binghui Helen; Wharton, Stephen (Technical Monitor)
2000-01-01
Query processing is the most common operation in a DBMS. Sophisticated query processing has been mainly targeted at a single enterprise environment providing centralized control over data and metadata. Submitting queries by anonymous users on the web is different in such a way that load balancing or DBMS' accessing control becomes the key issue. This paper provides a solution by introducing a framework for WWW query processing. The success of this framework lies in the utilization of query optimization techniques and the ontological approach. This methodology has proved to be cost effective at the NASA Goddard Space Flight Center Distributed Active Archive Center (GDAAC).
Efficient Access Control in Multimedia Social Networks
NASA Astrophysics Data System (ADS)
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
Decentralized Control of Scheduling in Distributed Systems.
1983-03-18
the job scheduling algorithm adapts to the changing busyness of the various hosts in the system. The environment in which the job scheduling entities...resources and processes that constitute the node and a set of interfaces for accessing these processes and resources. The structure of a node could change ...parallel. Chang [CHNG82] has also described some algorithms for detecting properties of general graphs by traversing paths in a graph in parallel. One of
Information Access Challenges: Data Fission Needs of the Field Expert
2011-06-01
at hand. For this phase of our research , we focus on rapid ethnography assessment. To inform the research at hand and our framework, we assess...to guide our “who, what, where, when, why, and how” questions for qualitative interviews that are a next step of this research . Because our...Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES Presented at the 16th International Command and Control Research and
Cloud-Based Distributed Control of Unmanned Systems
2015-04-01
during mission execution. At best, the data is saved onto hard-drives and is accessible only by the local team. Data history in a form available and...following open source technologies: GeoServer, OpenLayers, PostgreSQL , and PostGIS are chosen to implement the back-end database and server. A brief...geospatial map data. 3. PostgreSQL : An SQL-compliant object-relational database that easily scales to accommodate large amounts of data - upwards to
Volume 2. Information Age Anthology: National Security Implications of the Information Age
2000-08-01
relationships Harder for govts to control export/import of controversial content by private parties (political, porn , etc.) 150 Information Age Anthology...distribution of child pornography. The Munich authorities contended that CompuServe, which offers Internet access, had not taken sufficient measures to protect...Legislation,” Newsbytes, July 8, 1997, “Germany to Enforce Child -Friendly Internet,” Chicago Tribune, July 5, 1997, and “Germany’s Efforts to Police
Pore size distribution and accessible pore size distribution in bituminous coals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sakurovs, Richard; He, Lilin; Melnichenko, Yuri B
2012-01-01
The porosity and pore size distribution of coals determine many of their properties, from gas release to their behavior on carbonization, and yet most methods of determining pore size distribution can only examine a restricted size range. Even then, only accessible pores can be investigated with these methods. Small-angle neutron scattering (SANS) and ultra small-angle neutron scattering (USANS) are increasingly used to characterize the size distribution of all of the pores non-destructively. Here we have used USANS/SANS to examine 24 well-characterized bituminous and subbituminous coals: three from the eastern US, two from Poland, one from New Zealand and the restmore » from the Sydney and Bowen Basins in Eastern Australia, and determined the relationships of the scattering intensity corresponding to different pore sizes with other coal properties. The range of pore radii examinable with these techniques is 2.5 nm to 7 {micro}m. We confirm that there is a wide range of pore sizes in coal. The pore size distribution was found to be strongly affected by both rank and type (expressed as either hydrogen or vitrinite content) in the size range 250 nm to 7 {micro}m and 5 to 10 nm, but weakly in intermediate regions. The results suggest that different mechanisms control coal porosity on different scales. Contrast-matching USANS and SANS were also used to determine the size distribution of the fraction of the pores in these coals that are inaccessible to deuterated methane, CD{sub 4}, at ambient temperature. In some coals most of the small ({approx} 10 nm) pores were found to be inaccessible to CD{sub 4} on the time scale of the measurement ({approx} 30 min - 16 h). This inaccessibility suggests that in these coals a considerable fraction of inherent methane may be trapped for extended periods of time, thus reducing the effectiveness of methane release from (or sorption by) these coals. Although the number of small pores was less in higher rank coals, the fraction of total pores that was inaccessible was not rank dependent. In the Australian coals, at the 10 nm to 50 nm size scales the pores in inertinites appeared to be completely accessible to CD{sub 4}, whereas the pores in the vitrinite were about 75% inaccessible. Unlike the results for total porosity that showed no regional effects on relationships between porosity and coal properties, clear regional differences in the relationships between fraction of closed porosity and coal properties were found. The 10 to 50 nm-sized pores of inertinites of the US and Polish coals examined appeared less accessible to methane than those of the inertinites of Australian coals. This difference in pore accessibility in inertinites may explain why empirical relationships between fluidity and coking properties developed using Carboniferous coals do not apply to Australian coals.« less
2012-01-01
Background People living in neighbourhoods of lower socioeconomic status have been shown to have higher rates of obesity and a lower likelihood of meeting physical activity recommendations than their more affluent counterparts. This study examines the sociospatial distribution of access to facilities for moderate or vigorous intensity physical activity in Scotland and whether such access differs by the mode of transport available and by Urban Rural Classification. Methods A database of all fixed physical activity facilities was obtained from the national agency for sport in Scotland. Facilities were categorised into light, moderate and vigorous intensity activity groupings before being mapped. Transport networks were created to assess the number of each type of facility accessible from the population weighted centroid of each small area in Scotland on foot, by bicycle, by car and by bus. Multilevel modelling was used to investigate the distribution of the number of accessible facilities by small area deprivation within urban, small town and rural areas separately, adjusting for population size and local authority. Results Prior to adjustment for Urban Rural Classification and local authority, the median number of accessible facilities for moderate or vigorous intensity activity increased with increasing deprivation from the most affluent or second most affluent quintile to the most deprived for all modes of transport. However, after adjustment, the modelling results suggest that those in more affluent areas have significantly higher access to moderate and vigorous intensity facilities by car than those living in more deprived areas. Conclusions The sociospatial distributions of access to facilities for both moderate intensity and vigorous intensity physical activity were similar. However, the results suggest that those living in the most affluent neighbourhoods have poorer access to facilities of either type that can be reached on foot, by bicycle or by bus than those living in less affluent areas. This poorer access from the most affluent areas appears to be reversed for those with access to a car. PMID:22568969
Li, Xukai; Liao, Haofeng; Fan, Chunfen; Hu, Huizhen; Li, Ying; Li, Jing; Yi, Zili; Cai, Xiwen; Peng, Liangcai; Tu, Yuanyuan
2016-01-01
Miscanthus is a leading bioenergy candidate for biofuels, and it thus becomes essential to characterize the desire natural Miscanthus germplasm accessions with high biomass saccharification. In this study, total 171 natural Miscanthus accessions were geographically mapped using public database. According to the equation [P(H/L| East) = P(H/L∩East)/P(East)], the probability (P) parameters were calculated on relationships between geographical distributions of Miscanthus accessions in the East of China, and related factors with high(H) or low(L) values including biomass saccahrification under 1% NaOH and 1% H2SO4 pretreatments, lignocellulose features and climate conditions. Based on the maximum P value, a golden cutting line was generated from 42°25’ N, 108°22’ E to 22°58’ N, 116°28’ E on the original locations of Miscanthus accessions with high P(H|East) values (0.800–0.813), indicating that more than 90% Miscanthus accessions were originally located in the East with high biomass saccharification. Furthermore, the averaged insolation showed high P (H|East) and P(East|H) values at 0.782 and 0.754, whereas other climate factors had low P(East|H) values, suggesting that the averaged insolation is unique factor on Miscanthus distributions for biomass saccharification. In terms of cell wall compositions and wall polymer features, both hemicelluloses level and cellulose crystallinity (CrI) of Miscanthus accessions exhibited relative high P values, suggesting that they should be the major factors accounting for geographic distributions of Miscanthus accessions with high biomass digestibility. PMID:27532636
Widdus, R.
2001-01-01
The global burden of disease, especially the part attributable to infectious diseases, disproportionately affects populations in developing countries. Inadequate access to pharmaceuticals plays a role in perpetuating this disparity. Drugs and vaccines may not be accessible because of weak distribution infrastructures or because development of the desired products has been neglected. This situation can be tackled with push interventions to lower the costs and risks of product development for industry, with pull interventions providing economic and market incentives, and with the creation of infrastructures allowing products to be put into use. If appropriately motivated, pharmaceutical companies can bring to partnerships expertise in product development, production process development, manufacturing, marketing, and distribution--all of which are lacking in the public sector. A large variety of public-private partnerships, combining the skills and resources of a wide range of collaborators, have arisen for product development, disease control through product donation and distribution, or the general strengthening or coordination of health services. Administratively, such partnerships may either involve affiliation with international organizations, i.e. they are essentially public-sector programmes with private-sector participation, or they may be legally independent not-for-profit bodies. These partnerships should be regarded as social experiments; they show promise but are not a panacea. New ventures should be built on need, appropriateness, and lessons on good practice learnt from experience. Suggestions are made for public, private, and joint activities that could help to improve the access of poor populations to the pharmaceuticals and health services they need. PMID:11545327
Cerqueira-Silva, Carlos Bernard M.; Santos, Elisa S. L.; Jesus, Onildo N.; Vieira, João G. P.; Mori, Gustavo M.; Corrêa, Ronan X.; Souza, Anete P.
2014-01-01
Passiflora species are distributed throughout Latin America, and Brazil and Colombia serve as the centers of diversity for this genus. We performed cross-species amplification to evaluate 109 microsatellite loci in 14 Passiflora species and estimated the diversity and genetic structure of Passiflora cincinnata, Passiflora setaceae and Passiflora edulis. A total of 127 accessions, including 85 accessions of P. edulis, a commercial species, and 42 accessions of 13 wild species, were examined. The cross-species amplification was effective for obtaining microsatellite loci (average cross-amplification of 70%). The average number of alleles per locus (five) was relatively low, and the average diversity ranged from 0.52 in P. cincinnata to 0.32 in P. setacea. The Bayesian analyses indicated that the P. cincinnata and P. setacea accessions were distributed into two groups, and the P. edulis accessions were distributed into five groups. Private alleles were identified, and suggestions for core collections are presented. Further collections are necessary, and the information generated may be useful for breeding and conservation. PMID:25514245
Cerqueira-Silva, Carlos Bernard M; Santos, Elisa S L; Jesus, Onildo N; Vieira, João G P; Mori, Gustavo M; Corrêa, Ronan X; Souza, Anete P
2014-12-10
Passiflora species are distributed throughout Latin America, and Brazil and Colombia serve as the centers of diversity for this genus. We performed cross-species amplification to evaluate 109 microsatellite loci in 14 Passiflora species and estimated the diversity and genetic structure of Passiflora cincinnata, Passiflora setaceae and Passiflora edulis. A total of 127 accessions, including 85 accessions of P. edulis, a commercial species, and 42 accessions of 13 wild species, were examined. The cross-species amplification was effective for obtaining microsatellite loci (average cross-amplification of 70%). The average number of alleles per locus (five) was relatively low, and the average diversity ranged from 0.52 in P. cincinnata to 0.32 in P. setacea. The Bayesian analyses indicated that the P. cincinnata and P. setacea accessions were distributed into two groups, and the P. edulis accessions were distributed into five groups. Private alleles were identified, and suggestions for core collections are presented. Further collections are necessary, and the information generated may be useful for breeding and conservation.
NESDIS OSPO Data Access Policy and CRM
NASA Astrophysics Data System (ADS)
Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.
2012-12-01
The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.
Distributed computing testbed for a remote experimental environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Butner, D.N.; Casper, T.A.; Howard, B.C.
1995-09-18
Collaboration is increasing as physics research becomes concentrated on a few large, expensive facilities, particularly in magnetic fusion energy research, with national and international participation. These facilities are designed for steady state operation and interactive, real-time experimentation. We are developing tools to provide for the establishment of geographically distant centers for interactive operations; such centers would allow scientists to participate in experiments from their home institutions. A testbed is being developed for a Remote Experimental Environment (REE), a ``Collaboratory.`` The testbed will be used to evaluate the ability of a remotely located group of scientists to conduct research on themore » DIII-D Tokamak at General Atomics. The REE will serve as a testing environment for advanced control and collaboration concepts applicable to future experiments. Process-to-process communications over high speed wide area networks provide real-time synchronization and exchange of data among multiple computer networks, while the ability to conduct research is enhanced by adding audio/video communication capabilities. The Open Software Foundation`s Distributed Computing Environment is being used to test concepts in distributed control, security, naming, remote procedure calls and distributed file access using the Distributed File Services. We are exploring the technology and sociology of remotely participating in the operation of a large scale experimental facility.« less
Implementation of the Web-based laboratory
NASA Astrophysics Data System (ADS)
Ying, Liu; Li, Xunbo
2005-12-01
With the rapid developments of Internet technologies, remote access and control via Internet is becoming a reality. A realization of the web-based laboratory (the W-LAB) was presented. The main target of the W-LAB was to allow users to easily access and conduct experiments via the Internet. While realizing the remote communication, a system, which adopted the double client-server architecture, was introduced. It ensures the system better security and higher functionality. The experimental environment implemented in the W-Lab was integrated by both virtual lab and remote lab. The embedded technology in the W-LAB system as an economical and efficient way to build the distributed infrastructural network was introduced. Furthermore, by introducing the user authentication mechanism in the system, it effectively secures the remote communication.
The PO.DAAC Portal and its use of the Drupal Framework
NASA Astrophysics Data System (ADS)
Alarcon, C.; Huang, T.; Bingham, A.; Cosic, S.
2011-12-01
The Physical Oceanography Distributed Active Archive Center portal (http://podaac.jpl.nasa.gov) is the primary interface for discovering and accessing oceanographic datasets collected from the vantage point of space. In addition, it provides information about NASA's satellite missions and operational activities at the data center. Recently the portal underwent a major redesign and deployment utilizing the Drupal framework. The Drupal framework was chosen as the platform for the portal due to its flexibility, open source community, and modular infrastructure. The portal features efficient content addition and management, mailing lists, forums, role based access control, and a faceted dataset browse capability. The dataset browsing was built as a custom Drupal module and integrates with a SOLR search engine.
SigmaCLIPSE = presentation management + NASA CLI PS + SQL
NASA Technical Reports Server (NTRS)
Weiss, Bernard P., Jr.
1990-01-01
SigmaCLIPSE provides an expert systems and 'intelligent' data base development program for diverse systems integration environments that require support for automated reasoning and expert systems technology, presentation management, and access to 'intelligent' SQL data bases. The SigmaCLIPSE technology and and its integrated ability to access 4th generation application development and decision support tools through a portable SQL interface, comprises a sophisticated software development environment for solving knowledge engineering and expert systems development problems in information intensive commercial environments -- financial services, health care, and distributed process control -- where the expert system must be extendable -- a major architectural advantage of NASA CLIPS. SigmaCLIPSE is a research effort intended to test the viability of merging SQL data bases with expert systems technology.
NASA Astrophysics Data System (ADS)
Li, Jinze; Qu, Zhi; He, Xiaoyang; Jin, Xiaoming; Li, Tie; Wang, Mingkai; Han, Qiu; Gao, Ziji; Jiang, Feng
2018-02-01
Large-scale access of distributed power can improve the current environmental pressure, at the same time, increasing the complexity and uncertainty of overall distribution system. Rational planning of distributed power can effectively improve the system voltage level. To this point, the specific impact on distribution network power quality caused by the access of typical distributed power was analyzed and from the point of improving the learning factor and the inertia weight, an improved particle swarm optimization algorithm (IPSO) was proposed which could solve distributed generation planning for distribution network to improve the local and global search performance of the algorithm. Results show that the proposed method can well reduce the system network loss and improve the economic performance of system operation with distributed generation.
Kerai, Paresh; Wood, Pene; Martin, Mary
2014-03-01
Australia introduced its version of personal health records in July 2012. Success of the personally controlled electronic health record (PCEHR) relies on acceptance during the early stages. The main aim of this study was to investigate the views of a sample of elderly people in a non-metropolitan region in Australia on the PCEHR, and to assess their acceptance levels of this concept. A self-administered questionnaire was distributed to a non-probability convenience sample of respondents recruited from meetings of Probus, a community club for active business and professional retirees. Approximately three-quarters of the respondents had computer and Internet access at home. If not accessed at home a computer at a general practitioner's practice was seen as beneficial in accessing the PCEHR. Respondents felt that access to their health record would help them make decisions about their own health and improve their communication with healthcare providers. The majority of respondents were in favour of the PCEHR although some expressed concerns about the security of their PCEHR. There was mixed opinion surrounding the access by health professionals to an individual's PCEHR. This study has revealed important information about views of the PCEHR. While the respondents were generally in favour of the concept, there were still some concerns about the security of the PCEHR suggesting further reassurance may be required. The study also highlighted some measures, in particular provision of General Practitioner computer access points and print-out facilities that may need to be considered during these initial implementation stages in order to improve adoption rates once the technology is fully available. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Integration of EGA secure data access into Galaxy.
Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J A Fijneman, Remond; Boiten, Jan-Willem; A Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne
2016-01-01
High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study. The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.
Integration of EGA secure data access into Galaxy
Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; Fijneman, Remond J.A.; Boiten, Jan-Willem; A. Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne
2016-01-01
High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study. The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer. PMID:28232859
Application of SQL database to the control system of MOIRCS
NASA Astrophysics Data System (ADS)
Yoshikawa, Tomohiro; Omata, Koji; Konishi, Masahiro; Ichikawa, Takashi; Suzuki, Ryuji; Tokoku, Chihiro; Uchimoto, Yuka Katsuno; Nishimura, Tetsuo
2006-06-01
MOIRCS (Multi-Object Infrared Camera and Spectrograph) is a new instrument for the Subaru telescope. In order to perform observations of near-infrared imaging and spectroscopy with cold slit mask, MOIRCS contains many device components, which are distributed on an Ethernet LAN. Two PCs wired to the focal plane array electronics operate two HAWAII2 detectors, respectively, and other two PCs are used for integrated control and quick data reduction, respectively. Though most of the devices (e.g., filter and grism turrets, slit exchange mechanism for spectroscopy) are controlled via RS232C interface, they are accessible from TCP/IP connection using TCP/IP to RS232C converters. Moreover, other devices are also connected to the Ethernet LAN. This network distributed structure provides flexibility of hardware configuration. We have constructed an integrated control system for such network distributed hardwares, named T-LECS (Tohoku University - Layered Electronic Control System). T-LECS has also network distributed software design, applying TCP/IP socket communication to interprocess communication. In order to help the communication between the device interfaces and the user interfaces, we defined three layers in T-LECS; an external layer for user interface applications, an internal layer for device interface applications, and a communication layer, which connects two layers above. In the communication layer, we store the data of the system to an SQL database server; they are status data, FITS header data, and also meta data such as device configuration data and FITS configuration data. We present our software system design and the database schema to manage observations of MOIRCS with Subaru.
Innovative Airbreathing Propulsion Concepts for Access to Space
NASA Technical Reports Server (NTRS)
Whitlow, Jr., Woodrow; Blech, Richard A.; Blankson, Isaiah M.
2001-01-01
This paper will present technologies and concepts for novel aeropropulsion systems. These technologies will enhance the safety of operations, reduce life cycle costs, and contribute to reduced costs of air travel and access to space. One of the goals of the NASA program is to reduce the carbon-dioxide emissions of aircraft engines. Engine concepts that use highly efficient fuel cell/electric drive technologies in hydrogen-fueled engines will be presented in the proposed paper. Carbon-dioxide emissions will be eliminated by replacing hydrocarbon fuel with hydrogen, and reduce NOx emissions through better combustion process control. A revolutionary exoskeletal engine concept, in which the engine drum is rotated, will be shown. This concept has the potential to allow a propulsion system that can be used for subsonic through hypersonic flight. Dual fan concepts that have ultra-high bypass ratios, low noise, and low drag will be presented. Flow-controlled turbofans and control-configured turbofans also will be discussed. To increase efficiency, a system of microengines distributed along lifting surfaces and on the fuselage is being investigated. This concept will be presented in the paper. Small propulsion systems for affordable, safe personal transportation vehicles will be discussed. These low-oil/oilless systems use technologies that enable significant cost and weight reductions. Pulse detonation engine-based hybrid-cycle and combined-cycle propulsion systems for aviation and space access will be presented.
Peer-to-peer architecture for multi-departmental distributed PACS
NASA Astrophysics Data System (ADS)
Rosset, Antoine; Heuberger, Joris; Pysher, Lance; Ratib, Osman
2006-03-01
We have elected to explore peer-to-peer technology as an alternative to centralized PACS architecture for the increasing requirements for wide access to images inside and outside a radiology department. The goal being to allow users across the enterprise to access any study anytime without the need for prefetching or routing of images from central archive. Images can be accessed between different workstations and local storage nodes. We implemented "bonjour" a new remote file access technology developed by Apple allowing applications to share data and files remotely with optimized data access and data transfer. Our Open-source image display platform called OsiriX was adapted to allow sharing of local DICOM images through direct access of each local SQL database to be accessible from any other OsiriX workstation over the network. A server version of Osirix Core Data database also allows to access distributed archives servers in the same way. The infrastructure implemented allows fast and efficient access to any image anywhere anytime independently from the actual physical location of the data. It also allows benefiting from the performance of distributed low-cost and high capacity storage servers that can provide efficient caching of PACS data that was found to be 10 to 20 x faster that accessing the same date from the central PACS archive. It is particularly suitable for large hospitals and academic environments where clinical conferences, interdisciplinary discussions and successive sessions of image processing are often part of complex workflow or patient management and decision making.
Access to medicines and distributive justice: breaching Doha's ethical threshold.
Kiddell-Monroe, Rachel
2014-08-01
The global health crisis in non-communicable diseases (NCDs) reveals a deep global health inequity that lies at the heart of global justice concerns. Mirroring the HIV/AIDS epidemic, NCDs bring into stark relief once more the human consequences of trade policies that reinforce global inequities in treatment access. Recognising distributive justice issues in access to medicines for their populations, World Trade Organisation (WTO) members confirmed the primacy of access to medicines for all in trade and public health in the landmark Doha Declaration on the TRIPS Agreement and Public Health of 2001. © 2014 John Wiley & Sons Ltd.
Interior shadings for office indoor visual comfort in humid climate region
NASA Astrophysics Data System (ADS)
Dinapradipta, Asri; Sudarma, Erwin; Defiana, Ima; Erwindi, Collinthia
2018-03-01
As part of the fenestration system, the interior shadings have also a role to control the indoor environment to maintain indoor visual comfort. As the occupants have personal access to control these, their control behavior then, might enhance or even worsen indoor comfort performance. The controlling behavior might not only influence indoor comfort performance but can also indicate the success or failure of interior shading as a control device element. This paper is intended to report control behavior patterns, as represented by the variety of the slats’ openings of two types of interior shading i.e. Venetian and Vertical blinds and to analyze these on the concurrent impacts to indoor office building’s indoor illuminance and luminance distribution. The purpose of this research is to figure out the shading control patterns as well as to examine the effectiveness of these two types of interior shadings to control indoor visual environment. This study is a quantitative research using experimentation on the slats’ opening of two types of shadings at two identical office rooms. The research results suggested that both types of blinds seem unsuitable for gaining proper illumination values at work planes in humid tropics area. However, these shadings demonstrate good performance for luminance distribution except for that of the closed Venetian blinds.
The European Network of Analytical and Experimental Laboratories for Geosciences
NASA Astrophysics Data System (ADS)
Freda, Carmela; Funiciello, Francesca; Meredith, Phil; Sagnotti, Leonardo; Scarlato, Piergiorgio; Troll, Valentin R.; Willingshofer, Ernst
2013-04-01
Integrating Earth Sciences infrastructures in Europe is the mission of the European Plate Observing System (EPOS).The integration of European analytical, experimental, and analogue laboratories plays a key role in this context and is the task of the EPOS Working Group 6 (WG6). Despite the presence in Europe of high performance infrastructures dedicated to geosciences, there is still limited collaboration in sharing facilities and best practices. The EPOS WG6 aims to overcome this limitation by pushing towards national and trans-national coordination, efficient use of current laboratory infrastructures, and future aggregation of facilities not yet included. This will be attained through the creation of common access and interoperability policies to foster and simplify personnel mobility. The EPOS ambition is to orchestrate European laboratory infrastructures with diverse, complementary tasks and competences into a single, but geographically distributed, infrastructure for rock physics, palaeomagnetism, analytical and experimental petrology and volcanology, and tectonic modeling. The WG6 is presently organizing its thematic core services within the EPOS distributed research infrastructure with the goal of joining the other EPOS communities (geologists, seismologists, volcanologists, etc...) and stakeholders (engineers, risk managers and other geosciences investigators) to: 1) develop tools and services to enhance visitor programs that will mutually benefit visitors and hosts (transnational access); 2) improve support and training activities to make facilities equally accessible to students, young researchers, and experienced users (training and dissemination); 3) collaborate in sharing technological and scientific know-how (transfer of knowledge); 4) optimize interoperability of distributed instrumentation by standardizing data collection, archive, and quality control standards (data preservation and interoperability); 5) implement a unified e-Infrastructure for data analysis, numerical modelling, and joint development and standardization of numerical tools (e-science implementation); 6) collect and store data in a flexible inventory database accessible within and beyond the Earth Sciences community(open access and outreach); 7) connect to environmental and hazard protection agencies, stakeholders, and public to raise consciousness of geo-hazards and geo-resources (innovation for society). We will inform scientists and industrial stakeholders on the most recent WG6 achievements in EPOS and we will show how our community is proceeding to design the thematic core services.
NASA Astrophysics Data System (ADS)
Archibong, Belinda
While previous literature has emphasized the importance of energy and public infrastructure services for economic development, questions surrounding the implications of unequal spatial distribution in access to these resources remain, particularly in the developing country context. This dissertation provides evidence on the nature, origins and implications of this distribution uniting three strands of research from the development and political economy, regional science and energy economics fields. The dissertation unites three papers on the nature of spatial inequality of access to energy and infrastructure with further implications for conflict risk , the historical institutional and biogeographical determinants of current distribution of access to energy and public infrastructure services and the response of households to fuel price changes over time. Chapter 2 uses a novel survey dataset to provide evidence for spatial clustering of public infrastructure non-functionality at schools by geopolitical zone in Nigeria with further implications for armed conflict risk in the region. Chapter 3 investigates the drivers of the results in chapter 2, exploiting variation in the spatial distribution of precolonial institutions and geography in the region, to provide evidence for the long-term impacts of these factors on current heterogeneity of access to public services. Chapter 4 addresses the policy implications of energy access, providing the first multi-year evidence on firewood demand elasticities in India, using the spatial variation in prices for estimation.
DOT National Transportation Integrated Search
2014-09-30
This report covers two studies: (Part A) Improvement of research report distribution and access process improvement of State Planning and Research (SPR) funded reports; and (Part B) Promotion of more effective use of the Technical Report Documentatio...
Systematic plan of building Web geographic information system based on ActiveX control
NASA Astrophysics Data System (ADS)
Zhang, Xia; Li, Deren; Zhu, Xinyan; Chen, Nengcheng
2003-03-01
A systematic plan of building Web Geographic Information System (WebGIS) using ActiveX technology is proposed in this paper. In the proposed plan, ActiveX control technology is adopted in building client-side application, and two different schemas are introduced to implement communication between controls in users¡ browser and middle application server. One is based on Distribute Component Object Model (DCOM), the other is based on socket. In the former schema, middle service application is developed as a DCOM object that communicates with ActiveX control through Object Remote Procedure Call (ORPC) and accesses data in GIS Data Server through Open Database Connectivity (ODBC). In the latter, middle service application is developed using Java language. It communicates with ActiveX control through socket based on TCP/IP and accesses data in GIS Data Server through Java Database Connectivity (JDBC). The first one is usually developed using C/C++, and it is difficult to develop and deploy. The second one is relatively easy to develop, but its performance of data transfer relies on Web bandwidth. A sample application is developed using the latter schema. It is proved that the performance of the sample application is better than that of some other WebGIS applications in some degree.
Infection control professionals' information-seeking preferences.
Mortensen, Heidi J; Alexander, Jeffrey L; Nehrenz, Guy M; Porter, Cynthia
2013-03-01
The aims of this study were to: 1) establish whether infection control professionals (ICPs) who had access to and utilised medical librarian services for evidence-based medicine (EBM) research perceived this assistance to be useful and 2) to establish whether ICPs who used electronic or hard copy resources for EBM research perceived that those resources had a significant impact on their work. Convenience sampling was used to collect quantitative data via a questionnaire. Study participants were members of South-west and Western chapters of the Association for Professionals in Infection Control and Epidemiology. There were 264 questionnaires distributed in this study; 179 participants completed the questionnaire. The response rate for eligible respondents was 59.5% (157). Results indicated 56.7% (51) of the ICPs with librarian access reported requesting assistance from their work facility librarian. In reference to locating infection control information, 77.9% (95), 87.3% (124) and 93.3% (138) of ICPs found textbooks, journals and the Internet 'very useful' or 'useful', respectively. Study results indicated ICPs who used the assistance of medical librarians and/or hard copy or electronic resources for EBM research perceived such sources to be valuable for obtaining infection control information. © 2012 The authors. Health Information and Libraries Journal © 2012 Health Libraries Group.
A DRM based on renewable broadcast encryption
NASA Astrophysics Data System (ADS)
Ramkumar, Mahalingam; Memon, Nasir
2005-07-01
We propose an architecture for digital rights management based on a renewable, random key pre-distribution (KPD) scheme, HARPS (hashed random preloaded subsets). The proposed architecture caters for broadcast encryption by a trusted authority (TA) and by "parent" devices (devices used by vendors who manufacture compliant devices) for periodic revocation of devices. The KPD also facilitates broadcast encryption by peer devices, which permits peers to distribute content, and efficiently control access to the content encryption secret using subscription secrets. The underlying KPD also caters for broadcast authentication and mutual authentication of any two devices, irrespective of the vendors manufacturing the device, and thus provides a comprehensive solution for securing interactions between devices taking part in a DRM system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less
Tools for Local and Distributed Climate Data Access
NASA Astrophysics Data System (ADS)
Schweitzer, R.; O'Brien, K.; Burger, E. F.; Smith, K. M.; Manke, A. B.; Radhakrishnan, A.; Balaji, V.
2017-12-01
Last year we reported on our efforts to adapt existing tools to facilitate model development. During the lifecycle of a Climate Model Intercomparison Project (CMIP), data must be quality controlled before it can be published and studied. Like previous efforts, the next CMIP6 will produce an unprecedented volume of data. For an institution, modelling group or modeller the volume of data is unmanageable without tools that organize and automate as many processes as possible. Even if a modelling group has tools for data and metadata management, it often falls on individuals to do the initial quality assessment for a model run with bespoke tools. Using individually crafted tools can lead to interruptions when project personnel change and may result in inconsistencies and duplication of effort across groups. This talk will expand on our experiences using available tools (Ferret/PyFerret, the Live Access Server, the GFDL Curator, the GFDL Model Development Database Interface and the THREDDS Data Server) to seamlessly automate the data assembly process to give users "one-click" access to a rich suite of Web-based analysis and comparison tools. On the surface, it appears that this collection of tools is well suited to the task, but our experience of the last year taught us that the data volume and distributed storage adds a number of challenges in adapting the tools for this task. Quality control and initial evaluation add their own set of challenges. We will discuss how we addressed the needs of QC researchers by expanding standard tools to include specialized plots and leveraged the configurability of the tools to add specific user defined analysis operations so they are available to everyone using the system. We also report on our efforts to overcome some of the technical barriers for wide adoption of the tools by providing pre-built containers that are easily deployed in virtual machine and cloud environments. Finally, we will offer some suggestions for added features, configuration options and improved robustness that can make future implementation of similar systems operate faster and more reliably. Solving these challenges for data sets distributed narrowly across networks and storage systems of points the way to solving similar problems associated with sharing data distributed across institutions continents.
AEROSAT Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Aerosat Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
System Engineering Strategy for Distributed Multi-Purpose Simulation Architectures
NASA Technical Reports Server (NTRS)
Bhula, Dlilpkumar; Kurt, Cindy Marie; Luty, Roger
2007-01-01
This paper describes the system engineering approach used to develop distributed multi-purpose simulations. The multi-purpose simulation architecture focuses on user needs, operations, flexibility, cost and maintenance. This approach was used to develop an International Space Station (ISS) simulator, which is called the International Space Station Integrated Simulation (ISIS)1. The ISIS runs unmodified ISS flight software, system models, and the astronaut command and control interface in an open system design that allows for rapid integration of multiple ISS models. The initial intent of ISIS was to provide a distributed system that allows access to ISS flight software and models for the creation, test, and validation of crew and ground controller procedures. This capability reduces the cost and scheduling issues associated with utilizing standalone simulators in fixed locations, and facilitates discovering unknowns and errors earlier in the development lifecycle. Since its inception, the flexible architecture of the ISIS has allowed its purpose to evolve to include ground operator system and display training, flight software modification testing, and as a realistic test bed for Exploration automation technology research and development.
Design of a Holonic Control Architecture for Distributed Sensor Management
2009-09-01
Tracking tasks require only intermit - tent access to the sensors to maintain a given track quality. The higher the specified quality, the more often...resolution of the sensor (i.e., sensor mode), which can be adjusted to compensate for fast moving targets tracked over long ranges, or slower moving...but provides higher data update rates that are beneficial when tracking fast agile targets (i.e., a fighter). Table A.2 illustrates the dependence of
Witt, Michael; Krefting, Dagmar
2016-01-01
Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.
1989-06-01
Science Unclassified SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la. REPORT SECURITY CLASS’r!CATION )b RESTRICTIVE MARKINGS UNCLASSIFIED...2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; Zb. DECLASSIFICATION I DOWNGRADING SCHEDULE...ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT Monterey, CA. 93943 FLEMENT NO. NO. NO ACCESSION NO. 11. TITLE (Include Security
Quantum key distribution using card, base station and trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson
Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less
Quantum key distribution using card, base station and trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson
Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less
Nuclear spin noise in the central spin model
NASA Astrophysics Data System (ADS)
Fröhling, Nina; Anders, Frithjof B.; Glazov, Mikhail
2018-05-01
We study theoretically the fluctuations of the nuclear spins in quantum dots employing the central spin model which accounts for the hyperfine interaction of the nuclei with the electron spin. These fluctuations are calculated both with an analytical approach using homogeneous hyperfine couplings (box model) and with a numerical simulation using a distribution of hyperfine coupling constants. The approaches are in good agreement. The box model serves as a benchmark with low computational cost that explains the basic features of the nuclear spin noise well. We also demonstrate that the nuclear spin noise spectra comprise a two-peak structure centered at the nuclear Zeeman frequency in high magnetic fields with the shape of the spectrum controlled by the distribution of the hyperfine constants. This allows for direct access to this distribution function through nuclear spin noise spectroscopy.
Yoo, Sung Jin; Park, Bong Seok
2017-09-06
This paper addresses a distributed connectivity-preserving synchronized tracking problem of multiple uncertain nonholonomic mobile robots with limited communication ranges. The information of the time-varying leader robot is assumed to be accessible to only a small fraction of follower robots. The main contribution of this paper is to introduce a new distributed nonlinear error surface for dealing with both the synchronized tracking and the preservation of the initial connectivity patterns among nonholonomic robots. Based on this nonlinear error surface, the recursive design methodology is presented to construct the approximation-based local adaptive tracking scheme at the robot dynamic level. Furthermore, a technical lemma is established to analyze the stability and the connectivity preservation of the total closed-loop control system in the Lyapunov sense. An example is provided to illustrate the effectiveness of the proposed methodology.
Moving Toward Real Time Data Handling: Data Management at the IRIS DMC
NASA Astrophysics Data System (ADS)
Ahern, T. K.; Benson, R. B.
2001-12-01
The IRIS Data Management Center at the University of Washington has become a major archive and distribution center for a wide variety of seismological data. With a mass storage system with a 360-terabyte capacity, the center is well positioned to manage the data flow, both inbound and outbound, from all anticipated seismic sources for the foreseeable future. As data flow in and out of the IRIS DMC at an increasing rate, new methods to deal with data using purely automated techniques are being developed. The on-line and self-service data repositories of SPYDERr and FARM are collections of seismograms for all larger events. The WWW tool WILBER and the client application WEED are examples of tools that provide convenient access to the 1/2 terabyte of SPYDERr and FARM data. The Buffer of Uniform Data (BUD) system provides access to continuous data available in real time from GSN, FDSN, US regional networks, and other globally distributed stations. Continuous data that have received quality control are always available from the archive of continuous data. This presentation will review current and future data access techniques supported at IRIS. One of the most difficult tasks at the DMC is the management of the metadata that describes all the stations, sensors, and data holdings. Demonstrations of tools that provide access to the metadata will be presented. This presentation will focus on the new techniques of data management now being developed at the IRIS DMC. We believe that these techniques are generally applicable to other types of geophysical data management as well.
BIO-Plex Information System Concept
NASA Technical Reports Server (NTRS)
Jones, Harry; Boulanger, Richard; Arnold, James O. (Technical Monitor)
1999-01-01
This paper describes a suggested design for an integrated information system for the proposed BIO-Plex (Bioregenerative Planetary Life Support Systems Test Complex) at Johnson Space Center (JSC), including distributed control systems, central control, networks, database servers, personal computers and workstations, applications software, and external communications. The system will have an open commercial computing and networking, architecture. The network will provide automatic real-time transfer of information to database server computers which perform data collection and validation. This information system will support integrated, data sharing applications for everything, from system alarms to management summaries. Most existing complex process control systems have information gaps between the different real time subsystems, between these subsystems and central controller, between the central controller and system level planning and analysis application software, and between the system level applications and management overview reporting. An integrated information system is vitally necessary as the basis for the integration of planning, scheduling, modeling, monitoring, and control, which will allow improved monitoring and control based on timely, accurate and complete data. Data describing the system configuration and the real time processes can be collected, checked and reconciled, analyzed and stored in database servers that can be accessed by all applications. The required technology is available. The only opportunity to design a distributed, nonredundant, integrated system is before it is built. Retrofit is extremely difficult and costly.
48 CFR 204.270 - Electronic Document Access.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Electronic Document Access..., DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Distribution 204.270 Electronic Document Access. Follow the procedures at PGI 204.270 relating to obtaining an account in the Electronic Document Access...
48 CFR 204.270 - Electronic Document Access.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Electronic Document Access..., DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Distribution 204.270 Electronic Document Access. Follow the procedures at PGI 204.270 relating to obtaining an account in the Electronic Document Access...
48 CFR 204.270 - Electronic Document Access.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Electronic Document Access..., DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Distribution 204.270 Electronic Document Access. Follow the procedures at PGI 204.270 relating to obtaining an account in the Electronic Document Access...
48 CFR 204.270 - Electronic Document Access.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Electronic Document Access..., DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Distribution 204.270 Electronic Document Access. Follow the procedures at PGI 204.270 relating to obtaining an account in the Electronic Document Access...
48 CFR 204.270 - Electronic Document Access.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Electronic Document Access..., DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Distribution 204.270 Electronic Document Access. Follow the procedures at PGI 204.270 relating to obtaining an account in the Electronic Document Access...
Feedback-Equivalence of Nonlinear Systems with Applications to Power System Equations.
NASA Astrophysics Data System (ADS)
Marino, Riccardo
The key concept of the dissertation is feedback equivalence among systems affine in control. Feedback equivalence to linear systems in Brunovsky canonical form and the construction of the corresponding feedback transformation are used to: (i) design a nonlinear regulator for a detailed nonlinear model of a synchronous generator connected to an infinite bus; (ii) establish which power system network structures enjoy the feedback linearizability property and design a stabilizing control law for these networks with a constraint on the control space which comes from the use of d.c. lines. It is also shown that the feedback linearizability property allows the use of state feedback to contruct a linear controllable system with a positive definite linear Hamiltonian structure for the uncontrolled part if the state space is even; a stabilizing control law is derived for such systems. Feedback linearizability property is characterized by the involutivity of certain nested distributions for strongly accessible analytic systems; if the system is defined on a manifold M diffeomorphic to the Euclidean space, it is established that the set where the property holds is a submanifold open and dense in M. If an analytic output map is defined, a set of nested involutive distributions can be always defined and that allows the introduction of an observability property which is the dual concept, in some sense, to feedback linearizability: the goal is to investigate when a nonlinear system affine in control with an analytic output map is feedback equivalent to a linear controllable and observable system. Finally a nested involutive structure of distributions is shown to guarantee the existence of a state feedback that takes a nonlinear system affine in control to a single input one, both feedback equivalent to linear controllable systems, preserving one controlled vector field.
Information Power Grid Posters
NASA Technical Reports Server (NTRS)
Vaziri, Arsi
2003-01-01
This document is a summary of the accomplishments of the Information Power Grid (IPG). Grids are an emerging technology that provide seamless and uniform access to the geographically dispersed, computational, data storage, networking, instruments, and software resources needed for solving large-scale scientific and engineering problems. The goal of the NASA IPG is to use NASA's remotely located computing and data system resources to build distributed systems that can address problems that are too large or complex for a single site. The accomplishments outlined in this poster presentation are: access to distributed data, IPG heterogeneous computing, integration of large-scale computing node into distributed environment, remote access to high data rate instruments,and exploratory grid environment.
Cancer Care at Times of Crisis and War: The Syrian Example
Sahloul, Eman; Salem, Riad; Alrez, Wessam; Alkarim, Tayseer; Sukari, Ammar; Maziak, Wasim
2017-01-01
Purpose As Syria enters its fifth year of conflict, the number of civilians killed and injured continues to rise sharply. Along with this conflict comes the rapid decline of medical care, specifically cancer care. To determine physician and equipment availability, cancer screening and management, and possible solutions relative to various major cities, a survey was distributed to physicians inside Syria through the help of the humanitarian organization Syrian American Medical Society. Methods Online surveys were distributed to both certified oncologists who work in cancer clinics and general physicians who work in rural and mobile clinics inside Syria. Variables assessed were physician specialty, location, population, cost, regional situation (besieged versus government controlled), and resource availability and access. Results were stratified by location and physician specialty. Results Survey results revealed a large shortage of specialized physicians and inhibited accessibility to screening and management options in besieged areas compared with government-controlled regions. Physicians within both government-controlled and besieged cities reported limited or no targeted agents, radiation therapy, clinical trials, bone marrow transplantation, positron emission tomography scans, magnetic resonance imaging, and genetic testing. Conclusion The Syrian civil war has resulted in suboptimal oncology care in the majority of the region. In consideration of specific deficiencies in cancer care, we recommend several solutions that may better the level of care in Syria: patient education on medical documentation and self-examination; online consultation; and cheap, effective screening methods. The implementation of these recommendations may change the course of cancer care in a country that has deteriorated into the worst humanitarian crisis of the century. PMID:28831442
Cancer Care at Times of Crisis and War: The Syrian Example.
Sahloul, Eman; Salem, Riad; Alrez, Wessam; Alkarim, Tayseer; Sukari, Ammar; Maziak, Wasim; Atassi, M Bassel
2017-08-01
As Syria enters its fifth year of conflict, the number of civilians killed and injured continues to rise sharply. Along with this conflict comes the rapid decline of medical care, specifically cancer care. To determine physician and equipment availability, cancer screening and management, and possible solutions relative to various major cities, a survey was distributed to physicians inside Syria through the help of the humanitarian organization Syrian American Medical Society. Online surveys were distributed to both certified oncologists who work in cancer clinics and general physicians who work in rural and mobile clinics inside Syria. Variables assessed were physician specialty, location, population, cost, regional situation (besieged versus government controlled), and resource availability and access. Results were stratified by location and physician specialty. Survey results revealed a large shortage of specialized physicians and inhibited accessibility to screening and management options in besieged areas compared with government-controlled regions. Physicians within both government-controlled and besieged cities reported limited or no targeted agents, radiation therapy, clinical trials, bone marrow transplantation, positron emission tomography scans, magnetic resonance imaging, and genetic testing. The Syrian civil war has resulted in suboptimal oncology care in the majority of the region. In consideration of specific deficiencies in cancer care, we recommend several solutions that may better the level of care in Syria: patient education on medical documentation and self-examination; online consultation; and cheap, effective screening methods. The implementation of these recommendations may change the course of cancer care in a country that has deteriorated into the worst humanitarian crisis of the century.
NASA Astrophysics Data System (ADS)
Sana, Ajaz; Saddawi, Samir; Moghaddassi, Jalil; Hussain, Shahab; Zaidi, Syed R.
2010-01-01
In this research paper we propose a novel Passive Optical Network (PON) based Mobile Worldwide Interoperability for Microwave Access (WiMAX) access network architecture to provide high capacity and performance multimedia services to mobile WiMAX users. Passive Optical Networks (PON) networks do not require powered equipment; hence they cost lower and need less network management. WiMAX technology emerges as a viable candidate for the last mile solution. In the conventional WiMAX access networks, the base stations and Multiple Input Multiple Output (MIMO) antennas are connected by point to point lines. Ideally in theory, the Maximum WiMAX bandwidth is assumed to be 70 Mbit/s over 31 miles. In reality, WiMAX can only provide one or the other as when operating over maximum range, bit error rate increases and therefore it is required to use lower bit rate. Lowering the range allows a device to operate at higher bit rates. Our focus in this research paper is to increase both range and bit rate by utilizing distributed cluster of MIMO antennas connected to WiMAX base stations with PON based topologies. A novel quality of service (QoS) algorithm is also proposed to provide admission control and scheduling to serve classified traffic. The proposed architecture presents flexible and scalable system design with different performance requirements and complexity.
A prototype Upper Atmospheric Research Collaboratory (UARC)
NASA Technical Reports Server (NTRS)
Clauer, C. R.; Atkins, D. E; Weymouth, T. E.; Olson, G. M.; Niciejewski, R.; Finholt, T. A.; Prakash, A.; Rasmussen, C. E.; Killeen, T.; Rosenberg, T. J.
1995-01-01
The National Collaboratory concept has great potential for enabling 'critical mass' working groups and highly interdisciplinary research projects. We report here on a new program to build a prototype collaboratory using the Sondrestrom Upper Atmospheric Research Facility in Kangerlussuaq, Greenland and a group of associated scientists. The Upper Atmospheric Research Collaboratory (UARC) is a joint venture of researchers in upper atmospheric and space science, computer science, and behavioral science to develop a testbed for collaborative remote research. We define the 'collaboratory' as an advanced information technology environment which enables teams to work together over distance and time on a wide variety of intellectual tasks. It provides: (1) human-to-human communications using shared computer tools and work spaces; (2) group access and use of a network of information, data, and knowledge sources; and (3) remote access and control of instruments for data acquisition. The UARC testbed is being implemented to support a distributed community of space scientists so that they have network access to the remote instrument facility in Kangerlussuaq and are able to interact among geographically distributed locations. The goal is to enable them to use the UARC rather than physical travel to Greenland to conduct team research campaigns. Even on short notice through the collaboratory from their home institutions, participants will be able to meet together to operate a battery of remote interactive observations and to acquire, process, and interpret the data.
Solar-terrestrial data access distribution and archiving
NASA Technical Reports Server (NTRS)
1984-01-01
It is recommended that a central data catalog and data access network (CDC/DAN) for solar-terrestrial research be established, initially as a NASA pilot program. The system is envisioned to be flexible and to evolve as funds permit, starting from a catalog to an access network for high-resolution data. The report describes the various functional requirements for the CDC/DAN, but does not specify the hardware and software architectures as these are constantly evolving. The importance of a steering committee, working with the CDC/DAN organization, to provide scientific guidelines for the data catalog and for data storage, access, and distribution is also stressed.
A Streaming Content Distribution Network for E-Learning Support
ERIC Educational Resources Information Center
Esteve, M.; Molina, B.; Palau, C.; Fortino, G.
2006-01-01
To date e-Learning material has usually been accessed and delivered through a central web server. As the number of users, the amount of information, the frequency of accesses and the volume of data increase, together with the introduction of multimedia streaming applications, a decentralized content distribution architecture is necessary. In this…
Distributed Structure-Searchable Toxicity (DSSTox) Database Network: Making Public Toxicity Data Resources More Accessible and U sable for Data Exploration and SAR Development
Many sources of public toxicity data are not currently linked to chemical structure, are not ...
Graduating to Postdoc: Information-Sharing in Support of Organizational Structures and Needs
NASA Technical Reports Server (NTRS)
Keller, Richard M.; Lucas, Paul J.; Compton, Michael M.; Stewart, Helen J.; Baya, Vinod; DelAlto, Martha
1999-01-01
The deployment of information-sharing systems in large organizations can significantly impact existing policies and procedures with regard to authority and control over information. Unless information-sharing systems explicitly support organizational structures and needs, these systems will be rejected summarily. The Postdoc system is a deployed Web-based information-sharing system created specifically to address organizational needs. Postdoc contains various organizational support features including a shared, globally navigable document space, as well as specialized access control, distributed administration, and mailing list features built around the key notion of hierarchical group structures. We review successes and difficulties in supporting organizational needs with Postdoc
Securing Provenance of Distributed Processes in an Untrusted Environment
NASA Astrophysics Data System (ADS)
Syalim, Amril; Nishide, Takashi; Sakurai, Kouichi
Recently, there is much concern about the provenance of distributed processes, that is about the documentation of the origin and the processes to produce an object in a distributed system. The provenance has many applications in the forms of medical records, documentation of processes in the computer systems, recording the origin of data in the cloud, and also documentation of human-executed processes. The provenance of distributed processes can be modeled by a directed acyclic graph (DAG) where each node represents an entity, and an edge represents the origin and causal relationship between entities. Without sufficient security mechanisms, the provenance graph suffers from integrity and confidentiality problems, for example changes or deletions of the correct nodes, additions of fake nodes and edges, and unauthorized accesses to the sensitive nodes and edges. In this paper, we propose an integrity mechanism for provenance graph using the digital signature involving three parties: the process executors who are responsible in the nodes' creation, a provenance owner that records the nodes to the provenance store, and a trusted party that we call the Trusted Counter Server (TCS) that records the number of nodes stored by the provenance owner. We show that the mechanism can detect the integrity problem in the provenance graph, namely unauthorized and malicious “authorized” updates even if all the parties, except the TCS, collude to update the provenance. In this scheme, the TCS only needs a very minimal storage (linear with the number of the provenance owners). To protect the confidentiality and for an efficient access control administration, we propose a method to encrypt the provenance graph that allows access by paths and compartments in the provenance graph. We argue that encryption is important as a mechanism to protect the provenance data stored in an untrusted environment. We analyze the security of the integrity mechanism, and perform experiments to measure the performance of both mechanisms.
NASA Astrophysics Data System (ADS)
Pascoe, Stephen; Cinquini, Luca; Lawrence, Bryan
2010-05-01
The Phase 5 Coupled Model Intercomparison Project (CMIP5) will produce a petabyte scale archive of climate data relevant to future international assessments of climate science (e.g., the IPCC's 5th Assessment Report scheduled for publication in 2013). The infrastructure for the CMIP5 archive must meet many challenges to support this ambitious international project. We describe here the distributed software architecture being deployed worldwide to meet these challenges. The CMIP5 architecture extends the Earth System Grid (ESG) distributed architecture of Datanodes, providing data access and visualisation services, and Gateways providing the user interface including registration, search and browse services. Additional features developed for CMIP5 include a publication workflow incorporating quality control and metadata submission, data replication, version control, update notification and production of citable metadata records. Implementation of these features have been driven by the requirements of reliable global access to over 1Pb of data and consistent citability of data and metadata. Central to the implementation is the concept of Atomic Datasets that are identifiable through a Data Reference Syntax (DRS). Atomic Datasets are immutable to allow them to be replicated and tracked whilst maintaining data consistency. However, since occasional errors in data production and processing is inevitable, new versions can be published and users notified of these updates. As deprecated datasets may be the target of existing citations they can remain visible in the system. Replication of Atomic Datasets is designed to improve regional access and provide fault tolerance. Several datanodes in the system are designated replicating nodes and hold replicas of a portion of the archive expected to be of broad interest to the community. Gateways provide a system-wide interface to users where they can track the version history and location of replicas to select the most appropriate location for download. In addition to meeting the immediate needs of CMIP5 this architecture provides a basis for the Earth System Modeling e-infrastructure being further developed within the EU FP7 IS-ENES project.
The Technology Information Environment with Industry{trademark} system description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Detry, R.; Machin, G.
The Technology Information Environment with Industry (TIE-In{trademark}) provides users with controlled access to distributed laboratory resources that are packaged in intelligent user interfaces. These interfaces help users access resources without requiring the user to have technical or computer expertise. TIE-In utilizes existing, proven technologies such as the Kerberos authentication system, X-Windows, and UNIX sockets. A Front End System (FES) authenticates users and allows them to register for resources and subsequently access them. The FES also stores status and accounting information, and provides an automated method for the resource owners to recover costs from users. The resources available through TIE-In aremore » typically laboratory-developed applications that are used to help design, analyze, and test components in the nation`s nuclear stockpile. Many of these applications can also be used by US companies for non-weapons-related work. TIE-In allows these industry partners to obtain laboratory-developed technical solutions without requiring them to duplicate the technical resources (people, hardware, and software) at Sandia.« less
"These young chaps think they are just men, too": redistributing masculinity in Kgatleng bars.
Suggs, D N
2001-07-01
In the 19th century the BaKgatla polity was a chiefdom with a redistributional economy based on mixed agriculture. Sorghum beer was symbolic not only of the patrilineal core of their descent system and of the ideologies of reciprocity and redistribution, but also of masculinity and patriarchal control. With the establishment of a market economy, an industrial brewery and individual access to income, both beer and the act of drinking have been symbolically reconstructed. The ideology of redistribution was well suited to the support of the BaKgatla gerontocracy via alcohol production and consumption. The limits on production and consumption of beer inherent in the agricultural cycle and the control of young men's access by elders made alcohol an effective symbol of managerial competence from the limited context of household authority to that of the chiefdom as a whole. Today, young men's greater control of cash income has given them access to beer beyond the control of elders. As a result, the contrasting ideology of market exchange and competitive distribution of beer has contributed to the degradation of the power of seniors. After reviewing the historical background, this paper explores those changes. It argues that while the observed infrastructural changes have had a predictable impact on drinking behaviors and the symbolic structure of "seniority/masculinity", constructions of the "masculine community" in BaKgatla bars demonstrate continuity in key areas of mens' identities. If as anthropologists we see obvious discontinuities in behavior and ideology, the BaKgatla build selective bridges to "tradition" which seemingly ground the experience of change in relatively seamless continuity.
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
NASA Astrophysics Data System (ADS)
McKee, Shawn;
2017-10-01
Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks. We will report on a number of networking initiatives in ATLAS including participation in the global perfSONAR network monitoring and measuring efforts of WLCG and OSG, the collaboration with the LHCOPN/LHCONE effort, the integration of network awareness into PanDA, the use of the evolving ATLAS analytics framework to better understand our networks and the changes in our DDM system to allow remote access to data. We will also discuss new efforts underway that are exploring the inclusion and use of software defined networks (SDN) and how ATLAS might benefit from: • Orchestration and optimization of distributed data access and data movement. • Better control of workflows, end to end. • Enabling prioritization of time-critical vs normal tasks • Improvements in the efficiency of resource usage
NASA Astrophysics Data System (ADS)
Freund, Eckhard; Rossmann, Juergen
2002-02-01
In 2004, the European COLUMBUS Module is to be attached to the International Space Station. On the way to the successful planning, deployment and operation of the module, computer generated and animated models are being used to optimize performance. Under contract of the German Space Agency DLR, it has become IRF's task to provide a Projective Virtual Reality System to provide a virtual world built after the planned layout of the COLUMBUS module let astronauts and experimentators practice operational procedures and the handling of experiments. The key features of the system currently being realized comprise the possibility for distributed multi-user access to the virtual lab and the visualization of real-world experiment data. Through the capabilities to share the virtual world, cooperative operations can be practiced easily, but also trainers and trainees can work together more effectively sharing the virtual environment. The capability to visualize real-world data will be used to introduce measured data of experiments into the virtual world online in order to realistically interact with the science-reference model hardware: The user's actions in the virtual world are translated into corresponding changes of the inputs of the science reference model hardware; the measured data is than in turn fed back into the virtual world. During the operation of COLUMBUS, the capabilities for distributed access and the capabilities to visualize measured data through the use of metaphors and augmentations of the virtual world may be used to provide virtual access to the COLUMBUS module, e.g. via Internet. Currently, finishing touches are being put to the system. In November 2001 the virtual world shall be operational, so that besides the design and the key ideas, first experimental results can be presented.
FAST copper for broadband access
NASA Astrophysics Data System (ADS)
Chiang, Mung; Huang, Jianwei; Cendrillon, Raphael; Tan, Chee Wei; Xu, Dahai
2006-10-01
FAST Copper is a multi-year, U.S. NSF funded project that started in 2004, and is jointly pursued by the research groups of Mung Chiang at Princeton University, John Cioffi at Stanford University, and Alexader Fraser at Fraser Research Lab, and in collaboration with several industrial partners including AT&T. The goal of the FAST Copper Project is to provide ubiquitous, 100 Mbps, fiber/DSL broadband access to everyone in the U.S. with a phone line. This goal will be achieved through two threads of research: dynamic and joint optimization of resources in Frequency, Amplitude, Space, and Time (thus the name 'FAST') to overcome the attenuation and crosstalk bottlenecks, and the integration of communication, networking, computation, modeling, and distributed information management and control for the multi-user twisted pair network.
WIWS: a protein structure bioinformatics Web service collection.
Hekkelman, M L; Te Beek, T A H; Pettifer, S R; Thorne, D; Attwood, T K; Vriend, G
2010-07-01
The WHAT IF molecular-modelling and drug design program is widely distributed in the world of protein structure bioinformatics. Although originally designed as an interactive application, its highly modular design and inbuilt control language have recently enabled its deployment as a collection of programmatically accessible web services. We report here a collection of WHAT IF-based protein structure bioinformatics web services: these relate to structure quality, the use of symmetry in crystal structures, structure correction and optimization, adding hydrogens and optimizing hydrogen bonds and a series of geometric calculations. The freely accessible web services are based on the industry standard WS-I profile and the EMBRACE technical guidelines, and are available via both REST and SOAP paradigms. The web services run on a dedicated computational cluster; their function and availability is monitored daily.
A System for Distributing Real-Time Customized (NEXRAD-Radar) Geosciences Data
NASA Astrophysics Data System (ADS)
Singh, Satpreet; McWhirter, Jeff; Krajewski, Witold; Kruger, Anton; Goska, Radoslaw; Seo, Bongchul; Domaszczynski, Piotr; Weber, Jeff
2010-05-01
Hydrometeorologists and hydrologists can benefit from (weather) radar derived rain products, including rain rates and accumulations. The Hydro-NEXRAD system (HNX1) has been in operation since 2006 at IIHR-Hydroscience and Engineering at The University of Iowa. It provides rapid and user-friendly access to such user-customized products, generated using archived Weather Surveillance Doppler Radar (WSR-88D) data from the NEXRAD weather radar network in the United States. HNX1 allows researchers to deal directly with radar-derived rain products, without the burden of the details of radar data collection, quality control, processing, and format conversion. A number of hydrologic applications can benefit from a continuous real-time feed of customized radar-derived rain products. We are currently developing such a system, Hydro-NEXRAD 2 (HNX2). HNX2 collects real-time, unprocessed data from multiple NEXRAD radars as they become available, processes them through a user-configurable pipeline of data-processing modules, and then publishes processed products at regular intervals. Modules in the data processing pipeline encapsulate algorithms such as non-meteorological echo detection, range correction, radar-reflectivity-rain rate (Z-R) conversion, advection correction, merging products from multiple radars, and grid transformations. HNX2's implementation presents significant challenges, including quality-control, error-handling, time-synchronization of data from multiple asynchronous sources, generation of multiple-radar metadata products, distribution of products to a user base with diverse needs and constraints, and scalability. For content management and distribution, HNX2 uses RAMADDA (Repository for Archiving, Managing and Accessing Diverse Data), developed by the UCAR/Unidata Program Center in the Unites States. RAMADDA allows HNX2 to publish products through automation and gives users multiple access methods to the published products, including simple web-browser based access, and OpenDAP access. The latter allows a user to set up automation at his/her end, and fetch new data from HNX2 at regular intervals. HNX2 uses a two-dimensional metadata structure called a mosaic for managing metadata of the rain products. Currently, HNX2 is in pre-production state and is serving near real-time rain-rate map data-products for individual radars and merged data-products from seven radars covering the state of Iowa in the United States. These products then drive a rainfall-runoff model called CUENCAS, which is used as part of the Iowa Flood Center (housed at The University of Iowa) real-time flood forecasting system. We are currently developing a generalized scalable framework that will run on inexpensive hardware and will provide products for basins anywhere in the continental United States.
An enhanced Ada run-time system for real-time embedded processors
NASA Technical Reports Server (NTRS)
Sims, J. T.
1991-01-01
An enhanced Ada run-time system has been developed to support real-time embedded processor applications. The primary focus of this development effort has been on the tasking system and the memory management facilities of the run-time system. The tasking system has been extended to support efficient and precise periodic task execution as required for control applications. Event-driven task execution providing a means of task-asynchronous control and communication among Ada tasks is supported in this system. Inter-task control is even provided among tasks distributed on separate physical processors. The memory management system has been enhanced to provide object allocation and protected access support for memory shared between disjoint processors, each of which is executing a distinct Ada program.
Purdue ionomics information management system. An integrated functional genomics platform.
Baxter, Ivan; Ouzzani, Mourad; Orcun, Seza; Kennedy, Brad; Jandhyala, Shrinivas S; Salt, David E
2007-02-01
The advent of high-throughput phenotyping technologies has created a deluge of information that is difficult to deal with without the appropriate data management tools. These data management tools should integrate defined workflow controls for genomic-scale data acquisition and validation, data storage and retrieval, and data analysis, indexed around the genomic information of the organism of interest. To maximize the impact of these large datasets, it is critical that they are rapidly disseminated to the broader research community, allowing open access for data mining and discovery. We describe here a system that incorporates such functionalities developed around the Purdue University high-throughput ionomics phenotyping platform. The Purdue Ionomics Information Management System (PiiMS) provides integrated workflow control, data storage, and analysis to facilitate high-throughput data acquisition, along with integrated tools for data search, retrieval, and visualization for hypothesis development. PiiMS is deployed as a World Wide Web-enabled system, allowing for integration of distributed workflow processes and open access to raw data for analysis by numerous laboratories. PiiMS currently contains data on shoot concentrations of P, Ca, K, Mg, Cu, Fe, Zn, Mn, Co, Ni, B, Se, Mo, Na, As, and Cd in over 60,000 shoot tissue samples of Arabidopsis (Arabidopsis thaliana), including ethyl methanesulfonate, fast-neutron and defined T-DNA mutants, and natural accession and populations of recombinant inbred lines from over 800 separate experiments, representing over 1,000,000 fully quantitative elemental concentrations. PiiMS is accessible at www.purdue.edu/dp/ionomics.
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
Two decades of reforms. Appraisal of the financial reforms in the Russian public healthcare sector.
Gordeev, Vladimir S; Pavlova, Milena; Groot, Wim
2011-10-01
This paper reviews the empirical evidence on the outcomes of the financial reforms in the Russian public healthcare sector. A systematic literature review identified 37 relevant publications that presented empirical evidence on changes in quality, equity, efficiency and sustainability in public healthcare provision due to the Russian public healthcare financial reforms. Evidence suggests that there are substantial inter-regional inequalities across income groups both in terms of financing and access to public healthcare services. There are large efficiency differences between regions, along with inter-regional variations in payment and reimbursement mechanisms. Informal and quasi-formal payments deteriorate access to public healthcare services and undermine the overall financing sustainability. The public healthcare sector is still underfinanced, although the implementation of health insurance gave some premises for future increases of efficiency. Overall, the available empirical data are not sufficient for an evidence-based evaluation of the reforms. More studies on the quality, equity, efficiency and sustainability impact of the reforms are needed. Future reforms should focus on the implementation of cost-efficiency and cost-control mechanisms; provide incentives for better allocation and distribution of resources; tackle problems in equity in access and financing; implement a system of quality controls; and stimulate healthy competition between insurance companies. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Graziano, Martin; Sigman, Mariano
2008-05-23
When a stimulus is presented, its sensory trace decays rapidly, lasting for approximately 1000 ms. This brief and labile memory, referred as iconic memory, serves as a buffer before information is transferred to working memory and executive control. Here we explored the effect of different factors--geometric, spatial, and experience--with respect to the access and the maintenance of information in iconic memory and the progressive distortion of this memory. We studied performance in a partial report paradigm, a design wherein recall of only part of a stimulus array is required. Subjects had to report the identity of a letter in a location that was cued in a variable delay after the stimulus onset. Performance decayed exponentially with time, and we studied the different parameters (time constant, zero-delay value, and decay amplitude) as a function of the different factors. We observed that experience (determined by letter frequency) affected the access to iconic memory but not the temporal decay constant. On the contrary, spatial position affected the temporal course of delay. The entropy of the error distribution increased with time reflecting a progressive morphological distortion of the iconic buffer. We discuss our results on the context of a model of information access to executive control and how it is affected by learning and attention.
Simple, Script-Based Science Processing Archive
NASA Technical Reports Server (NTRS)
Lynnes, Christopher; Hegde, Mahabaleshwara; Barth, C. Wrandle
2007-01-01
The Simple, Scalable, Script-based Science Processing (S4P) Archive (S4PA) is a disk-based archival system for remote sensing data. It is based on the data-driven framework of S4P and is used for data transfer, data preprocessing, metadata generation, data archive, and data distribution. New data are automatically detected by the system. S4P provides services such as data access control, data subscription, metadata publication, data replication, and data recovery. It comprises scripts that control the data flow. The system detects the availability of data on an FTP (file transfer protocol) server, initiates data transfer, preprocesses data if necessary, and archives it on readily available disk drives with FTP and HTTP (Hypertext Transfer Protocol) access, allowing instantaneous data access. There are options for plug-ins for data preprocessing before storage. Publication of metadata to external applications such as the Earth Observing System Clearinghouse (ECHO) is also supported. S4PA includes a graphical user interface for monitoring the system operation and a tool for deploying the system. To ensure reliability, S4P continuously checks stored data for integrity, Further reliability is provided by tape backups of disks made once a disk partition is full and closed. The system is designed for low maintenance, requiring minimal operator oversight.
Multi-static networked 3D ladar for surveillance and access control
NASA Astrophysics Data System (ADS)
Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.
2007-04-01
A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.
Evaluation of analytical performance of a new high-sensitivity immunoassay for cardiac troponin I.
Masotti, Silvia; Prontera, Concetta; Musetti, Veronica; Storti, Simona; Ndreu, Rudina; Zucchelli, Gian Carlo; Passino, Claudio; Clerico, Aldo
2018-02-23
The study aim was to evaluate and compare the analytical performance of the new chemiluminescent immunoassay for cardiac troponin I (cTnI), called Access hs-TnI using DxI platform, with those of Access AccuTnI+3 method, and high-sensitivity (hs) cTnI method for ARCHITECT platform. The limits of blank (LoB), detection (LoD) and quantitation (LoQ) at 10% and 20% CV were evaluated according to international standardized protocols. For the evaluation of analytical performance and comparison of cTnI results, both heparinized plasma samples, collected from healthy subjects and patients with cardiac diseases, and quality control samples distributed in external quality assessment programs were used. LoB, LoD and LoQ at 20% and 10% CV values of the Access hs-cTnI method were 0.6, 1.3, 2.1 and 5.3 ng/L, respectively. Access hs-cTnI method showed analytical performance significantly better than that of Access AccuTnI+3 method and similar results to those of hs ARCHITECT cTnI method. Moreover, the cTnI concentrations measured with Access hs-cTnI method showed close linear regressions with both Access AccuTnI+3 and ARCHITECT hs-cTnI methods, although there were systematic differences between these methods. There was no difference between cTnI values measured by Access hs-cTnI in heparinized plasma and serum samples, whereas there was a significant difference between cTnI values, respectively measured in EDTA and heparin plasma samples. Access hs-cTnI has analytical sensitivity parameters significantly improved compared to Access AccuTnI+3 method and is similar to those of the high-sensitivity method using ARCHITECT platform.
A Virtual Upgrade Validation Method for Software-Reliant Systems
2012-06-01
3.4 Root Cause Areas of System-Level Faults 11 3.4.1 End-to-End Flow of Data Streams 11 3.4.2 Distributed Communicating State Machines 13 3.4.3...FlyByWire/FlyByWire_english.pdf (Accessed on November 11 , 2011.) [Apple 2005] Apple Support Communities , jazzman40. iTunes Crashes When Ripping...Strategies 39 7.1 Application Pattern Modeling Strategies 39 7.1.1 Control Loops 39 7.1.2 State Transition Communication 42 7.1.3 Sensor/Signal Fusion
A Framework for Managing Inter-Site Storage Area Networks using Grid Technologies
NASA Technical Reports Server (NTRS)
Kobler, Ben; McCall, Fritz; Smorul, Mike
2006-01-01
The NASA Goddard Space Flight Center and the University of Maryland Institute for Advanced Computer Studies are studying mechanisms for installing and managing Storage Area Networks (SANs) that span multiple independent collaborating institutions using Storage Area Network Routers (SAN Routers). We present a framework for managing inter-site distributed SANs that uses Grid Technologies to balance the competing needs to control local resources, share information, delegate administrative access, and manage the complex trust relationships between the participating sites.
1983-11-01
successfully. I- Accession For NTIS -GO iiiONa DTIC TAB t Unannounced - Justificatio Distribution/ I Availability Codes vail and/or DIst Special IA-11...terms of initial signal power. An active sensor must be excited externally. Such a sensor receives its power from an external source and merely modulates...electrons in the material to gain L enough energy to be emitted. The voltage source causes a positive potential to be felt on the collector, thus causing the
Mycobacterial biomaterials and resources for researchers.
Hazbón, Manzour Hernando; Rigouts, Leen; Schito, Marco; Ezewudo, Matthew; Kudo, Takuji; Itoh, Takashi; Ohkuma, Moriya; Kiss, Katalin; Wu, Linhuan; Ma, Juncai; Hamada, Moriyuki; Strong, Michael; Salfinger, Max; Daley, Charles L; Nick, Jerry A; Lee, Jung-Sook; Rastogi, Nalin; Couvin, David; Hurtado-Ortiz, Raquel; Bizet, Chantal; Suresh, Anita; Rodwell, Timothy; Albertini, Audrey; Lacourciere, Karen A; Deheer-Graham, Ana; Alexander, Sarah; Russell, Julie E; Bradford, Rebecca; Riojas, Marco A
2018-06-01
There are many resources available to mycobacterial researchers, including culture collections around the world that distribute biomaterials to the general scientific community, genomic and clinical databases, and powerful bioinformatics tools. However, many of these resources may be unknown to the research community. This review article aims to summarize and publicize many of these resources, thus strengthening the quality and reproducibility of mycobacterial research by providing the scientific community access to authenticated and quality-controlled biomaterials and a wealth of information, analytical tools and research opportunities.
Majumder, S; Baranwal, V K
2014-06-01
Indian garlic is infected with Onion yellow dwarf virus (OYDV), Shallot latent virus (SLV), Garlic common latent virus (GarCLV) and allexiviruses. Identity and distribution of garlic viruses in various garlic accessions from different geographical regions of India were investigated. OYDV and allexiviruses were observed in all the garlic accessions, while SLV and GarCLV were observed only in a few accessions. A multiplex reverse transcription (RT)-PCR method was developed for the simultaneous detection and identification of OYDV, SLV, GarCLV and Allexivirus infecting garlic accessions in India. This multiplex protocol standardized in this study will be useful in indexing of garlic viruses and production of virus free seed material. Copyright © 2014 Elsevier B.V. All rights reserved.
Open access, library and publisher competition, and the evolution of general commerce.
Odlyzko, Andrew M
2015-02-01
Discussions of the economics of scholarly communication are usually devoted to Open Access, rising journal prices, publisher profits, and boycotts. That ignores what seems a much more important development in this market. Publishers, through the oft-reviled Big Deal packages, are providing much greater and more egalitarian access to the journal literature, an approximation to true Open Access. In the process, they are also marginalizing libraries and obtaining a greater share of the resources going into scholarly communication. This is enabling a continuation of publisher profits as well as of what for decades has been called "unsustainable journal price escalation." It is also inhibiting the spread of Open Access and potentially leading to an oligopoly of publishers controlling distribution through large-scale licensing. The Big Deal practices are worth studying for several general reasons. The degree to which publishers succeed in diminishing the role of libraries may be an indicator of the degree and speed at which universities transform themselves. More importantly, these Big Deals appear to point the way to the future of the whole economy, where progress is characterized by declining privacy, increasing price discrimination, increasing opaqueness in pricing, increasing reliance on low-paid or unpaid work of others for profits, and business models that depend on customer inertia. © The Author(s) 2014.
Bringing modeling to the masses: A web based system to predict potential species distributions
Graham, Jim; Newman, Greg; Kumar, Sunil; Jarnevich, Catherine S.; Young, Nick; Crall, Alycia W.; Stohlgren, Thomas J.; Evangelista, Paul
2010-01-01
Predicting current and potential species distributions and abundance is critical for managing invasive species, preserving threatened and endangered species, and conserving native species and habitats. Accurate predictive models are needed at local, regional, and national scales to guide field surveys, improve monitoring, and set priorities for conservation and restoration. Modeling capabilities, however, are often limited by access to software and environmental data required for predictions. To address these needs, we built a comprehensive web-based system that: (1) maintains a large database of field data; (2) provides access to field data and a wealth of environmental data; (3) accesses values in rasters representing environmental characteristics; (4) runs statistical spatial models; and (5) creates maps that predict the potential species distribution. The system is available online at www.niiss.org, and provides web-based tools for stakeholders to create potential species distribution models and maps under current and future climate scenarios.
Snag distributions in relation to human access in ponderosa pine forests
Jeff P. Hollenbeck; Lisa J. Bate; Victoria A. Saab; John F. Lehmkuhl
2013-01-01
Ponderosa pine (Pinus ponderosa) forests in western North America provide habitat for numerous cavity-using wildlife species that often select large-diameter snags for nesting and roosting. Yet large snags are often removed for their commercial and firewood values. Consequently we evaluated effects of human access on snag densities and diameter-class distributions at...
Effects of Reinforcer Magnitude and Distribution on Preference for Work Schedules
ERIC Educational Resources Information Center
Ward-Horner, John C.; Pittenger, Alexis; Pace, Gary; Fienup, Daniel M.
2014-01-01
When the overall magnitude of reinforcement is matched between 2 alternative work schedules, some students prefer to complete all of their work for continuous access to a reinforcer (continuous work) rather than distributed access to a reinforcer while they work (discontinuous work). We evaluated a student's preference for continuous work by…
Orchestrating Distributed Resource Ensembles for Petascale Science
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baldin, Ilya; Mandal, Anirban; Ruth, Paul
2014-04-24
Distributed, data-intensive computational science applications of interest to DOE scientific com- munities move large amounts of data for experiment data management, distributed analysis steps, remote visualization, and accessing scientific instruments. These applications need to orchestrate ensembles of resources from multiple resource pools and interconnect them with high-capacity multi- layered networks across multiple domains. It is highly desirable that mechanisms are designed that provide this type of resource provisioning capability to a broad class of applications. It is also important to have coherent monitoring capabilities for such complex distributed environments. In this project, we addressed these problems by designing an abstractmore » API, enabled by novel semantic resource descriptions, for provisioning complex and heterogeneous resources from multiple providers using their native provisioning mechanisms and control planes: computational, storage, and multi-layered high-speed network domains. We used an extensible resource representation based on semantic web technologies to afford maximum flexibility to applications in specifying their needs. We evaluated the effectiveness of provisioning using representative data-intensive ap- plications. We also developed mechanisms for providing feedback about resource performance to the application, to enable closed-loop feedback control and dynamic adjustments to resource allo- cations (elasticity). This was enabled through development of a novel persistent query framework that consumes disparate sources of monitoring data, including perfSONAR, and provides scalable distribution of asynchronous notifications.« less
NASA Astrophysics Data System (ADS)
Pamulaparthy, Balakrishna; KS, Swarup; Kommu, Rajagopal
2014-12-01
Distribution automation (DA) applications are limited to feeder level today and have zero visibility outside of the substation feeder and reaching down to the low-voltage distribution network level. This has become a major obstacle in realizing many automated functions and enhancing existing DA capabilities. Advanced metering infrastructure (AMI) systems are being widely deployed by utilities across the world creating system-wide communications access to every monitoring and service point, which collects data from smart meters and sensors in short time intervals, in response to utility needs. DA and AMI systems convergence provides unique opportunities and capabilities for distribution grid modernization with the DA system acting as a controller and AMI system acting as feedback to DA system, for which DA applications have to understand and use the AMI data selectively and effectively. In this paper, we propose a load segmentation method that helps the DA system to accurately understand and use the AMI data for various automation applications with a suitable case study on power restoration.
Recommendations for a service framework to access astronomical archives
NASA Technical Reports Server (NTRS)
Travisano, J. J.; Pollizzi, J.
1992-01-01
There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit archive user and supplier alike is proposed.
Failure to produce taste-aversion learning in rats exposed to static electric fields and air ions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Creim, J.A.; Lovely, R.H.; Weigel, R.J.
1995-12-01
Taste-aversion (TA) learning was measured to determine whether exposure to high-voltage direct current (HVdc) static electric fields can produce TA learning in male Long Evans rats. Fifty-six rats were randomly distributed into four groups of 14 rats each. All rats were placed on a 20 min/day drinking schedule for 12 consecutive days prior to receiving five conditioning trials. During the conditioning trials, access to 0.1% sodium saccharin-flavored water was given for 20 min, followed 30 min later by one of four treatments. Two groups of 14 rats each were individually exposed to static electric fields and air ions, one groupmore » to +75 kV/m (+2 {times} 10{sup 5} air ions/cm{sup 3}) and the other group to {minus}75 kV/m ({minus}2 {times} 10{sup 5} air ions/cm{sup 3}). Two other groups of 14 rats each served as sham-exposed controls, with the following variation in one of the sham-exposed groups: this group was subdivided into two subsets of seven rats each, so that a positive control group could be included to validate the experimental design. The positive control group (n = 7) was injected with cyclophosphamide 25 mg/kg, i.p., 30 min after access to saccharin-flavored water on conditioning days, whereas the other subset of seven rats was similarly injected with an equivalent volume of saline. Access to saccharin-flavored water on conditioning days was followed by the treatments described above and was alternated daily with water recovery sessions in which the rats received access to water for 20 min in the home cage without further treatment. Following the last water-recovery session, a 20 min, two-bottle preference test (between water and saccharin-flavored water) was administered to each group. The positive control group did show TA learning, thus validating the experimental protocol.« less
NASA Technical Reports Server (NTRS)
Nguyen, Quang-Viet
1998-01-01
Fuel distribution measurements in gas turbine combustors are needed from both pollution and fuel-efficiency standpoints. In addition to providing valuable data for performance testing and engine development, measurements of fuel distributions uniquely complement predictive numerical simulations. Although equally important as spatial distribution, the temporal distribution of the fuel is an often overlooked aspect of combustor design and development. This is due partly to the difficulties in applying time-resolved diagnostic techniques to the high-pressure, high-temperature environments inside gas turbine engines. Time-resolved measurements of the fuel-to-air ratio (F/A) can give researchers critical insights into combustor dynamics and acoustics. Beginning in early 1998, a windowless technique that uses fiber-optic, line-of-sight, infrared laser light absorption to measure the time-resolved fluctuations of the F/A (refs. 1 and 2) will be used within the premixer section of a lean-premixed, prevaporized (LPP) combustor in NASA Lewis Research Center's CE-5 facility. The fiber-optic F/A sensor will permit optical access while eliminating the need for film-cooled windows, which perturb the flow. More importantly, the real-time data from the fiber-optic F/A sensor will provide unique information for the active feedback control of combustor dynamics. This will be a prototype for an airborne sensor control system.
Exploratory Research on Personnel Long Range Planning
1982-05-01
rN4 and Joyce ShieldsI AR I ’I.0 04E~i Reserch nsttuteforU. S., Army K-Z Reearh Istiuteforthe Behavioral and Social Sciences May 1982 4S () 9 2~s.? 001...should be included in a personnel long ,ang plan (PLRP), DD , 0711W03 mno EOF@ 9 Nov sois@oneum UNCLASSIFIED SECURITY CLASSIFICATION OF TNIS PAE9 (ftaft...Accessions 3-16 3-7 FY1998 Distribution of Non-Prior-Service Accessions 3-17 3-8 FY1988 Distribution of Non-Prior-Service Accessions 3-18 * 3- 9 FY1989
Neighborhood Disparities in Access to Healthy Foods and Their Effects on Environmental Justice
Dave, Jayna
2012-01-01
Environmental justice is concerned with an equitable distribution of environmental burdens. These burdens comprise immediate health hazards as well as subtle inequities, such as limited access to healthy foods. We reviewed the literature on neighborhood disparities in access to fast-food outlets and convenience stores. Low-income neighborhoods offered greater access to food sources that promote unhealthy eating. The distribution of fast-food outlets and convenience stores differed by the racial/ethnic characteristics of the neighborhood. Further research is needed to address the limitations of current studies, identify effective policy actions to achieve environmental justice, and evaluate intervention strategies to promote lifelong healthy eating habits, optimum health, and vibrant communities. PMID:22813465
Distributed reservation-based code division multiple access
NASA Astrophysics Data System (ADS)
Wieselthier, J. E.; Ephremides, A.
1984-11-01
The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.
Remote Sensing Decision Support System for Optimal Access Restoration in Post Disaster Environments
DOT National Transportation Integrated Search
2017-01-01
Access restoration is an extremely important part of disaster response. Without access to the site, critically important emergency functions like search and rescue, emergency evacuation, and relief distribution, cannot commence. Frequently, roads are...
Picado, Albert; Das, Murari L; Kumar, Vijay; Kesari, Shreekant; Dinesh, Diwakar S; Roy, Lalita; Rijal, Suman; Das, Pradeep; Rowland, Mark; Sundar, Shyam; Coosemans, Marc; Boelaert, Marleen; Davies, Clive R
2010-01-26
Visceral leishmaniasis (VL) control in the Indian subcontinent is currently based on case detection and treatment, and on vector control using indoor residual spraying (IRS). The use of long-lasting insecticidal nets (LN) has been postulated as an alternative or complement to IRS. Here we tested the impact of comprehensive distribution of LN on the density of Phlebotomus argentipes in VL-endemic villages. A cluster-randomized controlled trial with household P. argentipes density as outcome was designed. Twelve clusters from an ongoing LN clinical trial--three intervention and three control clusters in both India and Nepal--were selected on the basis of accessibility and VL incidence. Ten houses per cluster selected on the basis of high pre-intervention P. argentipes density were monitored monthly for 12 months after distribution of LN using CDC light traps (LT) and mouth aspiration methods. Ten cattle sheds per cluster were also monitored by aspiration. A random effect linear regression model showed that the cluster-wide distribution of LNs significantly reduced the P. argentipes density/house by 24.9% (95% CI 1.80%-42.5%) as measured by means of LTs. The ongoing clinical trial, designed to measure the impact of LNs on VL incidence, will confirm whether LNs should be adopted as a control strategy in the regional VL elimination programs. The entomological evidence described here provides some evidence that LNs could be usefully deployed as part of the VL control program. ClinicalTrials.gov CT-2005-015374.
NASA Astrophysics Data System (ADS)
Viegas, F.; Malon, D.; Cranshaw, J.; Dimitrov, G.; Nowak, M.; Nairz, A.; Goossens, L.; Gallas, E.; Gamboa, C.; Wong, A.; Vinek, E.
2010-04-01
The TAG files store summary event quantities that allow a quick selection of interesting events. This data will be produced at a nominal rate of 200 Hz, and is uploaded into a relational database for access from websites and other tools. The estimated database volume is 6TB per year, making it the largest application running on the ATLAS relational databases, at CERN and at other voluntary sites. The sheer volume and high rate of production makes this application a challenge to data and resource management, in many aspects. This paper will focus on the operational challenges of this system. These include: uploading the data from files to the CERN's and remote sites' databases; distributing the TAG metadata that is essential to guide the user through event selection; controlling resource usage of the database, from the user query load to the strategy of cleaning and archiving of old TAG data.
Modeling and Managing Risk in Billing Infrastructures
NASA Astrophysics Data System (ADS)
Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele
This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.
Hesselman, Marlies; Toebes, Brigit
2017-07-15
This Commentary forms a response to Nikogosian's and Kickbusch's forward-looking perspective about the legal strength of international health instruments. Building on their arguments, in this commentary we consider what we can learn from the Framework Convention on Tobacco Control (FCTC) for the adoption of new legal international health instruments. © 2018 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reliability of stiffened structural panels: Two examples
NASA Technical Reports Server (NTRS)
Stroud, W. Jefferson; Davis, D. Dale, Jr.; Maring, Lise D.; Krishnamurthy, Thiagaraja; Elishakoff, Isaac
1992-01-01
The reliability of two graphite-epoxy stiffened panels that contain uncertainties is examined. For one panel, the effect of an overall bow-type initial imperfection is studied. The size of the bow is assumed to be a random variable. The failure mode is buckling. The benefits of quality control are explored by using truncated distributions. For the other panel, the effect of uncertainties in a strain-based failure criterion is studied. The allowable strains are assumed to be random variables. A geometrically nonlinear analysis is used to calculate a detailed strain distribution near an elliptical access hole in a wing panel that was tested to failure. Calculated strains are used to predict failure. Results are compared with the experimental failure load of the panel.
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
Reflective Database Access Control
ERIC Educational Resources Information Center
Olson, Lars E.
2009-01-01
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...
Interventions for enhancing the distribution of dental professionals: a concise systematic review.
Jäger, Ralf; van den Berg, Neeltje; Schwendicke, Falk
2017-10-01
A spatially unequal distribution of dentists or dental care professionals (D/DCPs), such as therapists or hygienists, could reduce the quality of health services and increase health inequities. This review describes the interventions available to enhance this spatial distribution and systematically assesses their effectiveness. Electronic databases (Cochrane CENTRAL, Medline, Embase, CINAHL) were searched and cross-referencing was performed using a standardised searching algorithm. Randomised and non-randomised controlled trials, controlled before-and-after studies and interrupted time series were included. Studies investigating a minimum of one of four interventions (educational, financial, regulatory and supportive) were included. The primary outcome was the spatial distribution of D/DCPs. Secondary outcomes were access, quality of services and equity or adverse effects. This review was registered (CRD42015026265). Of 4,885 articles identified, the full text of 201 was assessed and three (all investigating national policy interventions originally not aiming to change the distribution of D/DCPs) were included. In one Japanese study spanning 1980 to 2000, the unequal spatial distribution of dentists decreased alongside a general increase in the number of dentists. It remained unclear if these findings were associated. In a second Japanese study, an increase in the number of dentists was found in combination with a postgraduate training programme implemented in 2006, and this occurred alongside an increasingly unequal distribution of dentists, again without proof of cause and consequence. A third study from Taiwan found the introduction of a national universal-coverage health insurance to equalise the distribution of dentists, with statistical association between this equalisation and the introduction of the insurance. The effectiveness of interventions to enhance the spatial distribution of D/DCPs remains unclear. © 2017 FDI World Dental Federation.
The Impact of School Closures on Equity of Access in Chicago
ERIC Educational Resources Information Center
Lee, Jin; Lubienski, Christopher
2017-01-01
This study examines the impact of school closures on the sociospatial distribution of equitable access to schooling following the school closure policy pursued by the Chicago Public Schools in 2013. By examining access in terms of proximity between students and schools, the study estimates the changes in accessibility before and after school…
Perceptions of a campus-wide condom distribution programme: An exploratory study
Francis, Diane B; Noar, Seth M; Widman, Laura; Willoughby, Jessica Fitts; Sanchez, Diana M; Garrett, Kyla P
2016-01-01
Objective Condom distribution programmes are an important means of preventing sexually transmitted infections (STIs); yet little research has examined their perceived and actual impact on college campuses. Design Quantitative, cross-sectional study. Setting Large public university in the Southeastern USA. Method Approximately 2 months after a campus-wide condom distribution programme began, we utilised intercept surveys with 355 students (68% women; 43% racial/ethnic minorities) to examine their perceptions of the availability, accessibility and acceptability of condoms, and their perceptions and use of the newly installed condom dispensers. Results Students perceived condoms to be available and accessible on campus after implementation of the condom dispensers. Students had heard about the dispensers from other people (36%), through social media (18%) and the campus newspaper (15%). Most students (71%) had seen the dispensers. Almost one in four students (23%) had taken a condom from the dispensers; among those who were sexually active during the 2months that the dispensers were available, 33% had used them. More than one-third of students (37%) – and 53% of sexually active students – indicated intentions to use the dispensers in the next 6months. Multiple regression analysis controlling for age, gender and race revealed that prior condom use, attitudes about the dispensers and comfort with the dispensers were significant predictors of sexually active students’ intentions to use the dispensers (p<.001). Conclusion Overall, results indicate that over a short time period, this condom distribution programme was successful in reaching students and providing free condoms. Implications for implementing condom distribution programmes on college campuses as well as future directions for research are discussed. PMID:27917002
Running a distributed virtual observatory: U.S. Virtual Astronomical Observatory operations
NASA Astrophysics Data System (ADS)
McGlynn, Thomas A.; Hanisch, Robert J.; Berriman, G. Bruce; Thakar, Aniruddha R.
2012-09-01
Operation of the US Virtual Astronomical Observatory shares some issues with modern physical observatories, e.g., intimidating data volumes and rapid technological change, and must also address unique concerns like the lack of direct control of the underlying and scattered data resources, and the distributed nature of the observatory itself. In this paper we discuss how the VAO has addressed these challenges to provide the astronomical community with a coherent set of science-enabling tools and services. The distributed nature of our virtual observatory-with data and personnel spanning geographic, institutional and regime boundaries-is simultaneously a major operational headache and the primary science motivation for the VAO. Most astronomy today uses data from many resources. Facilitation of matching heterogeneous datasets is a fundamental reason for the virtual observatory. Key aspects of our approach include continuous monitoring and validation of VAO and VO services and the datasets provided by the community, monitoring of user requests to optimize access, caching for large datasets, and providing distributed storage services that allow user to collect results near large data repositories. Some elements are now fully implemented, while others are planned for subsequent years. The distributed nature of the VAO requires careful attention to what can be a straightforward operation at a conventional observatory, e.g., the organization of the web site or the collection and combined analysis of logs. Many of these strategies use and extend protocols developed by the international virtual observatory community. Our long-term challenge is working with the underlying data providers to ensure high quality implementation of VO data access protocols (new and better 'telescopes'), assisting astronomical developers to build robust integrating tools (new 'instruments'), and coordinating with the research community to maximize the science enabled.
NASA Astrophysics Data System (ADS)
Lindner, Robert; Lou, Xinghua; Reinstein, Jochen; Shoeman, Robert L.; Hamprecht, Fred A.; Winkler, Andreas
2014-06-01
Hydrogen-deuterium exchange (HDX) experiments analyzed by mass spectrometry (MS) provide information about the dynamics and the solvent accessibility of protein backbone amide hydrogen atoms. Continuous improvement of MS instrumentation has contributed to the increasing popularity of this method; however, comprehensive automated data analysis is only beginning to mature. We present Hexicon 2, an automated pipeline for data analysis and visualization based on the previously published program Hexicon (Lou et al. 2010). Hexicon 2 employs the sensitive NITPICK peak detection algorithm of its predecessor in a divide-and-conquer strategy and adds new features, such as chromatogram alignment and improved peptide sequence assignment. The unique feature of deuteration distribution estimation was retained in Hexicon 2 and improved using an iterative deconvolution algorithm that is robust even to noisy data. In addition, Hexicon 2 provides a data browser that facilitates quality control and provides convenient access to common data visualization tasks. Analysis of a benchmark dataset demonstrates superior performance of Hexicon 2 compared with its predecessor in terms of deuteration centroid recovery and deuteration distribution estimation. Hexicon 2 greatly reduces data analysis time compared with manual analysis, whereas the increased number of peptides provides redundant coverage of the entire protein sequence. Hexicon 2 is a standalone application available free of charge under http://hx2.mpimf-heidelberg.mpg.de.
Dynamic Reconfiguration of a RGBD Sensor Based on QoS and QoC Requirements in Distributed Systems.
Munera, Eduardo; Poza-Lujan, Jose-Luis; Posadas-Yagüe, Juan-Luis; Simó-Ten, José-Enrique; Noguera, Juan Fco Blanes
2015-07-24
The inclusion of embedded sensors into a networked system provides useful information for many applications. A Distributed Control System (DCS) is one of the clearest examples where processing and communications are constrained by the client's requirements and the capacity of the system. An embedded sensor with advanced processing and communications capabilities supplies high level information, abstracting from the data acquisition process and objects recognition mechanisms. The implementation of an embedded sensor/actuator as a Smart Resource permits clients to access sensor information through distributed network services. Smart resources can offer sensor services as well as computing, communications and peripheral access by implementing a self-aware based adaptation mechanism which adapts the execution profile to the context. On the other hand, information integrity must be ensured when computing processes are dynamically adapted. Therefore, the processing must be adapted to perform tasks in a certain lapse of time but always ensuring a minimum process quality. In the same way, communications must try to reduce the data traffic without excluding relevant information. The main objective of the paper is to present a dynamic configuration mechanism to adapt the sensor processing and communication to the client's requirements in the DCS. This paper describes an implementation of a smart resource based on a Red, Green, Blue, and Depth (RGBD) sensor in order to test the dynamic configuration mechanism presented.
Lindner, Robert; Lou, Xinghua; Reinstein, Jochen; Shoeman, Robert L; Hamprecht, Fred A; Winkler, Andreas
2014-06-01
Hydrogen-deuterium exchange (HDX) experiments analyzed by mass spectrometry (MS) provide information about the dynamics and the solvent accessibility of protein backbone amide hydrogen atoms. Continuous improvement of MS instrumentation has contributed to the increasing popularity of this method; however, comprehensive automated data analysis is only beginning to mature. We present Hexicon 2, an automated pipeline for data analysis and visualization based on the previously published program Hexicon (Lou et al. 2010). Hexicon 2 employs the sensitive NITPICK peak detection algorithm of its predecessor in a divide-and-conquer strategy and adds new features, such as chromatogram alignment and improved peptide sequence assignment. The unique feature of deuteration distribution estimation was retained in Hexicon 2 and improved using an iterative deconvolution algorithm that is robust even to noisy data. In addition, Hexicon 2 provides a data browser that facilitates quality control and provides convenient access to common data visualization tasks. Analysis of a benchmark dataset demonstrates superior performance of Hexicon 2 compared with its predecessor in terms of deuteration centroid recovery and deuteration distribution estimation. Hexicon 2 greatly reduces data analysis time compared with manual analysis, whereas the increased number of peptides provides redundant coverage of the entire protein sequence. Hexicon 2 is a standalone application available free of charge under http://hx2.mpimf-heidelberg.mpg.de.
Remote control of an MR imaging study via tele-collaboration tools
NASA Astrophysics Data System (ADS)
Sullivan, John M., Jr.; Mullen, Julia S.; Benz, Udo A.; Schmidt, Karl F.; Murugavel, Murali; Chen, Wei; Ghadyani, Hamid
2005-04-01
In contrast to traditional 'video conferencing' the Access Grid (AG), developed by Argonne National Laboratory, is a collaboration of audio, video and shared application tools which provide the 'persistent presence' of each participant. Among the shared application tools are the ability to share viewing and control of presentations, browsers, images and movies. When used in conjunction with Virtual Network Computing (VNC) software, an investigator can interact with colleagues at a remote site, and control remote systems via local keyboard and mouse commands. This combination allows for effective viewing and discussion of information, i.e. data, images, and results. It is clear that such an approach when applied to the medical sciences will provide a means by which a team of experts can not only access, but interact and control medical devices for the purpose of experimentation, diagnosis, surgery and therapy. We present the development of an application node at our 4.7 Tesla MR magnet facility, and a demonstration of remote investigator control of the magnet. A local magnet operator performs manual tasks such as loading the test subject into the magnet and administering the stimulus associated with the functional MRI study. The remote investigator has complete control of the magnet console. S/he can adjust the gradient coil settings, the pulse sequence, image capture frequency, etc. A geographically distributed audience views and interacts with the remote investigator and local MR operator. This AG demonstration of MR magnet control illuminates the potential of untethered medical experiments, procedures and training.
Relating saturation capacity to charge density in strong cation exchangers.
Steinebach, Fabian; Coquebert de Neuville, Bertrand; Morbidelli, Massimo
2017-07-21
In this work the relation between physical and chemical resin characteristics and the total amount of adsorbed protein (saturation capacity) for ion-exchange resins is discussed. Eleven different packing materials with a sulfo-functionalization and one multimodal resin were analyzed in terms of their porosity, pore size distribution, ligand density and binding capacity. By specifying the ligand density and binding capacity by the total and accessible surface area, two different groups of resins were identified: Below a ligand density of approx. 2.5μmol/m 2 area the ligand density controls the saturation capacity, while above this limit the accessible surface area becomes the limiting factor. This results in a maximum protein uptake of around 2.5mg/m 2 of accessible surface area. The obtained results allow estimating the saturation capacity from independent resin characteristics like the saturation capacity mainly depends on "library data" such as the accessible and total surface area and the charge density. Hence these results give an insight into the fundamentals of protein adsorption and help to find suitable resins, thus limiting the experimental effort in early process development stages. Copyright © 2017 Elsevier B.V. All rights reserved.
High capacity low delay packet broadcasting multiaccess schemes for satellite repeater systems
NASA Astrophysics Data System (ADS)
Bose, S. K.
1980-12-01
Demand assigned packet radio schemes using satellite repeaters can achieve high capacities but often exhibit relatively large delays under low traffic conditions when compared to random access. Several schemes which improve delay performance at low traffic but which have high capacity are presented and analyzed. These schemes allow random acess attempts by users, who are waiting for channel assignments. The performance of these are considered in the context of a multiple point communication system carrying fixed length messages between geographically distributed (ground) user terminals which are linked via a satellite repeater. Channel assignments are done following a BCC queueing discipline by a (ground) central controller on the basis of requests correctly received over a collision type access channel. In TBACR Scheme A, some of the forward message channels are set aside for random access transmissions; the rest are used in a demand assigned mode. Schemes B and C operate all their forward message channels in a demand assignment mode but, by means of appropriate algorithms for trailer channel selection, allow random access attempts on unassigned channels. The latter scheme also introduces framing and slotting of the time axis to implement a more efficient algorithm for trailer channel selection than the former.
Integrating Data Distribution and Data Assimilation Between the OOI CI and the NOAA DIF
NASA Astrophysics Data System (ADS)
Meisinger, M.; Arrott, M.; Clemesha, A.; Farcas, C.; Farcas, E.; Im, T.; Schofield, O.; Krueger, I.; Klacansky, I.; Orcutt, J.; Peach, C.; Chave, A.; Raymer, D.; Vernon, F.
2008-12-01
The Ocean Observatories Initiative (OOI) is an NSF funded program to establish the ocean observing infrastructure of the 21st century benefiting research and education. It is currently approaching final design and promises to deliver cyber and physical observatory infrastructure components as well as substantial core instrumentation to study environmental processes of the ocean at various scales, from coastal shelf-slope exchange processes to the deep ocean. The OOI's data distribution network lies at the heart of its cyber- infrastructure, which enables a multitude of science and education applications, ranging from data analysis, to processing, visualization and ontology supported query and mediation. In addition, it fundamentally supports a class of applications exploiting the knowledge gained from analyzing observational data for objective-driven ocean observing applications, such as automatically triggered response to episodic environmental events and interactive instrument tasking and control. The U.S. Department of Commerce through NOAA operates the Integrated Ocean Observing System (IOOS) providing continuous data in various formats, rates and scales on open oceans and coastal waters to scientists, managers, businesses, governments, and the public to support research and inform decision-making. The NOAA IOOS program initiated development of the Data Integration Framework (DIF) to improve management and delivery of an initial subset of ocean observations with the expectation of achieving improvements in a select set of NOAA's decision-support tools. Both OOI and NOAA through DIF collaborate on an effort to integrate the data distribution, access and analysis needs of both programs. We present details and early findings from this collaboration; one part of it is the development of a demonstrator combining web-based user access to oceanographic data through ERDDAP, efficient science data distribution, and scalable, self-healing deployment in a cloud computing environment. ERDDAP is a web-based front-end application integrating oceanographic data sources of various formats, for instance CDF data files as aggregated through NcML or presented using a THREDDS server. The OOI-designed data distribution network provides global traffic management and computational load balancing for observatory resources; it makes use of the OpenDAP Data Access Protocol (DAP) for efficient canonical science data distribution over the network. A cloud computing strategy is the basis for scalable, self-healing organization of an observatory's computing and storage resources, independent of the physical location and technical implementation of these resources.
Scaling Irregular Applications through Data Aggregation and Software Multithreading
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morari, Alessandro; Tumeo, Antonino; Chavarría-Miranda, Daniel
Bioinformatics, data analytics, semantic databases, knowledge discovery are emerging high performance application areas that exploit dynamic, linked data structures such as graphs, unbalanced trees or unstructured grids. These data structures usually are very large, requiring significantly more memory than available on single shared memory systems. Additionally, these data structures are difficult to partition on distributed memory systems. They also present poor spatial and temporal locality, thus generating unpredictable memory and network accesses. The Partitioned Global Address Space (PGAS) programming model seems suitable for these applications, because it allows using a shared memory abstraction across distributed-memory clusters. However, current PGAS languagesmore » and libraries are built to target regular remote data accesses and block transfers. Furthermore, they usually rely on the Single Program Multiple Data (SPMD) parallel control model, which is not well suited to the fine grained, dynamic and unbalanced parallelism of irregular applications. In this paper we present {\\bf GMT} (Global Memory and Threading library), a custom runtime library that enables efficient execution of irregular applications on commodity clusters. GMT integrates a PGAS data substrate with simple fork/join parallelism and provides automatic load balancing on a per node basis. It implements multi-level aggregation and lightweight multithreading to maximize memory and network bandwidth with fine-grained data accesses and tolerate long data access latencies. A key innovation in the GMT runtime is its thread specialization (workers, helpers and communication threads) that realize the overall functionality. We compare our approach with other PGAS models, such as UPC running using GASNet, and hand-optimized MPI code on a set of typical large-scale irregular applications, demonstrating speedups of an order of magnitude.« less
Husten, Corinne G; Deyton, Lawrence R
2013-05-04
The USA has a rich history of public health efforts to reduce morbidity and mortality from tobacco use. Comprehensive tobacco-prevention programmes, when robustly implemented, reduce the prevalence of youth and adult smoking, decrease cigarette consumption, accelerate declines in tobacco-related deaths, and diminish health-care costs from tobacco-related diseases. Effective public health interventions include raising the price of tobacco products, smoke-free policies, counter-marketing campaigns, advertising restrictions, augmenting access to treatment for tobacco use through insurance coverage and telephone help lines, and comprehensive approaches to prevent children and adolescents from accessing tobacco products. The US Food and Drug Administration (FDA) has six major areas of regulatory authority: regulation of tobacco products; regulation of the advertising, marketing, and promotion of tobacco products; regulation of the distribution and sales of tobacco products; enforcement of the provisions of the Tobacco Control Act and tobacco regulations; regulatory science to support FDA authorities and activities; and public education about the harms of tobacco products and to support FDA regulatory actions. With passing of the Family Smoking Prevention and Tobacco Control Act (Tobacco Control Act) in June, 2009, important new regulatory approaches were added to the tobacco prevention and control arsenal. Copyright © 2013 Elsevier Ltd. All rights reserved.
Ray, Nicolas; Ebener, Steeve
2008-01-01
Background Access to health care can be described along four dimensions: geographic accessibility, availability, financial accessibility and acceptability. Geographic accessibility measures how physically accessible resources are for the population, while availability reflects what resources are available and in what amount. Combining these two types of measure into a single index provides a measure of geographic (or spatial) coverage, which is an important measure for assessing the degree of accessibility of a health care network. Results This paper describes the latest version of AccessMod, an extension to the Geographical Information System ArcView 3.×, and provides an example of application of this tool. AccessMod 3 allows one to compute geographic coverage to health care using terrain information and population distribution. Four major types of analysis are available in AccessMod: (1) modeling the coverage of catchment areas linked to an existing health facility network based on travel time, to provide a measure of physical accessibility to health care; (2) modeling geographic coverage according to the availability of services; (3) projecting the coverage of a scaling-up of an existing network; (4) providing information for cost effectiveness analysis when little information about the existing network is available. In addition to integrating travelling time, population distribution and the population coverage capacity specific to each health facility in the network, AccessMod can incorporate the influence of landscape components (e.g. topography, river and road networks, vegetation) that impact travelling time to and from facilities. Topographical constraints can be taken into account through an anisotropic analysis that considers the direction of movement. We provide an example of the application of AccessMod in the southern part of Malawi that shows the influences of the landscape constraints and of the modes of transportation on geographic coverage. Conclusion By incorporating the demand (population) and the supply (capacities of heath care centers), AccessMod provides a unifying tool to efficiently assess the geographic coverage of a network of health care facilities. This tool should be of particular interest to developing countries that have a relatively good geographic information on population distribution, terrain, and health facility locations. PMID:19087277
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
The CEOS WGISS Atmospheric Composition Portal
NASA Technical Reports Server (NTRS)
Lynnes, Chris
2010-01-01
Goal: Demonstrate the feasibility of connecting distributed atmospheric composition data and analysis tools into a common and shared web framework. Initial effort focused on: a) Collaboratively creating a web application within WDC-RSAT for comparison of satellite derived atmospheric composition datasets accessed from distributed data sources. b) Implementation of data access and interoperability standards. c) Sollicit feedback from paternal users; Especially from ACC participants.
Security middleware infrastructure for DICOM images in health information systems.
Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A
2003-12-01
In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.
The MSG Central Facility - A Mission Control System for Windows NT
NASA Astrophysics Data System (ADS)
Thompson, R.
The MSG Central Facility, being developed by Science Systems for EUMETSAT1, represents the first of a new generation of satellite mission control systems, based on the Windows NT operating system. The system makes use of a range of new technologies to provide an integrated environment for the planning, scheduling, control and monitoring of the entire Meteosat Second Generation mission. It supports packetised TM/TC and uses Science System's Space UNiT product to provide automated operations support at both Schedule (Timeline) and Procedure levels. Flexible access to historical data is provided through an operations archive based on ORACLE Enterprise Server, hosted on a large RAID array and off-line tape jukebox. Event driven real-time data distribution is based on the CORBA standard. Operations preparation and configuration control tools form a fully integrated element of the system.
Optimizing Distribution of Pandemic Influenza Antiviral Drugs
Huang, Hsin-Chan; Morton, David P.; Johnson, Gregory P.; Gutfraind, Alexander; Galvani, Alison P.; Clements, Bruce; Meyers, Lauren A.
2015-01-01
We provide a data-driven method for optimizing pharmacy-based distribution of antiviral drugs during an influenza pandemic in terms of overall access for a target population and apply it to the state of Texas, USA. We found that during the 2009 influenza pandemic, the Texas Department of State Health Services achieved an estimated statewide access of 88% (proportion of population willing to travel to the nearest dispensing point). However, access reached only 34.5% of US postal code (ZIP code) areas containing <1,000 underinsured persons. Optimized distribution networks increased expected access to 91% overall and 60% in hard-to-reach regions, and 2 or 3 major pharmacy chains achieved near maximal coverage in well-populated areas. Independent pharmacies were essential for reaching ZIP code areas containing <1,000 underinsured persons. This model was developed during a collaboration between academic researchers and public health officials and is available as a decision support tool for Texas Department of State Health Services at a Web-based interface. PMID:25625858
Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hartman, Steven M
2012-01-01
Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both ofmore » these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.« less
Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah
Tian, Le; Latré, Steven
2017-01-01
IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing RAW grouping under dynamic traffic in real time, which is a major leap towards applying RAW mechanism in real-life IoT networks. PMID:28677617
Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah.
Tian, Le; Khorov, Evgeny; Latré, Steven; Famaey, Jeroen
2017-07-04
IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing RAW grouping under dynamic traffic in real time, which is a major leap towards applying RAW mechanism in real-life IoT networks.
Hossain, Shahed; Quaiyum, Mohammad Abdul; Zaman, Khalequ; Banu, Sayera; Husain, Mohammad Ashaque; Islam, Mohammad Akramul; Cooreman, Erwin; Borgdorff, Martien; Lönnroth, Knut; Salim, Abdul Hamid; van Leth, Frank
2012-01-01
In Bangladesh DOTS has been provided free of charge since 1993, yet information on access to TB services by different population group is not well documented. The objective of this study was to assess and compare the socio economic position (SEP) of actively detected cases from the community and the cases being routinely detected under National Tuberculosis Control Programme (NTP) in Bangladesh. SEP was assessed by validated asset item for each of the 21,427 households included in the national tuberculosis prevalence survey 2007-2009. A principal component analysis generated household scores and categorized in quartiles. The distribution of 33 actively identified cases was compared with the 240 NTP cases over the identical SEP quartiles to evaluate access to TB services by different groups of the population. The population prevalence of tuberculosis was 5 times higher in the lowest quartiles of population (95.4, 95% CI: 48.0-189.7) to highest quartile population (19.5, 95% CI: 6.9-55.0). Among the 33 cases detected during survey, 25 (75.8%) were from lower two quartiles, and the rest 8 (24.3%) were from upper two quartiles. Among TB cases detected passively under NTP, more than half of them 137 (57.1%) were from uppermost two quartiles, 98 (41%) from the second quartile, and 5 (2%) in the lowest quartile of the population. This distribution is not affected when adjusted for other factors or interactions among them. The findings indicate that despite availability free of charge, DOTS is not equally accessed by the poorer sections of the population. However, these figures should be interpreted with caution since there is a need for additional studies that assess in-depth poverty indicators and its determinants in relation to access of the TB services provided in Bangladesh.
Karasov, Ariela O; Ostacher, Michael J
2014-01-01
Society has had an interest in controlling the production, distribution, and use of alcohol for millennia. The use of alcohol has always had consequences, be they positive or negative, and the role of government in the regulation of alcohol is now universal. This is accomplished at several levels, first through controls on production, importation, distribution, and use of alcoholic beverages, and second, through criminal laws, the aim of which is to address the behavior of users themselves. A number of interventions and policies reduce alcohol-related consequences to society by regulating alcohol pricing, targeting alcohol-impaired driving, and limiting alcohol availability. The legal system defines criminal responsibility in the context of alcohol use, as an enormous percentage of violent crime and motor death is associated with alcohol intoxication. In recent years, recovery-oriented policies have aimed to expand social supports for recovery and to improve access to treatment for substance use disorders within the criminal justice system. The Affordable Care Act, also know as "ObamaCare," made substantial changes to access to substance abuse treatment by mandating that health insurance include services for substance use disorders comparable to coverage for medical and surgical treatments. Rather than a simplified "war on drugs" approach, there appears to be an increasing emphasis on evidence-based policy development that approaches alcohol use disorders with hope for treatment and prevention. This chapter focuses on alcohol and the law in the United States. © 2014 Elsevier B.V. All rights reserved.
The proposed monitoring system for the Fermilab D0 colliding beams detector
NASA Astrophysics Data System (ADS)
Goodwin, Robert; Florian, Robert; Johnson, Marvin; Jones, Alan; Shea, Mike
1986-06-01
The Fermilab D0 Detector is a collaborative effort that includes seventeen universities and national laboratories. The monitoring and control system for this detector will be separate from the online detector data system. A distributed, stand-alone, microprocessor-based system is being designed to allow monitoring and control functions to be available to the collaborators at their home institutions during the design, fabrication, and testing phases of the project. Individual stations are VMEbus-based 68000 systems that are networked together during installation using an ARCnet (by Datapoint Corporation) Local Area Network. One station, perhaps a MicroVAX, would have a hard disk to store a backup copy of the distributed database located in non-volatile RAM in the local stations. This station would also serve as a gateway to the online system, so that data from the control system will be available for logging with the detector data. Apple Macintosh personal computers are being developed for use as the local control consoles. Each would be interfaced to ARCnet to provide access to all control system data. Through the use of bit-mapped graphics with multiple windows and pull-down menus, a cost effective, flexible display system can be provided, taking advantage of familiar modern software tools to support the operator interface.
Why build limited access highways?.
DOT National Transportation Integrated Search
1991-01-01
This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...
An eConsent-based System Architecture Supporting Cooperation in Integrated Healthcare Networks.
Bergmann, Joachim; Bott, Oliver J; Hoffmann, Ina; Pretschner, Dietrich P
2005-01-01
The economical need for efficient healthcare leads to cooperative shared care networks. A virtual electronic health record is required, which integrates patient related information but reflects the distributed infrastructure and restricts access only to those health professionals involved into the care process. Our work aims on specification and development of a system architecture fulfilling these requirements to be used in concrete regional pilot studies. Methodical analysis and specification have been performed in a healthcare network using the formal method and modelling tool MOSAIK-M. The complexity of the application field was reduced by focusing on the scenario of thyroid disease care, which still includes various interdisciplinary cooperation. Result is an architecture for a secure distributed electronic health record for integrated care networks, specified in terms of a MOSAIK-M-based system model. The architecture proposes business processes, application services, and a sophisticated security concept, providing a platform for distributed document-based, patient-centred, and secure cooperation. A corresponding system prototype has been developed for pilot studies, using advanced application server technologies. The architecture combines a consolidated patient-centred document management with a decentralized system structure without needs for replication management. An eConsent-based approach assures, that access to the distributed health record remains under control of the patient. The proposed architecture replaces message-based communication approaches, because it implements a virtual health record providing complete and current information. Acceptance of the new communication services depends on compatibility with the clinical routine. Unique and cross-institutional identification of a patient is also a challenge, but will loose significance with establishing common patient cards.
Ribisl, Kurt M
2012-01-01
This paper is part of a collection that identifies research priorities that will help guide the efforts of the U.S. Food and Drug Administration (FDA) as it regulates tobacco products. This paper examines the major provisions related to tobacco product advertising, marketing, sales, and distribution included in Public Law 111-31, the "Family Smoking Prevention and Tobacco Control Act". This paper covers 5 areas related to (a) marketing regulations (e.g., ban on color and imagery in ads, ban on nontobacco gifts with purchase); (b) granting FDA authority over the sale, distribution, accessibility, advertising, and promotion of tobacco and lifting state preemption over advertising; (c) remote tobacco sales (mail order and Internet); (d) prevention of illicit and cross-border trade; and (e) noncompliant export products. Each of the 5 sections of this paper provides a description and brief history of regulation, what is known about this regulatory strategy, and research opportunities.
40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 33 2011-07-01 2011-07-01 false Internet access to certain off-site... DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off... elements in the risk management plan database available on the Internet: (a) The concentration of the...
Mathur, Shawn; Schmidt, Christian; Das, Chhaya; Tucker, Philip W
2006-01-01
Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature. PMID:16956402
Mathur, Shawn; Schmidt, Christian; Das, Chhaya; Tucker, Philip W
2006-09-06
Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.
Accessing Data Federations with CVMFS
Weitzel, Derek; Bockelman, Brian; Dykstra, Dave; ...
2017-11-23
Data federations have become an increasingly common tool for large collaborations such as CMS and Atlas to efficiently distribute large data files. Unfortunately, these typically are implemented with weak namespace semantics and a non-POSIX API. On the other hand, CVMFS has provided a POSIX-compliant read-only interface for use cases with a small working set size (such as software distribution). The metadata required for the CVMFS POSIX interface is distributed through a caching hierarchy, allowing it to scale to the level of about a hundred thousand hosts. In this paper, we will describe our contributions to CVMFS that merges the datamore » scalability of XRootD-based data federations (such as AAA) with metadata scalability and POSIX interface of CVMFS. We modified CVMFS so it can serve unmodified files without copying them to the repository server. CVMFS 2.2.0 is also able to redirect requests for data files to servers outside of the CVMFS content distribution network. Finally, we added the ability to manage authorization and authentication using security credentials such as X509 proxy certificates. We combined these modifications with the OSGs StashCache regional XRootD caching infrastructure to create a cached data distribution network. Here, we will show performance metrics accessing the data federation through CVMFS compared to direct data federation access. Additionally, we will discuss the improved user experience of providing access to a data federation through a POSIX filesystem.« less
Accessing Data Federations with CVMFS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weitzel, Derek; Bockelman, Brian; Dykstra, Dave
Data federations have become an increasingly common tool for large collaborations such as CMS and Atlas to efficiently distribute large data files. Unfortunately, these typically are implemented with weak namespace semantics and a non-POSIX API. On the other hand, CVMFS has provided a POSIX-compliant read-only interface for use cases with a small working set size (such as software distribution). The metadata required for the CVMFS POSIX interface is distributed through a caching hierarchy, allowing it to scale to the level of about a hundred thousand hosts. In this paper, we will describe our contributions to CVMFS that merges the datamore » scalability of XRootD-based data federations (such as AAA) with metadata scalability and POSIX interface of CVMFS. We modified CVMFS so it can serve unmodified files without copying them to the repository server. CVMFS 2.2.0 is also able to redirect requests for data files to servers outside of the CVMFS content distribution network. Finally, we added the ability to manage authorization and authentication using security credentials such as X509 proxy certificates. We combined these modifications with the OSGs StashCache regional XRootD caching infrastructure to create a cached data distribution network. Here, we will show performance metrics accessing the data federation through CVMFS compared to direct data federation access. Additionally, we will discuss the improved user experience of providing access to a data federation through a POSIX filesystem.« less
Accessing Data Federations with CVMFS
NASA Astrophysics Data System (ADS)
Weitzel, Derek; Bockelman, Brian; Dykstra, Dave; Blomer, Jakob; Meusel, Ren
2017-10-01
Data federations have become an increasingly common tool for large collaborations such as CMS and Atlas to efficiently distribute large data files. Unfortunately, these typically are implemented with weak namespace semantics and a non-POSIX API. On the other hand, CVMFS has provided a POSIX-compliant read-only interface for use cases with a small working set size (such as software distribution). The metadata required for the CVMFS POSIX interface is distributed through a caching hierarchy, allowing it to scale to the level of about a hundred thousand hosts. In this paper, we will describe our contributions to CVMFS that merges the data scalability of XRootD-based data federations (such as AAA) with metadata scalability and POSIX interface of CVMFS. We modified CVMFS so it can serve unmodified files without copying them to the repository server. CVMFS 2.2.0 is also able to redirect requests for data files to servers outside of the CVMFS content distribution network. Finally, we added the ability to manage authorization and authentication using security credentials such as X509 proxy certificates. We combined these modifications with the OSGs StashCache regional XRootD caching infrastructure to create a cached data distribution network. We will show performance metrics accessing the data federation through CVMFS compared to direct data federation access. Additionally, we will discuss the improved user experience of providing access to a data federation through a POSIX filesystem.
Retail redlining in New York City: racialized access to day-to-day retail resources.
Kwate, Naa Oyo A; Loh, Ji Meng; White, Kellee; Saldana, Nelson
2013-08-01
Racial residential segregation is associated with health inequalities in the USA, and one of the primary mechanisms is through influencing features of the neighborhood physical environment. To better understand how Black residential segregation might contribute to health risk, we examined retail redlining; the inequitable distribution of retail resources across racially distinct areas. A combination of visual and analytic methods was used to investigate whether predominantly Black census block groups in New York City had poor access to retail stores important for health. After controlling for retail demand, median household income, population density, and subway ridership, percent Black was associated with longer travel distances to various retail industries. Our findings suggest that Black neighborhoods in New York City face retail redlining. Future research is needed to determine how retail redlining may perpetuate health disparities and socioeconomic disadvantage.
Automated Rocket Propulsion Test Management
NASA Technical Reports Server (NTRS)
Walters, Ian; Nelson, Cheryl; Jones, Helene
2007-01-01
The Rocket Propulsion Test-Automated Management System provides a central location for managing activities associated with Rocket Propulsion Test Management Board, National Rocket Propulsion Test Alliance, and the Senior Steering Group business management activities. A set of authorized users, both on-site and off-site with regard to Stennis Space Center (SSC), can access the system through a Web interface. Web-based forms are used for user input with generation and electronic distribution of reports easily accessible. Major functions managed by this software include meeting agenda management, meeting minutes, action requests, action items, directives, and recommendations. Additional functions include electronic review, approval, and signatures. A repository/library of documents is available for users, and all items are tracked in the system by unique identification numbers and status (open, closed, percent complete, etc.). The system also provides queries and version control for input of all items.
Proximity-based access control for context-sensitive information provision in SOA-based systems
NASA Astrophysics Data System (ADS)
Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew
2014-06-01
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
Open Source Next Generation Visualization Software for Interplanetary Missions
NASA Technical Reports Server (NTRS)
Trimble, Jay; Rinker, George
2016-01-01
Mission control is evolving quickly, driven by the requirements of new missions, and enabled by modern computing capabilities. Distributed operations, access to data anywhere, data visualization for spacecraft analysis that spans multiple data sources, flexible reconfiguration to support multiple missions, and operator use cases, are driving the need for new capabilities. NASA's Advanced Multi-Mission Operations System (AMMOS), Ames Research Center (ARC) and the Jet Propulsion Laboratory (JPL) are collaborating to build a new generation of mission operations software for visualization, to enable mission control anywhere, on the desktop, tablet and phone. The software is built on an open source platform that is open for contributions (http://nasa.github.io/openmct).
Some Protocols For Optical-Fiber Digital Communications
NASA Technical Reports Server (NTRS)
Yeh, Cavour; Gerla, Mario
1989-01-01
One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.
Plug-in hybrid electric vehicles as a source of distributed frequency regulation
NASA Astrophysics Data System (ADS)
Mullen, Sara Kathryn
The movement to transform the North American power grid into a smart grid may be accomplished by expanding integrated sensing, communications, and control technologies to include every part of the grid to the point of end-use. Plug-in hybrid electric vehicles (PHEV) provide an opportunity for small-scale distributed storage while they are plugged-in. With large numbers of PHEV and the communications and sensing associated with the smart grid, PHEV could provide ancillary services for the grid. Frequency regulation is an ideal service for PHEV because the duration of supply is short (order of minutes) and it is the highest priced ancillary service on the market offering greater financial returns for vehicle owners. Using Simulink a power system simulator modeling the IEEE 14 Bus System was combined with a model of PHEV charging and the controllers which facilitate vehicle-to-grid (V2G) regulation supply. The system includes a V2G controller for each vehicle which makes regulation supply decisions based on battery state, user preferences, and the recommended level of supply. A PHEV coordinator controller located higher in the system has access to reliable frequency measurements and can determine a suitable local automatic generation control (AGC) raise/lower signal for participating vehicles. A first step implementation of the V2G supply system where battery charging is modulated to provide regulation was developed. The system was simulated following a step change in loading using three scenarios: (1) Central generating units provide frequency regulation, (2) PHEV contribute to primary regulation analogous to generator speed governor control, and (3) PHEV contribute to primary and secondary regulation using an additional integral term in the PHEV control signal. In both cases the additional regulation provided by PHEV reduced the area control error (ACE) compared to the base case. Unique contributions resulting from this work include: (1) Studied PHEV energy systems and limitations on battery charging/discharging, (2) Reviewed standards for interconnection of distributed resources and electric vehicle charging [1], [2], (3) Explored strategies for distributed control of PHEV charging, (4) Developed controllers to accommodate PHEV regulation, and (5) Developed a simulator combining a power system model and PHEV/V2G components.
Ethical considerations in placebo-controlled randomised clinical trials.
Kaufman, Kenneth R
2015-06-01
Ethical considerations in standard medical care and clinical research are underpinnings to quality medicine. Similarly, the placebo-controlled double-blind randomised clinical trial is the gold standard for medical research and fundamental to the development of evidence-based medicine. Researchers and clinicians are challenged by ethical concerns in the informed consent with a need to maximise understanding and minimise therapeutic misconception. This editorial expands on themes raised by Chen et al 's article 'Disclosing the Potential Impact of Placebo Controls in Antidepressant Trials' and serves as an invitation for further submissions to BJPsych Open on ethics, research design and informed consent. None. © The Royal College of Psychiatrists 2015. This is an open access article distributed under the terms of the Creative Commons Non-Commercial, No Derivatives (CC BY-NC-ND) licence.
Dynamic access control model for privacy preserving personalized healthcare in cloud environment.
Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon
2015-01-01
When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.
NASA Astrophysics Data System (ADS)
Zhang, Daili
Increasing societal demand for automation has led to considerable efforts to control large-scale complex systems, especially in the area of autonomous intelligent control methods. The control system of a large-scale complex system needs to satisfy four system level requirements: robustness, flexibility, reusability, and scalability. Corresponding to the four system level requirements, there arise four major challenges. First, it is difficult to get accurate and complete information. Second, the system may be physically highly distributed. Third, the system evolves very quickly. Fourth, emergent global behaviors of the system can be caused by small disturbances at the component level. The Multi-Agent Based Control (MABC) method as an implementation of distributed intelligent control has been the focus of research since the 1970s, in an effort to solve the above-mentioned problems in controlling large-scale complex systems. However, to the author's best knowledge, all MABC systems for large-scale complex systems with significant uncertainties are problem-specific and thus difficult to extend to other domains or larger systems. This situation is partly due to the control architecture of multiple agents being determined by agent to agent coupling and interaction mechanisms. Therefore, the research objective of this dissertation is to develop a comprehensive, generalized framework for the control system design of general large-scale complex systems with significant uncertainties, with the focus on distributed control architecture design and distributed inference engine design. A Hybrid Multi-Agent Based Control (HyMABC) architecture is proposed by combining hierarchical control architecture and module control architecture with logical replication rings. First, it decomposes a complex system hierarchically; second, it combines the components in the same level as a module, and then designs common interfaces for all of the components in the same module; third, replications are made for critical agents and are organized into logical rings. This architecture maintains clear guidelines for complexity decomposition and also increases the robustness of the whole system. Multiple Sectioned Dynamic Bayesian Networks (MSDBNs) as a distributed dynamic probabilistic inference engine, can be embedded into the control architecture to handle uncertainties of general large-scale complex systems. MSDBNs decomposes a large knowledge-based system into many agents. Each agent holds its partial perspective of a large problem domain by representing its knowledge as a Dynamic Bayesian Network (DBN). Each agent accesses local evidence from its corresponding local sensors and communicates with other agents through finite message passing. If the distributed agents can be organized into a tree structure, satisfying the running intersection property and d-sep set requirements, globally consistent inferences are achievable in a distributed way. By using different frequencies for local DBN agent belief updating and global system belief updating, it balances the communication cost with the global consistency of inferences. In this dissertation, a fully factorized Boyen-Koller (BK) approximation algorithm is used for local DBN agent belief updating, and the static Junction Forest Linkage Tree (JFLT) algorithm is used for global system belief updating. MSDBNs assume a static structure and a stable communication network for the whole system. However, for a real system, sub-Bayesian networks as nodes could be lost, and the communication network could be shut down due to partial damage in the system. Therefore, on-line and automatic MSDBNs structure formation is necessary for making robust state estimations and increasing survivability of the whole system. A Distributed Spanning Tree Optimization (DSTO) algorithm, a Distributed D-Sep Set Satisfaction (DDSSS) algorithm, and a Distributed Running Intersection Satisfaction (DRIS) algorithm are proposed in this dissertation. Combining these three distributed algorithms and a Distributed Belief Propagation (DBP) algorithm in MSDBNs makes state estimations robust to partial damage in the whole system. Combining the distributed control architecture design and the distributed inference engine design leads to a process of control system design for a general large-scale complex system. As applications of the proposed methodology, the control system design of a simplified ship chilled water system and a notional ship chilled water system have been demonstrated step by step. Simulation results not only show that the proposed methodology gives a clear guideline for control system design for general large-scale complex systems with dynamic and uncertain environment, but also indicate that the combination of MSDBNs and HyMABC can provide excellent performance for controlling general large-scale complex systems.
Data management in Oceanography at SOCIB
NASA Astrophysics Data System (ADS)
Joaquin, Tintoré; March, David; Lora, Sebastian; Sebastian, Kristian; Frontera, Biel; Gómara, Sonia; Pau Beltran, Joan
2014-05-01
SOCIB, the Balearic Islands Coastal Ocean Observing and Forecasting System (http://www.socib.es), is a Marine Research Infrastructure, a multiplatform distributed and integrated system, a facility of facilities that extends from the nearshore to the open sea and provides free, open and quality control data. SOCIB is a facility o facilities and has three major infrastructure components: (1) a distributed multiplatform observing system, (2) a numerical forecasting system, and (3) a data management and visualization system. We present the spatial data infrastructure and applications developed at SOCIB. One of the major goals of the SOCIB Data Centre is to provide users with a system to locate and download the data of interest (near real-time and delayed mode) and to visualize and manage the information. Following SOCIB principles, data need to be (1) discoverable and accessible, (2) freely available, and (3) interoperable and standardized. In consequence, SOCIB Data Centre Facility is implementing a general data management system to guarantee international standards, quality assurance and interoperability. The combination of different sources and types of information requires appropriate methods to ingest, catalogue, display, and distribute this information. SOCIB Data Centre is responsible for directing the different stages of data management, ranging from data acquisition to its distribution and visualization through web applications. The system implemented relies on open source solutions. In other words, the data life cycle relies in the following stages: • Acquisition: The data managed by SOCIB mostly come from its own observation platforms, numerical models or information generated from the activities in the SIAS Division. • Processing: Applications developed at SOCIB to deal with all collected platform data performing data calibration, derivation, quality control and standardization. • Archival: Storage in netCDF and spatial databases. • Distribution: Data web services using Thredds, Geoserver and RESTful own services. • Catalogue: Metadata is provided through the ncISO plugin in Thredds and Geonetwork. • Visualization: web and mobile applications to present SOCIB data to different user profiles. SOCIB data services and applications have been developed to provide response to science and society needs (eg. European initiatives such as Emodnet or Copernicus), by targeting different user profiles (eg. researchers, technicians, policy and decision makers, educators, students, and society in general). For example, SOCIB has developed applications to: 1) allow researchers and technicians to access oceanographic information; 2) provide decision support for oil spills response; 3) disseminate information about the coastal state for tourists and recreational users; 4) present coastal research in educational programs; and 5) offer easy and fast access to marine information through mobile devices. In conclusion, the organizational and conceptual structure of SOCIB's Data Centre and the components developed provide an example of marine information systems within the framework of new ocean observatories and/or marine research infrastructures.
Rodriguez-Calero, Miguel Angel; Fernandez-Fernandez, Ismael; Molero-Ballester, Luis Javier; Matamalas-Massanet, Catalina; Moreno-Mejias, Luis; de Pedro-Gomez, Joan Ernest; Blanco-Mavillard, Ian; Morales-Asencio, Jose Miguel
2018-02-08
Patients with difficult venous access experience undesirable effects during healthcare, such as delayed diagnosis and initiation of treatment, stress and pain related to the technique and reduced satisfaction. This study aims to identify risk factors with which to model the appearance of difficulty in achieving peripheral venous puncture in hospital treatment. Case-control study. We will include adult patients requiring peripheral venous cannulation in eight public hospitals, excluding those in emergency situations and women in childbirth or during puerperium. The nurse who performs the technique will record in an anonymised register variables related to the intervention. Subsequently, a researcher will extract the health variables from the patient's medical history. Patients who present one of the following conditions will be assigned to the case group: two or more failed punctures, need for puncture support, need for central access after failure to achieve peripheral access, or decision to reject the technique. The control group will be obtained from records of patients who do not meet the above conditions. It has been stated a minimum sample size of 2070 patients, 207 cases and 1863 controls.A descriptive analysis will be made of the distribution of the phenomenon. The variables hypothesised to be risk factors for the appearance of difficult venous cannulation will be studied using a logistic regression model. The study was funded in January 2017 and obtained ethical approval from the Research Ethics Committee of the Balearic Islands. Informed consent will be obtained prior to data collection. Results will be published in a peer-reviewed scientific journal. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Invasion of American bullfrogs along the Yellowstone River
Sepulveda, Adam; Layhee, Megan J.; Stagliano, Dave; Chaffin, Jake; Begley, Allison; Maxell, Bryce A.
2015-01-01
The American bullfrog (Lithobates catesbeianus) is a globally distributed invasive species that was introduced to the Yellowstone River floodplain of Montana. Knowledge about floodplain habitat features that allow for bullfrog persistence and spread will help identify effective control strategies. We used field surveys in 2010, 2012 and 2013 to describe bullfrog spread in the Yellowstone River floodplain and the habitat features that are associated with bullfrog occupancy and colonization. Bullfrogs in our study area expanded from ~ 60 km in 2010 to 106 km in 2013, and are spreading to up- and downstream habitats. The number of breeding sites (i.e., presence of bullfrog eggs or larvae) increased from 12 sites in 2010 to 45 sites in 2013. We found that bullfrogs were associated with deeper waters, emergent vegetation and public-access sites, which are habitat features that characterize permanent waters and describe human-mediated introductions. Control strategies that reduce the hydroperiod of breeding sites may help to limit bullfrog persistence and spread, while an increase in public outreach and education may help prevent further bullfrog introductions at public-access sites.
Sy, Peter A
2003-10-01
The just distribution of benefits and burdens of healthcare, at least in the contemporary Philippine context, is an issue that gravitates towards two opposing doctrines of welfarism and 'free enterprise.' Supported largely by popular opinion, welfarism maintains that social welfare and healthcare are primarily the responsibility of the government. Free enterprise (FE) doctrine, on the other hand, maintains that social welfare is basically a market function and that healthcare should be a private industry that operates under competitive conditions with minimal government control. I will examine the ethical implications of these two doctrines as they inform healthcare programmes by business and government, namely: (a) the Devolution of Health Services and (b) the Philippine Health Maintenance Organization (HMO). I will argue that these doctrines and the health programmes they inform are deficient in following respects: (1) equitable access to healthcare, (2) individual needs for premium healthcare, (3) optimal utilisation of health resources, and (4) the equitable assignment of burdens that healthcare entails. These respects, as considerations of justice, are consistent with an operational definition of 'power' proposed here as 'access to and control of resources.'
South Africa's protracted struggle for equal distribution and equitable access - still not there.
van Rensburg, Hendrik C J
2014-05-08
The purpose of this contribution is to analyse and explain the South African HRH case, its historical evolution, and post-apartheid reform initiatives aimed at addressing deficiencies and shortfalls. HRH in South Africa not only mirrors the nature and diversity of challenges globally, but also the strategies pursued by countries to address these challenges. Although South Africa has strongly developed health professions, large numbers of professional and mid-level workers, and also well-established training institutions, it is experiencing serious workforce shortages and access constraints. This results from the unequal distribution of health workers between the well-resourced private sector over the poorly-resourced public sector, as well as from distributional disparities between urban and rural areas. During colonial and apartheid times, disparities were aggravated by policies of racial segregation and exclusion, remnants of which are today still visible in health-professional backlogs, unequal provincial HRH distribution, and differential access to health services for specific race and class groups. Since 1994, South Africa's transition to democracy deeply transformed the health system, health professions and HRH establishments. The introduction of free-health policies, the district health system and the prioritisation of PHC ensured more equal distribution of the workforce, as well as greater access to services for deprived groups. However, the HIV/AIDS epidemic brought about huge demands for care and massive patient loads in the public-sector. The emigration of health professionals to developed countries and to the private sector also undermines the strength and effectiveness of the public health sector. For the poor, access to care thus remains constrained and in perpetual shortfall. The post-1994 government has introduced several HRH-specific strategies to recruit, distribute, motivate and retain health professionals to strengthen the public sector and to expand access and coverage. Of great significance among these is the NHI Plan that aims to bridge the structural divide and to redistribute material and human resources more equally. Its success largely hinges on HRH and the balanced deployment of the national workforce.Low- and middle-income countries have much to learn from South African HRH experiences. In turn, South Africa has much to learn from other countries, as this case study shows.
Uptake of Rabies Control Measures by Dog Owners in Flores Island, Indonesia
Wera, Ewaldus; Mourits, Monique C. M.; Hogeveen, Henk
2015-01-01
Background Rabies has been a serious public health threat in Flores Island, Indonesia since it was introduced in 1997. To control the disease, annual dog vaccination campaigns have been implemented to vaccinate all dogs free of charge. Nevertheless, the uptake rate of the vaccination campaigns has been low. The objective of this paper is to identify risk factors associated with the uptake of rabies control measures by individual dog owners in Flores Island. Methodology/principal findings A total of 450 dog owners from 44 randomly selected villages in the Sikka and Manggarai regencies were interviewed regarding their socio-demographic factors, knowledge of rabies, and their uptake of rabies control measures. The majority of dog owners surveyed (>90%) knew that rabies is a fatal disease and that it can be prevented. Moreover, 68% of the dog owners had a high level of knowledge about available rabies control measures. Fifty-two percent of the dog owners had had at least one of their dogs vaccinated during the 2012 vaccination campaign. Vaccination uptake was significantly higher for dog owners who resided in Sikka, kept female dogs for breeding, had an income of more than one million Rupiah, and had easy access to their village. The most important reasons not to join the vaccination campaign were lack of information about the vaccination campaign schedule (40%) and difficulty to catch the dog during the vaccination campaign (37%). Conclusions/significance Dog owners in Flores Island had a high level of knowledge of rabies and its control, but this was not associated with uptake of the 2012 vaccination campaign. Geographical accessibility was one of the important factors influencing the vaccination uptake among dog owners. Targeted distribution of information on vaccination schedules and methods to catch and restrain dogs in those villages with poor accessibility may increase vaccination uptake in the future. PMID:25782019
UPC++ Programmer’s Guide (v1.0 2017.9)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bachan, J.; Baden, S.; Bonachea, D.
UPC++ is a C++11 library that provides Asynchronous Partitioned Global Address Space (APGAS) programming. It is designed for writing parallel programs that run efficiently and scale well on distributed-memory parallel computers. The APGAS model is single program, multiple-data (SPMD), with each separate thread of execution (referred to as a rank, a term borrowed from MPI) having access to local memory as it would in C++. However, APGAS also provides access to a global address space, which is allocated in shared segments that are distributed over the ranks. UPC++ provides numerous methods for accessing and using global memory. In UPC++, allmore » operations that access remote memory are explicit, which encourages programmers to be aware of the cost of communication and data movement. Moreover, all remote-memory access operations are by default asynchronous, to enable programmers to write code that scales well even on hundreds of thousands of cores.« less
UPC++ Programmer’s Guide, v1.0-2018.3.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bachan, J.; Baden, S.; Bonachea, Dan
UPC++ is a C++11 library that provides Partitioned Global Address Space (PGAS) programming. It is designed for writing parallel programs that run efficiently and scale well on distributed-memory parallel computers. The PGAS model is single program, multiple-data (SPMD), with each separate thread of execution (referred to as a rank, a term borrowed from MPI) having access to local memory as it would in C++. However, PGAS also provides access to a global address space, which is allocated in shared segments that are distributed over the ranks. UPC++ provides numerous methods for accessing and using global memory. In UPC++, all operationsmore » that access remote memory are explicit, which encourages programmers to be aware of the cost of communication and data movement. Moreover, all remote-memory access operations are by default asynchronous, to enable programmers to write code that scales well even on hundreds of thousands of cores.« less
Purdue Ionomics Information Management System. An Integrated Functional Genomics Platform1[C][W][OA
Baxter, Ivan; Ouzzani, Mourad; Orcun, Seza; Kennedy, Brad; Jandhyala, Shrinivas S.; Salt, David E.
2007-01-01
The advent of high-throughput phenotyping technologies has created a deluge of information that is difficult to deal with without the appropriate data management tools. These data management tools should integrate defined workflow controls for genomic-scale data acquisition and validation, data storage and retrieval, and data analysis, indexed around the genomic information of the organism of interest. To maximize the impact of these large datasets, it is critical that they are rapidly disseminated to the broader research community, allowing open access for data mining and discovery. We describe here a system that incorporates such functionalities developed around the Purdue University high-throughput ionomics phenotyping platform. The Purdue Ionomics Information Management System (PiiMS) provides integrated workflow control, data storage, and analysis to facilitate high-throughput data acquisition, along with integrated tools for data search, retrieval, and visualization for hypothesis development. PiiMS is deployed as a World Wide Web-enabled system, allowing for integration of distributed workflow processes and open access to raw data for analysis by numerous laboratories. PiiMS currently contains data on shoot concentrations of P, Ca, K, Mg, Cu, Fe, Zn, Mn, Co, Ni, B, Se, Mo, Na, As, and Cd in over 60,000 shoot tissue samples of Arabidopsis (Arabidopsis thaliana), including ethyl methanesulfonate, fast-neutron and defined T-DNA mutants, and natural accession and populations of recombinant inbred lines from over 800 separate experiments, representing over 1,000,000 fully quantitative elemental concentrations. PiiMS is accessible at www.purdue.edu/dp/ionomics. PMID:17189337
Inequalities in public health care delivery in Zambia
2014-01-01
Background Access to adequate health services that is of acceptable quality is important in the move towards universal health coverage. However, previous studies have revealed inequities in health care utilisation in the favour of the rich. Further, those with the greatest need for health services are not getting a fair share. In Zambia, though equity in access is extolled in government documents, there is evidence suggesting that those needing health services are not receiving their fair share. This study seeks therefore, to assess if socioeconomic related inequalities/inequities in public health service utilisation in Zambia still persist. Methods The 2010 nationally representative Zambia Living Conditions and Monitoring Survey data are used. Inequality is assessed using concentration curves and concentrations indices while inequity is assessed using a horizontal equity index: an index of inequity across socioeconomic status groups, based on standardizing health service utilisation for health care need. Public health services considered include public health post visits, public clinic visits, public hospital visits and total public facility visits. Results There is evidence of pro-poor inequality in public primary health care utilisation but a pro-rich inequality in hospital visits. The concentration indices for public health post visits and public clinic visits are −0.28 and −0.09 respectively while that of public hospitals is 0.06. After controlling for need, the pro-poor distribution is maintained at primary facilities and with a pro-rich distribution at hospitals. The horizontal equity indices for health post and clinic are estimated at −0.23 and −0.04 respectively while that of public hospitals is estimated at 0.11. A pro-rich inequity is observed when all the public facilities are combined (horizontal equity index = 0.01) though statistically insignificant. Conclusion The results of the paper point to areas of focus in ensuring equitable access to health services especially for the poor and needy. This includes strengthening primary facilities that serve the poor and reducing access barriers to ensure that health care utilisation at higher-level facilities is distributed in accordance with need for it. These initiatives may well reduce the observed inequities and accelerate the move towards universal health coverage in Zambia. PMID:24645826
Agent of opportunity risk mitigation: people, engineering, and security efficacy.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
2010-12-01
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same... synchronous dynamic random access memory controllers and products containing same by reason of infringement of... semiconductor chips having synchronous dynamic random access memory controllers and products containing same...
Huang, Cong; Nie, Xinhui; Shen, Chao; You, Chunyuan; Li, Wu; Zhao, Wenxia; Zhang, Xianlong; Lin, Zhongxu
2017-11-01
Gossypium hirsutum L. represents the largest source of textile fibre, and China is one of the largest cotton-producing and cotton-consuming countries in the world. To investigate the genetic architecture of the agronomic traits of upland cotton in China, a diverse and nationwide population containing 503 G. hirsutum accessions was collected for a genome-wide association study (GWAS) on 16 agronomic traits. The accessions were planted in four places from 2012 to 2013 for phenotyping. The CottonSNP63K array and a published high-density map based on this array were used for genotyping. The 503 G. hirsutum accessions were divided into three subpopulations based on 11 975 quantified polymorphic single-nucleotide polymorphisms (SNPs). By comparing the genetic structure and phenotypic variation among three genetic subpopulations, seven geographic distributions and four breeding periods, we found that geographic distribution and breeding period were not the determinants of genetic structure. In addition, no obvious phenotypic differentiations were found among the three subpopulations, even though they had different genetic backgrounds. A total of 324 SNPs and 160 candidate quantitative trait loci (QTL) regions were identified as significantly associated with the 16 agronomic traits. A network was established for multieffects in QTLs and interassociations among traits. Thirty-eight associated regions had pleiotropic effects controlling more than one trait. One candidate gene, Gh_D08G2376, was speculated to control the lint percentage (LP). This GWAS is the first report using high-resolution SNPs in upland cotton in China to comprehensively investigate agronomic traits, and it provides a fundamental resource for cotton genetic research and breeding. © 2017 The Authors. Plant Biotechnology Journal published by Society for Experimental Biology and The Association of Applied Biologists and John Wiley & Sons Ltd.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-21
...), Rockville, Maryland 20852 and is accessible from the NRC's Agencywide Documents Access and Management System... receipt of the document. The E-Filing system also distributes an e-mail notice that provides access to the... intervene is filed so that they can obtain access to the document via the E-Filing system. A person filing...
Collaborative Indoor Access Point Localization Using Autonomous Mobile Robot Swarm.
Awad, Fahed; Naserllah, Muhammad; Omar, Ammar; Abu-Hantash, Alaa; Al-Taj, Abrar
2018-01-31
Localization of access points has become an important research problem due to the wide range of applications it addresses such as dismantling critical security threats caused by rogue access points or optimizing wireless coverage of access points within a service area. Existing proposed solutions have mostly relied on theoretical hypotheses or computer simulation to demonstrate the efficiency of their methods. The techniques that rely on estimating the distance using samples of the received signal strength usually assume prior knowledge of the signal propagation characteristics of the indoor environment in hand and tend to take a relatively large number of uniformly distributed random samples. This paper presents an efficient and practical collaborative approach to detect the location of an access point in an indoor environment without any prior knowledge of the environment. The proposed approach comprises a swarm of wirelessly connected mobile robots that collaboratively and autonomously collect a relatively small number of non-uniformly distributed random samples of the access point's received signal strength. These samples are used to efficiently and accurately estimate the location of the access point. The experimental testing verified that the proposed approach can identify the location of the access point in an accurate and efficient manner.
Collaborative Indoor Access Point Localization Using Autonomous Mobile Robot Swarm
Awad, Fahed; Naserllah, Muhammad; Omar, Ammar; Abu-Hantash, Alaa; Al-Taj, Abrar
2018-01-01
Localization of access points has become an important research problem due to the wide range of applications it addresses such as dismantling critical security threats caused by rogue access points or optimizing wireless coverage of access points within a service area. Existing proposed solutions have mostly relied on theoretical hypotheses or computer simulation to demonstrate the efficiency of their methods. The techniques that rely on estimating the distance using samples of the received signal strength usually assume prior knowledge of the signal propagation characteristics of the indoor environment in hand and tend to take a relatively large number of uniformly distributed random samples. This paper presents an efficient and practical collaborative approach to detect the location of an access point in an indoor environment without any prior knowledge of the environment. The proposed approach comprises a swarm of wirelessly connected mobile robots that collaboratively and autonomously collect a relatively small number of non-uniformly distributed random samples of the access point’s received signal strength. These samples are used to efficiently and accurately estimate the location of the access point. The experimental testing verified that the proposed approach can identify the location of the access point in an accurate and efficient manner. PMID:29385042
Architecture for distributed actuation and sensing using smart piezoelectric elements
NASA Astrophysics Data System (ADS)
Etienne-Cummings, Ralph; Pourboghrat, Farzad; Maruboyina, Hari K.; Abrate, Serge; Dhali, Shirshak K.
1998-07-01
We discuss vibration control of a cantilevered plate with multiple sensors and actuators. An architecture is chosen to minimize the number of control and sensing wires required. A custom VLSI chip, integrated with the sensor/actuator elements, controls the local behavior of the plate. All the actuators are addressed in parallel; local decode logic selects which actuator is stimulated. Downloaded binary data controls the applied voltage and modulation frequency for each actuator, and High Voltage MOSFETs are used to activate them. The sensors, which are independent adjacent piezoelectric ceramic elements, can be accessed in a random or sequential manner. An A/D card and GPIB interconnected test equipment allow a PC to read the sensors' outputs and dictate the actuation procedure. A visual programming environment is used to integrate the sensors, controller and actuators. Based on the constitutive relations for the piezoelectric material, simple models for the sensors and actuators are derived. A two level hierarchical robust controller is derived for motion control and for damping of vibrations.
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
Subscriptions Are Us: Content, Access, & Collections
ERIC Educational Resources Information Center
Thomas, Lisa Carlucci
2012-01-01
In a time of increasingly digital distribution, challenging questions arise regarding what people own, what they want to access to, and how they develop and maintain collections. What considerations influence their decision making, as individuals and libraries shift toward more subscription-oriented content? Digital access to e-books and…
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
Myhill, William N; Cogburn, Derrick L; Samant, Deepti; Addom, Benjamin Kwasi; Blanck, Peter
2008-01-01
Since publication of the Atkins Commission report in 2003, the national scientific community has placed significant emphasis on developing cyberinfrastructure-enabled knowledge communities, which are designed to facilitate enhanced efficiency and collaboration in geographically distributed networks of researchers. This article suggests that the new cyberinfrastructure movement may not fully benefit those participants with disabilities, unless closer attention is paid to legal mandates and universal design principles. Many technology-enhanced learning communities provide geographically distributed collaboration opportunities that expand the inclusion of diverse peoples and help close the digital divide. However, to date, most collaboratory efforts have not emphasized the need for access among people with disabilities nor meeting minimum standards for technological accessibility. To address these concerns, this article reports on two pilot collaboratory studies that explore the role advanced information, communication, and collaboration technologies play in enhancing geographically distributed collaboration among specific research and applied networks within the national disability community. Universal design principles inform the design of the collaboratory and its use and our efforts to ensure access for all. Data for this article come from Web-based surveys, interviews, observations, computer logs, and detailed, mixed-methods accessibility testing. Emerging results suggest that with deliberate and systematic efforts, cyberinfrastructure can be more accessible and generate benefits among persons with disabilities. The authors provide lessons learned and recommendations for future research, policy, law, and practice.
An analysis of excessive running in the development of activity anorexia.
Beneke, W M; Schulte, S E; vander Tuig, J G
1995-09-01
Food restriction combined with activity wheel access produces activity anorexia: a combination of excessive running, reduced food intake and rapid weight loss. Temporal distributions of running in activity anorexia were examined in a reversal design with one of 2 x 2 x 2 factorial combinations (pelleted-vs-powdered food x deprivation x wheel access) as the treatment condition. Wheel revolutions were recorded in 30 min intervals; body weights, food and water intakes were measured daily. Only wheel access combined with food deprivation reliably produced activity anorexia. Excessive running occurred in the absence of schedule-induced polydipsia, was unaffected by food form, and showed distributional characteristics of facultative behavior. These results are inconsistent with schedule-induced behavior explanations. Running distributions appeared consistent with chronobiological models with light/dark onset and feeding serving as zeitgebers.
Virtual Solar Observatory Distributed Query Construction
NASA Technical Reports Server (NTRS)
Gurman, J. B.; Dimitoglou, G.; Bogart, R.; Davey, A.; Hill, F.; Martens, P.
2003-01-01
Through a prototype implementation (Tian et al., this meeting) the VSO has already demonstrated the capability of unifying geographically distributed data sources following the Web Services paradigm and utilizing mechanisms such as the Simple Object Access Protocol (SOAP). So far, four participating sites (Stanford, Montana State University, National Solar Observatory and the Solar Data Analysis Center) permit Web-accessible, time-based searches that allow browse access to a number of diverse data sets. Our latest work includes the extension of the simple, time-based queries to include numerous other searchable observation parameters. For VSO users, this extended functionality enables more refined searches. For the VSO, it is a proof of concept that more complex, distributed queries can be effectively constructed and that results from heterogeneous, remote sources can be synthesized and presented to users as a single, virtual data product.
Market access of cancer drugs in European countries: improving resource allocation.
Pauwels, Kim; Huys, Isabelle; Casteels, Minne; De Nys, Katelijne; Simoens, Steven
2014-06-01
Public health systems need to make well-founded choices in order to distribute their scarce resources in the most efficient way. Given the number of cancer patients, public/private investments in oncology research, the growing number of new anti-cancer agents and consequent budget impact of cancer care, market access of cancer drugs has become delicate over the last decade. Furthermore, decision makers are challenged by ethical objections and endeavour to provide fair and equal access to treatments for cancer patients. The aim of this study is to generate an overview of market access procedures for cancer drugs in eight European countries and formulate advice for improvement of resource allocation. Results are obtained through a literature review and a qualitative questionnaire and validated by experts with proven knowledge about procedures for price setting and reimbursement of drugs. Diverse measures are applied in the studied countries to optimize reimbursement of cancer drugs such as adjusted cost-effectiveness threshold, regulations for off-label use and new market access agreements. Additionally, innovative cancer drugs are excluded from explicit cost control measures such as payback of budget excess by pharmaceutical companies and lump-sum payments per diagnostic related groups (DRG) in the hospital. The results suggest that cancer is prioritized above other disease areas. Further research is necessary to address the question if society attaches higher value to cancer drugs than to treatments for other diseases.
EPICS as a MARTe Configuration Environment
NASA Astrophysics Data System (ADS)
Valcarcel, Daniel F.; Barbalace, Antonio; Neto, André; Duarte, André S.; Alves, Diogo; Carvalho, Bernardo B.; Carvalho, Pedro J.; Sousa, Jorge; Fernandes, Horácio; Goncalves, Bruno; Sartori, Filippo; Manduchi, Gabriele
2011-08-01
The Multithreaded Application Real-Time executor (MARTe) software provides an environment for the hard real-time execution of codes while leveraging a standardized algorithm development process. The Experimental Physics and Industrial Control System (EPICS) software allows the deployment and remote monitoring of networked control systems. Channel Access (CA) is the protocol that enables the communication between EPICS distributed components. It allows to set and monitor process variables across the network belonging to different systems. The COntrol and Data Acquisition and Communication (CODAC) system for the ITER Tokamak will be EPICS based and will be used to monitor and live configure the plant controllers. The reconfiguration capability in a hard real-time system requires strict latencies from the request to the actuation and it is a key element in the design of the distributed control algorithm. Presently, MARTe and its objects are configured using a well-defined structured language. After each configuration, all objects are destroyed and the system rebuilt, following the strong hard real-time rule that a real-time system in online mode must behave in a strictly deterministic fashion. This paper presents the design and considerations to use MARTe as a plant controller and enable it to be EPICS monitorable and configurable without disturbing the execution at any time, in particular during a plasma discharge. The solutions designed for this will be presented and discussed.
Milestones and impact factors.
Ozonoff, David M; Grandjean, Philippe
2010-07-08
Environmental Health has just received its first Impact Factor by Thomson ISI. At a level of 2.48, this achievement is quite satisfactory and places Environmental Health in the top 25% of environmental science journals. When the journal was launched in 2002, it was still unclear whether the Open Access publishing model could be made into a viable commercial enterprise within the biomedical field. During the past eight years, Open Access journals have become widely available, although still covering only about 15% of journal titles. Major funding agencies and institutions, including prominent US universities, now require that researchers publish in Open Access journals. Because of the profound role of scientific journals for the sharing of results and communication between researchers, the advent of Open Access may be of as much significance as the transition from handwriting to printing via moveable type. As Environmental Health is an electronic Open Access journal, the numbers of downloads at the journal website can be retrieved. The top-20 list of articles most frequently accessed shows that all of them have been downloaded over 10,000 times. Back in 2002, the first article published was accessed only 49 times during the following month. A year later, the server had over 1,000 downloads per month, and now the total number of monthly downloads approaches 50,000. These statistics complement the Impact Factor and confirm the viability of Open Access in our field of research. The advent of digital media and its decentralized mode of distribution - the internet - have dramatically changed the control and financing of scientific information dissemination, while facilitating peer review, accelerating editorial handling, and supporting much needed transparency. Both the meaning and means of "having an impact" are therefore changing, as will the degree and way in which scientific journals remain "factors" in that impact.
2010-01-01
Environmental Health has just received its first Impact Factor by Thomson ISI. At a level of 2.48, this achievement is quite satisfactory and places Environmental Health in the top 25% of environmental science journals. When the journal was launched in 2002, it was still unclear whether the Open Access publishing model could be made into a viable commercial enterprise within the biomedical field. During the past eight years, Open Access journals have become widely available, although still covering only about 15% of journal titles. Major funding agencies and institutions, including prominent US universities, now require that researchers publish in Open Access journals. Because of the profound role of scientific journals for the sharing of results and communication between researchers, the advent of Open Access may be of as much significance as the transition from handwriting to printing via moveable type. As Environmental Health is an electronic Open Access journal, the numbers of downloads at the journal website can be retrieved. The top-20 list of articles most frequently accessed shows that all of them have been downloaded over 10,000 times. Back in 2002, the first article published was accessed only 49 times during the following month. A year later, the server had over 1,000 downloads per month, and now the total number of monthly downloads approaches 50,000. These statistics complement the Impact Factor and confirm the viability of Open Access in our field of research. The advent of digital media and its decentralized mode of distribution - the internet - have dramatically changed the control and financing of scientific information dissemination, while facilitating peer review, accelerating editorial handling, and supporting much needed transparency. Both the meaning and means of "having an impact" are therefore changing, as will the degree and way in which scientific journals remain "factors" in that impact. PMID:20615249
Research into display sharing techniques for distributed computing environments
NASA Technical Reports Server (NTRS)
Hugg, Steven B.; Fitzgerald, Paul F., Jr.; Rosson, Nina Y.; Johns, Stephen R.
1990-01-01
The X-based Display Sharing solution for distributed computing environments is described. The Display Sharing prototype includes the base functionality for telecast and display copy requirements. Since the prototype implementation is modular and the system design provided flexibility for the Mission Control Center Upgrade (MCCU) operational consideration, the prototype implementation can be the baseline for a production Display Sharing implementation. To facilitate the process the following discussions are presented: Theory of operation; System of architecture; Using the prototype; Software description; Research tools; Prototype evaluation; and Outstanding issues. The prototype is based on the concept of a dedicated central host performing the majority of the Display Sharing processing, allowing minimal impact on each individual workstation. Each workstation participating in Display Sharing hosts programs to facilitate the user's access to Display Sharing as host machine.
Preventing Unofficial Information Propagation
NASA Astrophysics Data System (ADS)
Le, Zhengyi; Ouyang, Yi; Xu, Yurong; Ford, James; Makedon, Fillia
Digital copies are susceptible to theft and vulnerable to leakage, copying, or manipulation. When someone (or some group), who has stolen, leaked, copied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels many challenges arise which document holders must overcome in order to mitigate the impact to their privacy or business. This paper focuses on the propagation problem of digital credentials, which may contain sensitive information about a credential holder. Existing work such as access control policies and the Platform for Privacy Preferences (P3P) assumes that qualified or certified credential viewers are honest and reliable. The proposed approach in this paper uses short-lived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised viewer.
A Java-Enabled Interactive Graphical Gas Turbine Propulsion System Simulator
NASA Technical Reports Server (NTRS)
Reed, John A.; Afjeh, Abdollah A.
1997-01-01
This paper describes a gas turbine simulation system which utilizes the newly developed Java language environment software system. The system provides an interactive graphical environment which allows the quick and efficient construction and analysis of arbitrary gas turbine propulsion systems. The simulation system couples a graphical user interface, developed using the Java Abstract Window Toolkit, and a transient, space- averaged, aero-thermodynamic gas turbine analysis method, both entirely coded in the Java language. The combined package provides analytical, graphical and data management tools which allow the user to construct and control engine simulations by manipulating graphical objects on the computer display screen. Distributed simulations, including parallel processing and distributed database access across the Internet and World-Wide Web (WWW), are made possible through services provided by the Java environment.
Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft
2013-03-27
the cheapest computers currently on the market (the $35 Raspberry Pi [New13, Upt13]) to distribute the workload, a determined attacker would incur a...cCost of Brute-Force) for 6,318 Raspberry Pi systems (x) at $82 per 3DR-enabled Raspberry Pi (RPCost of RasPi) [3DR13, New13] to brute-force all 3,790,800...NIST, 2004. [New13] Newark. Order the Raspberry Pi , November 2013. last accessed: 19 Febru- ary 2014. URL: http://www.newark.com/jsp/search
High speed fiber optics local area networks: Design and implementation
NASA Technical Reports Server (NTRS)
Tobagi, Fouad A.
1988-01-01
The design of high speed local area networks (HSLAN) for communication among distributed devices requires solving problems in three areas: (1) the network medium and its topology; (2) the medium access control; and (3) the network interface. Considerable progress has been made in all areas. Accomplishments are divided into two groups according to their theoretical or experimental nature. A brief summary is given in Section 2, including references to papers which appeared in the literature, as well as to Ph.D. dissertations and technical reports published at Stanford University.
Advance reservation access control using software-defined networking and tokens
Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; ...
2017-03-09
Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less
Advance reservation access control using software-defined networking and tokens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar
Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less
Advance reservation access control using software-defined networking and tokens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar
Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We usemore » SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.« less
Su, Fan; Zhao, Ying; Su, Qin
2013-08-01
To evaluate the stress distribution of the cervical-defected incisor with labial or lingual endodontic access with finite element analysis (FEA), and to explore the advantage of resistance in labial endodontic access. 3-D finite element models of upper cervical-defected incisor were established using cone-beam CT (CBCT), Mimics Catia, and Ansys software. The subjects were categorized according to the two endodontic accesses and three restorative ways, which were composite resin, glass fiber-reinforced composite resin and glass fiber-reinforced post-crown. All the models were loaded.The von Mises stress values and distribution were recorded and analyzed with Ansys 10.0 software. In this study, direct composite resin restoration showed no significant difference between the labial and lingual access. In glass fiber-reinforced composite resin, labial access could transfer the stress concentration area. It could reduce the incidence of fracture of the cervical lesion but increase the incidence of root fracture. Post-crown restoration could obviously reduce the incidence of fracture of the cervical lesion. When the cervical-defected incisor is restored with composite resin, labial and lingual accesses can be considered. Labial access with glass fiber-reinforced composite resin or post-crown restoration is a good choice.
A New Approach to Site Demand-Based Level Inventory Optimization
2016-06-01
Command (2016) Navy supply chain management. Accessed April 17, 2016, https://www.navsup.navy.mil/navsup/capabilities/nscm Salmeron J, Craparo E (2016...Engineering 53: 122-142. Naval Supply Systems Command (2016a) Navy supply chain management. Accessed April 17, 2016, https://www.navsup.navy.mil...distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Naval Supply Systems Command (NAVSUP) supports Navy, Marine Corps
Online catalog access and distribution of remotely sensed information
NASA Astrophysics Data System (ADS)
Lutton, Stephen M.
1997-09-01
Remote sensing is providing voluminous data and value added information products. Electronic sensors, communication electronics, computer software, hardware, and network communications technology have matured to the point where a distributed infrastructure for remotely sensed information is a reality. The amount of remotely sensed data and information is making distributed infrastructure almost a necessity. This infrastructure provides data collection, archiving, cataloging, browsing, processing, and viewing for applications from scientific research to economic, legal, and national security decision making. The remote sensing field is entering a new exciting stage of commercial growth and expansion into the mainstream of government and business decision making. This paper overviews this new distributed infrastructure and then focuses on describing a software system for on-line catalog access and distribution of remotely sensed information.
Logical Access Control Mechanisms in Computer Systems.
ERIC Educational Resources Information Center
Hsiao, David K.
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Neighborhood disparities in access to healthy foods and their effects on environmental justice
USDA-ARS?s Scientific Manuscript database
Environmental justice is concerned with an equitable distribution of environmental burdens. These burdens comprise immediate health hazards as well as subtle inequities, such as limited access to healthy foods. We reviewed the literature on neighborhood disparities in access to fast-food outlets and...
Development of Disruptive Open Access Journals
ERIC Educational Resources Information Center
Anderson, Terry; McConkey, Brigette
2009-01-01
Open access (OA) publication has emerged, with disruptive effects, as a major outlet for scholarly publication. OA publication is usually associated with on-line distribution and provides access to scholarly publications to anyone, anywhere--regardless of their ability to pay subscription fees or their association with an educational institution.…
40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.
Code of Federal Regulations, 2012 CFR
2012-07-01
...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to paper copies of off-site consequence analysis information. (a) General. The Administrator and the...
40 CFR 1400.8 - Access to off-site consequence analysis information by Federal government officials.
Code of Federal Regulations, 2011 CFR
2011-07-01
... analysis information by Federal government officials. 1400.8 Section 1400.8 Protection of Environment... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Access to Off-Site Consequence Analysis Information by Government Officials. § 1400.8 Access to off-site consequence analysis information by Federal...
40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.
Code of Federal Regulations, 2013 CFR
2013-07-01
...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to paper copies of off-site consequence analysis information. (a) General. The Administrator and the...
40 CFR 1400.8 - Access to off-site consequence analysis information by Federal government officials.
Code of Federal Regulations, 2013 CFR
2013-07-01
... analysis information by Federal government officials. 1400.8 Section 1400.8 Protection of Environment... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Access to Off-Site Consequence Analysis Information by Government Officials. § 1400.8 Access to off-site consequence analysis information by Federal...
40 CFR 1400.8 - Access to off-site consequence analysis information by Federal government officials.
Code of Federal Regulations, 2012 CFR
2012-07-01
... analysis information by Federal government officials. 1400.8 Section 1400.8 Protection of Environment... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Access to Off-Site Consequence Analysis Information by Government Officials. § 1400.8 Access to off-site consequence analysis information by Federal...
40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.
Code of Federal Regulations, 2011 CFR
2011-07-01
...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to paper copies of off-site consequence analysis information. (a) General. The Administrator and the...
40 CFR 1400.8 - Access to off-site consequence analysis information by Federal government officials.
Code of Federal Regulations, 2014 CFR
2014-07-01
... analysis information by Federal government officials. 1400.8 Section 1400.8 Protection of Environment... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Access to Off-Site Consequence Analysis Information by Government Officials. § 1400.8 Access to off-site consequence analysis information by Federal...
40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.
Code of Federal Regulations, 2014 CFR
2014-07-01
...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to paper copies of off-site consequence analysis information. (a) General. The Administrator and the...
He, Wen-Jun; Lai, Ying-Si; Karmacharya, Biraj M; Dai, Bo-Feng; Hao, Yuan-Tao; Xu, Dong Roman
2018-04-02
Per United Nations' Sustainable Development Goals, Nepal is aspiring to achieve universal and equitable access to safe and affordable drinking water and provide access to adequate and equitable sanitation for all by 2030. For these goals to be accomplished, it is important to understand the country's geographical heterogeneity and inequality of access to its drinking-water supply and sanitation (WSS) so that resource allocation and disease control can be optimized. We aimed 1) to estimate spatial heterogeneity of access to improved WSS among the overall Nepalese population at a high resolution; 2) to explore inequality within and between relevant Nepalese administrative levels; and 3) to identify the specific administrative areas in greatest need of policy attention. We extracted cluster-sample data on the use of the water supply and sanitation that included 10,826 surveyed households from the 2011 Nepal Demographic and Health Survey, then used a Gaussian kernel density estimation with adaptive bandwidths to estimate the distribution of access to improved WSS conditions over a grid at 1 × 1 km. The Gini coefficient was calculated for the measurement of inequality in the distribution of improved WSS; the Theil L measure and Theil T index were applied to account for the decomposition of inequality. 57% of Nepalese had access to improved sanitation (range: 18.1% in Mahottari to 100% in Kathmandu) and 92% to drinking-water (range: 41.7% in Doti to 100% in Bara). The most unequal districts in Gini coefficient among improved sanitation were Saptari, Sindhuli, Banke, Bajura and Achham (range: 0.276 to 0.316); and Sankhuwasabha, Arghakhanchi, Gulmi, Bhojpur, Kathmandu (range: 0.110 to 0.137) among improved drinking-water. Both the Theil L and Theil T showed that within-province inequality was substantially greater than between-province inequality; while within-district inequality was less than between-district inequality. The inequality of several districts was higher than what is calculated by regression of the Gini coefficient and our estimates. This study showed considerable geographical heterogeneity and inequality not evidenced in previous national statistics. Our findings may be useful in prioritizing resources to reduce inequality and expand the coverage of improved water supply and sanitation in Nepal.
NASA Astrophysics Data System (ADS)
Kershaw, P.
2016-12-01
CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective integration with services and resources which they must protect. Effective policy and governance structures are needed for ongoing operations Federated identity infrastructures often exist only at the national level making it difficult for international research collaborations to exploit them.
NASA Technical Reports Server (NTRS)
Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)
2000-01-01
A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.
NASA Technical Reports Server (NTRS)
Wilson, William C.
1999-01-01
The NASA Langley Research Center's Wind Tunnel Reinvestment project plans to shrink the existing data acquisition electronics to fit inside a wind tunnel model. Space limitations within a model necessitate a distributed system of Application Specific Integrated Circuits (ASICs) rather than a centralized system based on PC boards. This thesis will focus on the design of the prototype of the communication Controller board. A portion of the communication Controller board is to be used as the basis of an ASIC design. The communication Controller board will communicate between the internal model modules and the external data acquisition computer. This board is based around an Field Programmable Gate Array (FPGA), to allow for reconfigurability. In addition to the FPGA, this board contains buffer Random Access Memory (RAM), configuration memory (EEPROM), drivers for the communications ports, and passive components.
Coherent control of optical polarization effects in metamaterials
Mousavi, Seyedmohammad A.; Plum, Eric; Shi, Jinhui; Zheludev, Nikolay I.
2015-01-01
Processing of photonic information usually relies on electronics. Aiming to avoid the conversion between photonic and electronic signals, modulation of light with light based on optical nonlinearity has become a major research field and coherent optical effects on the nanoscale are emerging as new means of handling and distributing signals. Here we demonstrate that in slabs of linear material of sub-wavelength thickness optical manifestations of birefringence and optical activity (linear and circular birefringence and dichroism) can be controlled by a wave coherent with the wave probing the polarization effect. We demonstrate this in proof-of-principle experiments for chiral and anisotropic microwave metamaterials, where we show that the large parameter space of polarization characteristics may be accessed at will by coherent control. Such control can be exerted at arbitrarily low intensities, thus arguably allowing for fast handling of electromagnetic signals without facing thermal management and energy challenges. PMID:25755071
Robot Task Commander with Extensible Programming Environment
NASA Technical Reports Server (NTRS)
Hart, Stephen W (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Yamokoski, John D. (Inventor); Gooding, Dustin R (Inventor)
2014-01-01
A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.
Jarquin, Diego; Specht, James; Lorenz, Aaron
2016-08-09
The identification and mobilization of useful genetic variation from germplasm banks for use in breeding programs is critical for future genetic gain and protection against crop pests. Plummeting costs of next-generation sequencing and genotyping is revolutionizing the way in which researchers and breeders interface with plant germplasm collections. An example of this is the high density genotyping of the entire USDA Soybean Germplasm Collection. We assessed the usefulness of 50K single nucleotide polymorphism data collected on 18,480 domesticated soybean (Glycine max) accessions and vast historical phenotypic data for developing genomic prediction models for protein, oil, and yield. Resulting genomic prediction models explained an appreciable amount of the variation in accession performance in independent validation trials, with correlations between predicted and observed reaching up to 0.92 for oil and protein and 0.79 for yield. The optimization of training set design was explored using a series of cross-validation schemes. It was found that the target population and environment need to be well represented in the training set. Second, genomic prediction training sets appear to be robust to the presence of data from diverse geographical locations and genetic clusters. This finding, however, depends on the influence of shattering and lodging, and may be specific to soybean with its presence of maturity groups. The distribution of 7608 nonphenotyped accessions was examined through the application of genomic prediction models. The distribution of predictions of phenotyped accessions was representative of the distribution of predictions for nonphenotyped accessions, with no nonphenotyped accessions being predicted to fall far outside the range of predictions of phenotyped accessions. Copyright © 2016 Jarquin et al.
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-01-01
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-11-04
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
NASA Astrophysics Data System (ADS)
Schaap, D. M. A.; Maudire, G.
2009-04-01
SeaDataNet is an Integrated research Infrastructure Initiative (I3) in EU FP6 (2006 - 2011) to provide the data management system adapted both to the fragmented observation system and the users need for an integrated access to data, meta-data, products and services. Therefore SeaDataNet insures the long term archiving of the large number of multidisciplinary data (i.e. temperature, salinity current, sea level, chemical, physical and biological properties) collected by many different sensors installed on board of research vessels, satellite and the various platforms of the marine observing system. The SeaDataNet project started in 2006, but builds upon earlier data management infrastructure projects, undertaken over a period of 20 years by an expanding network of oceanographic data centres from the countries around all European seas. Its predecessor project Sea-Search had a strict focus on metadata. SeaDataNet maintains significant interest in the further development of the metadata infrastructure, but its primary objective is the provision of easy data access and generic data products. SeaDataNet is a distributed infrastructure that provides transnational access to marine data, meta-data, products and services through 40 interconnected Trans National Data Access Platforms (TAP) from 35 countries around the Black Sea, Mediterranean, North East Atlantic, North Sea, Baltic and Arctic regions. These include: National Oceanographic Data Centres (NODC's) Satellite Data Centres. Furthermore the SeaDataNet consortium comprises a number of expert modelling centres, SME's experts in IT, and 3 international bodies (ICES, IOC and JRC). Planning: The SeaDataNet project is delivering and operating the infrastructure in 3 versions: Version 0: maintenance and further development of the metadata systems developed by the Sea-Search project plus the development of a new metadata system for indexing and accessing to individual data objects managed by the SeaDataNet data centres. This is known as the Common Data Index (CDI) V0 system Version 1: harmonisation and upgrading of the metadatabases through adoption of the ISO 19115 metadata standard and provision of transparent data access and download services from all partner data centres through upgrading the Common Data Index and deployment of a data object delivery service. Version 2: adding data product services and OGC compliant viewing services and further virtualisation of data access. SeaDataNet Version 0: The SeaDataNet portal has been set up at http://www.seadatanet.org and it provides a platform for all SeaDataNet services and standards as well as background information about the project and its partners. It includes discovery services via the following catalogues: CSR - Cruise Summary Reports of research vessels; EDIOS - Locations and details of monitoring stations and networks / programmes; EDMED - High level inventory of Marine Environmental Data sets collected and managed by research institutes and organisations; EDMERP - Marine Environmental Research Projects ; EDMO - Marine Organisations. These catalogues are interrelated, where possible, to facilitate cross searching and context searching. These catalogues connect to the Common Data Index (CDI). Common Data Index (CDI) The CDI gives detailed insight in available datasets at partners databases and paves the way to direct online data access or direct online requests for data access / data delivery. The CDI V0 metadatabase contains more than 340.000 individual data entries from 36 CDI partners from 29 countries across Europe, covering a broad scope and range of data, held by these organisations. For purposes of standardisation and international exchange the ISO19115 metadata standard has been adopted. The CDI format is defined as a dedicated subset of this standard. A CDI XML format supports the exchange between CDI-partners and the central CDI manager, and ensures interoperability with other systems and networks. CDI XML entries are generated by participating data centres, directly from their databases. CDI-partners can make use of dedicated SeaDataNet Tools to generate CDI XML files automatically. Approach for SeaDataNet V1 and V2: The approach for SeaDataNet V1 and V2, which is in line with the INSPIRE Directive, comprises the following services: Discovery services = Metadata directories Security services = Authentication, Authorization & Accounting (AAA) Delivery services = Data access & downloading of datasets Viewing services = Visualisation of metadata, data and data products Product services = Generic and standard products Monitoring services = Statistics on usage and performance of the system Maintenance services = Updating of metadata by SeaDataNet partners The services will be operated over a distributed network of interconnected Data Centres accessed through a central Portal. In addition to service access the portal will provide information on data management standards, tools and protocols. The architecture has been designed to provide a coherent system based on V1 services, whilst leaving the pathway open for later extension with V2 services. For the implementation, a range of technical components have been defined. Some are already operational with the remainder in the final stages of development and testing. These make use of recent web technologies, and also comprise Java components, to provide multi-platform support and syntactic interoperability. To facilitate sharing of resources and interoperability, SeaDataNet has adopted SOAP Web Service technology. The SeaDataNet architecture and components have been designed to handle all kinds of oceanographic and marine environmental data including both in-situ measurements and remote sensing observations. The V1 technical development is ready and the V1 system is now being implemented and adopted by all participating data centres in SeaDataNet. Interoperability: Interoperability is the key to distributed data management system success and it is achieved in SeaDataNet V1 by: Using common quality control protocols and flag scale Using controlled vocabularies from a single source that have been developed using international content governance Adopting the ISO 19115 metadata standard for all metadata directories Providing XML Validation Services to quality control the metadata maintenance, including field content verification based on Schematron. Providing standard metadata entry tools Using harmonised Data Transport Formats (NetCDF, ODV ASCII and MedAtlas ASCII) for data sets delivery Adopting of OGC standards for mapping and viewing services Using SOAP Web Services in the SeaDataNet architecture SeaDataNet V1 Delivery Services: An important objective of the V1 system is to provide transparent access to the distributed data sets via a unique user interface at the SeaDataNet portal and download service. In the SeaDataNet V1 architecture the Common Data Index (CDI) V1 provides the link between discovery and delivery. The CDI user interface enables users to have a detailed insight of the availability and geographical distribution of marine data, archived at the connected data centres, and it provides the means for downloading data sets in common formats via a transaction mechanism. The SeaDataNet portal provides registered users access to these distributed data sets via the CDI V1 Directory and a shopping basket mechanism. This allows registered users to locate data of interest and submit their data requests. The requests are forwarded automatically from the portal to the relevant SeaDataNet data centres. This process is controlled via the Request Status Manager (RSM) Web Service at the portal and a Download Manager (DM) java software module, implemented at each of the data centres. The RSM also enables registered users to check regularly the status of their requests and download data sets, after access has been granted. Data centres can follow all transactions for their data sets online and can handle requests which require their consent. The actual delivery of data sets is done between the user and the selected data centre. The CDI V1 system is now being populated by all participating data centres in SeaDataNet, thereby phasing out CDI V0. 0.1 SeaDataNet Partners: IFREMER (France), MARIS (Netherlands), HCMR/HNODC (Greece), ULg (Belgium), OGS (Italy), NERC/BODC (UK), BSH/DOD (Germany), SMHI (Sweden), IEO (Spain), RIHMI/WDC (Russia), IOC (International), ENEA (Italy), INGV (Italy), METU (Turkey), CLS (France), AWI (Germany), IMR (Norway), NERI (Denmark), ICES (International), EC-DG JRC (International), MI (Ireland), IHPT (Portugal), RIKZ (Netherlands), RBINS/MUMM (Belgium), VLIZ (Belgium), MRI (Iceland), FIMR (Finland ), IMGW (Poland), MSI (Estonia), IAE/UL (Latvia), CMR (Lithuania), SIO/RAS (Russia), MHI/DMIST (Ukraine), IO/BAS (Bulgaria), NIMRD (Romania), TSU (Georgia), INRH (Morocco), IOF (Croatia), PUT (Albania), NIB (Slovenia), UoM (Malta), OC/UCY (Cyprus), IOLR (Israel), NCSR/NCMS (Lebanon), CNR-ISAC (Italy), ISMAL (Algeria), INSTM (Tunisia)
Ethics, economics, and public financing of health care.
Hurley, J
2001-08-01
There is a wide variety of ethical arguments for public financing of health care that share a common structure built on a series of four logically related propositions regarding: (1) the ultimate purpose of a human life or human society; (2) the role of health and its distribution in society in advancing this ultimate purpose; (3) the role of access to or utilisation of health care in maintaining or improving the desired level and distribution of health among members of society, and (4) the role of public financing in ensuring the ethically justified access to and utilisation of health care by members of society. This paper argues that economics has much to contribute to the development of the ethical foundations for publicly financed health care. It focuses in particular on recent economic work to clarify the concepts of access and need and their role in analyses of the just distribution of health care resources, and on the importance of economic analysis of health care and health care insurance markets in demonstrating why public financing is necessary to achieve broad access to and utilisation of health care services.
Complementarity between entanglement-assisted and quantum distributed random access code
NASA Astrophysics Data System (ADS)
Hameedi, Alley; Saha, Debashis; Mironowicz, Piotr; Pawłowski, Marcin; Bourennane, Mohamed
2017-05-01
Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks. However, there do exist specific cases where one outperforms the other. In this article, we study a family of 3 →1 distributed RACs [J. Bowles, N. Brunner, and M. Pawłowski, Phys. Rev. A 92, 022351 (2015), 10.1103/PhysRevA.92.022351] and present its general construction of both the QRAC and the EARAC. We demonstrate that, depending on the function of inputs that is sought, if QRAC achieves the maximal success probability then EARAC fails to do so and vice versa. Moreover, a tripartite Bell-type inequality associated with the EARAC variants reveals the genuine multipartite nonlocality exhibited by our protocol. We conclude with an experimental realization of the 3 →1 distributed QRAC that achieves higher success probabilities than the maximum possible with EARACs for a number of tasks.
Distributive justice and the introduction of generic medicines.
Rego, Guilhermina; Brandão, Cristina; Melo, Helena; Nunes, Rui
2002-01-01
All countries face the issue of choice in healthcare. Allocation of healthcare resources is clearly associated with the concept of distributive justice and to the existence of a right to healthcare. Nevertheless, there is still the question of whether this right should include all types of healthcare services or if it should be limited to selected types. It follows that choices must be made, priorities must be set and that efficiency of healthcare services should be maximum. Distributive justice aims at ensuring that everyone has access to necessary care based on the substantive ethical principles of equity and solidarity. Resource allocation is paramount in public policy particularly with regards pharmacoeconomics. The objective of this study is to determine the leading issues regarding the marketing and trade of generic medicines analysing the reasons why there are huge disparities between European countries with regards generic drugs acceptance by practitioners. Distributive justice aims at ensuring that everyone has access to reasonable care based on the ethical principles of equity and solidarity. However, universality implies always choice in access and efficiency in delivery. It follows that resource allocation is instrumental in public policy particularly with regards pharmacoeconomics. The acceptance of distributive justice as a new ethical paradigm for professional ethics implies that as long as the best interest of the patient is not at stake physicians should regard the use of generic drugs as a valid instrument to promote the efficiency of the system and therefore as a way to facilitate citizen's global access to healthcare.
Djobet, M P Ngogang; Singhe, David; Lohoue, Julienne; Kuaban, Christopher; Ngogang, Jeanne; Tambo, Ernest
2017-04-04
Evaluation of medication efficacy and safety is an essential guarantee to successful therapeutic outcome in public health practices. However, larger distribution chain supply in developing countries such as Cameroon is often challenged by counterfeit drugs, poor manufacturing, storage and degradation leading to health and patient adverse consequences. Yet, access to supply chain management in strengthening ARVs quality assurance and outcomes remains poorly documented. More than 53,000 patients have been enrolled on free ARVs medications, but little is documented on quality assurance and validity of safety for affected populations along the supply chain management since 2008. The cross sectional study was conducted in ARVs distribution units and centers in central, littoral and south west regions of Cameroon. ARVs drugs samples included Nevirapine, Efavirenz, and fixed dose combinations of Zidovudine + Lamivudine, Lamivudine + Stavudine and Zidovudine + Lamivudine + Nevirapine. Drugs packaging and labeling was assessed and galenic assays were performed at National Laboratory of quality Control of Medications and Expertise (LANACOME), Yaoundé, Cameroon. The study covered 16 structures located in eight different towns including the central ARVs store, two regional pharmaceutical procurement centers and thirteen HIV approved treatment centers and management units. A total of 35 ARVs products were collected. Only eight ARVs drugs containing Lamivudine and Stavudine presented with white stains on tablets, however these drugs were standard for all other tests performed. The others 28 ARVs products were standards to all assays performed. We concluded that ARVs drugs freely accessible and distributed to PLWHA are of good quality in Cameroon. However, with the increase number of patients under HAART since 2013, adoption of "Test and Treat" approach to reach the 90-90-90 goals and with the implementation of new national antiretroviral regimen guidelines and molecules such as boosted protease inhibitors, continuous quality control and assurance surveillance, monitoring and evaluation is recommended. Assessment of quality of formulations that are more susceptible to degradation such as pediatric formulations for averting the rising multidrug resistance trend is also desired.
2013-01-01
Universal access to antiretroviral treatment (ART) in Chad was officially declared in December 2006. This presidential initiative was and is still funded 100% by the country’s budget and external donors’ financial support. Many factors have triggered the spread of AIDS. Some of these factors include the existence of norms and beliefs that create or increase exposure, the low-level education that precludes access to health information, social unrest, and population migration to areas of high economic opportunities and gender-based discrimination. Social forces that influence the distribution of dimensions of well-being and shape risks for infection also determine the persistence of access barriers to ART. The universal access policy is quite revolutionary but should be informed by the systemic barriers to access so as to promote equity. It is not enough to distribute ARVs and provide health services when health systems are poorly organized and managed. Comprehensive access to ART raises many organizational, ethical and policy problems that need to be solved to achieve equity in access. This paper argues that the persistence of access barriers is due to weak health systems and a poor public health leadership. AIDS has challenged health systems in a manner that is essentially different from other health problems. PMID:23902732
Cluster randomized controlled trial of the plastic BioSand Water filter in Cambodia.
Stauber, C E; Printy, E R; McCarty, F A; Liang, K R; Sobsey, M D
2012-01-17
About half of the rural population of Cambodia lacks access to improved water; an even higher percentage lacks access to latrines. More than 35,000 concrete BioSand Water filters (BSF) have been installed in the country. However, the concrete BSF takes time to produce and weighs hundreds of pounds. A plastic BSF has been developed but may not perform to the same benchmarks established by its predecessor. To evaluate plastic BSF performance and health impact, we performed a cluster randomized controlled trial in 13 communities including 189 households and 1147 participants in the Angk Snoul district of Kandal Province from May to December 2008. The results suggest that villages with plastic BSFs had significantly lower concentrations of E. coli in drinking water and lower diarrheal disease (incidence rate ratio 0.41, 95% confidence interval: 0.24-0.69) compared to control villages. As one of the first studies on the plastic BSF in Cambodia, these are important findings, especially in a setting where the concrete BSF has seen high rates of continued use years after installation. The study suggests the plastic BSF may play an important role in scaling up the distribution/implementation of the BSF, potentially improving water quality and health in the region.
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
Access Control in Location-Based Services
NASA Astrophysics Data System (ADS)
Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.
Patient privacy protection using anonymous access control techniques.
Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V
2008-01-01
The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
Supporting Management of European Refugee Streams by Earth Observation and Geoinformation
NASA Astrophysics Data System (ADS)
Komp, K.-U.; Müterthies, A.
2016-06-01
The sharp increase in refugee numbers arriving in the European Union has recently caused major and manifold challenges for the member states and their administrative services. Location based situation reports and maps may support the refugee management from local to European level. The first support is mapping of the geographical distribution of migrating people which needs more or less real time data. The actual data sources are location related observations along the routes of refugees, actual satellite observations and data mining results. These tools and data are used to monitor spatial distributions as well as extrapolate the arrival of refugees for the subsequent weeks. The second support is the short term update of the location of initial registration facilities and first reception facilities, their capacities, and their occupancy. The third management level is the systematic inquiry for unoccupied housing facilities and for empty places within build-up areas. Geo-coded data sets of house numbers have to be cross-referenced with city maps and communal inhabitants address data. The legal aspects of data mining and secured access to personal data are strictly controlled by the administration allowing only limited access and distribution of data and results. However, the paper will not disclose scientific progress in Earth Observation and GIS, but will actually demonstrate an urgently needed new combination of existing methods to support actual needs. The societal benefits of EO/GIS are no longer just potential possibilities, but actual results in real political, administrative and humanitarian day to day reality.
NASA Astrophysics Data System (ADS)
Shapiro, Allen M.; Evans, Christopher E.; Hayes, Erin C.
2017-08-01
Characterizing properties of the rock matrix that control retention and release of chlorinated solvents is essential in evaluating the extent of contamination and the application of remediation technologies in fractured rock. Core samples from seven closely spaced boreholes in a mudstone subject to trichloroethene (TCE) contamination were analyzed using Mercury Intrusion Porosimetry to investigate porosity and pore size distribution as a function of mudstone characteristics, and depth and lateral extent in the aquifer; organic carbon content was also evaluated to identify the potential for adsorption. Porosity and retardation factor varied over two orders of magnitude, with the largest porosities and largest retardation factors associated with carbon-rich mudstone layers. Larger porosities were also measured in the shallow rock that has been subject to enhanced groundwater flow. Porosity also varied over more than an order of magnitude in spatially continuous mudstone layers. The analyses of the rock cores indicated that the largest pore diameters may be accessible to entry of the nonaqueous form of TCE. Although the porosity associated with the largest pore diameters is small ( 0.1%), that volume of TCE can significantly affect the total TCE that is retained in the rock matrix. The dimensions of the largest pore diameters may also be accessible to microbes responsible for reductive dechlorination; however, the small percentage of the pore space that can accommodate microbes may limit the extent of reductive dechlorination in the rock matrix.
Optical Properties of Aerosols from Long Term Ground-Based Aeronet Measurements
NASA Technical Reports Server (NTRS)
Holben, B. N.; Tanre, D.; Smirnov, A.; Eck, T. F.; Slutsker, I.; Dubovik, O.; Lavenu, F.; Abuhassen, N.; Chatenet, B.
1999-01-01
AERONET is an optical ground-based aerosol monitoring network and data archive supported by NASA's Earth Observing System and expanded by federation with many non-NASA institutions including AEROCAN (AERONET CANada) and PHOTON (PHOtometrie pour le Traiteinent Operatonnel de Normalisation Satellitaire). The network hardware consists of identical automatic sun-sky scanning spectral radiometers owned by national agencies and universities purchased for their own monitoring and research objectives. Data are transmitted hourly through the data collection system (DCS) on board the geostationary meteorological satellites GMS, GOES and METEOSAT and received in a common archive for daily processing utilizing a peer reviewed series of algorithms thus imposing a standardization and quality control of the product data base. Data from this collaboration provides globally distributed near real time observations of aerosol spectral optical depths, aerosol size distributions, and precipitable water in diverse aerosol regimes. Access to the AERONET data base has shifted from the interactive program 'demonstrat' (reserved for PI's) to the AERONET homepage allowing faster access and greater development for GIS object oriented retrievals and analysis with companion geocoded data sets from satellites, LIDAR and solar flux measurements for example. We feel that a significant yet under utilized component of the AERONET data base are inversion products made from hourly principal plane and almucanter measurements. The current inversions have been shown to retrieve aerosol volume size distributions. A significant enhancement to the inversion code has been developed and is presented in these proceedings.
Shapiro, Allen M.; Evans, Chrsitopher E.; Hayes, Erin C.
2017-01-01
Characterizing properties of the rock matrix that control retention and release of chlorinated solvents is essential in evaluating the extent of contamination and the application of remediation technologies in fractured rock. Core samples from seven closely spaced boreholes in a mudstone subject to trichloroethene (TCE) contamination were analyzed using Mercury Intrusion Porosimetry to investigate porosity and pore size distribution as a function of mudstone characteristics, and depth and lateral extent in the aquifer; organic carbon content was also evaluated to identify the potential for adsorption. Porosity and retardation factor varied over two orders of magnitude, with the largest porosities and largest retardation factors associated with carbon-rich mudstone layers. Larger porosities were also measured in the shallow rock that has been subject to enhanced groundwater flow. Porosity also varied over more than an order of magnitude in spatially continuous mudstone layers. The analyses of the rock cores indicated that the largest pore diameters may be accessible to entry of the nonaqueous form of TCE. Although the porosity associated with the largest pore diameters is small (~ 0.1%), that volume of TCE can significantly affect the total TCE that is retained in the rock matrix. The dimensions of the largest pore diameters may also be accessible to microbes responsible for reductive dechlorination; however, the small percentage of the pore space that can accommodate microbes may limit the extent of reductive dechlorination in the rock matrix.
Mújica, Oscar J; Haeberer, Mariana; Teague, Jordan; Santos-Burgoa, Carlos; Galvão, Luiz Augusto Cassanha
2015-11-01
To explore distributional inequality of key health outcomes as determined by access coverage to water and sanitation (WS) between countries in the Region of the Americas. An ecological study was designed to explore the magnitude and change-over-time of standard gap and gradient metrics of environmental inequalities in health at the country level in 1990 and 2010 among the 35 countries of the Americas. Access to drinking water and access to improved sanitation facilities were selected as equity stratifiers. Five dependent variables were: total and healthy life expectancies at birth, and infant, under-5, and maternal mortality. Access to WS correlated with survival and mortality, and strong gradients were seen in both 1990 and 2010. Higher WS access corresponded to higher life expectancy and healthy life expectancy and lower infant, under-5, and maternal mortality risks. Burden of life lost was unequally distributed, steadily concentrated among the most environmentally disadvantaged, who carried up to twice the burden than they would if WS were fairly distributed. Population averages in life expectancy and specific mortality improved, but whereas absolute inequalities decreased, relative inequalities remained mostly invariant. Even with the Region on track to meet MDG 7 on water and sanitation, large environmental gradients and health inequities among countries remain hidden by Regional averages. As the post-2015 development agenda unfolds, policies and actions focused on health equity-mainly on the most socially and environmentally deprived-will be needed in order to secure the right for universal access to water and sanitation.
Using the Fusion Proximal Area Method and Gravity Method to Identify Areas with Physician Shortages
Xiong, Xuechen; Jin, Chao; Chen, Haile; Luo, Li
2016-01-01
Objectives This paper presents a geographic information system (GIS)-based proximal area method and gravity method for identifying areas with physician shortages. The innovation of this paper is that it uses the appropriate methods to discover each type of health resource and then integrates all these methods to assess spatial access to health resources using population distribution data. In this way, spatial access to health resources for an entire city can be visualized in one neat package, which can help health policy makers quickly comprehend realistic distributions of health resources at a macro level. Methods First, classify health resources according to the trade areas of the patients they serve. Second, apply an appropriate method to each different type of health resource to measure spatial access to those resources. Third, integrate all types of access using population distribution data. Results In case study of Shanghai with the fusion method, areas with physician shortages are located primarily in suburban districts, especially in district junction areas. The result suggests that the government of Shanghai should pay more attention to these areas by investing in new or relocating existing health resources. Conclusion The fusion method is demonstrated to be more accurate and practicable than using a single method to assess spatial access to health resources. PMID:27695105
State laws on tobacco control--United States, 1998.
Fishman, J A; Allison, H; Knowles, S B; Fishburn, B A; Woollery, T A; Marx, W T; Shelton, D M; Husten, C G; Eriksen, M P
1999-06-25
State laws addressing tobacco use, the leading preventable cause of death in the United States, are summarized. Laws address smoke-free indoor air, minors' access to tobacco products, advertising of tobacco products, and excise taxes on tobacco products. Legislation effective through December 31, 1998. CDC identified laws addressing tobacco control by using an on-line legal research database. CDC's findings were verified with the National Cancer Institute's State Cancer Legislative Database. Since a previous surveillance summary on state tobacco-control laws published in November 1995 (covering legislation effective through June 30, 1995), several states have enacted new restrictions or strengthened existing legislation that addresses smoke-free indoor air, minors' access to tobacco, tobacco advertising, and tobacco taxes. Five states strengthened their smoke-free indoor air legislation. All states and Washington, D.C., continued to prohibit the sale and distribution of tobacco products to minors; however, 21 states expanded minors' access laws by designating enforcement authorities, adding license suspension or revocation for sale to minors, or requiring signage. Since the 1995 report, eight additional states (a total of 19 states and Washington, D.C.) now ban vending machines from areas accessible to minors. Thirteen states restrict advertising of tobacco products, an increase of four states since the 1995 report. Although the number of states that tax cigarettes and smokeless tobacco did not change, 13 states increased excise taxes on cigarettes, and five states increased excise taxes on smokeless tobacco products. The average state excise tax on cigarettes is 38.9 cents per pack, an increase of 7.4 cents compared with the average tax in the 1995 report. State laws addressing tobacco control vary in relation to restrictiveness, enforcement and penalties, preemptions, and exceptions. The data summarizing state tobacco-control laws are available through CDC's State Tobacco Activities Tracking and Evaluation (STATE) System; the laws are collected and updated every quarter. The STATE System also contains state-specific data on the prevalence of tobacco use, tobacco-related deaths, and the costs of tobacco use. Information from the STATE System is available for use by policy makers at the state and local levels to plan and implement initiatives to prevent and reduce tobacco use. In addition, CDC is using this information to assess the ongoing impact of tobacco-control programs and policies on tobacco use.
Failure to produce taste-aversion learning in rats exposed to static electric fields and air ions.
Creim, J A; Lovely, R H; Weigel, R J; Forsythe, W C; Anderson, L E
1995-01-01
Taste-aversion (TA) learning was measured to determine whether exposure to high-voltage direct current (HVdc) static electric fields can produce TA learning in male Long Evans rats. Fifty-six rats were randomly distributed into four groups of 14 rats each. All rats were placed on a 20 min/day drinking schedule for 12 consecutive days prior to receiving five conditioning trials. During the conditioning trials, access to 0.1% sodium saccharin-flavored water was given for 20 min, followed 30 min later by one of four treatments. Two groups of 14 rats each were individually exposed to static electric fields and air ions, one group to +75 kV/m (+2 x 10(5) air ions/cm3) and the other group to -75 kV/m (-2 x 10(5) air ions/cm3). Two other groups of 14 rats each served as sham-exposed controls, with the following variation in one of the sham-exposed groups: This group was subdivided into two subsets of seven rats each, so that a positive control group could be included to validate the experimental design. The positive control group (n = 7) was injected with cyclophosphamide 25 mg/kg, i.p., 30 min after access to saccharin-flavored water on conditioning days, whereas the other subset of seven rats was similarly injected with an equivalent volume of saline. Access to saccharin-flavored water on conditioning days was followed by the treatments described above and was alternated daily with water "recovery" sessions in which the rats received access to water for 20 min in the home cage without further treatment. Following the last water-recovery session, a 20 min, two-bottle preference test (between water and saccharin-flavored water) was administered to each group. The positive control group did show TA learning, thus validating the experimental protocol. No saccharin-flavored water was consumed in the two-bottle preference test by the cyclophosphamide-injected, sham-exposed group compared to 74% consumed by the saline-injected sham-exposed controls (P < .0001). Saccharin-preference data for the static field-exposed groups showed no TA learning compared to data for sham-exposed controls. In summary, exposure to intense static electric fields and air ions did not produce TA learning as assessed by this particular design.