Semantically Enriched Data Access Policies in eHealth.
Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin
2016-11-01
Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
Sucurovic, Snezana; Milutinovic, Veljko
2008-01-01
The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.
The E-Book: Pipe Dream or Potential Disaster?
ERIC Educational Resources Information Center
Dorman, David
1999-01-01
Discusses the development of electronic books and considers marketing and distribution, rights management, and technical standards. Economic and institutional relationships, copyrights, Extensible Markup Language (XML), access to content, free access versus fees, preservation versus loss of control over long-term storage and access, and trusted…
UNificatins and Extensions of the Multiple Access Communications Problem,
1981-07-01
Control , Stability and Waiting Time in a Slotted ALOHA Random Access System ," IEEE...quceing, them, the control procedure must tolerate a larger average number of’ messages in the system if it is to limit the number of times that the system ...running fas- ter than real time to provide some flow control for that class . The virtual clocks for every other class merely act as a "gate" which
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-16
... Notice of Information Collection for review; Electronic Bonds Online (eBonds) Access; OMB Control No... submitting the following information collection request for review and clearance in accordance [[Page 76154... information collection. (2) Title of the Form/Collection: Electronic Bonds Online (eBonds) Access. (3) Agency...
Device Oriented Project Controller
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dalesio, Leo; Kraimer, Martin
2013-11-20
This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions havemore » been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-22
... Notice of Information Collection Under Review; Electronic Bonds Online (eBonds) Access. The Department of... collection request for review and clearance in accordance with the Paperwork Reduction Act of 1995. The...) Title of the Form/Collection: Electronic Bonds Online (eBonds) Access; OMB Control No. 1653-0046. (3...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-30
... Information Collection for Review; Electronic Bonds Online (eBonds) Access; OMB Control No. 1653-0046. The... following information collection request for review and clearance in accordance with the Paperwork Reduction... Online (eBonds) Access. (3) Agency form number, if any, and the applicable component of the Department of...
Impacts of extension access and cooperative membership on technology adoption and household welfare.
Wossen, Tesfamicheal; Abdoulaye, Tahirou; Alene, Arega; Haile, Mekbib G; Feleke, Shiferaw; Olanrewaju, Adetunji; Manyong, Victor
2017-08-01
This paper examines the impacts of access to extension services and cooperative membership on technology adoption, asset ownership and poverty using household-level data from rural Nigeria. Using different matching techniques and endogenous switching regression approach, we find that both extension access and cooperative membership have a positive and statistically significant effect on technology adoption and household welfare. Moreover, we find that both extension access and cooperative membership have heterogeneous impacts. In particular, we find evidence of a positive selection as the average treatment effects of extension access and cooperative membership are higher for farmers with the highest propensity to access extension and cooperative services. The impact of extension services on poverty reduction and of cooperatives on technology adoption is significantly stronger for smallholders with access to formal credit than for those without access. This implies that expanding rural financial markets can maximize the potential positive impacts of extension and cooperative services on farmers' productivity and welfare.
Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley
2010-10-01
Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.
Denkyirah, Elisha Kwaku; Okoffo, Elvis Dartey; Adu, Derick Taylor; Aziz, Ahmed Abdul; Ofori, Amoako; Denkyirah, Elijah Kofi
2016-01-01
Pesticides are a significant component of the modern agricultural technology that has been widely adopted across the globe to control pests, diseases, weeds and other plant pathogens, in an effort to reduce or eliminate yield losses and maintain high product quality. Although pesticides are said to be toxic and exposes farmers to risk due to the hazardous effects of these chemicals, pesticide use among cocoa farmers in Ghana is still high. Furthermore, cocoa farmers do not apply pesticide on their cocoa farms at the recommended frequency of application. In view of this, the study assessed the factors influencing cocoa farmers' decision to use pesticide and frequency of pesticide application. A total of 240 cocoa farmers from six cocoa growing communities in the Brong Ahafo Region of Ghana were selected for the study using the multi-stage sampling technique. The Probit and Tobit regression models were used to estimate factors influencing farmers' decision to use pesticide and frequency of pesticide application, respectively. Results of the study revealed that the use of pesticide is still high among farmers in the Region and that cocoa farmers do not follow the Ghana Cocoa Board recommended frequency of pesticide application. In addition, cocoa farmers in the study area were found to be using both Ghana Cocoa Board approved/recommended and unapproved pesticides for cocoa production. Gender, age, educational level, years of farming experience, access to extension service, availability of agrochemical shop and access to credit significantly influenced farmers' decision to use pesticides. Also, educational level, years of farming experience, membership of farmer based organisation, access to extension service, access to credit and cocoa income significantly influenced frequency of pesticide application. Since access to extension service is one key factor that reduces pesticide use and frequency of application among cocoa farmers, it is recommended that policies by government and non-governmental organisations should be aimed at mobilizing resources towards the expansion of extension education. In addition, extension service should target younger farmers as well as provide information on alternative pest control methods in order to reduce pesticide use among cocoa farmers. Furthermore, extension service/agents should target cocoa farmers with less years of farming experience and encourage cocoa farmers to join farmer based organisations in order to decrease frequency of pesticide application.
Yi, Meng; Chen, Qingkui; Xiong, Neal N
2016-11-03
This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
Web Extensible Display Manager
DOE Office of Scientific and Technical Information (OSTI.GOV)
Slominski, Ryan; Larrieu, Theodore L.
Jefferson Lab's Web Extensible Display Manager (WEDM) allows staff to access EDM control system screens from a web browser in remote offices and from mobile devices. Native browser technologies are leveraged to avoid installing and managing software on remote clients such as browser plugins, tunnel applications, or an EDM environment. Since standard network ports are used firewall exceptions are minimized. To avoid security concerns from remote users modifying a control system, WEDM exposes read-only access and basic web authentication can be used to further restrict access. Updates of monitored EPICS channels are delivered via a Web Socket using a webmore » gateway. The software translates EDM description files (denoted with the edl suffix) to HTML with Scalable Vector Graphics (SVG) following the EDM's edl file vector drawing rules to create faithful screen renderings. The WEDM server parses edl files and creates the HTML equivalent in real-time allowing existing screens to work without modification. Alternatively, the familiar drag and drop EDM screen creation tool can be used to create optimized screens sized specifically for smart phones and then rendered by WEDM.« less
An approach to access control in electronic health record.
Sucurovic, Snezana
2010-08-01
OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.
Yi, Meng; Chen, Qingkui; Xiong, Neal N.
2016-01-01
This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-14
... a TWIC and a voluntary customer satisfaction survey. DATES: Send your comments by August 15, 2011. A... identification verification and access control. TSA also conducts a survey to capture worker overall satisfaction...
78 FR 27472 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... Approved For Collection And Use: Airfield lighting and vault. Runway 21 extension--preliminary design...--80 facility modification design and build-out. Access control enhancements. Security fence replacement. Airfield pavement survey. Jet bridge refurbishment. Security checkpoint modification. Friction...
Integrating Software Modules For Robot Control
NASA Technical Reports Server (NTRS)
Volpe, Richard A.; Khosla, Pradeep; Stewart, David B.
1993-01-01
Reconfigurable, sensor-based control system uses state variables in systematic integration of reusable control modules. Designed for open-architecture hardware including many general-purpose microprocessors, each having own local memory plus access to global shared memory. Implemented in software as extension of Chimera II real-time operating system. Provides transparent computing mechanism for intertask communication between control modules and generic process-module architecture for multiprocessor realtime computation. Used to control robot arm. Proves useful in variety of other control and robotic applications.
The Cybersecurity Challenge in Acquisition
2016-04-30
problems. Scarier yet, another group took control of a car’s computers through a cellular telephone and Bluetooth connections and could access...did more extensive work, hacking their way into a 2009 midsize car through its cellular, Bluetooth , and other wireless connections. Stefan Savage, a
Framework and prototype for a secure XML-based electronic health records system.
Steele, Robert; Gardner, William; Chandra, Darius; Dillon, Tharam S
2007-01-01
Security of personal medical information has always been a challenge for the advancement of Electronic Health Records (EHRs) initiatives. eXtensible Markup Language (XML), is rapidly becoming the key standard for data representation and transportation. The widespread use of XML and the prospect of its use in the Electronic Health (e-health) domain highlights the need for flexible access control models for XML data and documents. This paper presents a declarative access control model for XML data repositories that utilises an expressive XML role control model. The operational semantics of this model are illustrated by Xplorer, a user interface generation engine which supports search-browse-navigate activities on XML repositories.
Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng
2016-10-12
Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.
Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng
2016-01-01
Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel. PMID:27754316
Information Search Behaviors of Indian Farmers: Implications for Extension Services
ERIC Educational Resources Information Center
Glendenning, Claire J.; Babu, Suresh C.; Asenso-Okyere, Kwadwo
2012-01-01
Purpose: In India, a national survey conducted in 2003 showed that only 40% of farmers accessed extension. But little is known of the characteristics of farmers who did not access extension. However, this understanding is needed in order to target approaches to farmers, who differ in their access and use of information, that is their information…
SNX -- Starlink Extensions to the NCAR Graphics Utilities
NASA Astrophysics Data System (ADS)
Rees, P. C. T.; Bly, M. J.; Wallace, P. T.
The NCAR graphics suite (SUN/88) consists of a set of subprograms which can be used to produce complete graphs in a variety of formats. The package has been in wide use for some years; the latest version employs the ISO standard GKS interfaces for its low-level plotting, giving it access to all Starlink graphics devices, present and future. The NCAR routines themselves are thoroughly documented, and just a few simple calls will produce graphs of excellent appearance. The package also provides a high level of flexibility, with dozens of different details of the plot independently controllable to give exactly the result required. However, beginners may be daunted by the mass of features offered, and unless they take the extreme step of reading the manual may give up before they realise what the package can do for them. This document describes minor extensions which provide more convenient access to certain features without sacrificing flexibility. The AUTOGRAPH part of the NCAR suite, used in conjunction with the Starlink NCAR extensions and the Starlink low level plotting package SGS (SUN/85), offers an alternative high level system to PGPLOT (SUN/15) for producing graphs of one variable plotted against another. All of the Starlink extensions provided within SNX enhance the power of the facilities provided by AUTOGRAPH and make it more accessible to the beginner.
Parallel Systems Laboratory: Access, Allocation, and Control
1992-06-30
boog Eae...4d READ ISTRUCTIONSREPORT DOCUMENTATIO PAGE BEFOR COMPLETNG FORM I. REPORT NUMNER 2. GOVT ACCESSION NO 3- RECIPINT’S CATALOG NUMR9 . TITLE (an...a summary of the salient results of this research in capsule form which is followed by an extensive list of publications, dissertations and theses...because it provides the asymptotic use of currently wasted cycles. To do so, we examine a distribution of w(u It) in a very simple form and for
7. VIEW NORTHWEST OF 'ISLAND' (TOWER OR SUPERSTRUCTURE) ON THE ...
7. VIEW NORTHWEST OF 'ISLAND' (TOWER OR SUPERSTRUCTURE) ON THE DECK OF THE AIRCRAFT CARRIER JOHN F. KENNEDY. WHEN THE PHOTOGRAPH WAS TAKEN IN SEPTEMBER 1994, THE KENNEDY WAS IN DRY-DOCK FOR REFURBISHMENT UNDER THE 'SERVICE LIFE EXTENSION PROGRAM (SLEP). THE 'ISLAND' HOUSES THE SHIP'S BRIDGE AND A CONTROL CENTER FOR AIRCRAFT OPERATIONS. EXTENSIVE SCAFFOLDING WAS REQUIRED TO ALLOW FULL ACCESS TO THE PAINTERS AND TECHNICIANS WORKING HERE. - Naval Base Philadelphia-Philadelphia Naval Shipyard, Dry Dock No. 5, League Island, Philadelphia, Philadelphia County, PA
Hettich, Robert L.; Pan, Chongle; Chourey, Karuna; Giannone, Richard J.
2013-01-01
Summary The availability of extensive genome information for many different microbes, including unculturable species in mixed communities from environmental samples, has enabled systems-biology interrogation by providing a means to access genomic, transcriptomic, and proteomic information. To this end, metaproteomics exploits the power of high performance mass spectrometry for extensive characterization of the complete suite of proteins expressed by a microbial community in an environmental sample. PMID:23469896
Extending MAM5 Meta-Model and JaCalIV E Framework to Integrate Smart Devices from Real Environments.
Rincon, J A; Poza-Lujan, Jose-Luis; Julian, V; Posadas-Yagüe, Juan-Luis; Carrascosa, C
2016-01-01
This paper presents the extension of a meta-model (MAM5) and a framework based on the model (JaCalIVE) for developing intelligent virtual environments. The goal of this extension is to develop augmented mirror worlds that represent a real and virtual world coupled, so that the virtual world not only reflects the real one, but also complements it. A new component called a smart resource artifact, that enables modelling and developing devices to access the real physical world, and a human in the loop agent to place a human in the system have been included in the meta-model and framework. The proposed extension of MAM5 has been tested by simulating a light control system where agents can access both virtual and real sensor/actuators through the smart resources developed. The results show that the use of real environment interactive elements (smart resource artifacts) in agent-based simulations allows to minimize the error between simulated and real system.
Extending MAM5 Meta-Model and JaCalIV E Framework to Integrate Smart Devices from Real Environments
2016-01-01
This paper presents the extension of a meta-model (MAM5) and a framework based on the model (JaCalIVE) for developing intelligent virtual environments. The goal of this extension is to develop augmented mirror worlds that represent a real and virtual world coupled, so that the virtual world not only reflects the real one, but also complements it. A new component called a smart resource artifact, that enables modelling and developing devices to access the real physical world, and a human in the loop agent to place a human in the system have been included in the meta-model and framework. The proposed extension of MAM5 has been tested by simulating a light control system where agents can access both virtual and real sensor/actuators through the smart resources developed. The results show that the use of real environment interactive elements (smart resource artifacts) in agent-based simulations allows to minimize the error between simulated and real system. PMID:26926691
NASA Astrophysics Data System (ADS)
Cinquini, L.; Bell, G. M.; Williams, D.; Harney, J.
2012-12-01
The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing state-of-the-art services for the management and access of Earth system data. ESGF is currently used to serve the totality of the model output used for the forthcoming IPCC 5th assessment report on climate change, as well as supporting observational and reanalysis datasets. Also, it is been adopted by several other projects that focus on global, regional and local climate modeling. The ESGF software stack is composed of several modular applications that cover related but disjoint areas of functionality: data publishing, data search and discovery, data access, user management, security, and federation. Overall, the ESGF infrastructure offers a configurable end-to-end solution to the problem of enabling web-based access to large amounts of geospatial data. This talk will present the architectural and configuration options that are available to a data provider leveraging ESGF to serve their data: which services to expose, how to scale to larger data collections, how to establish access control, how to customize the user interface, and others. Additionally, the framework provides extension points that allow each site to plug in custom functionality such as crawling of specific metadata repositories, exposing domain-specific analysis and visualization services, developing custom access clients that interact with the system APIs. These configuration and extension capabilities are based on simple but effective domain-specific object models, that underpin the software applications: the data model, the security model, and the federation model. The ESGF software stack is developed collaboratively by software engineers at many institutions around the world, and is made freely available to the community under an open source license to promote adoption, reuse, inspection and continuous improvement.
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2014 CFR
2014-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2013 CFR
2013-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2012 CFR
2012-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2011 CFR
2011-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio
2011-11-01
We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.
Open-label extension studies: do they provide meaningful information on the safety of new drugs?
Day, Richard O; Williams, Kenneth M
2007-01-01
The number of open-label extension studies being performed has increased enormously in recent years. Often it is difficult to differentiate between these extension studies and the double-blind, controlled studies that preceded them. If undertaken primarily to gather more patient-years of exposure to the new drug in order to understand and gain confidence in its safety profile, open-label extension studies can play a useful and legitimate role in drug development and therapeutics. However, this can only occur if the open-label extension study is designed, executed, analysed and reported competently. Most of the value accrued in open-label extension studies is gained from a refinement in the perception of the expected incidence of adverse effects that have most likely already been identified as part of the preclinical and clinical trial programme. We still have to rely heavily on post-marketing safety surveillance systems to alert us to type B (unpredictable) adverse reactions because open-label extension studies are unlikely to provide useful information about these types of often serious and relatively rare adverse reactions. Random allocation into test and control groups is needed to produce precise incidence data on pharmacologically expected, or type A, adverse effects. Some increased confidence about incidence rates might result from the open-label extension study; however, as these studies are essentially uncontrolled and biased, the data are not of great value. Other benefits have been proposed to be gained from open-label extension studies. These include ongoing access to an effective but otherwise unobtainable medicine by the volunteers who participated in the phase III pivotal trials. However, there are unappreciated ethical issues about the appropriateness of enrolling patients whose response to previous treatment is uncertain, largely because treatment allocation in the preceding randomised, double-blind, controlled trial has not been revealed at the time of entry into the open-label extension study. Negative aspects of open-label extension studies revolve around their use as a marketing tool, as they build a market for the drug and generate pressure for subsidised access to the drug from consumers and their physicians. Consumers, institutions where these studies are conducted and research ethics committees need to be convinced of the motives, as well as the quality, of the open-label extension study and its execution before supporting such studies. Open-label extension studies do have a legitimate but limited place in the clinical development of new medicines. The negative perceptions about these studies have arisen because of perversion of acceptable rationales for this type of study and a failure to recognise (or disclose) the limitations resulting from the inherent weaknesses in their design. Increased human exposure to a new medicine under reasonably controlled circumstances to increase confidence in the safety of the medicine is an acceptable rationale for an open-label extension study, and a useful activity to increase the knowledge of the safety profile of a new medicine. However, this goal is increasingly being achieved by means other than open-label extension studies.
An object oriented Python interface for atomistic simulations
NASA Astrophysics Data System (ADS)
Hynninen, T.; Himanen, L.; Parkkinen, V.; Musso, T.; Corander, J.; Foster, A. S.
2016-01-01
Programmable simulation environments allow one to monitor and control calculations efficiently and automatically before, during, and after runtime. Environments directly accessible in a programming environment can be interfaced with powerful external analysis tools and extensions to enhance the functionality of the core program, and by incorporating a flexible object based structure, the environments make building and analysing computational setups intuitive. In this work, we present a classical atomistic force field with an interface written in Python language. The program is an extension for an existing object based atomistic simulation environment.
Gender Differences in Access to Extension Services and Agricultural Productivity
ERIC Educational Resources Information Center
Ragasa, Catherine; Berhane, Guush; Tadesse, Fanaye; Taffesse, Alemayehu Seyoum
2013-01-01
Purpose: This article contributes new empirical evidence and nuanced analysis on the gender difference in access to extension services and how this translates to observed differences in technology adoption and agricultural productivity. Approach: It looks at the case of Ethiopia, where substantial investments in the extension system have been…
A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment
2008-12-01
always light at the end of the tunnel . Last but not less, the author would like to share the success of the completion of this thesis research...modern clients (e.g. Blackberries , iPhones, tactical digital assistants like the TACTICOMP), wikis do not require extensive user training or loading of
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-08
...: Exchange Programs Alumni Web Site Registration ACTION: Notice of request for public comment. SUMMARY: The... following methods: Web: Persons with access to the Internet may use the Federal Docket Management System... Programs Alumni Web site Registration OMB Control Number: 1405-0192 Type of Request: Extension of an...
A software for managing after-hours activities in research user facilities
Camino, F. E.
2017-05-01
Here, we present an afterhours activity management program for shared facilities, which handles the processes required for afterhours access (request, approval, extension, etc.). It implements the concept of permitted afterhours activities, which consists of a list of well-defined activities that each user can perform afterhours. The program provides an easy and unambiguous way for users to know which activities they are allowed to perform afterhours. In addition, the program can enhance its safety efficacy by interacting with lab and instrument access control systems commonly present in user facilities.
A new data collaboration service based on cloud computing security
NASA Astrophysics Data System (ADS)
Ying, Ren; Li, Hua-Wei; Wang, Li na
2017-09-01
With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.
A software for managing after-hours activities in research user facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Camino, F. E.
Here, we present an afterhours activity management program for shared facilities, which handles the processes required for afterhours access (request, approval, extension, etc.). It implements the concept of permitted afterhours activities, which consists of a list of well-defined activities that each user can perform afterhours. The program provides an easy and unambiguous way for users to know which activities they are allowed to perform afterhours. In addition, the program can enhance its safety efficacy by interacting with lab and instrument access control systems commonly present in user facilities.
RBAC-Matrix-based EMR right management system to improve HIPAA compliance.
Lee, Hung-Chang; Chang, Shih-Hsin
2012-10-01
Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-12
... DEPARTMENT OF AGRICULTURE Forest Service Extension of the Comment Period: The Village at Wolf Creek Access Project Draft Environmental Impact Statement AGENCY: Forest Service, USDA. ACTION... (USFS), Rio Grande National Forest announces the extension of the comment period for the Village at Wolf...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-20
... DEPARTMENT OF COMMERCE International Trade Administration [C-580-851] Dynamic Random Access Memory Semiconductors from the Republic of Korea: Extension of Time Limit for Preliminary Results of Countervailing Duty... access memory semiconductors from the Republic of Korea, covering the period January 1, 2008 through...
A software architecture for multidisciplinary applications: Integrating task and data parallelism
NASA Technical Reports Server (NTRS)
Chapman, Barbara; Mehrotra, Piyush; Vanrosendale, John; Zima, Hans
1994-01-01
Data parallel languages such as Vienna Fortran and HPF can be successfully applied to a wide range of numerical applications. However, many advanced scientific and engineering applications are of a multidisciplinary and heterogeneous nature and thus do not fit well into the data parallel paradigm. In this paper we present new Fortran 90 language extensions to fill this gap. Tasks can be spawned as asynchronous activities in a homogeneous or heterogeneous computing environment; they interact by sharing access to Shared Data Abstractions (SDA's). SDA's are an extension of Fortran 90 modules, representing a pool of common data, together with a set of Methods for controlled access to these data and a mechanism for providing persistent storage. Our language supports the integration of data and task parallelism as well as nested task parallelism and thus can be used to express multidisciplinary applications in a natural and efficient way.
Shipboard Calibration Network Extension Utilizing COTS Products
2014-09-01
to emulate the MCS system console. C. KEYBOARD VIDEO AND MOUSE (KVM) SWITCH A ServSwitch Wizard IP Plus KVM switch is used to allow remote access...9 C. KEYBOARD VIDEO AND MOUSE (KVM) SWITCH .......................... 10 D. ROUTER...mechanical, and electrical KVM Keyboard Video and Mouse LAN Local Area Network MCS Machinery Control Systems NIST National Institute of Standards and
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-26
...] Access to Employee Exposure and Medical Records; Extension of the Office of Management and Budget's (OMB... Regulation on Access to Employee Exposure and Medical Records (29 CFR 1910.1020). DATES: Comments must be... operating small businesses, and to reduce to the maximum extent feasible unnecessary duplication of efforts...
2014-06-01
Even well- controlled laboratory testing saw a range of COV from less than 10 percent to over 500 percent for different steels (Tryon & Cruse...identified. This 6-year limit is driven by concerns about corrosion fatigue , a process initiated by water gaining access to the carbon steel of the shaft...physics and is controlled by different parameters and interactions of the many variables involved. Figure 2 depicts the corrosion fatigue sequence of
Hopewell, Sally; Boutron, Isabelle; Altman, Douglas G; Barbour, Ginny; Moher, David; Montori, Victor; Schriger, David; Cook, Jonathan; Gerry, Stephen; Omar, Omar; Dutton, Peter; Roberts, Corran; Frangou, Eleni; Clifton, Lei; Chiocchia, Virginia; Rombach, Ines; Wartolowska, Karolina; Ravaud, Philippe
2016-11-28
The CONSORT Statement is an evidence-informed guideline for reporting randomised controlled trials. A number of extensions have been developed that specify additional information to report for more complex trials. The aim of this study was to evaluate the impact of using a simple web-based tool (WebCONSORT, which incorporates a number of different CONSORT extensions) on the completeness of reporting of randomised trials published in biomedical publications. We conducted a parallel group randomised trial. Journals which endorsed the CONSORT Statement (i.e. referred to it in the Instruction to Authors) but do not actively implement it (i.e. require authors to submit a completed CONSORT checklist) were invited to participate. Authors of randomised trials were requested by the editor to use the web-based tool at the manuscript revision stage. Authors registering to use the tool were randomised (centralised computer generated) to WebCONSORT or control. In the WebCONSORT group, they had access to a tool allowing them to combine the different CONSORT extensions relevant to their trial and generate a customised checklist and flow diagram that they must submit to the editor. In the control group, authors had only access to a CONSORT flow diagram generator. Authors, journal editors, and outcome assessors were blinded to the allocation. The primary outcome was the proportion of CONSORT items (main and extensions) reported in each article post revision. A total of 46 journals actively recruited authors into the trial (25 March 2013 to 22 September 2015); 324 author manuscripts were randomised (WebCONSORT n = 166; control n = 158), of which 197 were reports of randomised trials (n = 94; n = 103). Over a third (39%; n = 127) of registered manuscripts were excluded from the analysis, mainly because the reported study was not a randomised trial. Of those included in the analysis, the most common CONSORT extensions selected were non-pharmacologic (n = 43; n = 50), pragmatic (n = 20; n = 16) and cluster (n = 10; n = 9). In a quarter of manuscripts, authors either wrongly selected an extension or failed to select the right extension when registering their manuscript on the WebCONSORT study site. Overall, there was no important difference in the overall mean score between WebCONSORT (mean score 0.51) and control (0.47) in the proportion of CONSORT and CONSORT extension items reported pertaining to a given study (mean difference, 0.04; 95% CI -0.02 to 0.10). This study failed to show a beneficial effect of a customised web-based CONSORT checklist to help authors prepare more complete trial reports. However, the exclusion of a large number of inappropriately registered manuscripts meant we had less precision than anticipated to detect a difference. Better education is needed, earlier in the publication process, for both authors and journal editorial staff on when and how to implement CONSORT and, in particular, CONSORT-related extensions. ClinicalTrials.gov: NCT01891448 [registered 24 May 2013].
Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs
NASA Astrophysics Data System (ADS)
Zhu, Yanfeng; Niu, Zhisheng
Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.
New features in the design code Tlie
NASA Astrophysics Data System (ADS)
van Zeijts, Johannes
1993-12-01
We present features recently installed in the arbitrary-order accelerator design code Tlie. The code uses the MAD input language, and implements programmable extensions modeled after the C language that make it a powerful tool in a wide range of applications: from basic beamline design to high precision-high order design and even control room applications. The basic quantities important in accelerator design are easily accessible from inside the control language. Entities like parameters in elements (strength, current), transfer maps (either in Taylor series or in Lie algebraic form), lines, and beams (either as sets of particles or as distributions) are among the type of variables available. These variables can be set, used as arguments in subroutines, or just typed out. The code is easily extensible with new datatypes.
Rowan, L.C.; Offield, T.W.; Watson, R.D.; Cannon, P.J.; Grolier, H.J.; Pohn, H.A.; Watson, Kenneth
1970-01-01
Field Sites have been selected for controlled experiments to analyze physical and chemical parameters affecting the response of electromagnetic radiation to geological materials. Considerations in the selection of the sites are the availability of good exposures of nearly monomineralic rocks, level of geologic understanding, and ease of access. Seven sites, where work is underway or planned, contain extensive outcrops of the following rocks: stanstone, limestone, dolomite, and gypsum. Field measurement of quartz have been conducted at four sites.
78 FR 16502 - Emergency Access Advisory Committee; Announcement of Charter Extension
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
... FEDERAL COMMUNICATIONS COMMISSION [DA 13-28 and DA 13-331] Emergency Access Advisory Committee; Announcement of Charter Extension AGENCY: Federal Communications Commission. ACTION: Notice; correction. SUMMARY: In this document, the Federal Communication Commission (FCC) is correcting a notice that appeared...
Implementing a Data Quality Strategy to Simplify Access to Data
NASA Astrophysics Data System (ADS)
Druken, K. A.; Trenham, C. E.; Evans, B. J. K.; Richards, C. J.; Wang, J.; Wyborn, L. A.
2016-12-01
To ensure seamless programmatic access for data analysis (including machine learning), standardization of both data and services is vital. At the Australian National Computational Infrastructure (NCI) we have developed a Data Quality Strategy (DQS) that currently provides processes for: (1) the consistency of data structures in the underlying High Performance Data (HPD) platform; (2) quality control through compliance with recognized community standards; and (3) data quality assurance through demonstrated functionality across common platforms, tools and services. NCI hosts one of Australia's largest repositories (10+ PBytes) of research data collections spanning datasets from climate, coasts, oceans and geophysics through to astronomy, bioinformatics and the social sciences. A key challenge is the application of community-agreed data standards to the broad set of Earth systems and environmental data that are being used. Within these disciplines, data span a wide range of gridded, ungridded (i.e., line surveys, point clouds), and raster image types, as well as diverse coordinate reference projections and resolutions. By implementing our DQS we have seen progressive improvement in the quality of the datasets across the different subject domains, and through this, the ease by which the users can programmatically access the data, either in situ or via web services. As part of its quality control procedures, NCI has developed a compliance checker based upon existing domain standards. The DQS also includes extensive Functionality Testing which include readability by commonly used libraries (e.g., netCDF, HDF, GDAL, etc.); accessibility by data servers (e.g., THREDDS, Hyrax, GeoServer), validation against scientific analysis and programming platforms (e.g., Python, Matlab, QGIS); and visualization tools (e.g., ParaView, NASA Web World Wind). These tests ensure smooth interoperability between products and services as well as exposing unforeseen requirements and dependencies. The results provide an important component of quality control within the DQS as well as clarifying the requirement for any extensions to the relevant standards that help support the uptake of data by broader international communities.
Providing Internet Access to High-Resolution Lunar Images
NASA Technical Reports Server (NTRS)
Plesea, Lucian
2008-01-01
The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.
Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications
Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan
2016-01-01
In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666
Secure Embedded System Design Methodologies for Military Cryptographic Systems
2016-03-31
Fault- Tree Analysis (FTA); Built-In Self-Test (BIST) Introduction Secure access-control systems restrict operations to authorized users via methods...failures in the individual software/processor elements, the question of exactly how unlikely is difficult to answer. Fault- Tree Analysis (FTA) has a...Collins of Sandia National Laboratories for years of sharing his extensive knowledge of Fail-Safe Design Assurance and Fault- Tree Analysis
Skull base tumors: a kaleidoscope of challenge.
Khanna, J N; Natrajan, Srivalli; Galinde, Jyotsna
2014-08-01
Resection of skull base lesions has always been riddled with problems like inadequate access, proximity to major vessels, dural tears, cranial nerve damage, and infection. Understanding the modular concept of the facial skeleton has led to the development of transfacial swing osteotomies that facilitates resection in a difficult area with minimal morbidity and excellent cosmetic results. In spite of the current trend toward endonasal endoscopic management of skull base tumors, our series presents nine cases of diverse extensive skull base lesions, 33% of which were recurrent. These cases were approached through different transfacial swing osteotomies through the mandible, a midfacial swing, or a zygomaticotemporal osteotomy as dictated by the three-dimensional spatial location of the lesion, and its extent and proximity to vital structures. Access osteotomies ensured complete removal and good results through the most direct and safe route and good vascular control. This reiterated the fact that transfacial approaches still hold a special place in the management of extensive skull base lesions.
Skull Base Tumors: A Kaleidoscope of Challenge
Khanna, J.N.; Natrajan, Srivalli; Galinde, Jyotsna
2014-01-01
Resection of skull base lesions has always been riddled with problems like inadequate access, proximity to major vessels, dural tears, cranial nerve damage, and infection. Understanding the modular concept of the facial skeleton has led to the development of transfacial swing osteotomies that facilitates resection in a difficult area with minimal morbidity and excellent cosmetic results. In spite of the current trend toward endonasal endoscopic management of skull base tumors, our series presents nine cases of diverse extensive skull base lesions, 33% of which were recurrent. These cases were approached through different transfacial swing osteotomies through the mandible, a midfacial swing, or a zygomaticotemporal osteotomy as dictated by the three-dimensional spatial location of the lesion, and its extent and proximity to vital structures. Access osteotomies ensured complete removal and good results through the most direct and safe route and good vascular control. This reiterated the fact that transfacial approaches still hold a special place in the management of extensive skull base lesions. PMID:25083368
Cross-modal prediction changes the timing of conscious access during the motion-induced blindness.
Chang, Acer Y C; Kanai, Ryota; Seth, Anil K
2015-01-01
Despite accumulating evidence that perceptual predictions influence perceptual content, the relations between these predictions and conscious contents remain unclear, especially for cross-modal predictions. We examined whether predictions of visual events by auditory cues can facilitate conscious access to the visual stimuli. We trained participants to learn associations between auditory cues and colour changes. We then asked whether congruency between auditory cues and target colours would speed access to consciousness. We did this by rendering a visual target subjectively invisible using motion-induced blindness and then gradually changing its colour while presenting congruent or incongruent auditory cues. Results showed that the visual target gained access to consciousness faster in congruent than in incongruent trials; control experiments excluded potentially confounding effects of attention and motor response. The expectation effect was gradually established over blocks suggesting a role for extensive training. Overall, our findings show that predictions learned through cross-modal training can facilitate conscious access to visual stimuli. Copyright © 2014 Elsevier Inc. All rights reserved.
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
NASA Astrophysics Data System (ADS)
Li, Fengjun; Luo, Bo; Liu, Peng; Squicciarini, Anna C.; Lee, Dongwon; Chu, Chao-Hsien
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and secure information sharing. However, most of the solutions proposed so far are built atop of conventional data warehousing or distributed database technologies.
A CyberCIEGE Traffic Analysis Extension for Teaching Network Security
2011-12-01
Information Technology LAN Local Area Network MAADNET Military Academy Attack/Defense Network MAC Media Access Control MMORPG Massively...ready to launch its latest massively multiplayer online role-playing game ( MMORPG ) “SyberSIEGE”! The product is currently in the final stages of...achieve his goal, this approach will still allow Tina to meet her goals and avoid disruptions to existing operations, which is also what would have
Rural household chicken management and challenges in the Upper River Region of the Gambia.
Olaniyan, Olawale Festus; Camara, Samba
2018-06-23
Systematic assessment and documentation of extensive livestock production systems are necessary to design or review breeding programs, extension services, and policies. This study therefore examined management practices and challenges concerning village chicken production in the Upper River Region of the Gambia. The data gathered with 45-variable semi-structured questionnaires were analyzed based on the household head's education status and gender. Illiteracy level was high, and only 38% indicated that they attended certain schools. There was a significant relationship (p < 0.05) and phi coefficient of 0.35 between household heads' education status and record keeping. None of the examined management practices had a statistically significant relationship (p > 0.05) with household heads' gender. Children (10-14 years) were mostly responsible for providing care to the chickens. Foundation and replacement stocks were mainly acquired through purchase (78%). Many households (74%) indicated supplementary feeding of their flocks but only 34% provided separate houses apart from the household dwellings. Newcastle (68%) was the most common disease. Sick birds were recognized by restlessness (34%) and diarrhea (28%). External parasites were mainly controlled through local practices (52%) while the most common way to dispose dead birds was to throw them away (88%). Up to 90% indicated no formal training on disease management and access to extension agents was also low (20%). Control of chicken movement was occasionally done to protect birds from predators (60%) and then, to avoid contagious diseases (38%). Individual farmers and their associations need to be supported by stakeholders to access relevant information and uptake improved management techniques.
Access control and confidentiality in radiology
NASA Astrophysics Data System (ADS)
Noumeir, Rita; Chafik, Adil
2005-04-01
A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.
Quality of Extension Advice: A Gendered Case Study from Ghana and Sri Lanka
ERIC Educational Resources Information Center
Lamontagne-Godwin, Julien; Williams, Frances; Bandara, Willoru Mudiyansele Palitha Thilakasiri; Appiah-Kubi, Ziporah
2017-01-01
Purpose: Women farmers have less access to extension services than male farmers, even though they make up almost half of the global agricultural workforce. Gender-focused international development programmes have focused on how ensuring women receive better access to advice. However, the quality of the technical advice and the service women…
Universal access to electricity in Burkina Faso: scaling-up renewable energy technologies
NASA Astrophysics Data System (ADS)
Moner-Girona, M.; Bódis, K.; Huld, T.; Kougias, I.; Szabó, S.
2016-08-01
This paper describes the status quo of the power sector in Burkina Faso, its limitations, and develops a new methodology that through spatial analysis processes with the aim to provide a possible pathway for universal electricity access. Following the SE4All initiative approach, it recommends the more extensive use of distributed renewable energy systems to increase access to electricity on an accelerated timeline. Less than 5% of the rural population in Burkina Faso have currently access to electricity and supply is lacking at many social structures such as schools and hospitals. Energy access achievements in Burkina Faso are still very modest. According to the latest SE4All Global Tracking Framework (2015), the access to electricity annual growth rate in Burkina Faso from 2010 to 2012 is 0%. The rural electrification strategy for Burkina Faso is scattered in several electricity sector development policies: there is a need of defining a concrete action plan. Planning and coordination between grid extension and the off-grid electrification programme is essential to reach a long-term sustainable energy model and prevent high avoidable infrastructure investments. This paper goes into details on the methodology and findings of the developed Geographic Information Systems tool. The aim of the dynamic planning tool is to provide support to the national government and development partners to define an alternative electrification plan. Burkina Faso proves to be paradigm case for the methodology as its national policy for electrification is still dominated by grid extension and the government subsidising fossil fuel electricity production. However, the results of our analysis suggest that the current grid extension is becoming inefficient and unsustainable in order to reach the national energy access targets. The results also suggest that Burkina Faso’s rural electrification strategy should be driven local renewable resources to power distributed mini-grids. We find that this approach would connect more people to power more quickly, and would reduce fossil fuel use that would otherwise be necessary for grid extension options.
Health and agricultural productivity: Evidence from Zambia.
Fink, Günther; Masiye, Felix
2015-07-01
We evaluate the productivity effects of investment in preventive health technology through a randomized controlled trial in rural Zambia. In the experiment, access to subsidized bed nets was randomly assigned at the community level; 516 farmers were followed over a one-year farming period. We find large positive effects of preventative health investment on productivity: among farmers provided with access to free nets, harvest value increased by US$ 76, corresponding to about 14.7% of the average output value. While only limited information was collected on farming inputs, shifts in the extensive and the intensive margins of labor supply appear to be the most likely mechanism underlying the productivity improvements observed. Copyright © 2015 Elsevier B.V. All rights reserved.
E-Control: First Public Release of Remote Control Software for VLBI Telescopes
NASA Technical Reports Server (NTRS)
Neidhardt, Alexander; Ettl, Martin; Rottmann, Helge; Ploetz, Christian; Muehlbauer, Matthias; Hase, Hayo; Alef, Walter; Sobarzo, Sergio; Herrera, Cristian; Himwich, Ed
2010-01-01
Automating and remotely controlling observations are important for future operations in a Global Geodetic Observing System (GGOS). At the Geodetic Observatory Wettzell, in cooperation with the Max-Planck-Institute for Radio Astronomy in Bonn, a software extension to the existing NASA Field System has been developed for remote control. It uses the principle of a remotely accessible, autonomous process cell as a server extension for the Field System. The communication is realized for low transfer rates using Remote Procedure Calls (RPC). It uses generative programming with the interface software generator idl2rpc.pl developed at Wettzell. The user interacts with this system over a modern graphical user interface created with wxWidgets. For security reasons the communication is automatically tunneled through a Secure Shell (SSH) session to the telescope. There are already successful test observations with the telescopes at O Higgins, Concepcion, and Wettzell. At Wettzell the software is already used routinely for weekend observations. Therefore the first public release of the software is now available, which will also be useful for other telescopes.
Bothamley, Graham H; Lange, Christoph
2017-11-01
Europe has the highest documented caseload and greatest increase in multidrug and extensively drug-resistant tuberculosis (M/XDR-TB) of all World Health Organization (WHO) regions. This survey examines how recommendations for M/XDR-TB management are being implemented. TBNET is a pan-European clinical research collaboration for tuberculosis. An email survey of TBNET members collected data in relation to infection control, access to molecular tests and basic microbiology with drug sensitivity testing. 68/105 responses gave valid information and were from countries within the WHO European Region. Inpatient beds matched demand, but single rooms with negative pressure were only available in low incidence countries; ultraviolet decontamination was used in 5 sites, all with >10 patients with M/XDR-TB per year. Molecular tests for mutations associated with rifampicin resistance were widely available (88%), even in lower income and especially in high incidence countries. Molecular tests for other first line and second line drugs were less accessible (76 and 52% respectively). A third of physicians considered that drug susceptibility results were delayed by > 2 months. Infection control for inpatients with M/XDR-TB remains a problem in high incidence countries. Rifampicin resistance is readily detected, but tests to plan regimens tailored to the drug susceptibilities of the strain of Mycobacterium tuberculosis are significantly delayed, allowing for further drug resistance to develop. Copyright © 2017 Elsevier Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-09
... broadband ISPs, a term which includes broadband Internet access service providers and broadband backbone... Internet consumers and businesses that purchase Internet access through less traditional access arrangements (e.g., prepaid Internet access cards). 23. Some broadband ISPs provide Internet access directly...
Watts, Sharon A; Roush, Laura; Julius, Mary; Sood, Ajay
2016-06-01
An increasing number of patients with diabetes mellitus has created a need for innovative delivery of specialized care not only by diabetes specialists but also by primary care providers (PCPs) as well. A potential avenue to address this need is training of PCPs by specialists via telehealth. The Veteran Affairs (VA) Specialty Care Access Network-Extension for Community Healthcare Outcomes (SCAN-ECHO) program includes education and case-based learning for PCPs by a multidisciplinary specialty team utilizing videoconferencing technology. Two PCPs completed a year of SCAN-ECHO diabetes training. These two PCPs set up "diabetes mini-clinics" to treat difficult-to-control high-risk patients with diabetes mellitus from their own panel and from their colleagues in the same community-based outpatient clinic (CBOC). We utilized a retrospective program evaluation by t-test using pre/post glycated hemoglobin (HbA1c) lab values after being seen by the two PCPs. A total of 39 patients, all with HbA1c > 9.0%, were seen in the two PCP mini-clinics over 15 months. The mean HbA1c improved from 10.2 ± 1.4% to 8.4 ± 1.8% (p < 0.001) over the average follow-up period of five months. This was not explained by system-wide changes or improvements. Care of veteran patients with poorly controlled diabetes by PCPs who participated in SCAN-ECHO program leads to improvement in glycemic control. This model of health care delivery can be effective in remote or rural areas with limited availability of specialists. © The Author(s) 2015.
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
Pang, Liaojun; Yang, Jie; Jiang, Zhengtao
2014-01-01
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time. In this paper, we survey the basic ABE scheme and its two variants: the key-policy ABE (KP-ABE) scheme and the ciphertext-policy ABE (CP-ABE) scheme. We also pay attention to other researches relating to the ABE schemes, including multiauthority, user/attribute revocation, accountability, and proxy reencryption, with an extensive comparison of their functionality and performance. Finally, possible future works and some conclusions are pointed out. PMID:25101313
Public opinion on media presence in the courthouse.
Fusco, Nina Marie; Sabourin, Michel
2012-01-01
Very little attention has been devoted to the public's opinion of media coverage of court cases despite extensive research on pretrial publicity (PTP). Following a provincial judgment to restrict media access in Quebec courthouses, a preliminary unpublished study found that the public was largely in support of these restrictions. The present study sought to expand on this finding in a more widely generalizable sample. Subjects were recruited from continuing education classes and completed a questionnaire that assessed their support for restricting journalists in courthouses. Nearly 80% of the 243 participants supported media restrictions. Although participants in the four experimental conditions and one of the control groups were largely in favor of the restrictions, one control group was opposed to the restrictions. The results suggest that the public prefers that journalists have restricted access to courtroom participants, resonating research on PTP and the Supreme Court's decision on the case. Copyright © 2011 Elsevier Ltd. All rights reserved.
Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
Wang, Shangping; Zhao, Duqiao; Zhang, Yaling
2017-01-01
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.
ERIC Educational Resources Information Center
Hatley, Leshell April Denise
2016-01-01
Today, most young people in the United States (U.S.) live technology-saturated lives. Their educational, entertainment, and career options originate from and demand incredible technological innovations. However, this extensive ownership of and access to technology does not indicate that today's youth know how technology works or how to control and…
Access to pedestrian roads, daily activities, and physical performance of adolescents.
Sjolie, A N
2000-08-01
A cross-sectional study using a questionnaire and physical tests was performed. To study how access to pedestrian roads and daily activities are related to low back strength, low back mobility, and hip mobility in adolescents. Although many authorities express concern about the passive lifestyle of adolescents, little is known about associations between daily activities and physical performance. This study compared 38 youths in a community lacking access to pedestrian roads with 50 youths in nearby area providing excellent access to pedestrian roads. A standardized questionnaire was used to obtain data about pedestrian roads, school journeys, and activities from the local authorities and the pupils. Low back strength was tested as static endurance strength, low back mobility by modified Schober techniques, and hip mobility by goniometer. For statistical analyses, a P value of 0.05 or less determined significance. In the area using school buses, the pupils had less low back extension, less hamstring flexibility, and less hip abduction, flexion, and extension than pupils in the area with pedestrian roads. Multivariate analyses showed no associations between walking or bicycling to school and anatomic function, but regular walking or bicycling to leisure-time activities associated positively with low back strength, low back extension, hip flexion, and extension. Distance by school bus associated negatively with hip abduction, hip flexion, hip extension, and hamstring flexibility (P<0.001). Time spent on television or computer associated negatively but insignificantly with low back strength, hamstring flexibility, hip abduction, and flexion (P<0.1). The results indicate that access to pedestrian roads and other lifestyle factors are associated with physical performance.
Hybrid Teaching in Extension: Learning at the Crossroads
ERIC Educational Resources Information Center
Hino, Jeff; Kahn, Cub
2016-01-01
Extension clients' learning preferences are changing, with many increasingly going online for educational content. In response, Oregon State University Extension pilot tested a training program for Extension educators to explore hybrid teaching--a methodology that could provide more flexible access to a wider audience. Hybrid teaching offers a…
NASA Astrophysics Data System (ADS)
Stevens, T.; Olsen, L. M.; Ritz, S.; Morahan, M.; Aleman, A.; Cepero, L.; Gokey, C.; Holland, M.; Cordova, R.; Areu, S.; Cherry, T.; Tran-Ho, H.
2012-12-01
Discovering Earth science data can be complex if the catalog holding the data lacks structure. Controlled keyword vocabularies within metadata catalogues can improve data discovery. NASA's Global Change Master Directory's (GCMD) Keyword Management System (KMS) is a recently released a RESTful web service for managing and providing access to controlled keywords (science keywords, service keywords, platforms, instruments, providers, locations, projects, data resolution, etc.). The KMS introduces a completely new paradigm for the use and management of the keywords and allows access to these keywords as SKOS Concepts (RDF), OWL, standard XML, and CSV. A universally unique identifier (UUID) is automatically assigned to each keyword, which uniquely identifies each concept and its associated information. A component of the KMS is the keyword manager, an internal tool that allows GCMD science coordinators to manage concepts. This includes adding, modifying, and deleting broader, narrower, or related concepts and associated definitions. The controlled keyword vocabulary represents over 20 years of effort and collaboration with the Earth science community. The maintenance, stability, and ongoing vigilance in maintaining mutually exclusive and parallel keyword lists is important for a "normalized" search and discovery, and provides a unique advantage for the science community. Modifications and additions are made based on community suggestions and internal review. To help maintain keyword integrity, science keyword rules and procedures for modification of keywords were developed. This poster will highlight the use of the KMS as a beneficial service for the stewardship and access of the GCMD keywords. Users will learn how to access the KMS and utilize the keywords. Best practices for managing an extensive keyword hierarchy will also be discussed. Participants will learn the process for making keyword suggestions, which subsequently help in building a controlled keyword vocabulary to improve earth science data discovery and access.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robinson Khosah
2007-07-31
Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analyticalmore » tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project was conducted in two phases. Phase One included the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two involved the development of a platform for on-line data analysis. Phase Two included the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now technically completed.« less
NASA Astrophysics Data System (ADS)
Gries, C.; Read, J. S.; Winslow, L. A.; Hanson, P. C.; Weathers, K. C.
2014-12-01
The Global Lake Ecological Observatory Network (GLEON) is an international community of scientists, educators and citizens with the mission to conduct innovative science by sharing and interpreting high-resolution sensor data to understand, predict and communicate the role and response of lakes in a changing global environment. During its almost ten years of existence and continual growth, GLEON has inspired innovative science, new modeling approaches, and accumulated extensive experience in the management of streaming, high resolution, and large volume data. However, a recent 'data task force' identified inhibiting data infrastructure issues, including providing access to data, discovering distributed data, and integrating data into useful data products for scientific research and management. Accordingly, in support of the complete data lifecycle, tools are being developed by the GLEON community and integrated with innovative technology from other groups to improve environmental observations data management in the broader community. Specifically we will discuss raw data handling with tools developed by the Consortium of Universities for the Advancement of Hydrologic Sciences (CUAHSI, Observation Data Model and DataLoader), quality control practices using a newly developed R package (sensorQC), data access with HydroDesktop, or webservices delivering WaterML, data analysis with the R package rLakeAnalyzer, and final storage of the quality controlled, harmonized and value added data product in a DataONE member node. Such data product is then discoverable, accessible for new analyses and citable in subsequent publications. Leveraging GLEON's organizational structure, community trust, extensive experience, and technological talent the goal is to develop a design and implementation plan for a data publishing and sharing system that will address not only GLEON's needs, but also those of other environmental research communities.
Thermal area effectiveness for future aircraft
NASA Technical Reports Server (NTRS)
Happ, W. W.
1975-01-01
Problem areas in airport planning, design, and operations identified by a decision matrix developed to display various airport functions interfaced with facilities and an extensive literature survey were investigated. Areas considered include: site selection and growth potential; emissions and noise control/containment for airports; financial and legal aspects of airport planning, contruction, and operation; intra-airport transportation and other passenger flow facilitators; simulation and modeling for airports; guidelines for airport multimodal access planning. Results are summarized and a bibliography is included.
1999-10-01
analgesics has also been extensively researched. Miranda and Paeile (1989) reported a minireview of the interactions between calcium channel blockers and...1990). Interactions between analgesics and calcium channel blockers. General Pharmacology, 21, 171-174. Peikert, A., Wilimzig, C., & Kohne-Volland, R...important actions of magnesium that relates to this study is the regulation of calcium access into the cell and the actions of calcium inside the cell
Gans, Kim M; Gorham, Gemma; Risica, Patricia M; Dulin-Keita, Akilah; Dionne, Laura; Gao, Tina; Peters, Sarah; Principato, Ludovica
2016-06-28
Adequate fruit and vegetable (F&V) intake is important for disease prevention. Yet, most Americans, especially low-income and racial/ethnic minorities, do not eat adequate amounts. These disparities are partly attributable to food environments in low-income neighborhoods where residents often have limited access to affordable, healthful food and easy access to inexpensive, unhealthful foods. Increasing access to affordable healthful food in underserved neighborhoods through mobile markets is a promising, year-round strategy for improving dietary behaviors and reducing F&V intake disparities. However, to date, there have been no randomized controlled trials studying their effectiveness. The objective of the 'Live Well, Viva Bien' (LWVB) cluster randomized controlled trial is to evaluate the efficacy of a multicomponent mobile market intervention at increasing F&V intake among residents of subsidized housing complexes. One housing complex served as a pilot site for the intervention group and the remaining 14 demographically-matched sites were randomized into either the intervention or control group. The intervention group received bimonthly, discount, mobile, fresh F&V markets in conjunction with a nutrition education intervention (two F&V campaigns, newsletters, DVDs and cooking demonstrations) for 12 months. The control group received physical activity and stress reduction interventions. Outcome measures include F&V intake (measured by two validated F&V screeners at baseline, six-month and twelve-months) along with potential psychosocial mediating variables. Extensive quantitative and qualitative process evaluation was also conducted throughout the study. Modifying neighborhood food environments in ways that increase access to affordable, healthful food is a promising strategy for improving dietary behaviors among low-income, racial and ethnic minority groups at increased risk for obesity and other food-related chronic diseases. Discount, mobile F&V markets address all the major barriers to eating more F&V (high cost, poor quality, limited access and limited time to shop and cook) and provide a year-round solution to limited access to healthful food in low-income neighborhoods. LWVB is the first randomized controlled trial evaluating the effectiveness of mobile markets at increasing F&V intake. If proven efficacious at increasing F&V consumption, LWVB could be disseminated widely to neighborhoods that have low access to fresh F&V. Clinicatrials.gov registration number: NCT02669472 First Received: January 19, 2016.
WebSat--a web software for microsatellite marker development.
Martins, Wellington Santos; Lucas, Divino César Soares; Neves, Kelligton Fabricio de Souza; Bertioli, David John
2009-01-01
Simple sequence repeats (SSR), also known as microsatellites, have been extensively used as molecular markers due to their abundance and high degree of polymorphism. We have developed a simple to use web software, called WebSat, for microsatellite molecular marker prediction and development. WebSat is accessible through the Internet, requiring no program installation. Although a web solution, it makes use of Ajax techniques, providing a rich, responsive user interface. WebSat allows the submission of sequences, visualization of microsatellites and the design of primers suitable for their amplification. The program allows full control of parameters and the easy export of the resulting data, thus facilitating the development of microsatellite markers. The web tool may be accessed at http://purl.oclc.org/NET/websat/
Hay, Simon I.; Rogers, David J.; Toomer, Jonathan F.; Snow, Robert W.
2011-01-01
This paper presents the results of an extensive search of the formal and informal literature on annual Plasmodium falciparum entomological inoculation rates (EIR) across Africa from 1980 onwards. It first describes how the annual EIR data were collated, summarized, neo-referenced and staged for public access on the internet. Problems of data standardization, reporting accuracy and the subsequent publishing of information on the internet follow. The review was conducted primarily to investigate the spatial heterogeneity of malaria exposure in Africa and supports the idea of highly heterogeneous risk at the continental, regional and country levels. The implications for malaria control of the significant spatial (and seasonal) variation in exposure to infected mosquito bites are discussed. PMID:10897348
Open-Access Physical Activity Programs for Older Adults: A Pragmatic and Systematic Review.
Balis, Laura E; Strayer, Thomas; Ramalingam, NithyaPriya; Wilson, Meghan; Harden, Samantha M
2018-01-10
Open-access, community-based programs are recommended to assist older adults in meeting physical activity guidelines, but the characteristics, impact, and scalability of these programs is less understood. The Land-Grant University Cooperative Extension System, an organization providing education through county-based educators, functions as a delivery system for these programs. A systematic review was conducted to determine characteristics of effective older adult physical activity programs and the extent to which programs delivered in Extension employ these characteristics. A systematic review of peer-reviewed and grey literature was conducted from August 2016 to February 2017. The review was limited to open-access (available to all), community-based physical activity interventions for older adults (≥65 years of age). The peer-reviewed literature search was conducted in PubMed and EBSCOhost; the grey literature search for Extension interventions was conducted through Extension websites, Land-Grant Impacts, and the Journal of Extension. Sixteen peer-reviewed studies and 17 grey literature sources met inclusion criteria and were analyzed. Peer-reviewed and Extension programs were similar in their limited use of behavioral theories and group-based strategies. Compared to Extension programs, those in the peer-reviewed literature were more likely to use a combination of physical activity components and be delivered by trained professionals. The results indicate notable differences between peer-reviewed literature and Extension programs and present an opportunity for Extension programs to more effectively use evidence-based program characteristics, including behavioral theories and group dynamics, a combination of physical activity components, and educator/agent-trained delivery agents. © The Author(s) 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Microprocessor-controlled, wide-range streak camera
DOE Office of Scientific and Technical Information (OSTI.GOV)
Amy E. Lewis, Craig Hollabaugh
Bechtel Nevada/NSTec recently announced deployment of their fifth generation streak camera. This camera incorporates many advanced features beyond those currently available for streak cameras. The arc-resistant driver includes a trigger lockout mechanism, actively monitors input trigger levels, and incorporates a high-voltage fault interrupter for user safety and tube protection. The camera is completely modular and may deflect over a variable full-sweep time of 15 nanoseconds to 500 microseconds. The camera design is compatible with both large- and small-format commercial tubes from several vendors. The embedded microprocessor offers Ethernet connectivity, and XML [extensible markup language]-based configuration management with non-volatile parameter storagemore » using flash-based storage media. The camera’s user interface is platform-independent (Microsoft Windows, Unix, Linux, Macintosh OSX) and is accessible using an AJAX [asynchronous Javascript and XML]-equipped modem browser, such as Internet Explorer 6, Firefox, or Safari. User interface operation requires no installation of client software or browser plug-in technology. Automation software can also access the camera configuration and control using HTTP [hypertext transfer protocol]. The software architecture supports multiple-simultaneous clients, multiple cameras, and multiple module access with a standard browser. The entire user interface can be customized.« less
Microprocessor-controlled wide-range streak camera
NASA Astrophysics Data System (ADS)
Lewis, Amy E.; Hollabaugh, Craig
2006-08-01
Bechtel Nevada/NSTec recently announced deployment of their fifth generation streak camera. This camera incorporates many advanced features beyond those currently available for streak cameras. The arc-resistant driver includes a trigger lockout mechanism, actively monitors input trigger levels, and incorporates a high-voltage fault interrupter for user safety and tube protection. The camera is completely modular and may deflect over a variable full-sweep time of 15 nanoseconds to 500 microseconds. The camera design is compatible with both large- and small-format commercial tubes from several vendors. The embedded microprocessor offers Ethernet connectivity, and XML [extensible markup language]-based configuration management with non-volatile parameter storage using flash-based storage media. The camera's user interface is platform-independent (Microsoft Windows, Unix, Linux, Macintosh OSX) and is accessible using an AJAX [asynchronous Javascript and XML]-equipped modem browser, such as Internet Explorer 6, Firefox, or Safari. User interface operation requires no installation of client software or browser plug-in technology. Automation software can also access the camera configuration and control using HTTP [hypertext transfer protocol]. The software architecture supports multiple-simultaneous clients, multiple cameras, and multiple module access with a standard browser. The entire user interface can be customized.
2014-01-01
Background Policies that improve access to healthy, affordable foods may improve population health and reduce health disparities. In the United States most food access policy research focuses on urban communities even though residents of rural communities face disproportionately higher risk for nutrition-related chronic diseases compared to residents of urban communities. The purpose of this study was to (1) identify the factors associated with access to healthy, affordable food in rural communities in the United States; and (2) prioritize a meaningful and feasible rural food policy research agenda. Methods This study was conducted by the Rural Food Access Workgroup (RFAWG), a workgroup facilitated by the Nutrition and Obesity Policy Research and Evaluation Network. A national sample of academic and non-academic researchers, public health and cooperative extension practitioners, and other experts who focus on rural food access and economic development was invited to complete a concept mapping process that included brainstorming the factors that are associated with rural food access, sorting and organizing the factors into similar domains, and rating the importance of policies and research to address these factors. As a last step, RFAWG members convened to interpret the data and establish research recommendations. Results Seventy-five participants in the brainstorming exercise represented the following sectors: non-extension research (n = 27), non-extension program administration (n = 18), “other” (n = 14), policy advocacy (n = 10), and cooperative extension service (n = 6). The brainstorming exercise generated 90 distinct statements about factors associated with rural food access in the United States; these were sorted into 5 clusters. Go Zones were established for the factors that were rated highly as both a priority policy target and a priority for research. The highest ranked policy and research priorities include strategies designed to build economic viability in rural communities, improve access to federal food and nutrition assistance programs, improve food retail systems, and increase the personal food production capacity of rural residents. Respondents also prioritized the development of valid and reliable research methodologies to measure variables associated with rural food access. Conclusions This collaborative, trans-disciplinary, participatory process, created a map to guide and prioritize research about polices to improve healthy, affordable food access in rural communities. PMID:24919425
Johnson, Donna B; Quinn, Emilee; Sitaker, Marilyn; Ammerman, Alice; Byker, Carmen; Dean, Wesley; Fleischhacker, Sheila; Kolodinsky, Jane; Pinard, Courtney; Pitts, Stephanie B Jilcott; Sharkey, Joseph
2014-06-12
Policies that improve access to healthy, affordable foods may improve population health and reduce health disparities. In the United States most food access policy research focuses on urban communities even though residents of rural communities face disproportionately higher risk for nutrition-related chronic diseases compared to residents of urban communities. The purpose of this study was to (1) identify the factors associated with access to healthy, affordable food in rural communities in the United States; and (2) prioritize a meaningful and feasible rural food policy research agenda. This study was conducted by the Rural Food Access Workgroup (RFAWG), a workgroup facilitated by the Nutrition and Obesity Policy Research and Evaluation Network. A national sample of academic and non-academic researchers, public health and cooperative extension practitioners, and other experts who focus on rural food access and economic development was invited to complete a concept mapping process that included brainstorming the factors that are associated with rural food access, sorting and organizing the factors into similar domains, and rating the importance of policies and research to address these factors. As a last step, RFAWG members convened to interpret the data and establish research recommendations. Seventy-five participants in the brainstorming exercise represented the following sectors: non-extension research (n = 27), non-extension program administration (n = 18), "other" (n = 14), policy advocacy (n = 10), and cooperative extension service (n = 6). The brainstorming exercise generated 90 distinct statements about factors associated with rural food access in the United States; these were sorted into 5 clusters. Go Zones were established for the factors that were rated highly as both a priority policy target and a priority for research. The highest ranked policy and research priorities include strategies designed to build economic viability in rural communities, improve access to federal food and nutrition assistance programs, improve food retail systems, and increase the personal food production capacity of rural residents. Respondents also prioritized the development of valid and reliable research methodologies to measure variables associated with rural food access. This collaborative, trans-disciplinary, participatory process, created a map to guide and prioritize research about polices to improve healthy, affordable food access in rural communities.
Farmer Experience of Pluralistic Agricultural Extension, Malawi
ERIC Educational Resources Information Center
Chowa, Clodina; Garforth, Chris; Cardey, Sarah
2013-01-01
Purpose: Malawi's current extension policy supports pluralism and advocates responsiveness to farmer demand. We investigate whether smallholder farmers' experience supports the assumption that access to multiple service providers leads to extension and advisory services that respond to the needs of farmers. Design/methodology/approach: Within a…
Grand Forks - East Grand Forks Urban Water Resources Study. Flood Control Appendix.
1981-07-01
Reach 4) is served by an extensive network of roads 4 ,! and railroads. U.S. Highway -2, Demers Avenue, and Minnesota Avenue pro- vide easy access to...their current focus of employment and social activity. It would require the construction of a new transportation and utility network at immense local...115 205 (1) See figure 4. (2) Outside study area; not to be devoped . Table 2 - Estimated peak runoff 10-year frequency Peak flow Existing Future
[Endovascular interventions for multiple trauma].
Kinstner, C; Funovics, M
2014-09-01
In recent years interventional radiology has significantly changed the management of injured patients with multiple trauma. Currently nearly all vessels can be reached within a reasonably short time with the help of specially preshaped catheters and guide wires to achieve bleeding control of arterial und venous bleeding. Whereas bleeding control formerly required extensive open surgery, current interventional methods allow temporary vessel occlusion (occlusion balloons), permanent embolization and stenting. In injured patients with multiple trauma preinterventional procedural planning is performed with the help of multidetector computed tomography whenever possible. Interventional radiology not only allows minimization of therapeutic trauma but also a considerably shorter treatment time. Interventional bleeding control has developed into a standard method in the management of vascular trauma of the chest and abdomen as well as in vascular injuries of the upper and lower extremities when open surgical access is associated with increased risk. Additionally, pelvic trauma, vascular trauma of the superior thoracic aperture and parenchymal arterial lacerations of organs that can be at least partially preserved are primarily managed by interventional methods. In an interdisciplinary setting interventional radiology provides a safe and efficient means of rapid bleeding control in nearly all vascular territories in addition to open surgical access.
Women's Access to Agricultural Extension Services in Botswana.
ERIC Educational Resources Information Center
Bettles, F. M.
Extension services to women in rural Botswana, particularly emphasized since the women's extension program began in 1975, must take into account constraints faced by female farmers, as past development processes have concentrated on male perceptions of concern (the beef industry, modernizing the economy). In Botswana, agriculture has traditionally…
WebSat ‐ A web software for microsatellite marker development
Martins, Wellington Santos; Soares Lucas, Divino César; de Souza Neves, Kelligton Fabricio; Bertioli, David John
2009-01-01
Simple sequence repeats (SSR), also known as microsatellites, have been extensively used as molecular markers due to their abundance and high degree of polymorphism. We have developed a simple to use web software, called WebSat, for microsatellite molecular marker prediction and development. WebSat is accessible through the Internet, requiring no program installation. Although a web solution, it makes use of Ajax techniques, providing a rich, responsive user interface. WebSat allows the submission of sequences, visualization of microsatellites and the design of primers suitable for their amplification. The program allows full control of parameters and the easy export of the resulting data, thus facilitating the development of microsatellite markers. Availability The web tool may be accessed at http://purl.oclc.org/NET/websat/ PMID:19255650
Lopez-Iturri, Peio; Aguirre, Erik; Trigo, Jesús Daniel; Astrain, José Javier; Azpilicueta, Leyre; Serrano, Luis; Villadangos, Jesús; Falcone, Francisco
2018-01-29
In the context of hospital management and operation, Intensive Care Units (ICU) are one of the most challenging in terms of time responsiveness and criticality, in which adequate resource management and signal processing play a key role in overall system performance. In this work, a context aware Intensive Care Unit is implemented and analyzed to provide scalable signal acquisition capabilities, as well as to provide tracking and access control. Wireless channel analysis is performed by means of hybrid optimized 3D Ray Launching deterministic simulation to assess potential interference impact as well as to provide required coverage/capacity thresholds for employed transceivers. Wireless system operation within the ICU scenario, considering conventional transceiver operation, is feasible in terms of quality of service for the complete scenario. Extensive measurements of overall interference levels have also been carried out, enabling subsequent adequate coverage/capacity estimations, for a set of Zigbee based nodes. Real system operation has been tested, with ad-hoc designed Zigbee wireless motes, employing lightweight communication protocols to minimize energy and bandwidth usage. An ICU information gathering application and software architecture for Visitor Access Control has been implemented, providing monitoring of the Boxes external doors and the identification of visitors via a RFID system. The results enable a solution to provide ICU access control and tracking capabilities previously not exploited, providing a step forward in the implementation of a Smart Health framework.
A dedicated database system for handling multi-level data in systems biology.
Pornputtapong, Natapol; Wanichthanarak, Kwanjeera; Nilsson, Avlant; Nookaew, Intawat; Nielsen, Jens
2014-01-01
Advances in high-throughput technologies have enabled extensive generation of multi-level omics data. These data are crucial for systems biology research, though they are complex, heterogeneous, highly dynamic, incomplete and distributed among public databases. This leads to difficulties in data accessibility and often results in errors when data are merged and integrated from varied resources. Therefore, integration and management of systems biological data remain very challenging. To overcome this, we designed and developed a dedicated database system that can serve and solve the vital issues in data management and hereby facilitate data integration, modeling and analysis in systems biology within a sole database. In addition, a yeast data repository was implemented as an integrated database environment which is operated by the database system. Two applications were implemented to demonstrate extensibility and utilization of the system. Both illustrate how the user can access the database via the web query function and implemented scripts. These scripts are specific for two sample cases: 1) Detecting the pheromone pathway in protein interaction networks; and 2) Finding metabolic reactions regulated by Snf1 kinase. In this study we present the design of database system which offers an extensible environment to efficiently capture the majority of biological entities and relations encountered in systems biology. Critical functions and control processes were designed and implemented to ensure consistent, efficient, secure and reliable transactions. The two sample cases on the yeast integrated data clearly demonstrate the value of a sole database environment for systems biology research.
Howard, Larry L
2014-09-01
As the demand for publicly funded health care continues to rise in the U.S., there is increasing pressure on state governments to ensure patient access through adjustments in provider compensation policies. This paper longitudinally examines the fees that states paid physicians for services covered by the Medicaid program over the period 1998-2004. Controlling for an extensive set of economic and health care industry characteristics, the elasticity of states' Medicaid fees, with respect to Medicare fees, is estimated to be in the range of 0.2-0.7 depending on the type of physician service examined. The findings indicate a significant degree of price competition between the Medicaid and Medicare programs for physician services that is more pronounced for cardiology and critical care, but not hospital care. The results also suggest several policy levers that work to either increase patient access or reduce total program costs through changes in fees.
Information needs related to extension service and community outreach.
Bottcher, Robert W
2003-06-01
Air quality affects everyone. Some people are affected by air quality impacts, regulations, and technological developments in several ways. Stakeholders include the medical community, ecologists, government regulators, industries, technology providers, academic professionals, concerned citizens, the news media, and elected officials. Each of these groups may perceive problems and opportunities differently, but all need access to information as it is developed. The diversity and complexity of air quality problems contribute to the challenges faced by extension and outreach professionals who must communicate with stakeholders having diverse backgrounds. Gases, particulates, biological aerosols, pathogens, and odors all require expensive and relatively complex technology to measure and control. Economic constraints affect the ability of regulators and others to measure air quality, and industry and others to control it. To address these challenges, while communicating air quality research results and concepts to stakeholders, three areas of information needs are evident. (1) A basic understanding of the fundamental concepts regarding air pollutants and their measurement and control is needed by all stakeholders; the Extension Specialist, to be effective, must help people move some distance up the learning curve. (2) Each problem or set of problems must be reasonably well defined since comprehensive solution of all problems simultaneously may not be feasible; for instance, the solution of an odor problem associated with animal production may not address atmospheric effects due to ammonia emissions. (3) The integrity of the communication process must be preserved by avoiding prejudice and protectionism; although stakeholders may seek to modify information to enhance their interests, extension and outreach professionals must be willing to present unwelcome information or admit to a lack of information. A solid grounding in fundamental concepts, careful and fair problem definition, and a resolute commitment to integrity and credibility will enable effective communication of air quality information to and among diverse stakeholders.
Network accessibility & the evoluation of urban employment.
DOT National Transportation Integrated Search
2011-06-01
This research examines the impact of accessibility on the growth of employment centers in the : Los Angeles Region between 1980 and 2000. There is extensive empirical documentation of : polycentricity the presence of multiple concentrations of em...
Coherent forward scattering as a signature of Anderson metal-insulator transitions
NASA Astrophysics Data System (ADS)
Ghosh, Sanjib; Miniatura, Christian; Cherroret, Nicolas; Delande, Dominique
2017-04-01
We show that the coherent forward scattering (CFS) interference peak amplitude sharply jumps from zero to a finite value upon crossing a metal-insulator transition. Extensive numerical simulations reveal that the CFS peak contrast obeys the one-parameter scaling hypothesis and gives access to the critical exponents of the transition. We also discover that the critical CFS peak directly controls the spectral compressibility at the transition where eigenfunctions are multifractal, and we demonstrate the universality of this property with respect to various types of disorder.
Infection control in hemodialysis units: a quick access to essential elements.
Karkar, Ayman; Bouhaha, Betty Mandin; Dammang, Mienalyn Lim
2014-05-01
Infection is the most common cause of hospitalization and the second most common cause of mortality among hemodialysis (HD) patients, after cardiovascular disease. HD patients as well as the dialysis staff are vulnerable to contracting health-care-associated infections (HAIs) due to frequent and prolonged exposure to many possible contaminants in the dialysis environment. The extracorporeal nature of the therapy, the associated common environmental conditions and the immune compromised status of HD patients are major predisposing factors. The evident increased potential for transmission of infections in the HD settings led to the creation and implementation of specific and stricter infection prevention and control measures in addition to the usual standard precautions. Different international organizations have generated guidelines and recommendations on infection prevention and control for implementation in the HD settings. These include the Centers for Disease Control and Prevention (CDC), the Association of Professionals in Infection Control (APIC), the Kidney Disease Outcomes Quality Initiative (K/DOQI), the European Best Practice Guidelines/European Renal Best Practice (EBPG/ERBP) and the Kidney Disease: Improving Global Outcomes (KDIGO). However, these guidelines are extensive and sometimes vary among different guideline-producing bodies. Our aim in this review is to facilitate the access, increase the awareness and encourage implementation among dialysis providers by reviewing, extracting and comparing the essential elements of guidelines and recommendations on infection prevention and control in HD units.
Garmakhany, Amir Daraei; Kashaninejad, Mahdi; Aalami, Mehran; Maghsoudlou, Yahya; Khomieri, Mortza; Tabil, Lope G
2014-06-01
In recent decades, bioconversion of lignocellulosic biomass to biofuel (ethanol and biodiesel) has been extensively investigated. The three main chemical constituents of biomass are cellulose, hemicellulose and lignin. Cellulose and hemicellulose are polysaccharides of primarily fermentable sugars, glucose and xylose respectively. Hemicellulose also includes small fermentable fractions of arabinose, galactose and mannose. The main issue in converting lignocellulosic biomass to fuel ethanol is the accessibility of the polysaccharides for enzymatic breakdown into monosaccharides. This study focused on the use of steam explosion as the pretreatment method for canola straw as lignocellulosic biomass. Result showed that steam explosion treatment of biomass increased cellulose accessibility and it hydrolysis by enzyme hydrolysis. Following 72 h of enzyme hydrolysis, a maximum cellulose conversion to glucose yield of 29.40% was obtained for the steam-exploded sample while the control showed 11.60% glucose yields. Steam explosion pretreatment increased glucose production and glucose yield by 200% and 153.22%, respectively, compared to the control sample. The crystalline index increased from 57.48% in untreated canola straw to 64.72% in steam-exploded samples. Steam explosion pretreatment of biomass increased cellulose accessibility, and enzymatic hydrolysis increased glucose production and glucose yield of canola straw. © 2013 Society of Chemical Industry.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robinson P. Khosah; Frank T. Alex
2007-02-11
Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analyticalmore » tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase One includes the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two, which is currently underway, involves the development of a platform for on-line data analysis. Phase Two includes the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its forty-eighth month of development activities.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robinson P. Khosah; Charles G. Crawford
2006-02-11
Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analyticalmore » tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase One includes the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two, which is currently underway, involves the development of a platform for on-line data analysis. Phase Two includes the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its forty-second month of development activities.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robinson P. Khosah; Charles G. Crawford
Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analyticalmore » tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase 1, which is currently in progress and will take twelve months to complete, will include the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. In Phase 2, which will be completed in the second year of the project, a platform for on-line data analysis will be developed. Phase 2 will include the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its eleventh month of Phase 1 development activities.« less
ERIC Educational Resources Information Center
Posthumus, Erin E.; Barnett, LoriAnne; Crimmins, Theresa M.; Kish, George R.; Sheftall, Will; Stancioff, Esperanza; Warren, Peter
2013-01-01
Extension, with its access to long-term volunteers, has the unique ability to teach citizen scientists about the connection between climate variability and the resulting effects on plants, animals, and thus, humans. The USA National Phenology Network's Nature's Notebook on-line program provides a science learning tool for Extension's Master…
Strategies for Accommodating Extension Clients Who Face Language, Vision, or Hearing Challenges
ERIC Educational Resources Information Center
Angima, Sam; Etuk, Lena; Maddy, Deborah
2016-01-01
Extension services nationwide seek to equalize access to university resources for all learners. In this article, we focus on accommodation as a tool of our trade. We discuss findings and implications from a study that documented approaches used by one state's Extension professionals to accommodate clients who face language, vision, or hearing…
Structure of choline oxidase in complex with the reaction product glycine betaine.
Salvi, Francesca; Wang, Yuan-Fang; Weber, Irene T; Gadda, Giovanni
2014-02-01
Choline oxidase from Arthrobacter globiformis, which is involved in the biosynthesis of glycine betaine from choline, has been extensively characterized in its mechanistic and structural properties. Despite the knowledge gained on the enzyme, the details of substrate access to the active site are not fully understood. The `loop-and-lid' mechanism described for the glucose-methanol-choline enzyme superfamily has not been confirmed for choline oxidase. Instead, a hydrophobic cluster on the solvent-accessible surface of the enzyme has been proposed by molecular dynamics to control substrate access to the active site. Here, the crystal structure of the enzyme was solved in complex with glycine betaine at pH 6.0 at 1.95 Å resolution, allowing a structural description of the ligand-enzyme interactions in the active site. This structure is the first of choline oxidase in complex with a physiologically relevant ligand. The protein structures with and without ligand are virtually identical, with the exception of a loop at the dimer interface, which assumes two distinct conformations. The different conformations of loop 250-255 define different accessibilities of the proposed active-site entrance delimited by the hydrophobic cluster on the other subunit of the dimer, suggesting a role in regulating substrate access to the active site.
Challenges in Obtaining Property Access: The FUSRAP Maywood Site Experience - 13433
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kollar, William
2013-07-01
The Formerly Utilized Sites Remedial Action Program (FUSRAP) is the US government program started in 1974 to identify, investigate and clean up or control sites that became contaminated as a result of the nation's early atomic programs. Many of these sites are not owned by the federal government and therefore require owner permission to enter. The experience in pursuing such access at the FUSRAP Maywood Superfund Site (the Maywood Site or the Site) in Bergen County, New Jersey, is extensive. Since the US Army Corps of Engineers (the Corps) assumed responsibility for the Maywood Site from the US Department ofmore » Energy in 1997, at least 186 separate property access agreements (known in FUSRAP as a Real Estate Right-of- Entry or ROE) have been executed between the Corps and approximately 55 different land owners and tenant occupants at the Maywood Site (agreement renewals with the same owners over time account for the difference). Maywood's experience during the Corps' tenure, reflected here in three case studies of representative property access efforts, offers some lessons and best practices that may apply to other remedial programs. While the Site Community Relations Manager (the author of this paper) managed the property access task, multi-disciplinary support from across the project was also critical to success in this endeavor. (authors)« less
Telecommunications access--matching available technologies to people with physical disabilities.
Nguyen, Toan; Garrett, Rob; Downing, Andrew; Walker, Lloyd; Hobbs, David
2006-03-01
People with a disability do not have equitable access to the modern telecommunication medium. Many experience difficulty typing, handling the phone, dialling or answering calls. For those who are unable to speak, the only option is to type messages using whatever functional control site exists on their body. The provision of accessible mobile phones for people with disabilities can significantly improve their quality of life through an increased range of accessible activities, and can improve their independence, safety, security and self-esteem. This research was aimed at providing practical ways for people with a disability to participate in the extensive community of home and mobile phone users. The outcomes of ten participants taking part in the evaluation and trial of off-the-shelf telecommunication options are presented. Nine out of ten participants showed high to very high results in terms of their overall performance and satisfaction with the use of the telecommunication equipment provided. With the right policies, processes and support through equipment matching, education, training and delivery, current off-the-shelf solutions can help people with disabilities to effectively communicate with other members of our society and to access the same range of information systems and services enjoyed by able-bodied members of the community.
Split-estate negotiations: the case of coal-bed methane
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hayley H. Chouinard; Christina Steinhoff
Coal-bed methane is an emerging contributor to the US energy supply. Split estates, where landowners control the surface and the energy companies lease the rights to the underground gas from the federal government, often impede successful negotiations for methane extraction. We provide an extensive form representation of the dynamic game of the negotiation process for subsurface access. We then solve for a set of Nash equilibrium outcomes associated with the split estate negotiations. By examining the optimal offers we can identify methods to improve the likelihood of negotiations that do not break down and result in the gas developer resortingmore » to the use of a bond. We examine how changes in transaction costs or entitlements will affect the outcomes, and support our finds with anecdotal evidence from actual negotiations for coal-bed methane access. 55 refs.« less
Herbal supplements: Research findings and safety.
Pruitt, Rosanne; Lemanski, Ashley; Carroll, Adam
2018-05-17
Herbal supplements are used extensively worldwide without much awareness regarding their safety and efficacy. Extensive research to determine the safety, utility, and level of research support for commonly used herbs has culminated in an easily accessible summary chart for NP providers.
NASA Astrophysics Data System (ADS)
Bauerdick, L. A. T.; Bloom, K.; Bockelman, B.; Bradley, D. C.; Dasu, S.; Dost, J. M.; Sfiligoi, I.; Tadel, A.; Tadel, M.; Wuerthwein, F.; Yagil, A.; Cms Collaboration
2014-06-01
Following the success of the XRootd-based US CMS data federation, the AAA project investigated extensions of the federation architecture by developing two sample implementations of an XRootd, disk-based, caching proxy. The first one simply starts fetching a whole file as soon as a file open request is received and is suitable when completely random file access is expected or it is already known that a whole file be read. The second implementation supports on-demand downloading of partial files. Extensions to the Hadoop Distributed File System have been developed to allow for an immediate fallback to network access when local HDFS storage fails to provide the requested block. Both cache implementations are in pre-production testing at UCSD.
Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.
Alam, Muhammad Mahtab; Ben Hamida, Elyes
2015-09-01
Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.
Research into telecommunications options for people with physical disabilities.
Nguyen, Toan; Garrett, Rob; Downing, Andrew; Walker, Lloyd; Hobbs, David
2007-01-01
People with a disability do not have equitable access to the modern telecommunication medium. Many experience difficulty typing, handling the phone, dialing, or answering calls. For those who are unable to speak, the only option is to type messages using whatever functional control site exists on their body. The provision of accessible mobile phones for people with disabilities can significantly improve their quality of life through an increased range of accessible activities, and mobile phones can improve their independence, safety, security and self-esteem. This research was aimed at providing practical ways for people with a disability to participate in the extensive community of home and mobile phone users. The outcomes of 10 participants taking part in the evaluation and trial of off-the-shelf telecommunication options are presented. Nine out of 10 participants showed high to very high results in terms of their overall performance and satisfaction with the use of the telecommunication equipment provided. With the processes and support covering equipment matching, education, training, and delivery, current off-the-shelf solutions can help people with disabilities to effectively communicate with other members of our society and to access the same range of information systems and services enjoyed by able-bodied members of the community.
"What Page, Miss?" Enhancing Text Accessibility with DAISY (Digital Accessible Information SYstem)
ERIC Educational Resources Information Center
Spooner, Sue
2014-01-01
Introduction: The provision of specially formatted materials is a complex and increasingly difficult task, given the extensive and burgeoning range of texts and resources available for classroom use. The need to extend the provision of accessible formats to include digital resources (in addition to braille, audio, and large print) led to a study…
Aguirre, Erik
2018-01-01
In the context of hospital management and operation, Intensive Care Units (ICU) are one of the most challenging in terms of time responsiveness and criticality, in which adequate resource management and signal processing play a key role in overall system performance. In this work, a context aware Intensive Care Unit is implemented and analyzed to provide scalable signal acquisition capabilities, as well as to provide tracking and access control. Wireless channel analysis is performed by means of hybrid optimized 3D Ray Launching deterministic simulation to assess potential interference impact as well as to provide required coverage/capacity thresholds for employed transceivers. Wireless system operation within the ICU scenario, considering conventional transceiver operation, is feasible in terms of quality of service for the complete scenario. Extensive measurements of overall interference levels have also been carried out, enabling subsequent adequate coverage/capacity estimations, for a set of Zigbee based nodes. Real system operation has been tested, with ad-hoc designed Zigbee wireless motes, employing lightweight communication protocols to minimize energy and bandwidth usage. An ICU information gathering application and software architecture for Visitor Access Control has been implemented, providing monitoring of the Boxes external doors and the identification of visitors via a RFID system. The results enable a solution to provide ICU access control and tracking capabilities previously not exploited, providing a step forward in the implementation of a Smart Health framework. PMID:29382148
ERIC Educational Resources Information Center
Mudege, Netsayi N.; Chevo, Tafadzwa; Nyekanyeka, Ted; Kapalasa, Eliya; Demo, Paul
2016-01-01
Purpose: This paper explores the interaction between extension services and gender relations in order to suggest ways and strategies that can be useful in ensuring that extension services are gender-equitable and empowering for women. Design/Methodology/Approach: In total, 35 sex-disaggregated focus group discussions with farmers, and 4 interviews…
ERIC Educational Resources Information Center
Franz, Nancy
2014-01-01
The Cooperative Extension System was created in 1914 with the passage of the Smith-Lever Act. The act provided resources to improve access to education by creating this nationwide organization to bring land-grant university research and resources to people where they lived and worked. Cooperative Extension was the first formal nationwide structure…
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
EXTENSION EDUCATION SYMPOSIUM: reinventing extension as a resource--what does the future hold?
Mirando, M A; Bewley, J M; Blue, J; Amaral-Phillips, D M; Corriher, V A; Whittet, K M; Arthur, N; Patterson, D J
2012-10-01
The mission of the Cooperative Extension Service, as a component of the land-grant university system, is to disseminate new knowledge and to foster its application and use. Opportunities and challenges facing animal agriculture in the United States have changed dramatically over the past few decades and require the use of new approaches and emerging technologies that are available to extension professionals. Increased federal competitive grant funding for extension, the creation of eXtension, the development of smartphone and related electronic technologies, and the rapidly increasing popularity of social media created new opportunities for extension educators to disseminate knowledge to a variety of audiences and engage these audiences in electronic discussions. Competitive grant funding opportunities for extension efforts to advance animal agriculture became available from the USDA National Institute of Food and Agriculture (NIFA) and have increased dramatically in recent years. The majority of NIFA funding opportunities require extension efforts to be integrated with research, and NIFA encourages the use of eXtension and other cutting-edge approaches to extend research to traditional clientele and nontraditional audiences. A case study is presented to illustrate how research and extension were integrated to improve the adoption of AI by beef producers. Those in agriculture are increasingly resorting to the use of social media venues such as Facebook, YouTube, LinkedIn, and Twitter to access information required to support their enterprises. Use of these various approaches by extension educators requires appreciation of the technology and an understanding of how the target audiences access information available on social media. Technology to deliver information is changing rapidly, and Cooperative Extension Service professionals will need to continuously evaluate digital technology and social media tools to appropriately integrate them into learning and educational opportunities.
78 FR 49248 - Passenger Vessels Accessibility Guidelines
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-13
... ARCHITECTURAL AND TRANSPORTATION BARRIERS COMPLIANCE BOARD 36 CFR Part 1196 [Docket No. ATBCB-2013... Barriers Compliance Board. ACTION: Notice of proposed rulemaking; extension of comment period. SUMMARY: The Architectural and Transportation Barriers Compliance Board (Access Board) is extending until January 24, 2014...
Chah, Jane M; Dimelu, Mebel U; Ukwuani, Stella U
2014-10-01
A study on the institutional and production characteristics of pig farming in Enugu State, Nigeria, was conducted using 80 randomly selected smallholder pig producers. Data were collected by using an interview schedule. Descriptive statistics were used to analyze data. The mean number of pigs owned by smallholder producer was 18. Only 20.0 and 6.3 % of the producers had access to credit and to extension services, respectively. Ninety percent of the respondents practiced intensive management system. The major housing type used by producers was cement brick walls with aluminum roofing sheets (97.6 %). The majority (80 %) of producers reared mostly crossbred pigs and family labor (68.7 %) was most prevalent. Fourteen (50 %) of the 28 routine management practices were always performed by the pig producers. Extension service providers should intensify efforts to provide producers with appropriate management practices and training for effective disease control and improve productivity.
NASA Technical Reports Server (NTRS)
Defeo, P.; Doane, D.; Saito, J.
1982-01-01
A Digital Flight Control Systems Verification Laboratory (DFCSVL) has been established at NASA Ames Research Center. This report describes the major elements of the laboratory, the research activities that can be supported in the area of verification and validation of digital flight control systems (DFCS), and the operating scenarios within which these activities can be carried out. The DFCSVL consists of a palletized dual-dual flight-control system linked to a dedicated PDP-11/60 processor. Major software support programs are hosted in a remotely located UNIVAC 1100 accessible from the PDP-11/60 through a modem link. Important features of the DFCSVL include extensive hardware and software fault insertion capabilities, a real-time closed loop environment to exercise the DFCS, an integrated set of software verification tools, and a user-oriented interface to all the resources and capabilities.
Robot Task Commander with Extensible Programming Environment
NASA Technical Reports Server (NTRS)
Hart, Stephen W (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Yamokoski, John D. (Inventor); Gooding, Dustin R (Inventor)
2014-01-01
A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.
Akaleephan, Chutima; Wibulpolprasert, Suwit; Sakulbumrungsil, Rungpetch; Luangruangrong, Paithip; Jitraknathee, Anchalee; Aeksaengsri, Achara; Udomaksorn, Siripa; Tangcharoensathien, Viroj; Tantivess, Sripen
2009-07-01
In Thailand and the US negotiating FTA, the 'TRIPs-Plus' is one of the US proposal which would result in an extension of market exclusivity of innovative drugs. In addition, it would foreseeably lead to high and unaffordable medicine prices and inaccessibility to essential medicines. To quantify the impact on medicine expense and medicine accessibility. Based on 2000 to 2003 Thai Food and Drug Administration (FDA)'s and the Drug & Medical Supply Information Center (DMSIC), costs and accessibility were estimated upon the price and quantity costing between innovative drugs and their generics plus some parameters found from their competitive behaviour. Thereafter, we simulated the 10-year potential additional expense on the 2003 unit price of the patented and monopolized non-patented medicines. In 2003, the availability of generics helped to save 104.5% of actual expense and the accessibility would increase by 53.6%. By extension of market exclusivity, given that there were 60 new items approved annually, the cumulative potential expense was projected to be $US 6.2 million for the first year to $US 5215.8 million in tenth year. The TRIPs-Plus proposal would result in a significant increase in the medicine expense; and a delay in the increase in drug accessibility via generics. Several options as well as other related mechanisms to help reduce the negative impact are proposed.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authority to order use of procedures for access by potential parties to certain sensitive unclassified... authority to order use of procedures for access by potential parties to certain sensitive unclassified... Commission or the presiding officer. (b) If this part does not prescribe a time limit for an action to be...
SARS: Safeguards Accounting and Reporting Software
NASA Astrophysics Data System (ADS)
Mohammedi, B.; Saadi, S.; Ait-Mohamed, S.
In order to satisfy the requirements of the SSAC (State System for Accounting and Control of nuclear materials), for recording and reporting objectives; this computer program comes to bridge the gape between nuclear facilities operators and national inspection verifying records and delivering reports. The SARS maintains and generates at-facility safeguards accounting records and generates International Atomic Energy Agency (IAEA) safeguards reports based on accounting data input by the user at any nuclear facility. A database structure is built and BORLAND DELPHI programming language has been used. The software is designed to be user-friendly, to make extensive and flexible management of menus and graphs. SARS functions include basic physical inventory tacking, transaction histories and reporting. Access controls are made by different passwords.
The Arabidopsis thaliana mobilome and its impact at the species level.
Quadrana, Leandro; Bortolini Silveira, Amanda; Mayhew, George F; LeBlanc, Chantal; Martienssen, Robert A; Jeddeloh, Jeffrey A; Colot, Vincent
2016-06-03
Transposable elements (TEs) are powerful motors of genome evolution yet a comprehensive assessment of recent transposition activity at the species level is lacking for most organisms. Here, using genome sequencing data for 211 Arabidopsis thaliana accessions taken from across the globe, we identify thousands of recent transposition events involving half of the 326 TE families annotated in this plant species. We further show that the composition and activity of the 'mobilome' vary extensively between accessions in relation to climate and genetic factors. Moreover, TEs insert equally throughout the genome and are rapidly purged by natural selection from gene-rich regions because they frequently affect genes, in multiple ways. Remarkably, loci controlling adaptive responses to the environment are the most frequent transposition targets observed. These findings demonstrate the pervasive, species-wide impact that a rich mobilome can have and the importance of transposition as a recurrent generator of large-effect alleles.
Pyszczynski, T; Greenberg, J; Solomon, S
1999-10-01
Distinct defensive processes are activated by conscious and nonconscious but accessible thoughts of death. Proximal defenses, which entail suppressing death-related thoughts or pushing the problem of death into the distant future by denying one's vulnerability, are rational, threat-focused, and activated when thoughts of death are in current focal attention. Distal terror management defenses, which entail maintaining self-esteem and faith in one's cultural worldview, function to control the potential for anxiety that results from knowing that death is inevitable. These defenses are experiential, are not related to the problem of death in any semantic or logical way, and are increasingly activated as the accessibility of death-related thoughts increases, up to the point at which such thoughts enter consciousness and proximal threat-focused defenses are initiated. Experimental evidence for this analysis is presented.
Substance Use Treatment Provider Behavior and Healthcare Reform: Evidence from Massachusetts.
Maclean, Johanna Catherine; Saloner, Brendan
2018-01-01
We examine the impact of the 2006 Massachusetts healthcare reform on substance use disorder (SUD) treatment facilities' provision of care. We test the impact of the reform on treatment quantity and access. We couple data on the near universe of specialty SUD treatment providers in the USA with a synthetic control method approach. We find little evidence that the reform lead to changes in treatment quantity or access. Reform effects were similar among for-profit and non-profit facilities. In an extension, we show that the reform altered the setting in which treatment is received, the number of offered services, and the number of programs for special populations. These findings may be useful in predicting the implications of major health insurance expansions on the provision of SUD treatment. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.
Providing end-to-end QoS for multimedia applications in 3G wireless networks
NASA Astrophysics Data System (ADS)
Guo, Katherine; Rangarajan, Samapth; Siddiqui, M. A.; Paul, Sanjoy
2003-11-01
As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio Access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.
Genetic diversity provides opportunities for improvement of fresh-cut pepper quality
USDA-ARS?s Scientific Manuscript database
Extensive genetic diversity present in the Capsicum genepool has been utilized extensively to improve pepper disease resistance, fruit quality and varied yield attributes. Little attention has been dedicated to genetic enhancement of pepper fresh-cut quality. We evaluated pepper accessions with dive...
Sandia Text ANaLysis Extensible librarY Server
DOE Office of Scientific and Technical Information (OSTI.GOV)
2006-05-11
This is a server wrapper for STANLEY (Sandia Text ANaLysis Extensible librarY). STANLEY provides capabilities for analyzing, indexing and searching through text. STANLEY Server exposes this capability through a TCP/IP interface allowing third party applications and remote clients to access it.
Where Field Staff Get Information. Approaching the Electronic Times.
ERIC Educational Resources Information Center
Shih, Win-Yuan; Evans, James F.
1991-01-01
Top 3 information sources identified in a survey of 109 extension agents were extension publications, specialists, and personal files. Electronic sources such as satellite programing and bibliographic databases were used infrequently, because of lack of access, user friendliness, and ready applicability of information. (SK)
Castles Made of Sand: Building Sustainable Digitized Collections Using XML.
ERIC Educational Resources Information Center
Ragon, Bart
2003-01-01
Describes work at the University of Virginia library to digitize special collections. Discusses the use of XML (Extensible Markup Language); providing access to original source materials; DTD (Document Type Definition); TEI (Text Encoding Initiative); metadata; XSL (Extensible Style Language); and future possibilities. (LRW)
45 CFR 150.215 - Extension for good cause.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS CMS Enforcement Processes for Determining Whether States Are Failing To Substantially Enforce HIPAA Requirements § 150.215 Extension for good cause. CMS may...
Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs
Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos
2015-01-01
In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950
Beatty, Joel W; Stephenson, Corey R J
2014-07-23
Natural product modification with photoredox catalysis allows for mild, chemoselective access to a wide array of related structures in complex areas of chemical space, providing the possibility for novel structural motifs as well as useful quantities of less abundant congeners. While amine additives have been used extensively as stoichiometric electron donors for photocatalysis, the controlled modification of amine substrates through single-electron oxidation is ideal for the synthesis and modification of alkaloids. Here, we report the conversion of the amine (+)-catharanthine into the natural products (-)-pseudotabersonine, (-)-pseudovincadifformine, and (+)-coronaridine utilizing visible light photoredox catalysis.
The National Biological Information Infrastructure: Coming of age
Cotter, G.; Frame, M.; Sepic, R.; Zolly, L.
2000-01-01
Coordinated by the US Geological Survey, the National Biological Information Infrastructure (NBII) is a Web-based system that provides increased access to data and information on the nation's biological resources. The NBII can be viewed from a variety of perspectives. This article - an individual case study and not a broad survey with extensive references to the literature - addresses the structure of the NBII related to thematic sections, infrastructure sections and place-based sections, and other topics such as the Integrated Taxonomic Information System (one of our more innovative tools) and the development of our controlled vocabulary.
McClelland, Shearwood; Page, Brandi R; Jaboin, Jerry J; Chapman, Christina H; Deville, Curtiland; Thomas, Charles R
2017-01-01
African Americans experience the highest burden of cancer incidence and mortality in the United States and have been persistently less likely to receive interventional care, even when such care has been proven superior to conservative management by randomized controlled trials. The presence of disparities in access to radiation therapy (RT) for African American cancer patients has rarely been examined in an expansive fashion. An extensive literature search was performed using the PubMed database to examine studies investigating disparities in RT access for African Americans. A total of 55 studies were found, spanning 11 organ systems. Disparities in access to RT for African Americans were most prominently study in cancers of the breast (23 studies), prostate (7 studies), gynecologic system (5 studies), and hematologic system (5 studies). Disparities in RT access for African Americans were prevalent regardless of organ system studied and often occurred independently of socioeconomic status. Fifty of 55 studies (91%) involved analysis of a population-based database such as Surveillance, Epidemiology and End Result (SEER; 26 studies), SEER-Medicare (5 studies), National Cancer Database (3 studies), or a state tumor registry (13 studies). African Americans in the United States have diminished access to RT compared with Caucasian patients, independent of but often in concert with low socioeconomic status. These findings underscore the importance of finding systemic and systematic solutions to address these inequalities to reduce the barriers that patient race provides in receipt of optimal cancer care.
7 CFR 3402.22 - Access to peer review information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Access to peer review information. 3402.22 Section 3402.22 Agriculture Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE RESEARCH, EDUCATION, AND EXTENSION SERVICE, DEPARTMENT OF AGRICULTURE FOOD AND AGRICULTURAL SCIENCES NATIONAL NEEDS...
7 CFR 3406.23 - Access to peer review information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Access to peer review information. 3406.23 Section 3406.23 Agriculture Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE RESEARCH, EDUCATION, AND EXTENSION SERVICE, DEPARTMENT OF AGRICULTURE 1890 INSTITUTION CAPACITY BUILDING GRANTS...
Accessing Electronic Theses: Progress?
ERIC Educational Resources Information Center
Tennant, Roy
2000-01-01
Describes various ways by which universities provide access to their electronic theses and dissertations (ETDs), discussing UMI (University Microfilms International), XML (eXtensible Markup Language), and other formats. Discusses key leaders--national and international--in the ETD effort. Outlines the two main methods for locating ETDs. Presents a…
7 CFR 3405.16 - Access to peer review information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Access to peer review information. 3405.16 Section 3405.16 Agriculture Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE RESEARCH, EDUCATION, AND EXTENSION SERVICE, DEPARTMENT OF AGRICULTURE HIGHER EDUCATION CHALLENGE GRANTS PROGRAM...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-27
... DEPARTMENT OF DEFENSE Office of the Secretary Extension of Autism Services Demonstration Project... Enhanced Access to Autism Services Demonstration Project under the Extended Care Health Option for beneficiaries diagnosed with an Autism Spectrum Disorder (ASD). Under the demonstration, the Department...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... DEPARTMENT OF DEFENSE Office of the Secretary Extension of Autism Services Demonstration Project... (the Department) Enhanced Access to Autism Services Demonstration Project (Autism Demonstration) under the Extended Care Health Option (ECHO) for beneficiaries diagnosed with an Autism Spectrum Disorder...
Hanberger, Lena; Ludvigsson, Johnny; Nordfeldt, Sam
2013-08-23
Diabetes requires extensive self-care and comprehensive knowledge, making patient education central to diabetes self-management. Web 2.0 systems have great potential to enhance health information and open new ways for patients and practitioners to communicate. To develop a Web portal designed to facilitate self-management, including diabetes-related information and social networking functions, and to study its use and effects in pediatric patients with diabetes. A Web 2.0 portal was developed in collaboration with patients, parents, and practitioners. It offered communication with local practitioners, interaction with peers, and access to relevant information and services. Children and adolescents with diabetes in a geographic population of two pediatric clinics in Sweden were randomized to a group receiving passwords for access to the portal or a control group with no access (n=230) for 1 year. All subjects had access during a second study year. Users' activity was logged by site and page visits. Health-related quality of life (HRQOL), empowerment (DES), and quality of information (QPP) questionnaires were given at baseline and after 1 and 2 study years. Clinical data came from the Swedish pediatric diabetes quality registry SWEDIABKIDS. There was a continuous flow of site visits, decreasing in summer and Christmas periods. In 119/233 families (51%), someone visited the portal the first study year and 169/484 (35%) the second study year. The outcome variables did not differ between intervention and control group. No adverse treatment or self-care effects were identified. A higher proportion of mothers compared to fathers visited once or more the first year (P<.001) and the second year (P<.001). The patients who had someone in the family visiting the portal 5 times or more, had shorter diabetes duration (P=.006), were younger (P=.008), had lower HbA1c after 1 year of access (P=.010), and were more often girls (P<.001). Peer interaction seems to be a valued aspect. The Web 2.0 portal may be useful as a complement to traditional care for this target group. Widespread use of a portal would need integration in routine care and promotion by diabetes team members. International Standard Randomized Controlled Trial Number (ISRCTN):92107365; http://www.controlled-trials.com/ISRCTN92107365/ (Archived by WebCite at http://webcitation.org/6IkiIvtSb).
Increasing Access to Tuberculosis Services in Ethiopia: Findings From a Patient-Pathway Analysis.
Fekadu, Lelisa; Hanson, Christy; Osberg, Mike; Makayova, Julia; Mingkwan, Pia; Chin, Daniel
2017-11-06
In Ethiopia, extensive scale-up of the availability of health extension workers (HEWs) at the community level has been credited with increased identification and referral of patients with presumptive tuberculosis, which has contributed to increased tuberculosis case notification and better treatment outcomes. However, nearly 30% of Ethiopia's estimated 191000 patients with tuberculosis remained unnotified in 2015. A better understanding of patient care-seeking practices may inform future government action to reach all patients with tuberculosis. A patient-pathway analysis was completed to assess the alignment between patient care initiation and the availability of diagnostic and treatment services at the national level. More than one third of patients initiated care with HEWs, who refer patients to health centers for diagnosis. An additional one third of patients initiated care at health centers. Of those health centers, >80% had microscopy services, but few had access to Xpert. Despite an extensive microscopy and radiography network at middle levels of the health system, a quarter of all notified patients with tuberculosis had no bacteriological confirmation of disease. While 30% of patients reported receiving some form of care from the private sector, private-sector facilities, especially pharmacies, were not widely accessed for tuberculosis diagnosis. The availability of HEWs can increase access to tuberculosis diagnostic and treatment support services, particularly for rural populations. Continued strengthening of referral systems from HEWs and health posts are needed to enable consistent and timely access to Xpert as an initial diagnostic test and to drug resistance screening. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.
75 FR 49936 - Notice of Request for Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-16
... civil rights clearances, should be granted equal access to quality health care, regardless of race... within 60-days. Proposed Project: The Civil Rights Information Request Form--OMB No. 0990-0243- Extension-Office for Civil Rights. Abstract: The Office of Civil Rights is requesting a 3 year extension of the...
Untied Efforts: The Challenges for Improved Research, Extension and Education Linkages
ERIC Educational Resources Information Center
Eneyew, Adugna
2013-01-01
Ethiopian agriculture is characterized by smallholders farming whose access to modern technology and basic education is very limited. Research, extension, education and farmers are the main pillars of agricultural knowledge systems and their effectiveness largely depends on strong linkage among each other. However, the existing…
ERIC Educational Resources Information Center
Inefuku, Harrison W.; Franz, Nancy K.
2015-01-01
Over the past 20 years, university libraries have developed and manage institutional repositories--digital libraries that provide free, public access to the research, scholarship, and publications of their university's faculty, staff, and students. Although underused by Extension professionals, institutional repositories are powerful tools that…
Pinterest for Parent Education
ERIC Educational Resources Information Center
Routh, Brianna; Langworthy, Sara; Jastram, Hannah
2014-01-01
As more parents are using the Internet to answer their questions, Extension needs to provide practical, research-based resources in an accessible format. Pinterest is a platform that can be used by Extension educators to provide continued education and make reputable resources more discoverable for parents. Based on Knowles adult learning theory…
Testing Extension Services through AKAP Models
ERIC Educational Resources Information Center
De Rosa, Marcello; Bartoli, Luca; La Rocca, Giuseppe
2014-01-01
Purpose: The aim of the paper is to analyse the attitude of Italian farms in gaining access to agricultural extension services (AES). Design/methodology/approach: The ways Italian farms use AES are described through the AKAP (Awareness, Knowledge, Adoption, Product) sequence. This article investigated the AKAP sequence by submitting a…
45 CFR 150.429 - Computation of time and extensions of time.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Computation of time and extensions of time. 150.429 Section 150.429 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings...
45 CFR 150.429 - Computation of time and extensions of time.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Computation of time and extensions of time. 150.429 Section 150.429 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS Administrative Hearings...
Entrepreneurial Extension Conducted via Social Media
ERIC Educational Resources Information Center
Cornelisse, Sarah; Hyde, Jeffrey; Raines, Christopher; Kelley, Kathleen; Ollendyke, Dana; Remcheck, James
2011-01-01
The widespread availability of and access to the Internet have led to the development of new forms of communication. Collectively termed "social media," these new communication tools have created vast opportunities for Extension professionals in how they perform their work and how businesses interact with consumers. This article outlines currently…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-07
... program (formerly known as the schools and libraries universal support program), eligible schools, libraries, and their consortia may apply for discounts for telecommunications services, Internet access, and... extension on or before the September 30 deadline. These extensions ensure that schools and libraries are not...
Assessments of genetic diversity and anthracnose disease response among Zimbabwe sorghum germplasm.
USDA-ARS?s Scientific Manuscript database
The USDA-ARS National Plant Germplasm System maintains a Zimbabwe sorghum collection of 1,235 accessions from different provinces. This germplasm has not been extensively employed in U.S. breeding programs due to the lack of phenotypic and genetic characterization. Therefore, 68 accessions from th...
78 FR 48640 - Special Access Proceeding; Comment Deadline Extension
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-09
... CONTACT: William Layton, Pricing Policy Division, Wireline Competition Bureau, 202-418-0868 or William...-198. See 44 U.S.C. 3506(c)(4). For further information, please contact William Layton, Pricing Policy... its rules for granting pricing flexibility for the special access services provided by incumbent local...
76 FR 4390 - Draft Regulatory Guide: Comment Period Extension and Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
....'' This Federal Register notice stated that electronic copies of DG-1229 were available in the NRC's Agencywide Documents Access and Management System (ADAMS) ( http://www.nrc.gov/reading-rm/adams.html ), under... Documents Access and Management System (ADAMS): Publicly available documents created or received at the NRC...
PACE: A Browsable Graphical Interface.
ERIC Educational Resources Information Center
Beheshti, Jamshid; And Others
1996-01-01
Describes PACE (Public Access Catalogue Extension), an alternative interface designed to enhance online catalogs by simulating images of books and library shelves to help users browse through the catalog. Results of a test in a college library against a text-based online public access catalog, including student attitudes, are described.…
AFLP analysis of Cynodon dactylon (L.) Pers. var. dactylon genetic variation.
Wu, Y Q; Taliaferro, C M; Bai, G H; Anderson, M P
2004-08-01
Cynodon dactylon (L.) Pers. var. dactylon (common bermudagrass) is geographically widely distributed between about lat 45 degrees N and lat 45 degrees S, penetrating to about lat 53 degrees N in Europe. The extensive variation of morphological and adaptive characteristics of the taxon is substantially documented, but information is lacking on DNA molecular variation in geographically disparate forms. Accordingly, this study was conducted to assess molecular genetic variation and genetic relatedness among 28 C. dactylon var. dactylon accessions originating from 11 countries on 4 continents (Africa, Asia, Australia, and Europe). A fluorescence-labeled amplified fragment length polymorphism (AFLP) DNA profiling method was used to detect the genetic diversity and relatedness. On the basis of 443 polymorphic AFLP fragments from 8 primer combinations, the accessions were grouped into clusters and subclusters associating with their geographic origins. Genetic similarity coefficients (SC) for the 28 accessions ranged from 0.53 to 0.98. Accessions originating from Africa, Australia, Asia, and Europe formed major groupings as indicated by cluster and principal coordinate analysis. Accessions from Australia and Asia, though separately clustered, were relatively closely related and most distantly related to accessions of European origin. African accessions formed two distant clusters and had the greatest variation in genetic relatedness relative to accessions from other geographic regions. Sampling the full extent of genetic variation in C. dactylon var. dactylon would require extensive germplasm collection in the major geographic regions of its distributional range.
Barker, Charles E.; Biewick, Laura R.; Warwick, Peter D.; SanFilipo, John R.
2000-01-01
Strong economic controls on the viability of coalbed methane (CBM) prospects make coal geometry and coal property maps key elements in identifying sweet spots and production fairways. Therefore, this study seeks to identify the apparent prospective areas for CBM exploration in the Wilcox Group (Paleocene-Eocene) lignite and coalbeds by mapping net coal thickness, depth to coal, and coal rank (vitrinite reflectance). Economic factors are not considered in this CBM prospects study. Given the comparatively extensive gas pipeline and other production infrastructure development in the Gulf Coast Region, these factors seem less a control compared to other areas. However, open leasable public lands are minimal or nonexistent in the Gulf Coast region and access to the CBM prospects could be a problem.
Data-Driven Software Framework for Web-Based ISS Telescience
NASA Technical Reports Server (NTRS)
Tso, Kam S.
2005-01-01
Software that enables authorized users to monitor and control scientific payloads aboard the International Space Station (ISS) from diverse terrestrial locations equipped with Internet connections is undergoing development. This software reflects a data-driven approach to distributed operations. A Web-based software framework leverages prior developments in Java and Extensible Markup Language (XML) to create portable code and portable data, to which one can gain access via Web-browser software on almost any common computer. Open-source software is used extensively to minimize cost; the framework also accommodates enterprise-class server software to satisfy needs for high performance and security. To accommodate the diversity of ISS experiments and users, the framework emphasizes openness and extensibility. Users can take advantage of available viewer software to create their own client programs according to their particular preferences, and can upload these programs for custom processing of data, generation of views, and planning of experiments. The same software system, possibly augmented with a subset of data and additional software tools, could be used for public outreach by enabling public users to replay telescience experiments, conduct their experiments with simulated payloads, and create their own client programs and other custom software.
ERIC Educational Resources Information Center
Vidales-Bolaños, María-José; Sádaba-Chalezquer, Charo
2017-01-01
Over the past twenty years, the high penetration of mobile phones as a means of interpersonal communication, especially among adolescents, has facilitated access to broader social environments outside their own family. Through the extension of their social environment, teenagers are able to establish new and more extensive relationships, while…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-07
... quality of special education personnel training and professional development. The goal is to help ensure... access to, and greater participation and progress in, the general education curriculum in the least... DEPARTMENT OF EDUCATION [CFDA No. 84.325F] Proposed Extensions and Waivers: National Center To...
Extension's Role in Developing a Farmers' Market
ERIC Educational Resources Information Center
Civittolo, David
2012-01-01
Interest in access to local food is increasing. Communities of all types and sizes have volunteers interested in creating farmers' markets. Extension can play an important role in the development of farmers' markets because it is ideally suited to organize and coordinate these volunteer energies. By helping community volunteers focus…
78 FR 5178 - Emergency Access Advisory Committee; Announcement of Charter Extension
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-24
... extension of the charter will enable the EAAC to complete the important work it began in early 2011 pursuant...); and/or Zenji Nakazawa, Public Safety and Homeland Security Bureau, (202) 418-7949, [email protected] Governmental Affairs Bureau and the Public Safety and Homeland Security Bureau of the Federal Communications...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-06
... went into effect, low volume manufacturers now have access to advanced air bag technology. Accordingly, NHTSA tentatively concludes that the expense of advanced air bag technology may not now be sufficient...) has applied for an extension of a previously granted temporary exemption from certain advanced air bag...
Odour discrimination and identification are improved in early blindness.
Cuevas, Isabel; Plaza, Paula; Rombaux, Philippe; De Volder, Anne G; Renier, Laurent
2009-12-01
Previous studies showed that early blind humans develop superior abilities in the use of their remaining senses, hypothetically due to a functional reorganization of the deprived visual brain areas. While auditory and tactile functions have been investigated for long, little is known about the effects of early visual deprivation on olfactory processing. However, blind humans make an extensive use of olfactory information in their daily life. Here we investigated olfactory discrimination and identification abilities in early blind subjects and age-matched sighted controls. Three levels of cuing were used in the identification task, i.e., free-identification (no cue), categorization (semantic cues) and multiple choice (semantic and phonological cues). Early blind subjects significantly outperformed the controls in odour discrimination, free-identification and categorization. In addition, the larger group difference was observed in the free-identification as compared to the categorization and the multiple choice conditions. This indicated that a better access to the semantic information from odour perception accounted for part of the improved olfactory performances in odour identification in the blind. We concluded that early blind subjects have both improved perceptual abilities and a better access to the information stored in semantic memory than sighted subjects.
Compression performance of HEVC and its format range and screen content coding extensions
NASA Astrophysics Data System (ADS)
Li, Bin; Xu, Jizheng; Sullivan, Gary J.
2015-09-01
This paper presents a comparison-based test of the objective compression performance of the High Efficiency Video Coding (HEVC) standard, its format range extensions (RExt), and its draft screen content coding extensions (SCC). The current dominant standard, H.264/MPEG-4 AVC, is used as an anchor reference in the comparison. The conditions used for the comparison tests were designed to reflect relevant application scenarios and to enable a fair comparison to the maximum extent feasible - i.e., using comparable quantization settings, reference frame buffering, intra refresh periods, rate-distortion optimization decision processing, etc. It is noted that such PSNR-based objective comparisons generally provide more conservative estimates of HEVC benefit than are found in subjective studies. The experimental results show that, when compared with H.264/MPEG-4 AVC, HEVC version 1 provides a bit rate savings for equal PSNR of about 23% for all-intra coding, 34% for random access coding, and 38% for low-delay coding. This is consistent with prior studies and the general characterization that HEVC can provide about a bit rate savings of about 50% for equal subjective quality for most applications. The HEVC format range extensions provide a similar bit rate savings of about 13-25% for all-intra coding, 28-33% for random access coding, and 32-38% for low-delay coding at different bit rate ranges. For lossy coding of screen content, the HEVC screen content coding extensions achieve a bit rate savings of about 66%, 63%, and 61% for all-intra coding, random access coding, and low-delay coding, respectively. For lossless coding, the corresponding bit rate savings are about 40%, 33%, and 32%, respectively.
Access control mechanism of wireless gateway based on open flow
NASA Astrophysics Data System (ADS)
Peng, Rong; Ding, Lei
2017-08-01
In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.
An Attribute Based Access Control Framework for Healthcare System
NASA Astrophysics Data System (ADS)
Afshar, Majid; Samet, Saeed; Hu, Ting
2018-01-01
Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.
Lung Reference Set A Application: LaszloTakacs - Biosystems (2010) — EDRN Public Portal
We would like to access the NCI lung cancer Combined Pre-Validation Reference Set A in order to further validate a lung cancer diagnostic test candidate. Our test is based on a panel of antibodies which have been tested on 4 different cohorts (see below, paragraph “Preliminary Data and Methods”). This Reference Set A, whose clinical setting is “Diagnosis of lung cancer”, will be used to validate the panel of monoclonal antibodies which have been demonstrated by extensive data analysis to provide the best discrimination between controls and Lung Cancer patient plasma samples, sensitivity and specificity values from ROC analyses are superior than 85 %.
IKOS: A Framework for Static Analysis based on Abstract Interpretation (Tool Paper)
NASA Technical Reports Server (NTRS)
Brat, Guillaume P.; Laserna, Jorge A.; Shi, Nija; Venet, Arnaud Jean
2014-01-01
The RTCA standard (DO-178C) for developing avionic software and getting certification credits includes an extension (DO-333) that describes how developers can use static analysis in certification. In this paper, we give an overview of the IKOS static analysis framework that helps developing static analyses that are both precise and scalable. IKOS harnesses the power of Abstract Interpretation and makes it accessible to a larger class of static analysis developers by separating concerns such as code parsing, model development, abstract domain management, results management, and analysis strategy. The benefits of the approach is demonstrated by a buffer overflow analysis applied to flight control systems.
Efficient Authorization of Rich Presence Using Secure and Composed Web Services
NASA Astrophysics Data System (ADS)
Li, Li; Chou, Wu
This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.
2015-01-01
Natural product modification with photoredox catalysis allows for mild, chemoselective access to a wide array of related structures in complex areas of chemical space, providing the possibility for novel structural motifs as well as useful quantities of less abundant congeners. While amine additives have been used extensively as stoichiometric electron donors for photocatalysis, the controlled modification of amine substrates through single-electron oxidation is ideal for the synthesis and modification of alkaloids. Here, we report the conversion of the amine (+)-catharanthine into the natural products (−)-pseudotabersonine, (−)-pseudovincadifformine, and (+)-coronaridine utilizing visible light photoredox catalysis. PMID:25003992
Automated Computer Access Request System
NASA Technical Reports Server (NTRS)
Snook, Bryan E.
2010-01-01
The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).
De Lusignan, Simon; Liyanage, Harshana; Di Iorio, Concetta Tania; Chan, Tom; Liaw, Siaw-Teng
2016-01-19
The use of health data for public health, surveillance, quality improvement and research is crucial to improve health systems and health care. However, bodies responsible for privacy and ethics often limit access to routinely collected health data. Ethical approvals, issues around protecting privacy and data access are often dealt with by different layers of regulations, making approval processes appear disjointed. To create a comprehensive framework for defining the ethical and privacy status of a project and for providing guidance on data access. The framework comprises principles and related questions. The core of the framework will be built using standard terminology definitions such as ethics-related controlled vocabularies and regional directives. It is built in this way to reduce ambiguity between different definitions. The framework is extensible: principles can be retired or added to, as can their related questions. Responses to these questions should allow data processors to define ethical issues, privacy risk and other unintended consequences. The framework contains three steps: (1) identifying possible ethical and privacy principles relevant to the project; (2) providing ethics and privacy guidance questions that inform the type of approval needed; and (3) assessing case-specific ethics and privacy issues. The outputs from this process should inform whether the balance between public interests and privacy breach and any ethical considerations are tipped in favour of societal benefits. If they are then this should be the basis on which data access is permitted. Tightly linking ethical principles to governance and data access may help maintain public trust.
77 FR 3751 - Extension of Deadlines; Upward Bound Program (Regular Upward Bound (UB))
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-25
... the document published in the Federal Register. Free Internet access to the official edition of the... Federal Relay Service (FRS), toll free, at 1-(800) 877-8339. SUPPLEMENTARY INFORMATION: Background On..., you must have Adobe Acrobat Reader, which is available free at this site. You may also access...
Locally Sourced Capital for Small Businesses in Rural Communities
ERIC Educational Resources Information Center
Tampien, Jordan
2016-01-01
Lack of adequate access to capital is a major barrier for rural entrepreneurs. Washington State University Extension and the Association of Washington Cities partnered to explore and test an innovative local investment approach that provides access to capital and engages the community in the success of individual businesses. The approach offers…
Derrida's Right to Philosophy, Then and Now
ERIC Educational Resources Information Center
Willinsky, John
2009-01-01
In this essay, a tribute to Jacques Derrida's educational efforts at expanding access to current work in philosophy, John Willinsky examines his efforts as both a public right and an element of academic freedom that bear on the open access movement today. Willinsky covers Derrida's extension and outreach work with the Groupe de Recherches pour…
On the Rural-Urban Disparity in Access to Higher Education Opportunities in China
ERIC Educational Resources Information Center
Jinzhong, Qiao
2010-01-01
Currently, the rural-urban disparity in access to higher education opportunities is primarily trending toward continuous shrinking; however, this disparity is still very clear and is especially marked in terms of opportunities to attend the top universities. Urbanization and the extension of admission to colleges and universities have played an…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-14
... Analysis Division, Office of Information Analysis and Access (2842T), Environmental Protection Agency, 1200.... Martin, Acting Director, Office of Information Analysis and Access. [FR Doc. 2010-8527 Filed 4-13-10; 8... comments. E-mail: [email protected] . Mail: Office of Environmental Information (OEI) Docket...
Gill, Dawn P; Blunt, Wendy; Bartol, Cassandra; Pulford, Roseanne W; De Cruz, Ashleigh; Simmavong, P Karen; Gavarkovs, Adam; Newhouse, Ian; Pearson, Erin; Ostenfeldt, Bayley; Law, Barbi; Karvinen, Kristina; Moffit, Pertice; Jones, Gareth; Watson, Cori; Zou, Guangyong; Petrella, Robert J
2017-02-07
Physical inactivity is one of the leading causes of chronic disease in Canadian adults. With less than 50% of Canadian adults reaching the recommended amount of daily physical activity, there is an urgent need for effective programs targeting this risk factor. HealtheSteps™ is a healthy lifestyle prescription program, developed from an extensive research base to address risk factors for chronic disease such as physical inactivity, sedentary behaviour and poor eating habits. HealtheSteps™ participants are provided with in-person lifestyle coaching and access to eHealth technologies delivered in community-based primary care clinics and health care organizations. To determine the effectiveness of Healthesteps™, we will conduct a 6-month pragmatic randomized controlled trial with integrated process and economic evaluations of HealtheSteps™ in 5 clinic settings in Southwestern Ontario. 110 participants will be individually randomized (1:1; stratified by site) to either the intervention (HealtheSteps™ program) or comparator (Wait-list control). There are 3 phases of the HealtheSteps™ program, lasting 6 months each. The active phase consists of bi-monthly in-person coaching with access to a full suite of eHealth technology supports. During the maintenance phase I, the in-person coaching will be removed, but participants will still have access to the full suite of eHealth technology supports. In the final stage, maintenance phase II, access to the full suite of eHealth technology supports is removed and participants only have access to publicly available resources and tools. This trial aims to determine the effectiveness of the program in increasing physical activity levels and improving other health behaviours and indicators, the acceptability of the HealtheSteps™ program, and the direct cost for each person participating in the program as well as the costs associated with delivering the program at the different community sites. These results will inform future optimization and scaling up of the program into additional community-based primary care sites. NCT02413385 (Clinicaltrials.gov). Date Registered: April 6, 2015.
HTTP-based remote operational options for the Vacuum Tower Telescope, Tenerife
NASA Astrophysics Data System (ADS)
Staiger, J.
2012-09-01
We are currently developing network based tools for the Vacuum Tower Telescope (VTT), Tenerife which will allow to operate the telescope together with the newly developed 2D-spectrometer HELLRIDE under remote control conditions. The computational configuration can be viewed as a distributed system linking hardware components of various functionality from different locations. We have developed a communication protocol which is basically an extension of the HTTP standard. It will serve as a carrier for command- and data-transfers. The server-client software is based on Berkley-Unix sockets in a C++ programming environment. A customized CMS will allow to create browser accessible information on-the-fly. Java-based applet pages have been tested as optional user access GUI's. An access tool has been implemented to download near-realtime, web-based target information from NASA/SDO. Latency tests have been carried out at the VTT and the Swedish STT at La Palma for concept verification. Short response times indicate that under favorable network conditions remote interactive telescope handling may be possible. The scientific focus of possible future remote operations will be set on the helioseismology of the solar atmosphere, the monitoring of flares and the footpoint analysis of coronal loops and chromospheric events.
Misgav, Mudi; Kenet, Gili; Martinowitz, Uriel
2014-03-01
Bleeding episodes in patients with congenital or acquired bleeding disorders are usually managed with factor concentrates or blood products. However, external and accessible bleeds may effectively be managed with topical hemostasis. After the application of the Hemcon, a Food and Drug Administration-approved chitosan-based hemostatic dressing was used as the "last resort" to successfully control external bleeds in 2 patients with severe bleeding disorders. We describe a single-center experience with this dressing, including its use in pediatric patients as the first mode of therapy. A total of 5 patients (median age 2 y) with severe bleeding disorders were treated with topical chitosan-based dressing for a total of 6 bleeding episodes. The dressing was used either after the failure of extensive systemic therapy or as the first choice of treatment. In 4 of the 6 episodes, bleeding ceased immediately alleviating the need for systemic therapy. There was no rebleeding after the removal of the dressing and no adverse events or local skin reactions were recorded. Hemostatic dressings, such as the chitosan, should be encouraged for the treatment of external/accessible bleeds, especially among the pediatric patients with bleeding tendency.
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.
2013-01-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332
PANATIKI: a network access control implementation based on PANA for IoT devices.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
2013-11-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
Can a tablet device alter undergraduate science students' study behavior and use of technology?
Morris, Neil P; Ramsay, Luke; Chauhan, Vikesh
2012-06-01
This article reports findings from a study investigating undergraduate biological sciences students' use of technology and computer devices for learning and the effect of providing students with a tablet device. A controlled study was conducted to collect quantitative and qualitative data on the impact of a tablet device on students' use of devices and technology for learning. Overall, we found that students made extensive use of the tablet device for learning, using it in preference to laptop computers to retrieve information, record lectures, and access learning resources. In line with other studies, we found that undergraduate students only use familiar Web 2.0 technologies and that the tablet device did not alter this behavior for the majority of tools. We conclude that undergraduate science students can make extensive use of a tablet device to enhance their learning opportunities without institutions changing their teaching methods or computer systems, but that institutional intervention may be needed to drive changes in student behavior toward the use of novel Web 2.0 technologies.
Building and evaluating an ontology-based tool for reasoning about consent permission
Grando, Adela; Schwab, Richard
2013-01-01
Given the lack of mechanisms for specifying, sharing and checking the compliance of consent permissions, we focus on building and testing novel approaches to address this gap. In our previous work, we introduced a “permission ontology” to capture in a precise, machine-interpretable form informed consent permissions in research studies. Here we explain how we built and evaluated a framework for specifying subject’s permissions and checking researcher’s resource request in compliance with those permissions. The framework is proposed as an extension of an existing policy engine based on the eXtensible Access Control Markup Language (XACML), incorporating ontology-based reasoning. The framework is evaluated in the context of the UCSD Moores Cancer Center biorepository, modeling permissions from an informed consent and a HIPAA form. The resulting permission ontology and mechanisms to check subject’s permission are implementation and institution independent, and therefore offer the potential to be reusable in other biorepositories and data warehouses. PMID:24551354
Varga, Nicole L.; Stewart, Rebekah A.; Bauer, Patricia J.
2016-01-01
Semantic memory, defined as our store of knowledge about the world, provides representational support for all of our higher order cognitive functions. As such, it is crucial that the contents of semantic memory remain accessible over time. Although memory for knowledge learned through direct observation has been previously investigated, we know very little about the retention of knowledge derived through integration of information acquired across separate learning episodes. The present research investigated cross-episode integration in 4-year-old children. Participants were presented with novel facts via distinct story episodes and tested for knowledge extension through cross-episode integration, as well as for retention of the information over a 1-week delay. In Experiment 1, children retained the self-derived knowledge over the delay, though performance was primarily evidenced in a forced-choice format. In Experiment 2, we sought to facilitate the accessibility and robustness of self-derived knowledge by providing a verbal reminder after the delay. The accessibility of self-derived knowledge increased, irrespective of whether participants successfully demonstrated knowledge of the integration facts during the first visit. The results suggest knowledge extended through integration remains accessible after delays, even in a population in which this learning process is less robust. The findings also demonstrate the facilitative effect of reminders on the accessibility and further extension of knowledge over extended time periods. PMID:26774259
ERIC Educational Resources Information Center
Whitefield, Elizabeth; Schmidt, David; Witt-Swanson, Lindsay; Smith, David; Pronto, Jennifer; Knox, Pam; Powers, Crystal
2016-01-01
There is a need to create competency among Extension professionals on the topic of climate change adaptation and mitigation in animal agriculture. The Animal Agriculture in a Changing Climate online course provides an easily accessible, user-friendly, free, and interactive experience for learning science-based information on a national and…
A Case Study of Extensive Reading with an Unmotivated L2 Reader
ERIC Educational Resources Information Center
Ro, Eunseok
2013-01-01
Extensive reading is gaining credibility as an effective way of boosting students' affect especially in an English as a Foreign Language (EFL) context where access to a second language (L2) input is minimal. This study uses a pattern-matching, single case study research design to examine an adult reader's motivation and anxiety shifts towards…
County Community Development Studies. No. 2: Extensions Library on Tape, Sarasota County.
ERIC Educational Resources Information Center
Rozar, Luther L.; And Others
A study was conducted in Sarasota County, Florida, to determine the feasibility of implementing a County Extension Service library on telecassette tape that could be dialed by phone callers. The system would allow office callers access to two-to-three-minute tape recordings containing information on many common problems. A survey instrument…
It's the Latest, It's the Greatest, It's [Financial Education] at the Library
ERIC Educational Resources Information Center
O'Neill, Barbara
2013-01-01
In recent years, libraries have become increasingly involved in financial education, and Extension educators are collaborating with them to deliver programs for their staff and the general public. Benefits to Extension educators include increased visibility, access to new audiences, having program logistics and marketing provided by others, access…
ERIC Educational Resources Information Center
Nagy, Judit T.
2018-01-01
The aim of the study was to examine the determining factors of students' video usage and their learning satisfaction relating to the supplementary application of educational videos, accessible in a Moodle environment in a Business Mathematics Course. The research model is based on the extension of "Technology Acceptance Model" (TAM), in…
Web accessibility and open source software.
Obrenović, Zeljko
2009-07-01
A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long-term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities, for which existing browsers tend to provide only partial solutions. Although functionality for Web accessibility can be found as open source and free software components, their reuse and integration is complex because they were developed in diverse implementation environments, following standards and conventions incompatible with the Web. To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility. The first of these activities is the development of Adaptable Multi-Interface COmmunicator (AMICO):WEB, an infrastructure that facilitates efficient reuse and integration of open source software components into the Web environment. The main contribution of AMICO:WEB is in enabling the syntactic and semantic interoperability between Web extension mechanisms and a variety of integration mechanisms used by open source and free software components. Its design is based on our experiences in solving practical problems where we have used open source components to improve accessibility of rich media Web applications. The second of our activities involves improving education, where we have used our platform to teach students how to build advanced accessibility solutions from diverse open-source software. We are also partially involved in the recently started Eclipse projects called Accessibility Tools Framework (ACTF), the aim of which is development of extensible infrastructure, upon which developers can build a variety of utilities that help to evaluate and enhance the accessibility of applications and content for people with disabilities. In this article we briefly report on these activities.
The Arabidopsis thaliana mobilome and its impact at the species level
Quadrana, Leandro; Bortolini Silveira, Amanda; Mayhew, George F; LeBlanc, Chantal; Martienssen, Robert A; Jeddeloh, Jeffrey A; Colot, Vincent
2016-01-01
Transposable elements (TEs) are powerful motors of genome evolution yet a comprehensive assessment of recent transposition activity at the species level is lacking for most organisms. Here, using genome sequencing data for 211 Arabidopsis thaliana accessions taken from across the globe, we identify thousands of recent transposition events involving half of the 326 TE families annotated in this plant species. We further show that the composition and activity of the 'mobilome' vary extensively between accessions in relation to climate and genetic factors. Moreover, TEs insert equally throughout the genome and are rapidly purged by natural selection from gene-rich regions because they frequently affect genes, in multiple ways. Remarkably, loci controlling adaptive responses to the environment are the most frequent transposition targets observed. These findings demonstrate the pervasive, species-wide impact that a rich mobilome can have and the importance of transposition as a recurrent generator of large-effect alleles. DOI: http://dx.doi.org/10.7554/eLife.15716.001 PMID:27258693
Jessmore, James J.; Loomis, Guy G.; Pettet, Mark C.; Flyckt, Melissa C.
2004-09-28
Systems and methods relating to subterranean drilling while maintaining containment of any contaminants released during the drilling. A thrust block installed over a zone of interest provides an overflow space for retaining any contaminants and excess sealant returns. Negative air pressure may be maintained in the overflow space by a ventilation system. Access ports in the thrust block seal the overflow space from the surrounding environment with a membrane seal. A flexible sack seal in the access port may be connected to a drill shroud prior to drilling, providing containment during drilling after the drill bit penetrates the membrane seal. The drill shroud may be adapted to any industry standard drilling rig and includes a connection conduit for connecting to the flexible sack seal and a flexible enclosure surrounding the drill shaft and of a length to accommodate full extension thereof. Upon withdrawal, the sack seal may be closed off and separated, maintaining containment of the overflow space and the drill shroud.
Efficient Access Control in Multimedia Social Networks
NASA Astrophysics Data System (ADS)
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
NASA Astrophysics Data System (ADS)
Mentis, Dimitrios; Howells, Mark; Rogner, Holger; Korkovelos, Alexandros; Arderne, Christopher; Zepeda, Eduardo; Siyal, Shahid; Taliotis, Costantinos; Bazilian, Morgan; de Roo, Ad; Tanvez, Yann; Oudalov, Alexandre; Scholtz, Ernst
2017-08-01
In September 2015, the United Nations General Assembly adopted Agenda 2030, which comprises a set of 17 Sustainable Development Goals (SDGs) defined by 169 targets. ‘Ensuring access to affordable, reliable, sustainable and modern energy for all by 2030’ is the seventh goal (SDG7). While access to energy refers to more than electricity, the latter is the central focus of this work. According to the World Bank’s 2015 Global Tracking Framework, roughly 15% of the world’s population (or 1.1 billion people) lack access to electricity, and many more rely on poor quality electricity services. The majority of those without access (87%) reside in rural areas. This paper presents results of a geographic information systems approach coupled with open access data. We present least-cost electrification strategies on a country-by-country basis for Sub-Saharan Africa. The electrification options include grid extension, mini-grid and stand-alone systems for rural, peri-urban, and urban contexts across the economy. At low levels of electricity demand there is a strong penetration of standalone technologies. However, higher electricity demand levels move the favourable electrification option from stand-alone systems to mini grid and to grid extensions.
Ionization processes in combined high-voltage nanosecond - laser discharges in inert gas
NASA Astrophysics Data System (ADS)
Starikovskiy, Andrey; Shneider, Mikhail; PU Team
2016-09-01
Remote control of plasmas induced by laser radiation in the atmosphere is one of the challenging issues of free space communication, long-distance energy transmission, remote sensing of the atmosphere, and standoff detection of trace gases and bio-threat species. Sequences of laser pulses, as demonstrated by an extensive earlier work, offer an advantageous tool providing access to the control of air-plasma dynamics and optical interactions. The avalanche ionization induced in a pre-ionized region by infrared laser pulses where investigated. Pre-ionization was created by an ionization wave, initiated by high-voltage nanosecond pulse. Then, behind the front of ionization wave extra avalanche ionization was initiated by the focused infrared laser pulse. The experiment was carried out in argon. It is shown that the gas pre-ionization inhibits the laser spark generation under low pressure conditions.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-08
... official version of this document is the document published in the Federal Register. Free Internet access... free, at 1- 800-877-8339. Accessible Format: Individuals with disabilities can obtain this document in... Document Format (PDF). To use PDF, you must have Adobe Acrobat Reader, which is available free at this site...
ERIC Educational Resources Information Center
Das, Biswa R.; Leatherman, John C.; Bressers, Bonnie M.
2015-01-01
The Internet has potential for improving health information delivery and strengthening connections between rural populations and local health service providers. An exploratory case study six rural health care markets in Kansas showed that about 70% of adults use the Internet, with substantial use for accessing health information. While there are…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-21
... Disability in Air Travel: Accessibility of Web Sites and Automated Kiosks at U.S. Airports AGENCY: Office of... January 9, 2012. This extension is a result of requests from a number of parties for additional time to... constructive comments for the Department's consideration. The Interactive Travel Services Association requested...
American Indians and Alaska Natives in Higher Education: Promoting Access and Achievement.
ERIC Educational Resources Information Center
Pavel, D. Michael
This chapter draws on an extensive literature review to examine factors that influence the access and achievement of American Indians and Alaska Natives in higher education. American Indians are less likely to attend college than other U.S. ethnic groups. This underrepresentation is partly due to precollege attributes: low scores on college…
Access, Outcomes, and Social Mobility in a Stratified System of Postsecondary Education
ERIC Educational Resources Information Center
Thompson, Jason
2017-01-01
Educational attainment sits at the core of research on social stratification in the United States. An extensive literature details the inequalities in access to levels of education, the socioeconomic rewards conferred upon those reaching higher levels of schooling, and the prospects for social mobility among those able to attain a college degree.…
Thirkell, Tom J; Cameron, Duncan D; Hodge, Angela
2016-08-01
Arbuscular mycorrhizal fungi (AMF) can transfer nitrogen (N) to host plants, but the ecological relevance is debated, as total plant N and biomass do not generally increase. The extent to which the symbiosis is mutually beneficial is thought to rely on the stoichiometry of N, phosphorus (P) and carbon (C) availability. While inorganic N fertilization has been shown to elicit strong mutualism, characterized by improved plant and fungal growth and mineral nutrition, similar responses following organic N addition are lacking. Using a compartmented microcosm experiment, we determined the significance to a mycorrhizal plant of placing a (15) N-labelled, nitrogen-rich patch of organic matter in a compartment to which only AMF hyphae had access. Control microcosms denied AMF hyphal access to the patch compartment. When permitted access to the patch compartment, the fungus proliferated extensively in the patch and transferred substantial quantities of N to the plant. Moreover, our data demonstrate that allowing hyphal access to an organic matter patch enhanced total plant N and P contents, with a simultaneous and substantial increase in plant biomass. Furthermore, we demonstrate that organic matter fertilization of arbuscular mycorrhizal plants can foster a mutually beneficial symbiosis based on nitrogen transfer, a phenomenon previously thought irrelevant. © 2015 The Authors. Plant, Cell & Environment published by John Wiley & Sons Ltd.
A semi-automated vascular access system for preclinical models
NASA Astrophysics Data System (ADS)
Berry-Pusey, B. N.; Chang, Y. C.; Prince, S. W.; Chu, K.; David, J.; Taschereau, R.; Silverman, R. W.; Williams, D.; Ladno, W.; Stout, D.; Tsao, T. C.; Chatziioannou, A.
2013-08-01
Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice.
Experiment Software and Projects on the Web with VISPA
NASA Astrophysics Data System (ADS)
Erdmann, M.; Fischer, B.; Fischer, R.; Geiser, E.; Glaser, C.; Müller, G.; Rieger, M.; Urban, M.; von Cube, R. F.; Welling, C.
2017-10-01
The Visual Physics Analysis (VISPA) project defines a toolbox for accessing software via the web. It is based on latest web technologies and provides a powerful extension mechanism that enables to interface a wide range of applications. Beyond basic applications such as a code editor, a file browser, or a terminal, it meets the demands of sophisticated experiment-specific use cases that focus on physics data analyses and typically require a high degree of interactivity. As an example, we developed a data inspector that is capable of browsing interactively through event content of several data formats, e.g., MiniAOD which is utilized by the CMS collaboration. The VISPA extension mechanism can also be used to embed external web-based applications that benefit from dynamic allocation of user-defined computing resources via SSH. For example, by wrapping the JSROOT project, ROOT files located on any remote machine can be inspected directly through a VISPA server instance. We introduced domains that combine groups of users and role-based permissions. Thereby, tailored projects are enabled, e.g. for teaching where access to student’s homework is restricted to a team of tutors, or for experiment-specific data that may only be accessible for members of the collaboration. We present the extension mechanism including corresponding applications and give an outlook onto the new permission system.
A service-oriented data access control model
NASA Astrophysics Data System (ADS)
Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali
2017-01-01
The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.
Medical Marijuana programs: implications for cannabis control policy--observations from Canada.
Fischer, Benedikt; Kuganesan, Sharan; Room, Robin
2015-01-01
While prohibition has been the dominant regime of cannabis control in most countries for decades, an increasing number of countries have been implementing cannabis control reforms recently, including decriminalization or even legalization frameworks. Canada has held out from this trend, although it has among the highest cannabis use rates in the world. Cannabis use is universally criminalized, and the current (conservative) federal government has vowed not to implement any softening reforms to cannabis control. As a result of several higher court decisions, the then federal government was forced to implement a 'medical marijuana access regulations' program in 2001 to allow severely ill patients therapeutic use and access to therapeutic cannabis while shielding them from prosecution. The program's regulations and approval processes were complex and subject to extensive criticism; initial uptake was low and most medical marijuana users continued their use and supply outside the program's auspices. This year, the government introduced new 'marijuana for medical purposes regulations', which allow physicians to 'authorize' medical marijuana use for virtually any health condition for which this is considered beneficial; supply is facilitated by licensed commercial producers. It is expected that some 500,000 users, and dozens of commercial producers will soon be approved under the program, arguably constituting - as with medical marijuana schemes elsewhere, e.g. in California--de facto 'legalization'. We discuss the question whether the evolving scope and realities of 'medical cannabis' provisions in Canada offer a 'sneaky side door' or a 'better third way' to cannabis control reform, and what the potential wider implications are of these developments. Copyright © 2014. Published by Elsevier B.V.
The Case for a Paradigm Shift in Extension from Information-Centric to Community-Centric Programming
ERIC Educational Resources Information Center
Strong, Emma; Rowntree, Jason; Thurlow, Kable; Raven, Matt R.
2015-01-01
Since its establishment through the Smith-Lever Act, the Cooperative Extension Service has sought to use non-formal education programs centered on community needs to provide research-based information. However, the onset of the information age has transformed the way knowledge is shared and as a result altered the way people access information.…
[Ultrasound in the emergency department as an extension of the practitioner's clinical examination].
Schmit, Aline; Pécoul, David; Lebret, Yannick; Dussoix, Philippe
2018-01-31
Ultrasound in the emergency department and general practice can be used as an extension of the physical examination, answering simple questions. It requires a short basic training that is easily accessible. This article illustrates with a few examples (kidney, lung and fractures) the interest of this formidable tool becoming unavoidable in the emergency department and general practice.
Using iPads as a Data Collection Tool in Extension Programming Evaluation
ERIC Educational Resources Information Center
Rowntree, J. E.; Witman, R. R.; Lindquist, G. L.; Raven, M. R.
2013-01-01
Program evaluation is an important part of Extension, especially with the increased emphasis on metrics and accountability. Agents are often the point persons for evaluation data collection, and Web-based surveys are a commonly used tool. The iPad tablet with Internet access has the potential to be an effective survey tool. iPads were field tested…
ERIC Educational Resources Information Center
Mayora, Carlos A.; Nieves, Idami; Ojeda, Victor
2014-01-01
A variety of computer-based models of Extensive Reading have emerged in the last decade. Different Information and Communication Technologies online usually support these models. However, such innovations are not feasible in contexts where the digital breach limits the access to Internet. The purpose of this paper is to report a project in which…
I/O-aware bandwidth allocation for petascale computing systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhou, Zhou; Yang, Xu; Zhao, Dongfang
In the Big Data era, the gap between the storage performance and an appli- cation's I/O requirement is increasing. I/O congestion caused by concurrent storage accesses from multiple applications is inevitable and severely harms the performance. Conventional approaches either focus on optimizing an ap- plication's access pattern individually or handle I/O requests on a low-level storage layer without any knowledge from the upper-level applications. In this paper, we present a novel I/O-aware bandwidth allocation framework to coordinate ongoing I/O requests on petascale computing systems. The motivation behind this innovation is that the resource management system has a holistic view ofmore » both the system state and jobs' activities and can dy- namically control the jobs' status or allocate resource on the y during their execution. We treat a job's I/O requests as periodical subjobs within its lifecycle and transform the I/O congestion issue into a classical scheduling problem. Based on this model, we propose a bandwidth management mech- anism as an extension to the existing scheduling system. We design several bandwidth allocation policies with different optimization objectives either on user-oriented metrics or system performance. We conduct extensive trace- based simulations using real job traces and I/O traces from a production IBM Blue Gene/Q system at Argonne National Laboratory. Experimental results demonstrate that our new design can improve job performance by more than 30%, as well as increasing system performance.« less
McDermott, J J; Randolph, T F; Staal, S J
1999-08-01
Livestock kept or produced in smallholder farming systems are an important component of the agricultural economy in the developing world. The role of livestock on smallholder farms varies widely, providing draught power for crop production or as a production activity for subsistence needs or market sale under systems ranging from extensive pastoralist to intensive, peri-urban feeder and dairy systems. A set of unique conditions and features characterise smallholder systems, and these need to be appreciated when assessing the strategies that have evolved for managing animal health in smallholder systems, and evaluating opportunities for improving disease control strategies. To provide a framework for discussing animal health issues and analytical methodogies, a typology of smallholder livestock and crop/livestock systems is developed. The typology considers livestock systems both in terms of the degree of intensification, as measured by market orientation and intensity of factor use, and in terms of importance within the household economy, as measured by contribution to household income. A number of characteristics are identified that distinguish smallholder systems from the commercialised systems of developed countries, including the multiple functions livestock serve, the integrated nature of livestock activities, multiple objectives of producers and lower capacity to bear risk at the household level, as well as poor infrastructure, markets, and access to information at the community level. Three representative smallholder livestock systems from Africa are described in detail, highlighting the relevant characteristics and the implications for analysing disease control strategies. Smallholder dairy systems in Kenya demonstrate the role of individual producer decision-making for animal health management in intensive, market-oriented systems, placing emphasis on farm-level risk and production management aspects of disease control. In extensive pastoralist systems where epidemic disease are still important and infrastructure is poor, disease control primarily involves managing communal natural resources, requiring a different analytical approach. Finally, in crop farming systems using draught cattle, the livestock activity is an integrated component of crop production and this must be reflected in the approach used to evaluate draught animal health management. Continued development of analytical approaches and decision-support tools for disease control strategies adapted to the special characteristics of these systems will be needed as smallholder systems continue to intensify in areas with good market access, and those in marginal areas face increasing pressures to optimally manage the natural resource base.
Safavi-Abbasi, Sam; de Oliveira, Jean G; Deshmukh, Pushpa; Reis, Cassius V; Brasiliense, Leonardo B C; Crawford, Neil R; Feiz-Erfan, Iman; Spetzler, Robert F; Preul, Mark C
2010-03-01
The aim of this study was to describe quantitatively the properties of the posterolateral approaches and their combination. Six silicone-injected cadaveric heads were dissected bilaterally. Quantitative data were generated with the Optotrak 3020 system (Northern Digital, Waterloo, Canada) and Surgiscope (Elekta Instruments, Inc., Atlanta, GA), including key anatomic points on the skull base and brainstem. All parameters were measured after the basic retrosigmoid craniectomy and then after combination with a basic far-lateral extension. The clinical results of 20 patients who underwent a combined retrosigmoid and far-lateral approach were reviewed. The change in accessibility to the lower clivus was greatest after the far-lateral extension (mean change, 43.62 +/- 10.98 mm2; P = .001). Accessibility to the constant landmarks, Meckel's cave, internal auditory meatus, and jugular foramen did not change significantly between the 2 approaches (P > .05). The greatest change in accessibility to soft tissue between the 2 approaches was to the lower brainstem (mean change, 33.88 +/- 5.25 mm2; P = .0001). Total removal was achieved in 75% of the cases. The average postoperative Glasgow Outcome Scale score of patients who underwent the combined retrosigmoid and far-lateral approach improved significantly, compared with the preoperative scores. The combination of the far-lateral and simple retrosigmoid approaches significantly increases the petroclival working area and access to the cranial nerves. However, risk of injury to neurovascular structures and time needed to extend the craniotomy must be weighed against the increased working area and angles of attack.
Langenbach, A; Oppel, Pascal; Grupp, Sina; Krinner, Sebastian; Pachowsky, Milena; Buder, Thomas; Schulz-Drost, Melanie; Hennig, Friedrich F; Schulz-Drost, Stefan
2017-11-09
Stabilizing techniques for flail chest injuries are described through wide surgical approaches to the chest wall, especially in the most affected posterior and lateral regions. Severe morbidity due to these invasive approaches needs to be considered due to dissection of the scapular guiding muscles and the risk of injuries to neurovascular bundles. This study discusses possibilities for minimized approaches to the posterior and lateral regions. Ten fresh-frozen cadavers in lateral decubitus position were observed on both sides. Each surgical arm was kept mobile during the procedure. Approaches were performed following a standard protocol with muscle-sparing incisions starting with 5 cm in length and extending to 10 and 15 cm. The accessible surface comparing the extensions was measured. Visible ribs were counted. In a next step, MatrixRib ® Plates were fixed to those ribs to prove the feasibility of rib stabilization through limited approaches. Combinations of the posterior and lateral minimized approaches allow surgical fixation of 6-9 and 7-11 ribs through 5 and 10 cm incisions, respectively. In the case of an extreme expansion of a rib fracture series, an access extension can be made to 15 cm to be able to adequately supply the entire hemithorax using two approaches. Extensive invasive surgical approaches to the thoracic wall can be replaced by reduced invasive and muscle-sparing access combinations. A free-moving positioning of the arm and an accurate preoperative plan for minimizing approaches are essential. Minimally invasive plate techniques are very helpful adjuncts.
Impact on access to medicines from TRIPS-Plus: a case study of Thai-US FTA.
Kessomboon, Nusaraporn; Limpananont, Jiraporn; Kulsomboon, Vidhaya; Maleewong, Usawadee; Eksaengsri, Achara; Paothong, Prinya
2010-05-01
This study assessed the impact of the Thai-US Free Trade Agreement (FTA) on access to medicines in Thailand. We first interpreted the text of the sixth round of Thai-US negotiations in 2006 on intellectual property rights (IPR). The impact was estimated using a macroeconomic model of the impact of changes in IPR. The estimated impact is based on a comparison between the current IPR situation and the proposed changes to IPR. The FTA text involves the period of patent extension from the Trade-Related Aspects of Intellectual Property Rights Agreement (TRIPS Agreement). The provisions involve the period of patent extension, which have to do with compensation for delays in patent registration and/or drug registration, data exclusivity that would result in a delay in generic drug entry, and the enforcing role of the Thai Food and Drug Administration of patent linkages. As a worst case scenario for this single provision, a 10 year patent extension would be given to compensate for delays in patent registration and/or drug registration. The impact on access to medicine, in the year 2027, would be: 1) A 32% increase in the medicine price index, 2) spending on medicines would increase to approximately USD 11,191 million, (USD1 = THB 33.9 on September 2, 2009), and 3) the domestic industry could loss USD 3.3 million. These results suggest there would be a severe restriction on the access to medicines under the TRIPS-Plus proposal. IPR protection of pharmaceuticals per the TRIPS-Plus proposal should be excluded from FTA negotiations.
McClelland, Shearwood; Perez, Carmen A
2018-01-01
Health disparities have profoundly affected underrepresented minorities throughout the United States, particularly with regard to access to evidence-based interventions such as surgery or medication. The degree of disparity in access to radiation therapy (RT) for Hispanic-American patients with cancer has not been previously examined in an extensive manner. An extensive literature search was performed using the PubMed database to examine studies investigating disparities in RT access for Hispanic-Americans. A total of 34 studies were found, spanning 10 organ systems. Disparities in access to RT for Hispanic-Americans were most prominently studied in cancers of the breast (15 studies), prostate (4 studies), head and neck (4 studies), and gynecologic system (3 studies). Disparities in RT access for Hispanic-Americans were prevalent regardless of the organ system studied and were compounded by limited English proficiency and/or birth outside of the United States. A total of 26 of 34 studies (77%) involved analysis of a population-based database, such as Surveillance, Epidemiology and End Result (15 studies); Surveillance, Epidemiology and End Result-Medicare (4 studies); National Cancer Database (3 studies); or a state tumor registry (4 studies). Hispanic-Americans in the United States have diminished RT access compared with Caucasian patients but are less likely to experience concomitant disparities in mortality than other underrepresented minorities that experience similar disparities (ie, African-Americans). Hispanic-Americans who are born outside of the United States and/or have limited English proficiency may be more likely to experience substandard RT access. These results underscore the importance of finding nationwide solutions to address such inequalities that hinder Hispanic-Americans and other underrepresented minorities throughout the United States.
Web-based X-ray quality control documentation.
David, George; Burnett, Lou Ann; Schenkel, Robert
2003-01-01
The department of radiology at the Medical College of Georgia Hospital and Clinics has developed an equipment quality control web site. Our goal is to provide immediate access to virtually all medical physics survey data. The web site is designed to assist equipment engineers, department management and technologists. By improving communications and access to equipment documentation, we believe productivity is enhanced. The creation of the quality control web site was accomplished in three distinct steps. First, survey data had to be placed in a computer format. The second step was to convert these various computer files to a format supported by commercial web browsers. Third, a comprehensive home page had to be designed to provide convenient access to the multitude of surveys done in the various x-ray rooms. Because we had spent years previously fine-tuning the computerization of the medical physics quality control program, most survey documentation was already in spreadsheet or database format. A major technical decision was the method of conversion of survey spreadsheet and database files into documentation appropriate for the web. After an unsatisfactory experience with a HyperText Markup Language (HTML) converter (packaged with spreadsheet and database software), we tried creating Portable Document Format (PDF) files using Adobe Acrobat software. This process preserves the original formatting of the document and takes no longer than conventional printing; therefore, it has been very successful. Although the PDF file generated by Adobe Acrobat is a proprietary format, it can be displayed through a conventional web browser using the freely distributed Adobe Acrobat Reader program that is available for virtually all platforms. Once a user installs the software, it is automatically invoked by the web browser whenever the user follows a link to a file with a PDF extension. Although no confidential patient information is available on the web site, our legal department recommended that we secure the site in order to keep out those wishing to make mischief. Our interim solution has not been to password protect the page, which we feared would hinder access for occasional legitimate users, but also not to provide links to it from other hospital and department pages. Utility and productivity were improved and time and money were saved by making radiological equipment quality control documentation instantly available on-line.
Identifying and Measuring Food Deserts in Rural Ohio
ERIC Educational Resources Information Center
Mulangu, Francis; Clark, Jill
2012-01-01
The purpose of our article is twofold. First, we introduce a framework for U.S. Extension educators to measure the extent of food access at any scale when information about food carried by retailers is limited. Second, we create a baseline for the Ohio Food Policy Council so that work to increase food access in rural areas will have a benchmark to…
ERIC Educational Resources Information Center
Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella
2011-01-01
The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II…
All in One Stop? The Accessibility of Work Support Programs at One-Stop Centers.
ERIC Educational Resources Information Center
Richer, Elise; Kubo, Hitomi; Frank, Abbey
The accessibility of work support programs at one-stop centers was examined in a study during which 33 telephone directors or managers of one-stop centers in 22 states were interviewed by telephone. The interviews established the existence of extensive differences between one-stop centers from the standpoint of all aspects of their operation,…
Old Tools for New Problems: Modifying Master Gardener Training to Improve Food Access in Rural Areas
ERIC Educational Resources Information Center
Randle, Anne
2015-01-01
Extension faces ever-changing problems, which can be addressed by modifying successful tools rather than inventing new ones. The Master Gardener program has proven its effectiveness, but the cost and time commitment can make it inaccessible to rural, low-income communities, where training in home gardening may address issues of food access and…
AEROSAT Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Aerosat Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Extending SQL to Support Privacy Policies
NASA Astrophysics Data System (ADS)
Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken
Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.
Lowe, H. J.
1993-01-01
This paper describes Image Engine, an object-oriented, microcomputer-based, multimedia database designed to facilitate the storage and retrieval of digitized biomedical still images, video, and text using inexpensive desktop computers. The current prototype runs on Apple Macintosh computers and allows network database access via peer to peer file sharing protocols. Image Engine supports both free text and controlled vocabulary indexing of multimedia objects. The latter is implemented using the TView thesaurus model developed by the author. The current prototype of Image Engine uses the National Library of Medicine's Medical Subject Headings (MeSH) vocabulary (with UMLS Meta-1 extensions) as its indexing thesaurus. PMID:8130596
Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels
Son, In Keun; Mao, Shiwen; Hur, Seung Min
2009-01-01
We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks. PMID:22408556
Weingarten, Rebecca A; Johnson, Ryan C; Conlan, Sean; Ramsburg, Amanda M; Dekker, John P; Lau, Anna F; Khil, Pavel; Odom, Robin T; Deming, Clay; Park, Morgan; Thomas, Pamela J; Henderson, David K; Palmore, Tara N; Segre, Julia A; Frank, Karen M
2018-02-06
The hospital environment is a potential reservoir of bacteria with plasmids conferring carbapenem resistance. Our Hospital Epidemiology Service routinely performs extensive sampling of high-touch surfaces, sinks, and other locations in the hospital. Over a 2-year period, additional sampling was conducted at a broader range of locations, including housekeeping closets, wastewater from hospital internal pipes, and external manholes. We compared these data with previously collected information from 5 years of patient clinical and surveillance isolates. Whole-genome sequencing and analysis of 108 isolates provided comprehensive characterization of bla KPC / bla NDM -positive isolates, enabling an in-depth genetic comparison. Strikingly, despite a very low prevalence of patient infections with bla KPC -positive organisms, all samples from the intensive care unit pipe wastewater and external manholes contained carbapenemase-producing organisms (CPOs), suggesting a vast, resilient reservoir. We observed a diverse set of species and plasmids, and we noted species and susceptibility profile differences between environmental and patient populations of CPOs. However, there were plasmid backbones common to both populations, highlighting a potential environmental reservoir of mobile elements that may contribute to the spread of resistance genes. Clear associations between patient and environmental isolates were uncommon based on sequence analysis and epidemiology, suggesting reasonable infection control compliance at our institution. Nonetheless, a probable nosocomial transmission of Leclercia sp. from the housekeeping environment to a patient was detected by this extensive surveillance. These data and analyses further our understanding of CPOs in the hospital environment and are broadly relevant to the design of infection control strategies in many infrastructure settings. IMPORTANCE Carbapenemase-producing organisms (CPOs) are a global concern because of the morbidity and mortality associated with these resistant Gram-negative bacteria. Horizontal plasmid transfer spreads the resistance mechanism to new bacteria, and understanding the plasmid ecology of the hospital environment can assist in the design of control strategies to prevent nosocomial infections. A 5-year genomic and epidemiological survey was undertaken to study the CPOs in the patient-accessible environment, as well as in the plumbing system removed from the patient. This comprehensive survey revealed a vast, unappreciated reservoir of CPOs in wastewater, which was in contrast to the low positivity rate in both the patient population and the patient-accessible environment. While there were few patient-environmental isolate associations, there were plasmid backbones common to both populations. These results are relevant to all hospitals for which CPO colonization may not yet be defined through extensive surveillance.
NEUTRONIC REACTOR CONTROL ROD DRIVE APPARATUS
Oakes, L.C.; Walker, C.S.
1959-12-15
ABS>A suspension mechanism between a vertically movable nuclear reactor control rod and a rod extension, which also provides information for the operator or an automatic control signal, is described. A spring connects the rod extension to a drive shift. The extension of the spring indicates whether (1) the rod is at rest on the reactor, (2) the rod and extension are suspended, or (3) the extension alone is suspended, the spring controlling a 3-position electrical switch.
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
User-friendly solutions for microarray quality control and pre-processing on ArrayAnalysis.org
Eijssen, Lars M. T.; Jaillard, Magali; Adriaens, Michiel E.; Gaj, Stan; de Groot, Philip J.; Müller, Michael; Evelo, Chris T.
2013-01-01
Quality control (QC) is crucial for any scientific method producing data. Applying adequate QC introduces new challenges in the genomics field where large amounts of data are produced with complex technologies. For DNA microarrays, specific algorithms for QC and pre-processing including normalization have been developed by the scientific community, especially for expression chips of the Affymetrix platform. Many of these have been implemented in the statistical scripting language R and are available from the Bioconductor repository. However, application is hampered by lack of integrative tools that can be used by users of any experience level. To fill this gap, we developed a freely available tool for QC and pre-processing of Affymetrix gene expression results, extending, integrating and harmonizing functionality of Bioconductor packages. The tool can be easily accessed through a wizard-like web portal at http://www.arrayanalysis.org or downloaded for local use in R. The portal provides extensive documentation, including user guides, interpretation help with real output illustrations and detailed technical documentation. It assists newcomers to the field in performing state-of-the-art QC and pre-processing while offering data analysts an integral open-source package. Providing the scientific community with this easily accessible tool will allow improving data quality and reuse and adoption of standards. PMID:23620278
Newman, Jonathan P.; Zeller-Townson, Riley; Fong, Ming-Fai; Arcot Desai, Sharanya; Gross, Robert E.; Potter, Steve M.
2013-01-01
Single neuron feedback control techniques, such as voltage clamp and dynamic clamp, have enabled numerous advances in our understanding of ion channels, electrochemical signaling, and neural dynamics. Although commercially available multichannel recording and stimulation systems are commonly used for studying neural processing at the network level, they provide little native support for real-time feedback. We developed the open-source NeuroRighter multichannel electrophysiology hardware and software platform for closed-loop multichannel control with a focus on accessibility and low cost. NeuroRighter allows 64 channels of stimulation and recording for around US $10,000, along with the ability to integrate with other software and hardware. Here, we present substantial enhancements to the NeuroRighter platform, including a redesigned desktop application, a new stimulation subsystem allowing arbitrary stimulation patterns, low-latency data servers for accessing data streams, and a new application programming interface (API) for creating closed-loop protocols that can be inserted into NeuroRighter as plugin programs. This greatly simplifies the design of sophisticated real-time experiments without sacrificing the power and speed of a compiled programming language. Here we present a detailed description of NeuroRighter as a stand-alone application, its plugin API, and an extensive set of case studies that highlight the system’s abilities for conducting closed-loop, multichannel interfacing experiments. PMID:23346047
Remote Control and Data Acquisition: A Case Study
NASA Technical Reports Server (NTRS)
DeGennaro, Alfred J.; Wilkinson, R. Allen
2000-01-01
This paper details software tools developed to remotely command experimental apparatus, and to acquire and visualize the associated data in soft real time. The work was undertaken because commercial products failed to meet the needs. This work has identified six key factors intrinsic to development of quality research laboratory software. Capabilities include access to all new instrument functions without any programming or dependence on others to write drivers or virtual instruments, simple full screen text-based experiment configuration and control user interface, months of continuous experiment run-times, order of 1% CPU load for condensed matter physics experiment described here, very little imposition of software tool choices on remote users, and total remote control from anywhere in the world over the Internet or from home on a 56 Kb modem as if the user is sitting in the laboratory. This work yielded a set of simple robust tools that are highly reliable, resource conserving, extensible, and versatile, with a uniform simple interface.
An object oriented extension to CLIPS
NASA Technical Reports Server (NTRS)
Sobkowicz, Clifford
1990-01-01
A presentation of software sub-system developed to augment C Language Production Systems (CLIPS) with facilities for object oriented Knowledge representation. Functions are provided to define classes, instantiate objects, access attributes, and assert object related facts. This extension is implemented via the CLIPS user function interface and does not require modification of any CLIPS code. It does rely on internal CLIPS functions for memory management and symbol representation.
Connecting Our Nation’s Crisis Information Management Systems
2008-12-01
Voice Alert is a communications solution that uses a combination of database and GIS mapping technologies to deliver outbound notifications.85 EOC...needing to be accessed through an extension is necessary. With many businesses, hotels , and other locations requiring an extension to reach...built around five major management activities of an incident.130 Command Operations Planning Logistics Finance/administration. The new
Meckel's cave access: anatomic study comparing the endoscopic transantral and endonasal approaches.
Van Rompaey, Jason; Suruliraj, Anand; Carrau, Ricardo; Panizza, Benedict; Solares, C Arturo
2014-04-01
Recent advances in endonasal endoscopy have facilitated the surgical access to the lateral skull base including areas such as Meckel's cave. This approach has been well documented, however, few studies have outlined transantral specific access to Meckel's. A transantral approach provides a direct pathway to this region obviating the need for extensive endonasal and transsphenoidal resection. Our aim in this study is to compare the anatomical perspectives obtained in endonasal and transantral approaches. We prepared 14 cadaveric specimens with intravascular injections of colored latex. Eight cadavers underwent endoscopic endonasal transpterygoid approaches to Meckel's cave. Six additional specimens underwent an endoscopic transantral approach to the same region. Photographic evidence was obtained for review. 30 CT scans were analyzed to measure comparative distances to Meckel's cave for both approaches. The endoscopic approaches provided a direct access to the anterior and inferior portions of Meckel's cave. However, the transantral approach required shorter instrumentation, and did not require clearing of the endonasal corridor. This approach gave an anterior view of Meckel's cave making posterior dissection more difficult. A transantral approach to Meckel's cave provides access similar to the endonasal approach with minimal invasiveness. Some of the morbidity associated with extensive endonasal resection could possibly be avoided. Better understanding of the complex skull base anatomy, from different perspectives, helps to improve current endoscopic skull base surgery and to develop new alternatives, consequently, leading to improvements in safety and efficacy.
NASA Astrophysics Data System (ADS)
Mentis, Dimitrios; Howells, Mark; Rogner, Holger; Korkovelos, Alexandros; Arderne, Christopher; Siyal, Shahid; Zepeda, Eduardo; Taliotis, Constantinos; Bazilian, Morgan; de Roo, Ad; Tanvez, Yann; Oudalov, Alexandre; Scholtz, Ernst
2017-04-01
In September 2015, the United Nations General Assembly adopted Agenda 2030, which comprises a set of 17 Sustainable Development Goals (SDGs) defined by 169 targets. "Ensuring access to affordable, reliable, sustainable and modern energy for all by 2030" is the seventh goal (SDG7). While access to energy refers to more than electricity, the latter is the central focus of this work. According to the World Bank's 2015 Global Tracking Framework, roughly 15% of world population (or 1.1 billion people) lack access to electricity, and many more rely on poor quality electricity services. The majority of those without access (87%) reside in rural areas. This paper presents results of a Geographic Information Systems (GIS) approach coupled with open access data and linked to the Electricity Model Base for Africa (TEMBA), a model that represents each continental African country's electricity supply system. We present least-cost electrification strategies on a country-by-country basis for Sub-Saharan Africa. The electrification options include grid extension, mini-grid and stand-alone systems for rural, peri-urban, and urban contexts across the economy. At low levels of electricity demand there is a strong penetration of standalone technologies. However, higher electricity demand levels move the favourable electrification option from stand-alone systems to mini grid and to grid extensions.
PAD-MAC: Primary User Activity-Aware Distributed MAC for Multi-Channel Cognitive Radio Networks
Ali, Amjad; Piran, Md. Jalil; Kim, Hansoo; Yun, Jihyeok; Suh, Doug Young
2015-01-01
Cognitive radio (CR) has emerged as a promising technology to solve problems related to spectrum scarcity and provides a ubiquitous wireless access environment. CR-enabled secondary users (SUs) exploit spectrum white spaces opportunistically and immediately vacate the acquired licensed channels as primary users (PUs) arrive. Accessing the licensed channels without the prior knowledge of PU traffic patterns causes severe throughput degradation due to excessive channel switching and PU-to-SU collisions. Therefore, it is significantly important to design a PU activity-aware medium access control (MAC) protocol for cognitive radio networks (CRNs). In this paper, we first propose a licensed channel usage pattern identification scheme, based on a two-state Markov model, and then estimate the future idle slots using previous observations of the channels. Furthermore, based on these past observations, we compute the rank of each available licensed channel that gives SU transmission success assessment during the estimated idle slot. Secondly, we propose a PU activity-aware distributed MAC (PAD-MAC) protocol for heterogeneous multi-channel CRNs that selects the best channel for each SU to enhance its throughput. PAD-MAC controls SU activities by allowing them to exploit the licensed channels only for the duration of estimated idle slots and enables predictive and fast channel switching. To evaluate the performance of the proposed PAD-MAC, we compare it with the distributed QoS-aware MAC (QC-MAC) and listen-before-talk MAC schemes. Extensive numerical results show the significant improvements of the PAD-MAC in terms of the SU throughput, SU channel switching rate and PU-to-SU collision rate. PMID:25831084
The swan-song phenomenon: last-works effects for 172 classical composers.
Simonton, D K
1989-03-01
Creative individuals approaching their final years of life may undergo a transformation in outlook that is reflected in their last works. This hypothesized effect was quantitatively assessed for an extensive sample of 1,919 works by 172 classical composers. The works were independently gauged on seven aesthetic attributes (melodic originality, melodic variation, repertoire popularity, aesthetic significance, listener accessibility, performance duration, and thematic size), and potential last-works effects were operationally defined two separate ways (linearly and exponentially). Statistical controls were introduced for both longitudinal changes (linear, quadratic, and cubic age functions) and individual differences (eminence and lifetime productivity). Hierarchical regression analyses indicated that composers' swan songs tend to score lower in melodic originality and performance duration but higher in repertoire popularity and aesthetic significance. These last-works effects survive control for total compositional output, eminence, and most significantly, the composer's age when the last works were created.
Kamphuis, Lars G; Hane, James K; Nelson, Matthew N; Gao, Lingling; Atkins, Craig A; Singh, Karam B
2015-01-01
Narrow-leafed lupin (NLL; Lupinus angustifolius L.) is an important grain legume crop that is valuable for sustainable farming and is becoming recognized as a human health food. NLL breeding is directed at improving grain production, disease resistance, drought tolerance and health benefits. However, genetic and genomic studies have been hindered by a lack of extensive genomic resources for the species. Here, the generation, de novo assembly and annotation of transcriptome datasets derived from five different NLL tissue types of the reference accession cv. Tanjil are described. The Tanjil transcriptome was compared to transcriptomes of an early domesticated cv. Unicrop, a wild accession P27255, as well as accession 83A:476, together being the founding parents of two recombinant inbred line (RIL) populations. In silico predictions for transcriptome-derived gene-based length and SNP polymorphic markers were conducted and corroborated using a survey assembly sequence for NLL cv. Tanjil. This yielded extensive indel and SNP polymorphic markers for the two RIL populations. A total of 335 transcriptome-derived markers and 66 BAC-end sequence-derived markers were evaluated, and 275 polymorphic markers were selected to genotype the reference NLL 83A:476 × P27255 RIL population. This significantly improved the completeness, marker density and quality of the reference NLL genetic map. PMID:25060816
Teletesting at IABG - Technical Features and Security Issues
NASA Astrophysics Data System (ADS)
Goerner, E.
2004-08-01
In the space simulation department at IABG data handling systems are used to collect, evaluate and present all data gathered from different test chambers during thermal vacuum tests. In the year 2000 a redesign of the existing data handling systems gave us the opportunity to add some features like ethernet- based client / server systems and internet protocol TCP / IP. The results were state of the art internet-ready data handling systems. Based on this we started mid 2002 with a new project called teletesting to give our customers remote access to test data. For the realisation TCO (Total Cost of Ownership), QoS (Quality of Service), data confidentiality, restrictive access to test data and a plain and simple user interface with standard components, i.e. normal PC hardware and software, were mandatory. As a result of this project, our customers have now online access to their test data in CSV/EXCEL format, in display mode either in numerical or graphical form and through DynaWorks. ISDN teletesting is already used by our customers, internet teletesting is in test mode but some parts have already been approved and used. Although an extension to teleoperation is implemented in the control systems (WIN CC) of our test chambers, it is not yet in use.
WebVR: an interactive web browser for virtual environments
NASA Astrophysics Data System (ADS)
Barsoum, Emad; Kuester, Falko
2005-03-01
The pervasive nature of web-based content has lead to the development of applications and user interfaces that port between a broad range of operating systems and databases, while providing intuitive access to static and time-varying information. However, the integration of this vast resource into virtual environments has remained elusive. In this paper we present an implementation of a 3D Web Browser (WebVR) that enables the user to search the internet for arbitrary information and to seamlessly augment this information into virtual environments. WebVR provides access to the standard data input and query mechanisms offered by conventional web browsers, with the difference that it generates active texture-skins of the web contents that can be mapped onto arbitrary surfaces within the environment. Once mapped, the corresponding texture functions as a fully integrated web-browser that will respond to traditional events such as the selection of links or text input. As a result, any surface within the environment can be turned into a web-enabled resource that provides access to user-definable data. In order to leverage from the continuous advancement of browser technology and to support both static as well as streamed content, WebVR uses ActiveX controls to extract the desired texture skin from industry strength browsers, providing a unique mechanism for data fusion and extensibility.
Welding torch gas cup extension
NASA Technical Reports Server (NTRS)
Gordon, Stephen S. (Inventor)
1988-01-01
The invention relates to a gas shielded electric arc welding torch having a detachable gas cup extension which may be of any desired configuration or length. The gas cup extension assembly is mounted on a standard electric welding torch gas cup to enable welding in areas with limited access. The gas cup assembly has an upper tubular insert that fits within the gas cup such that its lower portion protrudes thereform and has a lower tubular extension that is screwed into the lower portion. The extension has a rim to define the outer perimeter of the seat edge about its entrance opening so a gasket may be placed to effect an airtight seal between the gas cup and extension. The tubular extension may be made of metal or cermaic material that can be machined. The novelty lies in the use of an extension assembly for a standard gas cup of an electric arc welding torch which extension assembly is detachable permitting the use of a number of extensions which may be of different configurations and materials and yet fit the standard gas cup.
ERIC Educational Resources Information Center
Nkuyubwatsi, Bernard
2016-01-01
Recent reports on xMOOCs indicate that underprivileged learners in need of higher education have minimally been reached by these courses. While the "open access" agenda is needed to reach such learners, most MOOCs have been developed in societies that have shifted toward the "lifelong learning" agenda. In this paper, xMOOCs are…
Multiprocessor smalltalk: Implementation, performance, and analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pallas, J.I.
1990-01-01
Multiprocessor Smalltalk demonstrates the value of object-oriented programming on a multiprocessor. Its implementation and analysis shed light on three areas: concurrent programming in an object oriented language without special extensions, implementation techniques for adapting to multiprocessors, and performance factors in the resulting system. Adding parallelism to Smalltalk code is easy, because programs already use control abstractions like iterators. Smalltalk's basic control and concurrency primitives (lambda expressions, processes and semaphores) can be used to build parallel control abstractions, including parallel iterators, parallel objects, atomic objects, and futures. Language extensions for concurrency are not required. This implementation demonstrates that it is possiblemore » to build an efficient parallel object-oriented programming system and illustrates techniques for doing so. Three modification tools-serialization, replication, and reorganization-adapted the Berkeley Smalltalk interpreter to the Firefly multiprocessor. Multiprocessor Smalltalk's performance shows that the combination of multiprocessing and object-oriented programming can be effective: speedups (relative to the original serial version) exceed 2.0 for five processors on all the benchmarks; the median efficiency is 48%. Analysis shows both where performance is lost and how to improve and generalize the experimental results. Changes in the interpreter to support concurrency add at most 12% overhead; better access to per-process variables could eliminate much of that. Changes in the user code to express concurrency add as much as 70% overhead; this overhead could be reduced to 54% if blocks (lambda expressions) were reentrant. Performance is also lost when the program cannot keep all five processors busy.« less
PIMS sequencing extension: a laboratory information management system for DNA sequencing facilities.
Troshin, Peter V; Postis, Vincent Lg; Ashworth, Denise; Baldwin, Stephen A; McPherson, Michael J; Barton, Geoffrey J
2011-03-07
Facilities that provide a service for DNA sequencing typically support large numbers of users and experiment types. The cost of services is often reduced by the use of liquid handling robots but the efficiency of such facilities is hampered because the software for such robots does not usually integrate well with the systems that run the sequencing machines. Accordingly, there is a need for software systems capable of integrating different robotic systems and managing sample information for DNA sequencing services. In this paper, we describe an extension to the Protein Information Management System (PIMS) that is designed for DNA sequencing facilities. The new version of PIMS has a user-friendly web interface and integrates all aspects of the sequencing process, including sample submission, handling and tracking, together with capture and management of the data. The PIMS sequencing extension has been in production since July 2009 at the University of Leeds DNA Sequencing Facility. It has completely replaced manual data handling and simplified the tasks of data management and user communication. Samples from 45 groups have been processed with an average throughput of 10000 samples per month. The current version of the PIMS sequencing extension works with Applied Biosystems 3130XL 96-well plate sequencer and MWG 4204 or Aviso Theonyx liquid handling robots, but is readily adaptable for use with other combinations of robots. PIMS has been extended to provide a user-friendly and integrated data management solution for DNA sequencing facilities that is accessed through a normal web browser and allows simultaneous access by multiple users as well as facility managers. The system integrates sequencing and liquid handling robots, manages the data flow, and provides remote access to the sequencing results. The software is freely available, for academic users, from http://www.pims-lims.org/.
PathwayAccess: CellDesigner plugins for pathway databases.
Van Hemert, John L; Dickerson, Julie A
2010-09-15
CellDesigner provides a user-friendly interface for graphical biochemical pathway description. Many pathway databases are not directly exportable to CellDesigner models. PathwayAccess is an extensible suite of CellDesigner plugins, which connect CellDesigner directly to pathway databases using respective Java application programming interfaces. The process is streamlined for creating new PathwayAccess plugins for specific pathway databases. Three PathwayAccess plugins, MetNetAccess, BioCycAccess and ReactomeAccess, directly connect CellDesigner to the pathway databases MetNetDB, BioCyc and Reactome. PathwayAccess plugins enable CellDesigner users to expose pathway data to analytical CellDesigner functions, curate their pathway databases and visually integrate pathway data from different databases using standard Systems Biology Markup Language and Systems Biology Graphical Notation. Implemented in Java, PathwayAccess plugins run with CellDesigner version 4.0.1 and were tested on Ubuntu Linux, Windows XP and 7, and MacOSX. Source code, binaries, documentation and video walkthroughs are freely available at http://vrac.iastate.edu/~jlv.
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
McCoy, Sandra I; Ralph, Lauren J; Wilson, Wema; Padian, Nancy S
2013-01-01
Although women occupy a central position in agriculture in many developing countries, they face numerous constraints to achieving their full potential including unequal access to assets and limited decision-making authority. We explore the intersection of agricultural livelihoods, food and economic security, and women's sexual and reproductive health in Iringa Region, Tanzania. Our goal was to understand whether the benefits of supporting women in the agricultural sector might also extend to more distal outcomes, including sexual and reproductive health. Using the Sustainable Livelihoods Framework to guide data collection, we conducted 13 focus group discussions (FGD) with female (n = 11) and male farmers (n = 2) and 20 in-depth interviews with agricultural extension officers (n = 10) and village agro-dealers (n = 10). Despite providing the majority of agricultural labor, women have limited control over land and earned income and have little bargaining power. In response to these constraints, women adopt adaptive livelihood strategies, such as alcohol production, that allow them to retain control over income and support their households. However, women's central role in alcohol production, in concert with the ubiquitous nature of alcohol consumption, places them at risk by enhancing their vulnerability to unsafe or transactional sex. This represents a dangerous confluence of risk for female farmers, in which alcohol plays an important role in income generation and also facilitates high-risk sexual behavior. Alcohol production and consumption has the potential to both directly and indirectly place women at risk for undesirable sexual and reproductive health outcomes. Group formation, better access to finance, and engaging with agricultural extension officers were identified as potential interventions for supporting women farmers and challenging harmful gender norms. In addition, joint, multi-sectoral approaches from health and agriculture and alternative income-generating strategies for women might better address the complexities of achieving safe and sustainable livelihoods for women in this context.
McCoy, Sandra I.; Ralph, Lauren J.; Wilson, Wema; Padian, Nancy S.
2013-01-01
Background Although women occupy a central position in agriculture in many developing countries, they face numerous constraints to achieving their full potential including unequal access to assets and limited decision-making authority. We explore the intersection of agricultural livelihoods, food and economic security, and women’s sexual and reproductive health in Iringa Region, Tanzania. Our goal was to understand whether the benefits of supporting women in the agricultural sector might also extend to more distal outcomes, including sexual and reproductive health. Methods Using the Sustainable Livelihoods Framework to guide data collection, we conducted 13 focus group discussions (FGD) with female (n = 11) and male farmers (n = 2) and 20 in-depth interviews with agricultural extension officers (n = 10) and village agro-dealers (n = 10). Results Despite providing the majority of agricultural labor, women have limited control over land and earned income and have little bargaining power. In response to these constraints, women adopt adaptive livelihood strategies, such as alcohol production, that allow them to retain control over income and support their households. However, women’s central role in alcohol production, in concert with the ubiquitous nature of alcohol consumption, places them at risk by enhancing their vulnerability to unsafe or transactional sex. This represents a dangerous confluence of risk for female farmers, in which alcohol plays an important role in income generation and also facilitates high-risk sexual behavior. Conclusions Alcohol production and consumption has the potential to both directly and indirectly place women at risk for undesirable sexual and reproductive health outcomes. Group formation, better access to finance, and engaging with agricultural extension officers were identified as potential interventions for supporting women farmers and challenging harmful gender norms. In addition, joint, multi-sectoral approaches from health and agriculture and alternative income-generating strategies for women might better address the complexities of achieving safe and sustainable livelihoods for women in this context. PMID:23527167
PCDAQ, A Windows Based DAQ System
NASA Astrophysics Data System (ADS)
Hogan, Gary
1998-10-01
PCDAQ is a Windows NT based general DAQ/Analysis/Monte Carlo shell developed as part of the Proton Radiography project at LANL (Los Alamos National Laboratory). It has been adopted by experiments outside of the Proton Radiography project at Brookhaven National Laboratory (BNL) and at LANL. The program provides DAQ, Monte Carlo, and replay (disk file input) modes. Data can be read from hardware (CAMAC) or other programs (ActiveX servers). Future versions will read VME. User supplied data analysis routines can be written in Fortran, C++, or Visual Basic. Histogramming, testing, and plotting packages are provided. Histogram data can be exported to spreadsheets or analyzed in user supplied programs. Plots can be copied and pasted as bitmap objects into other Windows programs or printed. A text database keyed by the run number is provided. Extensive software control flags are provided so that the user can control the flow of data through the program. Control flags can be set either in script command files or interactively. The program can be remotely controlled and data accessed over the Internet through its ActiveX DCOM interface.
Welch, Vivian; Jull, J; Petkovic, J; Armstrong, R; Boyer, Y; Cuervo, L G; Edwards, Sjl; Lydiatt, A; Gough, D; Grimshaw, J; Kristjansson, E; Mbuagbaw, L; McGowan, J; Moher, D; Pantoja, T; Petticrew, M; Pottie, K; Rader, T; Shea, B; Taljaard, M; Waters, E; Weijer, C; Wells, G A; White, H; Whitehead, M; Tugwell, P
2015-10-21
Health equity concerns the absence of avoidable and unfair differences in health. Randomized controlled trials (RCTs) can provide evidence about the impact of an intervention on health equity for specific disadvantaged populations or in general populations; this is important for equity-focused decision-making. Previous work has identified a lack of adequate reporting guidelines for assessing health equity in RCTs. The objective of this study is to develop guidelines to improve the reporting of health equity considerations in RCTs, as an extension of the Consolidated Standards of Reporting Trials (CONSORT). A six-phase study using integrated knowledge translation governed by a study executive and advisory board will assemble empirical evidence to inform the CONSORT-equity extension. To create the guideline, the following steps are proposed: (1) develop a conceptual framework for identifying "equity-relevant trials," (2) assess empirical evidence regarding reporting of equity-relevant trials, (3) consult with global methods and content experts on how to improve reporting of health equity in RCTs, (4) collect broad feedback and prioritize items needed to improve reporting of health equity in RCTs, (5) establish consensus on the CONSORT-equity extension: the guideline for equity-relevant trials, and (6) broadly disseminate and implement the CONSORT-equity extension. This work will be relevant to a broad range of RCTs addressing questions of effectiveness for strategies to improve practice and policy in the areas of social determinants of health, clinical care, health systems, public health, and international development, where health and/or access to health care is a primary outcome. The outcomes include a reporting guideline (CONSORT-equity extension) for equity-relevant RCTs and a knowledge translation strategy to broadly encourage its uptake and use by journal editors, authors, and funding agencies.
Contralateral transmaxillary corridor: an augmented endoscopic approach to the petrous apex.
Patel, Chirag R; Wang, Eric W; Fernandez-Miranda, Juan C; Gardner, Paul A; Snyderman, Carl H
2017-10-20
OBJECTIVE The endoscopic endonasal approach (EEA) has been shown to be an effective means of accessing lesions of the petrous apex. Lesions that are lateral to the paraclival segment of the internal carotid artery (ICA) require lateralization of the paraclival segment of the ICA or a transpterygoid infrapetrous approach. In this study the authors studied the feasibility of adding a contralateral transmaxillary (CTM) corridor to provide greater access to the petrous apex with decreased need for manipulation of the ICA. METHODS Using image guidance, EEA and CTM extension were performed bilaterally on 5 cadavers. The anterior wall of the sphenoid sinus and rostrum were removed. The angle of the surgical approach from the axis of the petrous segment of the ICA was measured. Five illustrative clinical cases are presented. RESULTS The CTM corridor required a partial medial maxillectomy. When measured from the axis of the petrous ICA, the CTM corridor decreased the angle from 44.8° ± 2.78° to 20.1° ± 4.31°, a decrease of 24.7° ± 2.58°. Drilling through the CTM corridor allowed the drill to reach lateral aspects of the petrous apex that would have required lateralization of the ICA or would not have been accessible via EEA. The CTM corridor allowed us to achieve gross-total resection of the petrous apex region in 5 clinical cases with significant paraclival extension. CONCLUSIONS The CTM corridor is a feasible extension to the standard EEA to the petrous apex that offers a more lateral trajectory with improved access. This approach may reduce the risk and morbidity associated with manipulation of the paraclival ICA.
Investigating the disparities in cervical cancer screening among Namibian women.
Kangmennaang, Joseph; Thogarapalli, Nandini; Mkandawire, Paul; Luginaah, Isaac
2015-08-01
We examined the influence of knowledge and information, health care access and different socio-economic variables on women's decision to screen for cervical cancer using a nationally representative dataset. We use hierarchical binary logit regression models to explore the determinants of screening for cervical cancer among women who reported hearing about cervical cancer. This enabled us to include the effect of unobserved heterogeneity at the cluster level that may affect screening behaviors. Among women who have heard about cervical cancer (N=6542), only 39% of them did undergo screening with a mean age of 33 years. The univariate results reveal that women who are educated, insured, can afford money needed for treatment and reported distance not a barrier to accessing healthcare were more likely to screen. Our multivariate results indicate that insured women (OR=1.89, p=0.001) and women who had access to information through education and contact with a health worker (OR=1.41, p=0.001) were more likely to undertake screening compared to uninsured women and those with no contact with a health personnel, after controlling for relevant variables. The adoption of a universal health insurance scheme that ensures equity in access to health care and extension of public health information targeting women in rural communities especially within the Caprivi region may be needed for a large scale increase in cervical cancer screening in Namibia. Copyright © 2015 Elsevier Inc. All rights reserved.
Studies of lightning data in conjunction with geostationary satellite data
NASA Technical Reports Server (NTRS)
Auvine, B.; Martin, D.
1985-01-01
Since January, work has been proceeding on the first phase of this project: the creation of an extensive real-time lightning data base accessible via the Space Science and Engineering Center McIdas system. The purpose of this endeavor is two-fold: to enhance the availability and ease of access to lightning data among the various networks, governmental and research agencies; and to test the feasiblity and desirability of such efforts in succeeding years. The final steps in the creation of the necessary communications links, hardware, and software are in the process of being completed. Operations ground rules for access among the various users have been discussed and are being refined. While the research planned for the last year of the project will rely for the most part on archived, quality-controlled data from the various networks, the real-time data will provide a valuable first-look at potentially interesting case studies. For this purpose, tools are being developed on McIdas for display and analysis of the data as they become available. In conjunction with concurrent GOES real-time imagery, strike locations can be plotted, gridded and contoured, or displayed in various statistical formats including frequency distributions, histograms, and scatter plots. The user may also perform these functions in relation to arbitrarily defined areas on the satellite image. By mid-May these preparations for the access and analysis of real-time lightning data are expected to be complete.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Water access, water scarcity, and climate change.
Mukheibir, Pierre
2010-05-01
This article investigates the approaches of the various discourses operating in the water sector and how they address the issues of scarcity and equitable access under projected climate change impacts. Little synergy exists between the different approaches dealing with these issues. Whilst being a sustainable development and water resources management issue, a holistic view of access, scarcity and the projected impacts of climate change is not prevalent in these discourses. The climate change discourse too does not adequately bridge the gap between these issues. The projected impacts of climate change are likely to exacerbate the problems of scarcity and equitable access unless appropriate adaptation strategies are adopted and resilience is built. The successful delivery of accessible water services under projected climate change impacts therefore lies with an extension of the adaptive water management approach to include equitable access as a key driver.
Spatial Accessibility and Availability Measures and Statistical Properties in the Food Environment
Van Meter, E.; Lawson, A.B.; Colabianchi, N.; Nichols, M.; Hibbert, J.; Porter, D.; Liese, A.D.
2010-01-01
Spatial accessibility is of increasing interest in the health sciences. This paper addresses the statistical use of spatial accessibility and availability indices. These measures are evaluated via an extensive simulation based on cluster models for local food outlet density. We derived Monte Carlo critical values for several statistical tests based on the indices. In particular we are interested in the ability to make inferential comparisons between different study areas where indices of accessibility and availability are to be calculated. We derive tests of mean difference as well as tests for differences in Moran's I for spatial correlation for each of the accessibility and availability indices. We also apply these new statistical tests to a data example based on two counties in South Carolina for various accessibility and availability measures calculated for food outlets, stores, and restaurants. PMID:21499528
Trans-Splenic Portal Vein Embolization: A Technique to Avoid Damage to the Future Liver Remnant
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarwar, Ammar, E-mail: asarwar@bidmc.harvard.edu; Brook, Olga R.; Weinstein, Jeffrey L.
2016-10-15
Portal vein embolization (PVE) induces hypertrophy of the future liver remnant (FLR) in patients undergoing extensive hepatic resection. Portal vein access for PVE via the ipsilateral hepatic lobe (designated for resection) places veins targeted for embolization at acute angles to the access site requiring reverse curve catheters for access. This approach also involves access close to tumors in the ipsilateral lobe and requires care to avoid traversing tumor. Alternatively, a contralateral approach (through the FLR) risks damage to the FLR due to iatrogenic trauma or non-target embolization. Two patients successfully underwent PVE via trans-splenic portal vein access, allowing easy accessmore » to the ipsilateral portal veins and eliminating risk of damage to FLR. Technique and advantages of trans-splenic portal vein access to perform PVE are described.« less
NASA Technical Reports Server (NTRS)
Kriegler, F. J.
1973-01-01
The improvement and extension of the capabilities of the Environmental Research Institute of Michigan processing facility in handling multispectral data are discussed. Improvements consisted of implementing hardware modifications which permitted more rapid access to the recorded data through improved numbering and indexing of such data. In addition, techniques are discussed for handling data from sources other than the ERIM M-5 and M-7 scanner systems.
Toward edge minability for role mining in bipartite networks
NASA Astrophysics Data System (ADS)
Dong, Lijun; Wang, Yi; Liu, Ran; Pi, Benjie; Wu, Liuyi
2016-11-01
Bipartite network models have been extensively used in information security to automatically generate role-based access control (RBAC) from dataset. This process is called role mining. However, not all the topologies of bipartite networks are suitable for role mining; some edges may even reduce the quality of role mining. This causes unnecessary time consumption as role mining is NP-hard. Therefore, to promote the quality of role mining results, the capability that an edge composes roles with other edges, called the minability of edge, needs to be identified. We tackle the problem from an angle of edge importance in complex networks; that is an edge easily covered by roles is considered to be more important. Based on this idea, the k-shell decomposition of complex networks is extended to reveal the different minability of edges. By this way, a bipartite network can be quickly purified by excluding the low-minability edges from role mining, and thus the quality of role mining can be effectively improved. Extensive experiments via the real-world datasets are conducted to confirm the above claims.
Hajj: infectious disease surveillance and control.
Memish, Ziad A; Zumla, Alimuddin; Alhakeem, Rafat F; Assiri, Abdullah; Turkestani, Abdulhafeez; Al Harby, Khalid D; Alyemni, Mohamed; Dhafar, Khalid; Gautret, Philippe; Barbeschi, Maurizio; McCloskey, Brian; Heymann, David; Al Rabeeah, Abdullah A; Al-Tawfiq, Jaffar A
2014-06-14
Religious festivals attract a large number of pilgrims from worldwide and are a potential risk for the transmission of infectious diseases between pilgrims, and to the indigenous population. The gathering of a large number of pilgrims could compromise the health system of the host country. The threat to global health security posed by infectious diseases with epidemic potential shows the importance of advanced planning of public health surveillance and response at these religious events. Saudi Arabia has extensive experience of providing health care at mass gatherings acquired through decades of managing millions of pilgrims at the Hajj. In this report, we describe the extensive public health planning, surveillance systems used to monitor public health risks, and health services provided and accessed during Hajj 2012 and Hajj 2013 that together attracted more than 5 million pilgrims from 184 countries. We also describe the recent establishment of the Global Center for Mass Gathering Medicine, a Saudi Government partnership with the WHO Collaborating Centre for Mass Gatherings Medicine, Gulf Co-operation Council states, UK universities, and public health institutions globally. Copyright © 2014 Elsevier Ltd. All rights reserved.
Distinct modes of DNA accessibility in plant chromatin.
Shu, Huan; Wildhaber, Thomas; Siretskiy, Alexey; Gruissem, Wilhelm; Hennig, Lars
2012-01-01
The accessibility of DNA to regulatory proteins is a major property of the chromatin environment that favours or hinders transcription. Recent studies in flies reported that H3K9me2-marked heterochromatin is accessible while H3K27me3-marked chromatin forms extensive domains of low accessibility. Here we show that plants regulate DNA accessibility differently. H3K9me2-marked heterochromatin is the least accessible in the Arabidopsis thaliana genome, and H3K27me3-marked chromatin also has low accessibility. We see that very long genes without H3K9me2 or H3K27me3 are often inaccessible and generated significantly lower amounts of antisense transcripts than other genes, suggesting that reduced accessibility is associated with reduced recognition of alternative promoters. Low accessibility of H3K9me2-marked heterochromatin and long genes depend on cytosine methylation, explaining why chromatin accessibility differs between plants and flies. Together, we conclude that restriction of DNA accessibility is a local property of chromatin and not necessarily a consequence of microscopically visible compaction.
Thad Cochran National Warmwater Aquaculture Center
bytes) 2012 U.S. CATFISH DATABASE grnbar.jpg (3114 bytes) Delta Research & Extension Center to access these files. THAD COCHRAN NATIONAL WARMWATER AQUACULTURE CENTER Delta Research and
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
Reflective Database Access Control
ERIC Educational Resources Information Center
Olson, Lars E.
2009-01-01
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...
Elastic extension of a local analysis facility on external clouds for the LHC experiments
NASA Astrophysics Data System (ADS)
Ciaschini, V.; Codispoti, G.; Rinaldi, L.; Aiftimiei, D. C.; Bonacorsi, D.; Calligola, P.; Dal Pra, S.; De Girolamo, D.; Di Maria, R.; Grandi, C.; Michelotto, D.; Panella, M.; Taneja, S.; Semeria, F.
2017-10-01
The computing infrastructures serving the LHC experiments have been designed to cope at most with the average amount of data recorded. The usage peaks, as already observed in Run-I, may however originate large backlogs, thus delaying the completion of the data reconstruction and ultimately the data availability for physics analysis. In order to cope with the production peaks, the LHC experiments are exploring the opportunity to access Cloud resources provided by external partners or commercial providers. In this work we present the proof of concept of the elastic extension of a local analysis facility, specifically the Bologna Tier-3 Grid site, for the LHC experiments hosted at the site, on an external OpenStack infrastructure. We focus on the Cloud Bursting of the Grid site using DynFarm, a newly designed tool that allows the dynamic registration of new worker nodes to LSF. In this approach, the dynamically added worker nodes instantiated on an OpenStack infrastructure are transparently accessed by the LHC Grid tools and at the same time they serve as an extension of the farm for the local usage.
Pyoderma gangrenosum: an exceptional complication of venous access device.
La Marca, Sophie; Toussoun, Gilles; Ho Quoc, Christophe; Sebban, Henry; Delay, Emmanuel
2014-01-01
Pyoderma gangrenosum (PG) is a rare disease whose precise etiology remains unknown. It causes rapidly developing skin necrosis and can occur after surgery, or after a nonspecific external stimulus. This condition is difficult to diagnose because it often mimics a fulminant infection. We present a case of very significant local presentation of PG after placement of a venous access device. Fifteen days after placement, the patient developed extensive cutaneous ulcers and necrosis in the subclavicular area, which led to the misdiagnosis of infection. The device was removed and the patient was given antibiotics. Because there was no improvement following antibiotic treatment, combined with the worrying and extensive appearance of the skin and extremely intense pain, the diagnosis of PG was made. The patient was immediately treated with high-dose corticosteroids, resulting in rapid improvement of the lesions and relief of pain. PG should be considered in cases of extensive, antibiotic-resistant ulceration and treatment with corticosteroids should be initiated. Clinical improvement is usually dramatic, with almost immediate suppression of the pain and arrest of the lesion's progression. Early treatment is the best guarantee for an effective recovery.
Washburn, Lisa T; Cornell, Carol E; Phillips, Martha; Felix, Holly; Traywick, LaVona
2014-09-01
The effect of volunteer lay leaders on availability and sustainability of strength-training programs for older adults has not been well explored. We describe implementation of the StrongWomen strength training program by the Arkansas Cooperative Extension Service, and report on the relationship between delivery approach (agent-led, lay-led, or combination of agent- and lay-led) and program access and sustainability. All state Extension agents (n = 66) were surveyed on program implementation, continuance, and use of lay leaders. Program records were used to identify the number of trained lay leaders. Regression models were used to examine the relationship between delivery approach and group availability. Counties using lay leaders had twice as many groups as counties using only agents. There was a significant, positive relationship between the number of lay leaders and the number of groups. Counties using lay leaders were 8.3 times more likely to have continuing groups compared with counties not using lay leaders. Program continuance was significantly and positively associated with lay leader use. Lay delivery expanded access to strength training programs and increased the likelihood that programs would continue. This approach can be used to increase access to and sustainability of strength training programs, particularly in resource-constrained areas.
Pelloux, Yann; Murray, Jennifer E; Everitt, Barry J
2015-01-01
The availability of alternative reinforcement has been shown to reduce drug use, but it remains unclear whether it facilitates a reduction or cessation of drug seeking or taking. We compared the effects of punishment of cocaine seeking or taking behaviour after brief or extended cocaine-taking histories when behavioural reallocation was facilitated or not by making available an alternative ingestive reinforcer (sucrose). In the first experiment, punishment of either seeking or taking responses was introduced immediately after training on the seeking-taking chained schedule. In the second experiment, punishment of cocaine seeking was introduced after 12 additional days of either 1 or 6 h daily access to cocaine self-administration. In both experiments, beginning 1 week before the introduction of punishment, a subset of rats had concurrent nose poke access to sucrose while seeking or taking cocaine. The presence of an alternative source of reinforcement markedly facilitated behavioural reallocation from punished cocaine taking after acquisition. It also facilitated punishment-induced suppression of cocaine seeking after an extensive cocaine self-administration history likely by prompting goal-directed motivational control over drug use. However, a significant proportion of rats were deemed compulsive-maintaining drug use after an extensive cocaine history despite the presence of abstinence-promoting positive and negative incentives. Making available an alternative reinforcer facilitates disengagement from punished cocaine use through at least two different processes but remains ineffective in a subpopulation of vulnerable animals, which continued to seek cocaine despite the aversive consequence of punishment and the presence of the alternative positive reinforcer.
NASA Astrophysics Data System (ADS)
Neidhardt, Alexander; Collioud, Arnaud
2014-12-01
A central VLBI network status monitoring can be realized by using online status information about current VLBI sessions, real-time, and status data directly from each radio telescope. Such monitoring helps to organize sessions or to get immediate feedback from the active telescopes. Therefore the remote control software for VLBI radio telescopes ``e-RemoteCtrl'' (http://www.econtrol-software.de), which enables remote access as extension to the NASA Field System, realizes real-time data streams to dedicated data centers. The software has direct access to the status information about the current observation (e.g., schedule, scan, source) and the telescope (e.g., current state, temperature, pressure) in real-time. This information are directly sent to ``IVS Live''. ``IVS Live'' (http://ivslive.obs.u-bordeaux1.fr/) is a Web tool that can be used to follow the observing sessions, organized by the International VLBI Service for Geodesy and Astrometry (IVS), navigate through past or upcoming sessions, or search and display specific information about sessions, sources (like VLBI images), and stations, by using an Internet browser.
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
Avoiding Biased-Feeding in the Scheduling of Collaborative Multipath TCP.
Tsai, Meng-Hsun; Chou, Chien-Ming; Lan, Kun-Chan
2016-01-01
Smartphones have become the major communication and portable computing devices that access the Internet through Wi-Fi or mobile networks. Unfortunately, users without a mobile data subscription can only access the Internet at limited locations, such as hotspots. In this paper, we propose a collaborative bandwidth sharing protocol (CBSP) built on top of MultiPath TCP (MPTCP). CBSP enables users to buy bandwidth on demand from neighbors (called Helpers) and uses virtual interfaces to bind the subflows of MPTCP to avoid modifying the implementation of MPTCP. However, although MPTCP provides the required multi-homing functionality for bandwidth sharing, the current packet scheduling in collaborative MPTCP (e.g., Co-MPTCP) leads to the so-called biased-feeding problem. In this problem, the fastest link might always be selected to send packets whenever it has available cwnd, which results in other links not being fully utilized. In this work, we set out to design an algorithm, called Scheduled Window-based Transmission Control (SWTC), to improve the performance of packet scheduling in MPTCP, and we perform extensive simulations to evaluate its performance.
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques
NASA Astrophysics Data System (ADS)
Bhadauria, Rohit; Sanyal, Sugata
2012-06-01
Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow multi-fold increase in the capacity or capabilities of the existing and new software. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data-centers may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it.
Using ESB and BPEL for Evolving Healthcare Systems Towards Pervasive, Grid-Enabled SOA
NASA Astrophysics Data System (ADS)
Koufi, V.; Malamateniou, F.; Papakonstantinou, D.; Vassilacopoulos, G.
Healthcare organizations often face the challenge of integrating diverse and geographically disparate information technology systems to respond to changing requirements and to exploit the capabilities of modern technologies. Hence, systems evolution, through modification and extension of the existing information technology infrastructure, becomes a necessity. Moreover, the availability of these systems at the point of care when needed is a vital issue for the quality of healthcare provided to patients. This chapter takes a process perspective of healthcare delivery within and across organizational boundaries and presents a disciplined approach for evolving healthcare systems towards a pervasive, grid-enabled service-oriented architecture using the enterprise system bus middleware technology for resolving integration issues, the business process execution language for supporting collaboration requirements and grid middleware technology for both addressing common SOA scalability requirements and complementing existing system functionality. In such an environment, appropriate security mechanisms must ensure authorized access to integrated healthcare services and data. To this end, a security framework addressing security aspects such as authorization and access control is also presented.
Avoiding Biased-Feeding in the Scheduling of Collaborative Multipath TCP
2016-01-01
Smartphones have become the major communication and portable computing devices that access the Internet through Wi-Fi or mobile networks. Unfortunately, users without a mobile data subscription can only access the Internet at limited locations, such as hotspots. In this paper, we propose a collaborative bandwidth sharing protocol (CBSP) built on top of MultiPath TCP (MPTCP). CBSP enables users to buy bandwidth on demand from neighbors (called Helpers) and uses virtual interfaces to bind the subflows of MPTCP to avoid modifying the implementation of MPTCP. However, although MPTCP provides the required multi-homing functionality for bandwidth sharing, the current packet scheduling in collaborative MPTCP (e.g., Co-MPTCP) leads to the so-called biased-feeding problem. In this problem, the fastest link might always be selected to send packets whenever it has available cwnd, which results in other links not being fully utilized. In this work, we set out to design an algorithm, called Scheduled Window-based Transmission Control (SWTC), to improve the performance of packet scheduling in MPTCP, and we perform extensive simulations to evaluate its performance. PMID:27529783
MovieMaker: a web server for rapid rendering of protein motions and interactions
Maiti, Rajarshi; Van Domselaar, Gary H.; Wishart, David S.
2005-01-01
MovieMaker is a web server that allows short (∼10 s), downloadable movies of protein motions to be generated. It accepts PDB files or PDB accession numbers as input and automatically calculates, renders and merges the necessary image files to create colourful animations covering a wide range of protein motions and other dynamic processes. Users have the option of animating (i) simple rotation, (ii) morphing between two end-state conformers, (iii) short-scale, picosecond vibrations, (iv) ligand docking, (v) protein oligomerization, (vi) mid-scale nanosecond (ensemble) motions and (vii) protein folding/unfolding. MovieMaker does not perform molecular dynamics calculations. Instead it is an animation tool that uses a sophisticated superpositioning algorithm in conjunction with Cartesian coordinate interpolation to rapidly and automatically calculate the intermediate structures needed for many of its animations. Users have extensive control over the rendering style, structure colour, animation quality, background and other image features. MovieMaker is intended to be a general-purpose server that allows both experts and non-experts to easily generate useful, informative protein animations for educational and illustrative purposes. MovieMaker is accessible at . PMID:15980488
Mobile Edge Computing Empowers Internet of Things
NASA Astrophysics Data System (ADS)
Ansari, Nirwan; Sun, Xiang
In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging to the same user) are associated to a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes the IoT data (generated by its IoT devices) in real-time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access control problem in the IoT system. In addition, we propose two dynamic proxy VM migration methods to minimize the end-to-end delay between proxy VMs and their IoT devices and to minimize the total on-grid energy consumption of the cloudlets, respectively. Performance of the proposed methods are validated via extensive simulations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Radtke, M.A.
This paper will chronicle the activity at Wisconsin Public Service Corporation (WPSC) that resulted in the complete migration of a traditional, late 1970`s vintage, Energy Management System (EMS). The new environment includes networked microcomputers, minicomputers, and the corporate mainframe, and provides on-line access to employees outside the energy control center and some WPSC customers. In the late 1980`s, WPSC was forecasting an EMS computer upgrade or replacement to address both capacity and technology needs. Reasoning that access to diverse computing resources would best position the company to accommodate the uncertain needs of the energy industry in the 90`s, WPSC chosemore » to investigate an in-place migration to a network of computers, able to support heterogeneous hardware and operating systems. The system was developed in a modular fashion, with individual modules being deployed as soon as they were completed. The functional and technical specification was continuously enhanced as operating experience was gained from each operational module. With the migration off the original EMS computers complete, the networked system called DEMAXX (Distributed Energy Management Architecture with eXtensive eXpandability) has exceeded expectations in the areas of: cost, performance, flexibility, and reliability.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Radtke, M.A.
This paper will chronicle the activity at Wisconsin Public Service Corporation (WPSC) that resulted in the complete migration of a traditional, late 1970`s vintage, Energy management System (EMS). The new environment includes networked microcomputers, minicomputers, and the corporate mainframe, and provides on-line access to employees outside the energy control center and some WPSC customers. In the late 1980`s, WPSC was forecasting an EMS computer upgrade or replacement to address both capacity and technology needs. Reasoning that access to diverse computing resources would best position the company to accommodate the uncertain needs of the energy industry in the 90`s, WPSC chosemore » to investigate an in-place migration to a network of computers, able to support heterogeneous hardware and operating systems. The system was developed in a modular fashion, with individual modules being deployed as soon as they were completed. The functional and technical specification was continuously enhanced as operating experience was gained from each operational module. With the migration of the original EMS computers complete, the networked system called DEMAXX (Distributed Energy Management Architecture with eXtensive eXpandability) has exceeded expectations in the areas of: cost, performance, flexibility, and reliability.« less
Datiko, Daniel G; Yassin, Mohammed A; Theobald, Sally J; Blok, Lucie; Suvanand, Sahu; Creswell, Jacob
2017-01-01
Background Tuberculosis (TB) is a major cause of death in Ethiopia. One of the main barriers for TB control is the lack of access to health services. Methods We evaluated a diagnostic and treatment service for TB based on the health extension workers (HEW) of the Ethiopian Health Extension Programme in Sidama Zone, with 3.5 million population. We added the services to the HEW routines and evaluated their effect over 4.5 years. 1024 HEWs were trained to identify individuals with symptoms of TB, request sputum samples and prepare smears. Smears were transported to designated laboratories. Individuals with TB were offered treatment at home or the local health post. A second zone (Hadiya) with 1.2 million population was selected as control. We compared TB case notification rates (CNR) and treatment outcomes in the zones 3 years before and 4.5 years after intervention. Results HEWs identified 216 165 individuals with symptoms and 27 918 (12%) were diagnosed with TB. Smear-positive TB CNR increased from 64 (95% CI 62.5 to 65.8) to 127 (95% CI 123.8 to 131.2) and all forms of TB increased from 102 (95% CI 99.1 to 105.8) to 177 (95% CI 172.6 to 181.0) per 100 000 population in the first year of intervention. In subsequent years, the smear-positive CNR declined by 9% per year. There was no change in CNR in the control area. Treatment success increased from 76% before the intervention to 95% during the intervention. Patients lost to follow-up decreased from 21% to 3% (p<0.001). Conclusion A community-based package significantly increased case finding and improved treatment outcome. Implementing this strategy could help meet the Ethiopian Sustainable Development Goal targets. PMID:29209537
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Progress toward a Semantic eScience Framework; building on advanced cyberinfrastructure
NASA Astrophysics Data System (ADS)
McGuinness, D. L.; Fox, P. A.; West, P.; Rozell, E.; Zednik, S.; Chang, C.
2010-12-01
The configurable and extensible semantic eScience framework (SESF) has begun development and implementation of several semantic application components. Extensions and improvements to several ontologies have been made based on distinct interdisciplinary use cases ranging from solar physics, to biologicl and chemical oceanography. Importantly, these semantic representations mediate access to a diverse set of existing and emerging cyberinfrastructure. Among the advances are the population of triple stores with web accessible query services. A triple store is akin to a relational data store where the basic stored unit is a subject-predicate-object tuple. Access via a query is provided by the W3 Recommendation language specification SPARQL. Upon this middle tier of semantic cyberinfrastructure, we have developed several forms of semantic faceted search, including provenance-awareness. We report on the rapid advances in semantic technologies and tools and how we are sustaining the software path for the required technical advances as well as the ontology improvements and increased functionality of the semantic applications including how they are integrated into web-based portals (e.g. Drupal) and web services. Lastly, we indicate future work direction and opportunities for collaboration.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
The Particle Accelerator Simulation Code PyORBIT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gorlov, Timofey V; Holmes, Jeffrey A; Cousineau, Sarah M
2015-01-01
The particle accelerator simulation code PyORBIT is presented. The structure, implementation, history, parallel and simulation capabilities, and future development of the code are discussed. The PyORBIT code is a new implementation and extension of algorithms of the original ORBIT code that was developed for the Spallation Neutron Source accelerator at the Oak Ridge National Laboratory. The PyORBIT code has a two level structure. The upper level uses the Python programming language to control the flow of intensive calculations performed by the lower level code implemented in the C++ language. The parallel capabilities are based on MPI communications. The PyORBIT ismore » an open source code accessible to the public through the Google Open Source Projects Hosting service.« less
High coherence plane breaking packaging for superconducting qubits.
Bronn, Nicholas T; Adiga, Vivekananda P; Olivadese, Salvatore B; Wu, Xian; Chow, Jerry M; Pappas, David P
2018-04-01
We demonstrate a pogo pin package for a superconducting quantum processor specifically designed with a nontrivial layout topology (e.g., a center qubit that cannot be accessed from the sides of the chip). Two experiments on two nominally identical superconducting quantum processors in pogo packages, which use commercially available parts and require modest machining tolerances, are performed at low temperature (10 mK) in a dilution refrigerator and both found to behave comparably to processors in standard planar packages with wirebonds where control and readout signals come in from the edges. Single- and two-qubit gate errors are also characterized via randomized benchmarking, exhibiting similar error rates as in standard packages, opening the possibility of integrating pogo pin packaging with extensible qubit architectures.
An Augmented Reality Nanomanipulator for Learning Nanophysics: The "NanoLearner" Platform
NASA Astrophysics Data System (ADS)
Marchi, Florence; Marliere, Sylvain; Florens, Jean Loup; Luciani, Annie; Chevrier, Joel
The work focuses on the description and evaluation of an augmented reality nanomanipulator, called "NanoLearner" platform used as educational tool in practical works of nanophysics. Through virtual reality associated to multisensory renderings, students are immersed in the nanoworld where they can interact in real time with a sample surface or an object, using their senses as hearing, seeing and touching. The role of each sensorial rendering in the understanding and control of the "approach-retract" interaction has been determined thanks to statistical studies obtained during the practical works. Finally, we present two extensions of the use of this innovative tool for investigating nano effects in living organisms and for allowing grand public to have access to a natural understanding of nanophenomena.
High coherence plane breaking packaging for superconducting qubits
NASA Astrophysics Data System (ADS)
Bronn, Nicholas T.; Adiga, Vivekananda P.; Olivadese, Salvatore B.; Wu, Xian; Chow, Jerry M.; Pappas, David P.
2018-04-01
We demonstrate a pogo pin package for a superconducting quantum processor specifically designed with a nontrivial layout topology (e.g., a center qubit that cannot be accessed from the sides of the chip). Two experiments on two nominally identical superconducting quantum processors in pogo packages, which use commercially available parts and require modest machining tolerances, are performed at low temperature (10 mK) in a dilution refrigerator and both found to behave comparably to processors in standard planar packages with wirebonds where control and readout signals come in from the edges. Single- and two-qubit gate errors are also characterized via randomized benchmarking, exhibiting similar error rates as in standard packages, opening the possibility of integrating pogo pin packaging with extensible qubit architectures.
78 FR 53436 - Agency Information Collection Extension
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... anticipate difficulty in submitting comments within that period or if you want access to the collection of information, without charge, contact the person listed below as soon as possible. ADDRESSES: Written comments...
Security middleware infrastructure for DICOM images in health information systems.
Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A
2003-12-01
In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
2017-11-17
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
2017-01-01
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040
The LASP Interactive Solar IRradiance Datacenter (LISIRD)
NASA Astrophysics Data System (ADS)
Pankratz, C. K.; Lindholm, D. M.; Snow, M.; Knapp, B.; Woodraska, D.; Templeman, B.; Woods, T. N.; Eparvier, F. G.; Fontenla, J.; Harder, J.; McClintock, W. E.
2007-12-01
The Laboratory for Atmospheric and Space Physics (LASP) has been making space-based measurements of solar irradiance for many decades, and thus has established an extensive catalog of past and ongoing space- based solar irradiance measurements. In order to maximize the accessibility and usability of solar irradiance data and information from multiple missions, LASP is developing the LASP Interactive Solar IRradiance Datacenter (LISIRD) to better serve the needs of researchers, educators, and the general public. This data center is providing interactive and direct access to a comprehensive set of solar spectral irradiance measurements from the soft X-ray (XUV) at 0.1 nm up to the near infrared (NIR) at 2400 nm, as well as state-of-the-art measurements of Total Solar Irradiance (TSI). LASP researchers are also responsible for an extensive set of solar irradiance models and historical solar irradiance reconstructions, which will also be accessible via this data center over time. LISIRD currently provides access to solar irradiance data sets from the SORCE, TIMED-SEE, UARS-SOLSTICE, and SME instruments, spanning 1981 to the present, as well as a Lyman Alpha composite that is available from 1947 to the present. LISIRD also provides data products of interest to the space weather community, whose needs demand high time cadence and near real-time data delivery. This poster provides an overview of the LISIRD system, summarizes the data sets currently available, describes future plans and capabilities, and provides details on how to access solar irradiance data through LISIRD's various interfaces.
Why build limited access highways?.
DOT National Transportation Integrated Search
1991-01-01
This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...
75 FR 37419 - Agency Information Collection Extension
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-29
.... If you anticipate difficulty in submitting comments within that period or if you want access to the...: Written comments should be sent to the following: Denise Clarke, Procurement Analyst, MA-612/950 L'Enfant...
ERIC Educational Resources Information Center
Belsunce, Cesar A. Garcia
1983-01-01
Examination of the situation of archives in four Latin American countries--Argentina, Brazil, Colombia, and Costa Rica--highlights national systems, buildings, staff, processing of documents, accessibility and services to the public and publications and extension services. (EJS)
Urban History in 4 Dimensions - Supporting Research and Education
NASA Astrophysics Data System (ADS)
Münster, S.; Friedrichs, K.; Kröber, C.; Bruschke, J.; Henze, F.; Maiwald, F.; Niebling, F.
2017-08-01
The new research group on the four-dimensional research and communication of urban history (Urban History 4D) aims to investigate and develop methods and technologies to access extensive repositories of historical media and their contextual information in a spatial model, with an additional temporal component. This will make content accessible to different target groups, researchers and the public, via a 4D browser. A location-dependent augmented-reality representation can be used as an information base, research tool, and means of communicating historical knowledge. The data resources for this research include extensive holdings of historical photographs of Dresden, which have documented the city over the decades, and digitized map collections from the Deutsche Fotothek (German photographic collection) platform. These will lay the foundation for a prototype model which will give users a virtual experience of historic parts of Dresden.
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
Proximity-based access control for context-sensitive information provision in SOA-based systems
NASA Astrophysics Data System (ADS)
Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew
2014-06-01
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
Nanoparticle accumulation and transcytosis in brain endothelial cell layers
NASA Astrophysics Data System (ADS)
Ye, Dong; Raghnaill, Michelle Nic; Bramini, Mattia; Mahon, Eugene; Åberg, Christoffer; Salvati, Anna; Dawson, Kenneth A.
2013-10-01
The blood-brain barrier (BBB) is a selective barrier, which controls and limits access to the central nervous system (CNS). The selectivity of the BBB relies on specialized characteristics of the endothelial cells that line the microvasculature, including the expression of intercellular tight junctions, which limit paracellular permeability. Several reports suggest that nanoparticles have a unique capacity to cross the BBB. However, direct evidence of nanoparticle transcytosis is difficult to obtain, and we found that typical transport studies present several limitations when applied to nanoparticles. In order to investigate the capacity of nanoparticles to access and transport across the BBB, several different nanomaterials, including silica, titania and albumin- or transferrin-conjugated gold nanoparticles of different sizes, were exposed to a human in vitro BBB model of endothelial hCMEC/D3 cells. Extensive transmission electron microscopy imaging was applied in order to describe nanoparticle endocytosis and typical intracellular localisation, as well as to look for evidence of eventual transcytosis. Our results show that all of the nanoparticles were internalised, to different extents, by the BBB model and accumulated along the endo-lysosomal pathway. Rare events suggestive of nanoparticle transcytosis were also observed for several of the tested materials.The blood-brain barrier (BBB) is a selective barrier, which controls and limits access to the central nervous system (CNS). The selectivity of the BBB relies on specialized characteristics of the endothelial cells that line the microvasculature, including the expression of intercellular tight junctions, which limit paracellular permeability. Several reports suggest that nanoparticles have a unique capacity to cross the BBB. However, direct evidence of nanoparticle transcytosis is difficult to obtain, and we found that typical transport studies present several limitations when applied to nanoparticles. In order to investigate the capacity of nanoparticles to access and transport across the BBB, several different nanomaterials, including silica, titania and albumin- or transferrin-conjugated gold nanoparticles of different sizes, were exposed to a human in vitro BBB model of endothelial hCMEC/D3 cells. Extensive transmission electron microscopy imaging was applied in order to describe nanoparticle endocytosis and typical intracellular localisation, as well as to look for evidence of eventual transcytosis. Our results show that all of the nanoparticles were internalised, to different extents, by the BBB model and accumulated along the endo-lysosomal pathway. Rare events suggestive of nanoparticle transcytosis were also observed for several of the tested materials. Electronic supplementary information (ESI) available: Nanoparticle characterization in relevant media by Dynamic Light Scattering and SDS-PAGE. Transport study for silica nanoparticles across the BBB layer. Additional Electron Microscopy images of cells treated with the different nanoparticles investigated and details of the filters of the transwell systems. See DOI: 10.1039/c3nr02905k
Reactive power management and voltage control in deregulated power markets
NASA Astrophysics Data System (ADS)
Spangler, Robert G.
The research that is the subject of this dissertation is about the management of reactive power and voltage support in the wholesale open access power markets in the United States (US). The purpose of this research is to place decisions about open access market structures, as they relate to reactive power and voltage control, on a logical and consistent economic basis, given the engineering needs of a commercial electric power system. An examination of the electricity markets operating in the US today reveals that current approaches to reactive power management and voltage support are extensions of those based on historical, regulated monopoly electric service. A case for change is built by first looking at the subject of reactive power from an engineering viewpoint and then from an economic perspective. Ultimately, a set of market rules for managing reactive power and voltage support is proposed. The proposal suggests that cost recovery for static and dynamic VARs is appropriately accomplished through the regulated transmission cost of service. Static VAR cost recovery should follow traditional rate recovery methodologies. In the case of dynamic VARs, this work provides a methodology based on the microeconomic theory of the firm for determining such cost. It further suggests that an operational strategy that reduces and limits the use of dynamic VARs, during normal operations, is appropriate. This latter point leads to an increase in the fixed cost of the transmission network but prevents price spikes and short supply situations from affecting, or being affected by, the reactive capability limitations associated with dynamic VARs supplied from synchronous generators. The rules are consistent with a market structure that includes competitive generation and their application will result in the communication of a clear understanding of the responsibilities, related to voltage control, of each type of market entity. In this sense, their application will contribute to the efficient functioning of the wholesale open access markets.
Applying a Service-Oriented Architecture to Operational Flight Program Development
2007-09-01
using two Java 2 Enterprise Edition (J2EE) Web servers. The weapon models were accessed using a SUN Microsystems Java Web Services Development Pack...Oriented Architectures 22 CROSSTALK The Journal of Defense Software Engineering September 2007 tion, and Spring/ Hibernate to provide the data access...tion since a major coding effort was avoided. The majority of the effort was tweaking pre-existing Java source code and editing of eXtensible Markup
1994-10-01
these two sites. Extensive artifact analyses would contribute to studies concerning consumer behavior , and archaeological testing would help determine...Specific research areas to be considered especially from the artifact assemblages are: subsistence patterns, consumer behavior , market accessibility...to provide archaeological information which could be used in various studies, such as subsistence patterns, consumer behavior , market accessibility
Dynamic access control model for privacy preserving personalized healthcare in cloud environment.
Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon
2015-01-01
When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban
2017-01-01
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat. PMID:28758045
Huh, Sun
2013-01-01
ScienceCentral, a free or open access, full-text archive of scientific journal literature at the Korean Federation of Science and Technology Societies, was under test in September 2013. Since it is a Journal Article Tag Suite-based full text database, extensible markup language files of all languages can be presented, according to Unicode Transformation Format 8-bit encoding. It is comparable to PubMed Central: however, there are two distinct differences. First, its scope comprises all science fields; second, it accepts all language journals. Launching ScienceCentral is the first step for free access or open access academic scientific journals of all languages to leap to the world, including scientific journals from Croatia.
Electronic communication improves access, but barriers to its widespread adoption remain
Bishop, Tara F.; Press, Matthew J.; Mendelsohn, Jayme L.; Casalino, Lawrence P.
2013-01-01
Principles of patient-centered care imply that physicians should use electronic communication with patients more extensively, including as a substitute for office visits when clinically appropriate. We interviewed leaders of 21 medical groups that use electronic communication with patients extensively and also interviewed staff in six of these groups. Electronic communication was widely perceived to be a safe, effective and efficient means of communication that improves patient satisfaction and saves patients time, but increases the volume of physician work unless office visits are reduced. Practice redesign and new payment methods are likely necessary for electronic communication to be used more extensively. PMID:23918479
32 CFR 327.7 - Access by individuals
Code of Federal Regulations, 2010 CFR
2010-07-01
.... Such notes are an extension of the individual's memory. These notes, however, must be maintained and... within 10 working days of its receipt by the DeCA PA Officer. No notification will be provided to the...
SENTRE and TREND attenuator field installations
DOT National Transportation Integrated Search
1990-02-01
Arizona's canal network is extensive and necessitates the existence of many short bridges on the highway network. The necessity for maintaining access to adjacent canal roads dictates that any barrier installation intended to shield errant vehicles f...
32 CFR 1900.33 - Allocation of resources; agreed extensions of time.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA) Additional... Intelligence or otherwise by law, (3) The information review and release demands imposed by the Congress or...
32 CFR 1900.33 - Allocation of resources; agreed extensions of time.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA) Additional... Intelligence or otherwise by law, (3) The information review and release demands imposed by the Congress or...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... further extensions without further notice. Under Contract Number EP10H000097, Computer Science Corporation... EPA procedures, including comprehensive system security plans (SSPs) that are consistent with those...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same... synchronous dynamic random access memory controllers and products containing same by reason of infringement of... semiconductor chips having synchronous dynamic random access memory controllers and products containing same...
Friendly Extensible Transfer Tool Beta Version
DOE Office of Scientific and Technical Information (OSTI.GOV)
Collins, William P.; Gutierrez, Kenneth M.; McRee, Susan R.
2016-04-15
Often data transfer software is designed to meet specific requirements or apply to specific environments. Frequently, this requires source code integration for added functionality. An extensible data transfer framework is needed to more easily incorporate new capabilities, in modular fashion. Using FrETT framework, functionality may be incorporated (in many cases without need of source code) to handle new platform capabilities: I/O methods (e.g., platform specific data access), network transport methods, data processing (e.g., data compression.).
NASA Astrophysics Data System (ADS)
Glatter, Otto; Fuchs, Heribert; Jorde, Christian; Eigner, Wolf-Dieter
1987-03-01
The microprocessor of an 8-bit PC system is used as a central control unit for the acquisition and evaluation of data from quasi-elastic light scattering experiments. Data are sampled with a width of 8 bits under control of the CPU. This limits the minimum sample time to 20 μs. Shorter sample times would need a direct memory access channel. The 8-bit CPU can address a 64-kbyte RAM without additional paging. Up to 49 000 sample points can be measured without interruption. After storage, a correlation function or a power spectrum can be calculated from such a primary data set. Furthermore access is provided to the primary data for stability control, statistical tests, and for comparison of different evaluation methods for the same experiment. A detailed analysis of the signal (histogram) and of the effect of overflows is possible and shows that the number of pulses but not the number of overflows determines the error in the result. The correlation function can be computed with reasonable accuracy from data with a mean pulse rate greater than one, the power spectrum needs a three times higher pulse rate for convergence. The statistical accuracy of the results from 49 000 sample points is of the order of a few percent. Additional averages are necessary to improve their quality. The hardware extensions for the PC system are inexpensive. The main disadvantage of the present system is the high minimum sampling time of 20 μs and the fact that the correlogram or the power spectrum cannot be computed on-line as it can be done with hardware correlators or spectrum analyzers. These shortcomings and the storage size restrictions can be removed with a faster 16/32-bit CPU.
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
Cleary, James F; Maurer, Martha A
2018-02-01
For two decades, the Pain & Policy Studies Group (PPSG), a global research program at the University of Wisconsin Carbone Cancer Center, has worked passionately to fulfill its mission of improving pain relief by achieving balanced access to opioids worldwide. PPSG's early work highlighted the conceptual framework of balance leading to the development of the seminal guidelines and criteria for evaluating opioid policy. It has collaborated at the global level with United Nations agencies to promote access to opioids and has developed a unique model of technical assistance to help national governments assess regulatory barriers to essential medicines for pain relief and amend existing or develop new legislation that facilitates appropriate and adequate opioid prescribing according to international standards. This model was initially applied in regional workshops and individual country projects and then adapted for PPSG's International Pain Policy Fellowship, which provides long-term mentoring and support for several countries simultaneously. The PPSG disseminates its work online in several ways, including an extensive Web site, news alerts, and through several social media outlets. PPSG has become the focal point for expertise on policy governing drug control and medicine and pharmacy practice related to opioid availability and pain relief. Copyright © 2017 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.
Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; D'Amico, Fiora; Buonocunto, Francesca; Navarro, Jorge; Lanzilotti, Crocifissa; Fiore, Pietro; Megna, Marisa; Damiani, Sabino; Marvulli, Riccardo
2017-06-01
Postcoma persons in a minimally conscious state (MCS) and with extensive motor impairment cannot independently access and control environmental stimulation. Assessing the effects of a microswitch-aided program aimed at helping MCS persons develop responding and stimulation control and conducting a social validation/evaluation of the program. A single-subject ABAB design was used for each participant to determine the impact of the program on his or her responding. Staff interviews were used for the social validation/evaluation of the program. Rehabilitation and care facilities that the participants attended. Eleven MCS persons with extensive motor impairment and lack of speech or any other functional communication. For each participant, baseline (A) phases were alternated with intervention (B) phases during which the program was used. The program relied on microswitches to monitor participants' specific responses (e.g., prolonged eyelid closures) and on a computer system to enable those responses to control stimulation. In practice, the participants could use a simple response such as prolonged eyelid closure to generate a new stimulation input. Sixty-six staff people took part in the social validation of the program. They were to compare the program to basic and elaborate forms of externally controlled stimulation, scoring each of them on a six-item questionnaire. All participants showed increased response frequencies (and thus higher levels of independent stimulation input/control) during the B phases of the study. Their frequencies for each intervention phase more than doubled their frequencies for the preceding baseline phase with the difference between the two being clearly significant (P<0.01). Staff involved in the social validation procedure provided significantly higher scoring (P<0.01) for the program on five of the six questionnaire items. A microswitch-aided program can be an effective and socially acceptable tool in the work with MCS persons. The participants and staff's data can be taken as an encouragement for the use of a microswitch-aided program within care and rehabilitation settings for MCS persons.
Silverman, Julie; Krieger, James; Sayre, George; Nelson, Karin
2018-03-01
To describe community health workers (CHWs) roles in a diabetes self-management intervention. Retrospective qualitative inductive analysis of open text home visit encounter form from Peer Support for Achieving Independence in Diabetes (Peer AID), a randomized controlled trial in which low-income individuals with poorly controlled diabetes received either CHW home visits or usual care. Following visits, CHWs completed encounter forms documenting the health goal of the visit, the self-management strategies discussed and participant concerns. 634 encounter reports were completed for the 145 intervention participants. CHW notes revealed three main obstacles to optimal disease control: gaps in diabetes knowledge and self-management skills; socioeconomic conditions; and the complexity of the healthcare system. CHWs helped participants overcome these obstacles through extensive, hands-on education, connecting participants to community resources, and assistance navigating the medical system. In addition, the CHWs offered uncomplicated accessibility and availability to their clients. CHWs can be a valuable asset for low-income patients with chronic health conditions who may require more support than what can provided in a typical primary care visit.
Bose-Einstein Condensates in 1D Optical Lattices: Nonlinearity and Wannier-Stark Spectra
NASA Astrophysics Data System (ADS)
Arimondo, Ennio; Ciampini, Donatella; Morsch, Oliver
The development of powerful laser cooling and trapping techniques has made possible the controlled realization of dense and cold gaseous samples, thus opening the way for investigations in the ultracold temperature regimes not accessible with conventional techniques. A Bose-Einstein condensate (BEC) represents a peculiar gaseous state where all the particles reside in the same quantum mechanical state. Therefore BECs exhibit quantum mechanical phe-nomena on a macroscopic scale with a single quantum mechanical wavefunction describing the external degrees of freedom. That control of the external degrees of freedom is combined with a precise control of the internal degrees. The BEC investigation has become a very active area of research in contem-porary physics. The BEC study encompasses different subfields of physics, i.e., atomic and molecular physics, quantum optics, laser spectroscopy, solid state physics. Atomic physics and laser spectroscopy provide the methods for creating and manipulating the atomic and molecular BECs. However owing to the interactions between the particles composing the condensate and to the configuration of the external potential, concepts and methods from solid state physics are extensively used for BEC description.
The 1000 Genomes Project: data management and community access.
Clarke, Laura; Zheng-Bradley, Xiangqun; Smith, Richard; Kulesha, Eugene; Xiao, Chunlin; Toneva, Iliana; Vaughan, Brendan; Preuss, Don; Leinonen, Rasko; Shumway, Martin; Sherry, Stephen; Flicek, Paul
2012-04-27
The 1000 Genomes Project was launched as one of the largest distributed data collection and analysis projects ever undertaken in biology. In addition to the primary scientific goals of creating both a deep catalog of human genetic variation and extensive methods to accurately discover and characterize variation using new sequencing technologies, the project makes all of its data publicly available. Members of the project data coordination center have developed and deployed several tools to enable widespread data access.
Intelligence Reform in Albania: Its Relation to Democratization and Integration into the EU and NATO
2008-03-01
pdf (accessed December 20, 2007) 22 Owen Greene , “International Standards and Obligations: Norms and Criteria for DCAF in EU, OSCE, and OECD...History of Albania from Its Origins to the Present Day (London and Boston: Routledge and Kegan Paul, 1981), 197-222. 15 B. INTELLIGENCE SERVICES...February 2006.” http://www.mdlpl.ro/ _documente/engleza/dialog_ro_ue/2006/Annual_Extensive_Report.pdf (accessed December 29, 2007). Greene , Owen
DOE Office of Scientific and Technical Information (OSTI.GOV)
McKown, Athena; Klapste, Jaroslav; Guy, Robert
2014-01-01
To uncover the genetic basis of phenotypic trait variation, we used 448 unrelated wild accessions of black cottonwood (Populus trichocarpa Torr. & Gray) from natural populations throughout western North America. Extensive information from large-scale trait phenotyping (with spatial and temporal replications within a common garden) and genotyping (with a 34K Populus SNP array) of all accessions were used for gene discovery in a genome-wide association study (GWAS).
Logical Access Control Mechanisms in Computer Systems.
ERIC Educational Resources Information Center
Hsiao, David K.
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Genomics Portals: integrative web-platform for mining genomics data.
Shinde, Kaustubh; Phatak, Mukta; Johannes, Freudenberg M; Chen, Jing; Li, Qian; Vineet, Joshi K; Hu, Zhen; Ghosh, Krishnendu; Meller, Jaroslaw; Medvedovic, Mario
2010-01-13
A large amount of experimental data generated by modern high-throughput technologies is available through various public repositories. Our knowledge about molecular interaction networks, functional biological pathways and transcriptional regulatory modules is rapidly expanding, and is being organized in lists of functionally related genes. Jointly, these two sources of information hold a tremendous potential for gaining new insights into functioning of living systems. Genomics Portals platform integrates access to an extensive knowledge base and a large database of human, mouse, and rat genomics data with basic analytical visualization tools. It provides the context for analyzing and interpreting new experimental data and the tool for effective mining of a large number of publicly available genomics datasets stored in the back-end databases. The uniqueness of this platform lies in the volume and the diversity of genomics data that can be accessed and analyzed (gene expression, ChIP-chip, ChIP-seq, epigenomics, computationally predicted binding sites, etc), and the integration with an extensive knowledge base that can be used in such analysis. The integrated access to primary genomics data, functional knowledge and analytical tools makes Genomics Portals platform a unique tool for interpreting results of new genomics experiments and for mining the vast amount of data stored in the Genomics Portals backend databases. Genomics Portals can be accessed and used freely at http://GenomicsPortals.org.
Genomics Portals: integrative web-platform for mining genomics data
2010-01-01
Background A large amount of experimental data generated by modern high-throughput technologies is available through various public repositories. Our knowledge about molecular interaction networks, functional biological pathways and transcriptional regulatory modules is rapidly expanding, and is being organized in lists of functionally related genes. Jointly, these two sources of information hold a tremendous potential for gaining new insights into functioning of living systems. Results Genomics Portals platform integrates access to an extensive knowledge base and a large database of human, mouse, and rat genomics data with basic analytical visualization tools. It provides the context for analyzing and interpreting new experimental data and the tool for effective mining of a large number of publicly available genomics datasets stored in the back-end databases. The uniqueness of this platform lies in the volume and the diversity of genomics data that can be accessed and analyzed (gene expression, ChIP-chip, ChIP-seq, epigenomics, computationally predicted binding sites, etc), and the integration with an extensive knowledge base that can be used in such analysis. Conclusion The integrated access to primary genomics data, functional knowledge and analytical tools makes Genomics Portals platform a unique tool for interpreting results of new genomics experiments and for mining the vast amount of data stored in the Genomics Portals backend databases. Genomics Portals can be accessed and used freely at http://GenomicsPortals.org. PMID:20070909
Does access to fast food lead to super-sized pregnant women and whopper babies?
Lhila, Aparna
2011-12-01
Rise in the availability of fast-food restaurants has been blamed, at least partly, for the increasing obesity in the U.S. The existing studies of obesity have focused primarily on children, adolescents, and adults, and this paper extends the literature by raising a little-studied question and using nationally representative data to answer it. It examines the relationship between the supply of fast-food restaurants and weight gain of pregnant women and their newborns. I study prenatal weight gain because excessive weight gain has been linked to postpartum overweight/obesity and I study both tails of the birthweight distribution because the origin of obesity may be traced to the prenatal period and both tail outcomes have been associated with obesity later in life. I merge the 1998 and 2004 Natality Detail Files with the Area Resource File, and County Business Patterns, which provide data on the number of fast-food restaurants in the metropolitan area where the mother resides. The empirical model includes an extensive list of MSA characteristics and MSA fixed effects to control for factors that may be correlated with both health outcomes and restaurants' location decision. Results reveal that the fast-food and weight gain relationship is robust to the inclusion of these controls but these controls greatly mitigate the fast food-infant health relationship. Greater access to fast-food restaurants is positively related to mothers' probability of excessive weight gain but it does not share a statistically significant relationship with birthweight. These relationships hold in all the socioeconomic and demographic subgroups studied. 2011 Elsevier B.V. All rights reserved.
Guaranteeing synchronous message deadlines with the timed token medium access control protocol
NASA Technical Reports Server (NTRS)
Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh
1992-01-01
We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.
NASA Technical Reports Server (NTRS)
Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)
2000-01-01
A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.
76 FR 70468 - Extension of Agency Information Collection Activity Under OMB Review: Airport Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-14
... (SIDA); (4) submission to TSA of identifying information about individuals to whom the airport operator... information on individuals with unescorted access to a SIDA. Airport operators must ensure that individuals...
76 FR 27287 - Port Access Route Study: In the Bering Strait; Extension of Comment Period
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-11
... Lieutenant Faith Reynolds, Project Officer, Seventeenth Coast Guard District, telephone 907-463-2270; e-mail Faith.A.Reynolds@uscg.mil ; or George Detweiler, Office of Waterways Management, Coast Guard, telephone...
Equal Opportunity and Accessibility | Oregon State University Extension
discrimination based on age, color, disability, familial or parental status, gender identity or expression inclusion for people with a wide range of needs. People who benefit include those with: Vision, hearing, or
77 FR 1500 - Plum Tree Island National Wildlife Refuge, Poquoson, VA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-10
... but the refuge's 200-acre Cow Island Tract as a gunnery and bombing range. Extensive unexploded... access. The only public use offered is an annual, permit-only, waterfowl hunt on the Cow Island Tract...
General Catalytic Enantioselective Access to Monohalomethyl and Trifluoromethyl Cyclopropanes.
Huang, Wei-Sheng; Schlinquer, Claire; Poisson, Thomas; Pannecoucke, Xavier; Charette, André B; Jubault, Philippe
2018-05-29
An efficient catalytic enantioselective access to chiral functionalized trifluoromethyl cyclopropanes from two classes of diazo compounds and alpha-trifluoromethyl styrenes using Rh2((S)-BTPCP)4 as a catalyst is described. This method provides an efficient and practical strategy for the synthesis of highly functionalized CF3-cyclopropanes with excellent diastereoselectivities (up to 20:1) and enantioselectivities (up to 99% ee). The depicted methodology represents up to date the most efficient catalytic enantioselective method to access highly decorated chiral CF3-cyclopropanes. Extension to chiral monohalomethyl cyclopropanes in high ee is also reported. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
Zamasiya, Byron; Nyikahadzoi, Kefasi; Mukamuri, Billy Billiard
2017-08-01
This paper examines factors influencing behavioural change among smallholder farmers towards adaptation to climate change in transitional climatic zones of Africa, specifically, Hwedza District in Zimbabwe. Data for this study were collected from 400 randomly-selected smallholder farmers, using a structured questionnaire, focus group discussions and key informant interviews. The study used an ordered logit model to examine the factors that influence smallholder farmers' behavioural intention towards adaptation to climate change. Results from the study show that the gender of the household head, access to extension services on crop and livestock production, access to climate information, membership to social groups and experiencing a drought have a positive influence on farmers' attitude towards adaptation to climate change and variability. The study concluded that although the majority of smallholder farmers perceive that the climate is changing, they continue to habour negative attitudes towards prescribed climate change adaptation techniques. This study recommends more education on climate change, as well as adaptation strategies for both agricultural extension workers and farmers. This can be complemented by disseminating timely climate information through extension officers and farmers' groups. Copyright © 2017 Elsevier Ltd. All rights reserved.
Controlling Infrastructure Costs: Right-Sizing the Mission Control Facility
NASA Technical Reports Server (NTRS)
Martin, Keith; Sen-Roy, Michael; Heiman, Jennifer
2009-01-01
Johnson Space Center's Mission Control Center is a space vehicle, space program agnostic facility. The current operational design is essentially identical to the original facility architecture that was developed and deployed in the mid-90's. In an effort to streamline the support costs of the mission critical facility, the Mission Operations Division (MOD) of Johnson Space Center (JSC) has sponsored an exploratory project to evaluate and inject current state-of-the-practice Information Technology (IT) tools, processes and technology into legacy operations. The general push in the IT industry has been trending towards a data-centric computer infrastructure for the past several years. Organizations facing challenges with facility operations costs are turning to creative solutions combining hardware consolidation, virtualization and remote access to meet and exceed performance, security, and availability requirements. The Operations Technology Facility (OTF) organization at the Johnson Space Center has been chartered to build and evaluate a parallel Mission Control infrastructure, replacing the existing, thick-client distributed computing model and network architecture with a data center model utilizing virtualization to provide the MCC Infrastructure as a Service. The OTF will design a replacement architecture for the Mission Control Facility, leveraging hardware consolidation through the use of blade servers, increasing utilization rates for compute platforms through virtualization while expanding connectivity options through the deployment of secure remote access. The architecture demonstrates the maturity of the technologies generally available in industry today and the ability to successfully abstract the tightly coupled relationship between thick-client software and legacy hardware into a hardware agnostic "Infrastructure as a Service" capability that can scale to meet future requirements of new space programs and spacecraft. This paper discusses the benefits and difficulties that a migration to cloud-based computing philosophies has uncovered when compared to the legacy Mission Control Center architecture. The team consists of system and software engineers with extensive experience with the MCC infrastructure and software currently used to support the International Space Station (ISS) and Space Shuttle program (SSP).
Lang, Elvira V; Reyes, Jorge; Faintuch, Salomao; Smith, Amy; Abu-Elmagd, Kareem
2005-09-01
To assess feasibility and success of venous recanalization in patients with short gut syndrome who have lost their traditional central venous access and required intestinal or multivisceral transplantation. Twelve patients between the ages of 7 and 55 years with short gut syndrome and long-standing total parenteral nutrition (TPN) dependency and/or hypercoagulability were treated. All had extensive chronic central venous occlusions and survival was dependent on restoration of access and planned transplantation. Central venous recanalizations were obtained via sharp needle recanalization techniques, venous reconstructions with stents, and/or extraanatomic access to the central venous system for placement of central venous tunneled catheters. Central venous access was restored in all patients without operative-related mortality. Three major hemodynamic perioperative technical complications were recorded and successfully treated. There were three self-limited early infectious complications. With a mean follow-up of 22 months, eight of the 12 patients were alive with successful small bowel or multivisceral transplantation; six of those became independent of TPN. The remaining four patients died of complications related to TPN (n = 3) or transplantation (n = 1). With a mean follow-up of 20 months, all but two of the recanalized venous accesses were maintained, for a success rate of 83%. Recanalizations of extensive chronic vein occlusions are feasible but associated with high risk. The technique is life-saving for TPN-dependent patients and can restore candidacy for intestinal and multivisceral transplantation. This approach is likely to be increasingly requested because of the current clinical availability of the transplant procedure.
Allawi, H T; Dong, F; Ip, H S; Neri, B P; Lyamichev, V I
2001-01-01
A rapid and simple method for determining accessible sites in RNA that is independent of the length of target RNA and does not require RNA labeling is described. In this method, target RNA is allowed to hybridize with sequence-randomized libraries of DNA oligonucleotides linked to a common tag sequence at their 5'-end. Annealed oligonucleotides are extended with reverse transcriptase and the extended products are then amplified by using PCR with a primer corresponding to the tag sequence and a second primer specific to the target RNA sequence. We used the combination of both the lengths of the RT-PCR products and the location of the binding site of the RNA-specific primer to determine which regions of the RNA molecules were RNA extendible sites, that is, sites available for oligonucleotide binding and extension. We then employed this reverse transcription with the random oligonucleotide libraries (RT-ROL) method to determine the accessible sites on four mRNA targets, human activated ras (ha-ras), human intercellular adhesion molecule-1 (ICAM-1), rabbit beta-globin, and human interferon-gamma (IFN-gamma). Our results were concordant with those of other researchers who had used RNase H cleavage or hybridization with arrays of oligonucleotides to identify accessible sites on some of these targets. Further, we found good correlation between sites when we compared the location of extendible sites identified by RT-ROL with hybridization sites of effective antisense oligonucleotides on ICAM-1 mRNA in antisense inhibition studies. Finally, we discuss the relationship between RNA extendible sites and RNA accessibility. PMID:11233988
Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha, Fatemeh; Mu, Yi
2016-05-01
Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
PIMS sequencing extension: a laboratory information management system for DNA sequencing facilities
2011-01-01
Background Facilities that provide a service for DNA sequencing typically support large numbers of users and experiment types. The cost of services is often reduced by the use of liquid handling robots but the efficiency of such facilities is hampered because the software for such robots does not usually integrate well with the systems that run the sequencing machines. Accordingly, there is a need for software systems capable of integrating different robotic systems and managing sample information for DNA sequencing services. In this paper, we describe an extension to the Protein Information Management System (PIMS) that is designed for DNA sequencing facilities. The new version of PIMS has a user-friendly web interface and integrates all aspects of the sequencing process, including sample submission, handling and tracking, together with capture and management of the data. Results The PIMS sequencing extension has been in production since July 2009 at the University of Leeds DNA Sequencing Facility. It has completely replaced manual data handling and simplified the tasks of data management and user communication. Samples from 45 groups have been processed with an average throughput of 10000 samples per month. The current version of the PIMS sequencing extension works with Applied Biosystems 3130XL 96-well plate sequencer and MWG 4204 or Aviso Theonyx liquid handling robots, but is readily adaptable for use with other combinations of robots. Conclusions PIMS has been extended to provide a user-friendly and integrated data management solution for DNA sequencing facilities that is accessed through a normal web browser and allows simultaneous access by multiple users as well as facility managers. The system integrates sequencing and liquid handling robots, manages the data flow, and provides remote access to the sequencing results. The software is freely available, for academic users, from http://www.pims-lims.org/. PMID:21385349
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
Access Control in Location-Based Services
NASA Astrophysics Data System (ADS)
Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.
Balancing Accession and Retention (Navy Comprehensive Compensation Study)
1982-09-01
training graduate of quality type i SEXTE ^. STAYER. the ratio of the number of extensions of less than 1 year to the number of extensions of 1...rating and quality type who appear in LOS 5 can be calculated: ^5ij ELIG li X^^j ELIG]^^^ REUP^j(BMULT.) + X^j^j EXTE^.(BMULTj) + X^^. ELIG]^^ SEXTE ...in the jth rating, EXTEj_j( BMULT.) SEXTE ^. = probability that an eligible individual of quality type i in rating j chooses to extend his
Orthographic and phonological neighborhood effects in handwritten word perception
Goldinger, Stephen D.
2017-01-01
In printed-word perception, the orthographic neighborhood effect (i.e., faster recognition of words with more neighbors) has considerable theoretical importance, because it implicates great interactivity in lexical access. Mulatti, Reynolds, and Besner Journal of Experimental Psychology: Human Perception and Performance, 32, 799–810 (2006) questioned the validity of orthographic neighborhood effects, suggesting that they reflect a confound with phonological neighborhood density. They reported that, when phonological density is controlled, orthographic neighborhood effects vanish. Conversely, phonological neighborhood effects were still evident even when controlling for orthographic neighborhood density. The present study was a replication and extension of Mulatti et al. (2006), with words presented in four different formats (computer-generated print and cursive, and handwritten print and cursive). The results from Mulatti et al. (2006) were replicated with computer-generated stimuli, but were reversed with natural stimuli. These results suggest that, when ambiguity is introduced at the level of individual letters, top-down influences from lexical neighbors are increased. PMID:26306881
A Review on Development Practice of Smart Grid Technology in China
NASA Astrophysics Data System (ADS)
Han, Liu; Chen, Wei; Zhuang, Bo; Shen, Hongming
2017-05-01
Smart grid has become an inexorable trend of energy and economy development worldwide. Since the development of smart grid was put forward in China in 2009, we have obtained abundant research results and practical experiences as well as extensive attention from international community in this field. This paper reviews the key technologies and demonstration projects on new energy connection forecasts; energy storage; smart substations; disaster prevention and reduction for power transmission lines; flexible DC transmission; distribution automation; distributed generation access and micro grid; smart power consumption; the comprehensive demonstration of power distribution and utilization; smart power dispatching and control systems; and the communication networks and information platforms of China, systematically, on the basis of 5 fields, i.e., renewable energy integration, smart power transmission and transformation, smart power distribution and consumption, smart power dispatching and control systems and information and communication platforms. Meanwhile, it also analyzes and compares with the developmental level of similar technologies abroad, providing an outlook on the future development trends of various technologies.
Resonance Extraction from the Finite Volume
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doring, Michael; Molina Peralta, Raquel
2016-06-01
The spectrum of excited hadrons becomes accessible in simulations of Quantum Chromodynamics on the lattice. Extensions of Lüscher's method allow to address multi-channel scattering problems using moving frames or modified boundary conditions to obtain more eigenvalues in finite volume. As these are at different energies, interpolations are needed to relate different eigenvalues and to help determine the amplitude. Expanding the T- or the K-matrix locally provides a controlled scheme by removing the known non-analyticities of thresholds. This can be stabilized by using Chiral Perturbation Theory. Different examples to determine resonance pole parameters and to disentangle resonances from thresholds are dis-more » cussed, like the scalar meson f0(980) and the excited baryons N(1535)1/2^- and Lambda(1405)1/2^-.« less
Floral traits mediate the vulnerability of aloes to pollen theft and inefficient pollination by bees
Hargreaves, Anna L.; Harder, Lawrence D.; Johnson, Steven D.
2012-01-01
Background and Aims Pollen-collecting bees are among the most important pollinators globally, but are also the most common pollen thieves and can significantly reduce plant reproduction. The pollination efficiency of pollen collectors depends on the frequency of their visits to female(-phase) flowers, contact with stigmas and deposition of pollen of sufficient quantity and quality to fertilize ovules. Here we investigate the relative importance of these components, and the hypothesis that floral and inflorescence characteristics mediate the pollination role of pollen collection by bees. Methods For ten Aloe species that differ extensively in floral and inflorescence traits, we experimentally excluded potential bird pollinators to quantify the contributions of insect visitors to pollen removal, pollen deposition and seed production. We measured corolla width and depth to determine nectar accessibility, and the phenology of anther dehiscence and stigma receptivity to quantify herkogamy and dichogamy. Further, we compiled all published bird-exclusion studies of aloes, and compared insect pollination success with floral morphology. Key Results Species varied from exclusively insect pollinated, to exclusively bird pollinated but subject to extensive pollen theft by insects. Nectar inaccessibility and strong dichogamy inhibited pollination by pollen-collecting bees by discouraging visits to female-phase (i.e. pollenless) flowers. For species with large inflorescences of pollen-rich flowers, pollen collectors successfully deposited pollen, but of such low quality (probably self-pollen) that they made almost no contribution to seed set. Indeed, considering all published bird-exclusion studies (17 species in total), insect pollination efficiency varied significantly with floral shape. Conclusions Species-specific floral and inflorescence characteristics, especially nectar accessibility and dichogamy, control the efficiency of pollen-collecting bees as pollinators of aloes. PMID:22278414
NASA Astrophysics Data System (ADS)
Idehara, H.; Carbon, D. F.
2004-12-01
We present two new, publicly available tools to support the examination and interpretation of spectra. SCAMP is a specialized graphical user interface for MATLAB. It allows researchers to rapidly intercompare sets of observational, theoretical, and/or laboratory spectra. Users have extensive control over the colors and placement of individual spectra, and over spectrum normalization from one spectral region to another. Spectra can be interactively assigned to user-defined groups and the groupings recalled at a later time. The user can measure/record positions and intensities of spectral features, interactively spline-fit spectra, and normalize spectra by fitted splines. User-defined wavelengths can be automatically highlighted in SCAMP plots. The user can save/print annotated graphical output suitable for a scientific notebook depicting the work at any point. The ASP is a WWW portal that provides interactive access to two spectrum data sets: a library of synthetic stellar spectra and a library of laboratory PAH spectra. The synthetic stellar spectra in the ASP are appropriate to the giant branch with an assortment of compositions. Each spectrum spans the full range from 2 to 600 microns at a variety of resolutions. The ASP is designed to allow users to quickly identify individual features at any resolution that arise from any of the included isotopic species. The user may also retrieve the depth of formation of individual features at any resolution. PAH spectra accessible through the ASP are drawn from the extensive library of spectra measured by the NASA Ames Astrochemistry Laboratory. The user may interactively choose any subset of PAHs in the data set, combine them with user-defined weights and temperatures, and view/download the resultant spectrum at any user-defined resolution. This work was funded by the NASA Advanced Supercomputing Division, NASA Ames Research Center.
Development of brain networks involved in spoken word processing of Mandarin Chinese.
Cao, Fan; Khalid, Kainat; Lee, Rebecca; Brennan, Christine; Yang, Yanhui; Li, Kuncheng; Bolger, Donald J; Booth, James R
2011-08-01
Developmental differences in phonological and orthographic processing of Chinese spoken words were examined in 9-year-olds, 11-year-olds and adults using functional magnetic resonance imaging (fMRI). Rhyming and spelling judgments were made to two-character words presented sequentially in the auditory modality. Developmental comparisons between adults and both groups of children combined showed that age-related changes in activation in visuo-orthographic regions depended on a task. There were developmental increases in the left inferior temporal gyrus and the right inferior occipital gyrus in the spelling task, suggesting more extensive visuo-orthographic processing in a task that required access to these representations. Conversely, there were developmental decreases in activation in the left fusiform gyrus and left middle occipital gyrus in the rhyming task, suggesting that the development of reading is marked by reduced involvement of orthography in a spoken language task that does not require access to these orthographic representations. Developmental decreases may arise from the existence of extensive homophony (auditory words that have multiple spellings) in Chinese. In addition, we found that 11-year-olds and adults showed similar activation in the left superior temporal gyrus across tasks, with both groups showing greater activation than 9-year-olds. This pattern suggests early development of perceptual representations of phonology. In contrast, 11-year-olds and 9-year-olds showed similar activation in the left inferior frontal gyrus across tasks, with both groups showing weaker activation than adults. This pattern suggests late development of controlled retrieval and selection of lexical representations. Altogether, this study suggests differential effects of character acquisition on development of components of the language network in Chinese as compared to previous reports on alphabetic languages. Published by Elsevier Inc.
Extensive Drug Resistance Acquired During Treatment of Multidrug-Resistant Tuberculosis
Cegielski, J. Peter; Dalton, Tracy; Yagui, Martin; Wattanaamornkiet, Wanpen; Volchenkov, Grigory V.; Via, Laura E.; Van Der Walt, Martie; Tupasi, Thelma; Smith, Sarah E.; Odendaal, Ronel; Leimane, Vaira; Kvasnovsky, Charlotte; Kuznetsova, Tatiana; Kurbatova, Ekaterina; Kummik, Tiina; Kuksa, Liga; Kliiman, Kai; Kiryanova, Elena V.; Kim, HeeJin; Kim, Chang-ki; Kazennyy, Boris Y.; Jou, Ruwen; Huang, Wei-Lun; Ershova, Julia; Erokhin, Vladislav V.; Diem, Lois; Contreras, Carmen; Cho, Sang Nae; Chernousova, Larisa N.; Chen, Michael P.; Caoili, Janice Campos; Bayona, Jaime; Akksilp, Somsak; Calahuanca, Gloria Yale; Wolfgang, Melanie; Viiklepp, Piret; Vasilieva, Irina A.; Taylor, Allison; Tan, Kathrine; Suarez, Carmen; Sture, Ingrida; Somova, Tatiana; Smirnova, Tatyana G.; Sigman, Erika; Skenders, Girts; Sitti, Wanlaya; Shamputa, Isdore C.; Riekstina, Vija; Pua, Kristine Rose; Therese, M.; Perez, C.; Park, Seungkyu; Norvaisha, Inga; Nemtsova, Evgenia S.; Min, Seonyeong; Metchock, Beverly; Levina, Klavdia; Lei, Yung-Chao; Lee, Jongseok; Larionova, Elena E.; Lancaster, Joey; Jeon, Doosoo; Jave, Oswaldo; Khorosheva, Tatiana; Hwang, Soo Hee; Huang, Angela Song-En; Gler, M. Tarcela; Dravniece, Gunta; Eum, Seokyong; Demikhova, Olga V.; Degtyareva, Irina; Danilovits, Manfred; Cirula, Anda; Cho, Eunjin; Cai, Ying; Brand, Jeanette; Bonilla, Cesar; Barry, Clifton E.; Asencios, Luis; Andreevskaya, Sofia N.; Akksilp, Rattanawadee
2014-01-01
Background. Increasing access to drugs for the treatment of multidrug-resistant (MDR) tuberculosis is crucial but could lead to increasing resistance to these same drugs. In 2000, the international Green Light Committee (GLC) initiative began to increase access while attempting to prevent acquired resistance. Methods. To assess the GLC's impact, we followed adults with pulmonary MDR tuberculosis from the start to the end of treatment with monthly sputum cultures, drug susceptibility testing, and genotyping. We compared the frequency and predictors of acquired resistance to second-line drugs (SLDs) in 9 countries that volunteered to participate, 5 countries that met GLC criteria, and 4 countries that did not apply to the GLC. Results. In total, 832 subjects were enrolled. Of those without baseline resistance to specific SLDs, 68 (8.9%) acquired extensively drug-resistant (XDR) tuberculosis, 79 (11.2%) acquired fluoroquinolone (FQ) resistance, and 56 (7.8%) acquired resistance to second-line injectable drugs (SLIs). The relative risk (95% confidence interval [CI]) of acquired resistance was lower at GLC-approved sites: 0.27 (.16–.47) for XDR tuberculosis, 0.28 (.17–.45) for FQ, and 0.15 (.06–.39) to 0.60 (.34–1.05) for 3 different SLIs. The risk increased as the number of potentially effective drugs decreased. Controlling for baseline drug resistance and differences between sites, the odds ratios (95% CIs) were 0.21 (.07–.62) for acquired XDR tuberculosis and 0.23 (.09–.59) for acquired FQ resistance. Conclusions. Treatment of MDR tuberculosis involves substantial risk of acquired resistance to SLDs, increasing as baseline drug resistance increases. The risk was significantly lower in programs documented by the GLC to meet specific standards. PMID:25057101
Theriault, Veronique; Smale, Melinda; Haider, Hamza
2017-04-01
Better understanding of gender differences in the adoption of agricultural intensification strategies is crucial for designing effective policies to close the gender gap while sustainably enhancing farm productivity. We examine gender differences in adoption rates, likelihood and determinants of adopting strategy sets that enhance yields, protect crops, and restore soils in the West African Sahel, based on analysis of cereal production in Burkina Faso. Applying a multivariate probit model to a nationally representative household panel, we exploit the individual plot as unit of analysis and control for plot manager characteristics along with other covariates. Reflecting the socio-cultural context of farming combined with the economic attributes of inputs, we find that female managers of individual cereal fields are less likely than their male counterparts to adopt yield-enhancing and soil-restoring strategies, although no differential is apparent for yield-protecting strategies. More broadly, gender-disaggregated regressions demonstrate that adoption determinants differ by gender. Plot manager characteristics, including age, marital status, and access to credit or extension services do influence adoption decisions. Furthermore, household resources influence the probability of adopting intensification strategy sets differently by gender of the plot manager. Variables expressing the availability of household labor strongly influence the adoption of soil-restoring strategies by female plot managers. By contrast, household resources such as extent of livestock owned, value of non-farm income, and area planted to cotton affect the adoption choices of male plot managers. Rectifying the male bias in extension services along with improving access to credit, income, and equipment to female plot managers could contribute to sustainable agricultural intensification.
A dynamic access control method based on QoS requirement
NASA Astrophysics Data System (ADS)
Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang
2013-03-01
A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.
Task Delegation Based Access Control Models for Workflow Systems
NASA Astrophysics Data System (ADS)
Gaaloul, Khaled; Charoy, François
e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.
BNDB - the Biochemical Network Database.
Küntzer, Jan; Backes, Christina; Blum, Torsten; Gerasch, Andreas; Kaufmann, Michael; Kohlbacher, Oliver; Lenhof, Hans-Peter
2007-10-02
Technological advances in high-throughput techniques and efficient data acquisition methods have resulted in a massive amount of life science data. The data is stored in numerous databases that have been established over the last decades and are essential resources for scientists nowadays. However, the diversity of the databases and the underlying data models make it difficult to combine this information for solving complex problems in systems biology. Currently, researchers typically have to browse several, often highly focused, databases to obtain the required information. Hence, there is a pressing need for more efficient systems for integrating, analyzing, and interpreting these data. The standardization and virtual consolidation of the databases is a major challenge resulting in a unified access to a variety of data sources. We present the Biochemical Network Database (BNDB), a powerful relational database platform, allowing a complete semantic integration of an extensive collection of external databases. BNDB is built upon a comprehensive and extensible object model called BioCore, which is powerful enough to model most known biochemical processes and at the same time easily extensible to be adapted to new biological concepts. Besides a web interface for the search and curation of the data, a Java-based viewer (BiNA) provides a powerful platform-independent visualization and navigation of the data. BiNA uses sophisticated graph layout algorithms for an interactive visualization and navigation of BNDB. BNDB allows a simple, unified access to a variety of external data sources. Its tight integration with the biochemical network library BN++ offers the possibility for import, integration, analysis, and visualization of the data. BNDB is freely accessible at http://www.bndb.org.
76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
... Extension of Existing Information Collection; Rock Burst Control Plan, Metal and Nonmetal Mines AGENCY: Mine... extension of the information collection for 30 CFR 57.3461 Rock Bursts. DATES: All comments must be received... contains the request for an extension of the existing collection of information in 30 CFR 57.3461 Rock...
The Use of Proxy Caches for File Access in a Multi-Tier Grid Environment
NASA Astrophysics Data System (ADS)
Brun, R.; Duellmann, D.; Ganis, G.; Hanushevsky, A.; Janyst, L.; Peters, A. J.; Rademakers, F.; Sindrilaru, E.
2011-12-01
The use of proxy caches has been extensively studied in the HEP environment for efficient access of database data and showed significant performance with only very moderate operational effort at higher grid tiers (T2, T3). In this contribution we propose to apply the same concept to the area of file access and analyse the possible performance gains, operational impact on site services and applicability to different HEP use cases. Base on a proof-of-concept studies with a modified XROOT proxy server we review the cache efficiency and overheads for access patterns of typical ROOT based analysis programs. We conclude with a discussion of the potential role of this new component at the different tiers of a distributed computing grid.
Huh, Sun
2013-01-01
ScienceCentral, a free or open access, full-text archive of scientific journal literature at the Korean Federation of Science and Technology Societies, was under test in September 2013. Since it is a Journal Article Tag Suite-based full text database, extensible markup language files of all languages can be presented, according to Unicode Transformation Format 8-bit encoding. It is comparable to PubMed Central: however, there are two distinct differences. First, its scope comprises all science fields; second, it accepts all language journals. Launching ScienceCentral is the first step for free access or open access academic scientific journals of all languages to leap to the world, including scientific journals from Croatia. PMID:24266292
The Use of Proxy Caches for File Access in a Multi-Tier Grid Environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brun, R.; Dullmann, D.; Ganis, G.
2012-04-19
The use of proxy caches has been extensively studied in the HEP environment for efficient access of database data and showed significant performance with only very moderate operational effort at higher grid tiers (T2, T3). In this contribution we propose to apply the same concept to the area of file access and analyze the possible performance gains, operational impact on site services and applicability to different HEP use cases. Base on a proof-of-concept studies with a modified XROOT proxy server we review the cache efficiency and overheads for access patterns of typical ROOT based analysis programs. We conclude with amore » discussion of the potential role of this new component at the different tiers of a distributed computing grid.« less
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
Space Materials Handbook. 3rd; ed.
NASA Technical Reports Server (NTRS)
Rittenhouse, John B.; Singletary, John B.
1969-01-01
This edition is the result of an extensive revision and reworking of the second edition of the Space Materials Handbook along with the incorporation of entirely new subject matter coverage and new materials data. All of the most significant material, phenomena, properties, and principles covered in the original Handbook are presented and expanded in this revised and updated version. However, treatment of theoretical aspects has been condensed in order that more emphasis could be placed on the extensive new materials knowledge and data obtained from the design and successful launching of a wide variety of space systems. The handbook is organized into four parts, namely: space environment, effect of space environment on materials, materials in space, and biological interaction with spacecraft materials. Information on mechanical, physical, and chemical properties and characteristics is given for a wide variety of metallic and nonmetallic materials. The effects of natural and induced environments on materials are appraised. Materials categories include coverage of thermal control materials, optical materials, adhesives, organic structural materials, inorganic structural materials, electronic components and materials, materials for sealing applications, and lubrication materials. In addition, a comprehensive multiple citation index is incorporated which gives ready access to information on specific subject areas with regard to their locations within the Handbook.
Increasing mobility through enhanced transit connectivity.
DOT National Transportation Integrated Search
2016-08-15
The Chicago metropolitan area has one of the most extensive public transit systems in the United : States, yet there are many places in the region where people do not have convenient access to transit : service. To address that deficiency, this paper...
Does the Open Door Include the Physically Handicapped?
ERIC Educational Resources Information Center
Tuscher, James; Fox, Gary C.
1971-01-01
Though the community college offers many advantages to the physically handicapped because of its diversified programs and extensive counseling services, a recent survey found that too few community colleges provide the necessary architectural modifications to make them accessible. (NF)
75 FR 65312 - Combined Notice of Filings #1
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-22
...: Request for Reauthorization and Extension of Existing Blanket Authorization to Acquire Securities under.... Applicants: Western Electricity Coordinating Council. Description: Notice of Proposed Cancellation of Western Electricity Coordinating Council's Reliability Management System. Filed Date: 10/12/2010. Accession Number...
76 FR 71066 - HUD Draft Environmental Justice Strategy, Extension of Public Comment Period
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-16
... may access this number through TTY by calling the toll-free Federal Relay Service at (800) 877-8339... step in a larger Administration-wide effort to ensure strong protection from environmental and health...
[Public control and equity of access to hospitals under non-State public administration].
Carneiro Junior, Nivaldo; Elias, Paulo Eduardo
2006-10-01
To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.
NASA Astrophysics Data System (ADS)
Le, Zichun; Suo, Kaihua; Fu, Minglei; Jiang, Ling; Dong, Wen
2012-03-01
In order to minimize the average end to end delay for data transporting in hybrid wireless optical broadband access network, a novel routing algorithm named MSTMCF (minimum spanning tree and minimum cost flow) is devised. The routing problem is described as a minimum spanning tree and minimum cost flow model and corresponding algorithm procedures are given. To verify the effectiveness of MSTMCF algorithm, extensively simulations based on OWNS have been done under different types of traffic source.
Genome-wide epigenetic perturbation jump-starts patterns of heritable variation found in nature.
Roux, Fabrice; Colomé-Tatché, Maria; Edelist, Cécile; Wardenaar, René; Guerche, Philippe; Hospital, Frédéric; Colot, Vincent; Jansen, Ritsert C; Johannes, Frank
2011-08-01
We extensively phenotyped 6000 Arabidopsis plants with experimentally perturbed DNA methylomes as well as a diverse panel of natural accessions in a common garden. We found that alterations in DNA methylation not only caused heritable phenotypic diversity but also produced heritability patterns closely resembling those of the natural accessions. Our findings indicate that epigenetically induced and naturally occurring variation in complex traits share part of their polygenic architecture and may offer complementary adaptation routes in ecological settings.
Laser Recanalization of Central Venous Occlusion to Salvage a Threatened Arteriovenous Fistula.
Rambhia, Sagar; Janko, Matthew; Hacker, Robert I
2018-07-01
Central venous occlusion is conventionally managed with balloon angioplasty, stent extension, or sharp recanalization. Here, we describe recanalization of a chronically occluded innominate vein using excimer laser after conventional techniques were unsuccessful. Patient clinical improvement and fistula patency have been sustained 2 years postintervention. This technique may provide new hemodialysis access options for patients who would not otherwise be candidates for hemodialysis access on the ipsilateral side of a central venous occlusion. Copyright © 2018 Elsevier Inc. All rights reserved.
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Dischinger, Portia
2005-01-01
This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
Evaluation of modified work zone traffic control devices at business accesses
DOT National Transportation Integrated Search
2001-01-01
Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...
Doing Your Science While You're in Orbit
NASA Astrophysics Data System (ADS)
Green, Mark L.; Miller, Stephen D.; Vazhkudai, Sudharshan S.; Trater, James R.
2010-11-01
Large-scale neutron facilities such as the Spallation Neutron Source (SNS) located at Oak Ridge National Laboratory need easy-to-use access to Department of Energy Leadership Computing Facilities and experiment repository data. The Orbiter thick- and thin-client and its supporting Service Oriented Architecture (SOA) based services (available at https://orbiter.sns.gov) consist of standards-based components that are reusable and extensible for accessing high performance computing, data and computational grid infrastructure, and cluster-based resources easily from a user configurable interface. The primary Orbiter system goals consist of (1) developing infrastructure for the creation and automation of virtual instrumentation experiment optimization, (2) developing user interfaces for thin- and thick-client access, (3) provide a prototype incorporating major instrument simulation packages, and (4) facilitate neutron science community access and collaboration. The secure Orbiter SOA authentication and authorization is achieved through the developed Virtual File System (VFS) services, which use Role-Based Access Control (RBAC) for data repository file access, thin-and thick-client functionality and application access, and computational job workflow management. The VFS Relational Database Management System (RDMS) consists of approximately 45 database tables describing 498 user accounts with 495 groups over 432,000 directories with 904,077 repository files. Over 59 million NeXus file metadata records are associated to the 12,800 unique NeXus file field/class names generated from the 52,824 repository NeXus files. Services that enable (a) summary dashboards of data repository status with Quality of Service (QoS) metrics, (b) data repository NeXus file field/class name full text search capabilities within a Google like interface, (c) fully functional RBAC browser for the read-only data repository and shared areas, (d) user/group defined and shared metadata for data repository files, (e) user, group, repository, and web 2.0 based global positioning with additional service capabilities are currently available. The SNS based Orbiter SOA integration progress with the Distributed Data Analysis for Neutron Scattering Experiments (DANSE) software development project is summarized with an emphasis on DANSE Central Services and the Virtual Neutron Facility (VNF). Additionally, the DANSE utilization of the Orbiter SOA authentication, authorization, and data transfer services best practice implementations are presented.
Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel
2016-12-01
Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.
The PDS4 Data Dictionary Tool - Metadata Design for Data Preparers
NASA Astrophysics Data System (ADS)
Raugh, A.; Hughes, J. S.
2017-12-01
One of the major design goals of the PDS4 development effort was to create an extendable Information Model (IM) for the archive, and to allow mission data designers/preparers to create extensions for metadata definitions specific to their own contexts. This capability is critical for the Planetary Data System - an archive that deals with a data collection that is diverse along virtually every conceivable axis. Amid such diversity in the data itself, it is in the best interests of the PDS archive and its users that all extensions to the IM follow the same design techniques, conventions, and restrictions as the core implementation itself. But it is unrealistic to expect mission data designers to acquire expertise in information modeling, model-driven design, ontology, schema formulation, and PDS4 design conventions and philosophy in order to define their own metadata. To bridge that expertise gap and bring the power of information modeling to the data label designer, the PDS Engineering Node has developed the data dictionary creation tool known as "LDDTool". This tool incorporates the same software used to maintain and extend the core IM, packaged with an interface that enables a developer to create his extension to the IM using the same, standards-based metadata framework PDS itself uses. Through this interface, the novice dictionary developer has immediate access to the common set of data types and unit classes for defining attributes, and a straight-forward method for constructing classes. The more experienced developer, using the same tool, has access to more sophisticated modeling methods like abstraction and extension, and can define context-specific validation rules. We present the key features of the PDS Local Data Dictionary Tool, which both supports the development of extensions to the PDS4 IM, and ensures their compatibility with the IM.
Unsafe abortion: a cruel way of birth control.
Shrivastava, Saurabh RamBihariLal; Shrivastava, Prateek Saurabh; Ramasamy, Jegadeesh
2014-06-01
Unsafe abortion refers to a procedure for terminating an unintended pregnancy performed either by persons lacking the necessary skills or in an environment that does not conform to minimal medical standards, or both. The objectives of the study are to assess the factors attributing to practice of unsafe abortion and to suggest feasible and cost-effective measures to counter the same. An extensive search of all materials related to the topic was made using library sources including Pubmed, Medline and World Health Organization. Keywords used in the search include unsafe abortion and unintended pregnancy. Multiple socio-demographic determinants and barriers such as illiterate women, poor socio-economic status, poor awareness about abortion services, associated stigma, and untrained health professionals have been identified resulting in restricted utilization/access of women to safe abortion services. Consequences of unsafe abortion have been alarming, seriously questioning the quality of health care delivery system. Concerted and dedicated efforts of government in collaboration with the private sector, community members and non-governmental organizations are needed to ensure that women have a better access to contraceptives, abortion services, and post-abortion care that are safe, affordable, and free from stigma.
Shape Sensing Techniques for Continuum Robots in Minimally Invasive Surgery: A Survey.
Shi, Chaoyang; Luo, Xiongbiao; Qi, Peng; Li, Tianliang; Song, Shuang; Najdovski, Zoran; Fukuda, Toshio; Ren, Hongliang
2017-08-01
Continuum robots provide inherent structural compliance with high dexterity to access the surgical target sites along tortuous anatomical paths under constrained environments and enable to perform complex and delicate operations through small incisions in minimally invasive surgery. These advantages enable their broad applications with minimal trauma and make challenging clinical procedures possible with miniaturized instrumentation and high curvilinear access capabilities. However, their inherent deformable designs make it difficult to realize 3-D intraoperative real-time shape sensing to accurately model their shape. Solutions to this limitation can lead themselves to further develop closely associated techniques of closed-loop control, path planning, human-robot interaction, and surgical manipulation safety concerns in minimally invasive surgery. Although extensive model-based research that relies on kinematics and mechanics has been performed, accurate shape sensing of continuum robots remains challenging, particularly in cases of unknown and dynamic payloads. This survey investigates the recent advances in alternative emerging techniques for 3-D shape sensing in this field and focuses on the following categories: fiber-optic-sensor-based, electromagnetic-tracking-based, and intraoperative imaging modality-based shape-reconstruction methods. The limitations of existing technologies and prospects of new technologies are also discussed.
MovieMaker: a web server for rapid rendering of protein motions and interactions.
Maiti, Rajarshi; Van Domselaar, Gary H; Wishart, David S
2005-07-01
MovieMaker is a web server that allows short ( approximately 10 s), downloadable movies of protein motions to be generated. It accepts PDB files or PDB accession numbers as input and automatically calculates, renders and merges the necessary image files to create colourful animations covering a wide range of protein motions and other dynamic processes. Users have the option of animating (i) simple rotation, (ii) morphing between two end-state conformers, (iii) short-scale, picosecond vibrations, (iv) ligand docking, (v) protein oligomerization, (vi) mid-scale nanosecond (ensemble) motions and (vii) protein folding/unfolding. MovieMaker does not perform molecular dynamics calculations. Instead it is an animation tool that uses a sophisticated superpositioning algorithm in conjunction with Cartesian coordinate interpolation to rapidly and automatically calculate the intermediate structures needed for many of its animations. Users have extensive control over the rendering style, structure colour, animation quality, background and other image features. MovieMaker is intended to be a general-purpose server that allows both experts and non-experts to easily generate useful, informative protein animations for educational and illustrative purposes. MovieMaker is accessible at http://wishart.biology.ualberta.ca/moviemaker.
Tactical resource allocation and elective patient admission planning in care processes.
Hulshof, Peter J H; Boucherie, Richard J; Hans, Erwin W; Hurink, Johann L
2013-06-01
Tactical planning of resources in hospitals concerns elective patient admission planning and the intermediate term allocation of resource capacities. Its main objectives are to achieve equitable access for patients, to meet production targets/to serve the strategically agreed number of patients, and to use resources efficiently. This paper proposes a method to develop a tactical resource allocation and elective patient admission plan. These tactical plans allocate available resources to various care processes and determine the selection of patients to be served that are at a particular stage of their care process. Our method is developed in a Mixed Integer Linear Programming (MILP) framework and copes with multiple resources, multiple time periods and multiple patient groups with various uncertain treatment paths through the hospital, thereby integrating decision making for a chain of hospital resources. Computational results indicate that our method leads to a more equitable distribution of resources and provides control of patient access times, the number of patients served and the fraction of allocated resource capacity. Our approach is generic, as the base MILP and the solution approach allow for including various extensions to both the objective criteria and the constraints. Consequently, the proposed method is applicable in various settings of tactical hospital management.
Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
NASA Astrophysics Data System (ADS)
Tao, Kai; Li, Jing; Sampalli, Srinivas
Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.
Tripal: a construction toolkit for online genome databases.
Ficklin, Stephen P; Sanderson, Lacey-Anne; Cheng, Chun-Huai; Staton, Margaret E; Lee, Taein; Cho, Il-Hyung; Jung, Sook; Bett, Kirstin E; Main, Doreen
2011-01-01
As the availability, affordability and magnitude of genomics and genetics research increases so does the need to provide online access to resulting data and analyses. Availability of a tailored online database is the desire for many investigators or research communities; however, managing the Information Technology infrastructure needed to create such a database can be an undesired distraction from primary research or potentially cost prohibitive. Tripal provides simplified site development by merging the power of Drupal, a popular web Content Management System with that of Chado, a community-derived database schema for storage of genomic, genetic and other related biological data. Tripal provides an interface that extends the content management features of Drupal to the data housed in Chado. Furthermore, Tripal provides a web-based Chado installer, genomic data loaders, web-based editing of data for organisms, genomic features, biological libraries, controlled vocabularies and stock collections. Also available are Tripal extensions that support loading and visualizations of NCBI BLAST, InterPro, Kyoto Encyclopedia of Genes and Genomes and Gene Ontology analyses, as well as an extension that provides integration of Tripal with GBrowse, a popular GMOD tool. An Application Programming Interface is available to allow creation of custom extensions by site developers, and the look-and-feel of the site is completely customizable through Drupal-based PHP template files. Addition of non-biological content and user-management is afforded through Drupal. Tripal is an open source and freely available software package found at http://tripal.sourceforge.net.
Tripal: a construction toolkit for online genome databases
Sanderson, Lacey-Anne; Cheng, Chun-Huai; Staton, Margaret E.; Lee, Taein; Cho, Il-Hyung; Jung, Sook; Bett, Kirstin E.; Main, Doreen
2011-01-01
As the availability, affordability and magnitude of genomics and genetics research increases so does the need to provide online access to resulting data and analyses. Availability of a tailored online database is the desire for many investigators or research communities; however, managing the Information Technology infrastructure needed to create such a database can be an undesired distraction from primary research or potentially cost prohibitive. Tripal provides simplified site development by merging the power of Drupal, a popular web Content Management System with that of Chado, a community-derived database schema for storage of genomic, genetic and other related biological data. Tripal provides an interface that extends the content management features of Drupal to the data housed in Chado. Furthermore, Tripal provides a web-based Chado installer, genomic data loaders, web-based editing of data for organisms, genomic features, biological libraries, controlled vocabularies and stock collections. Also available are Tripal extensions that support loading and visualizations of NCBI BLAST, InterPro, Kyoto Encyclopedia of Genes and Genomes and Gene Ontology analyses, as well as an extension that provides integration of Tripal with GBrowse, a popular GMOD tool. An Application Programming Interface is available to allow creation of custom extensions by site developers, and the look-and-feel of the site is completely customizable through Drupal-based PHP template files. Addition of non-biological content and user-management is afforded through Drupal. Tripal is an open source and freely available software package found at http://tripal.sourceforge.net PMID:21959868
Guillomía San Bartolomé, Miguel A.; Artigas Maestre, José Ignacio; Sánchez Agustín, Ana
2017-01-01
Framed within a long-term cooperation between university and special education teachers, training in alternative communication skills and home control was realized using the “TICO” interface, a communication panel editor extensively used in special education schools. From a technological view we follow AAL technology trends by integrating a successful interface in a heterogeneous services AAL platform, focusing on a functional view. Educationally, a very flexible interface in line with communication training allows dynamic adjustment of complexity, enhanced by an accessible mindset and virtual elements significance already in use, offers specific interaction feedback, adapts to the evolving needs and capacities and improves the personal autonomy and self-confidence of children at school and home. TICO-home-control was installed during the last school year in the library of a special education school to study adaptations and training strategies to enhance the autonomy opportunities of its pupils. The methodology involved a case study and structured and semi-structured observations. Five children, considered unable to use commercial home control systems were trained obtaining good results in enabling them to use an open home control system. Moreover this AAL platform has proved efficient in training children in previous cognitive steps like virtual representation and cause-effect interaction. PMID:29023383
Guillomía San Bartolomé, Miguel A; Falcó Boudet, Jorge L; Artigas Maestre, José Ignacio; Sánchez Agustín, Ana
2017-10-12
Framed within a long-term cooperation between university and special education teachers, training in alternative communication skills and home control was realized using the "TICO" interface, a communication panel editor extensively used in special education schools. From a technological view we follow AAL technology trends by integrating a successful interface in a heterogeneous services AAL platform, focusing on a functional view. Educationally, a very flexible interface in line with communication training allows dynamic adjustment of complexity, enhanced by an accessible mindset and virtual elements significance already in use, offers specific interaction feedback, adapts to the evolving needs and capacities and improves the personal autonomy and self-confidence of children at school and home. TICO-home-control was installed during the last school year in the library of a special education school to study adaptations and training strategies to enhance the autonomy opportunities of its pupils. The methodology involved a case study and structured and semi-structured observations. Five children, considered unable to use commercial home control systems were trained obtaining good results in enabling them to use an open home control system. Moreover this AAL platform has proved efficient in training children in previous cognitive steps like virtual representation and cause-effect interaction.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-31
...). The current revision issues a new Branch Technical Position (BTP) 8-8 on ``Onsite (Emergency Diesel Generators) and Offsite Power Sources Allowed Outage Time Extensions.'' (ADAMS Accession No. ML111180521...
76 FR 45724 - Clearing Member Risk Management
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-01
... Management AGENCY: Commodity Futures Trading Commission. ACTION: Notice of proposed rulemaking. SUMMARY: The... proposed rules address risk management for cleared trades by futures commission merchants, swap dealers... Commission has proposed extensive regulations addressing open access and risk management at the derivatives...
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Relationship between antigravity control and postural control in young children.
Sellers, J S
1988-04-01
The purposes of this study were 1) to determine the relationship between antigravity control (supine flexion and prone extension) and postural control (static and dynamic balance), 2) to determine the quality of antigravity and postural control, and 3) to determine whether sex and ethnic group differences correlate with differences in antigravity control and postural control in young children. I tested 107 black, Hispanic, and Caucasian children in a Head Start program, with a mean age of 61 months. The study results showed significant relationships between antigravity control and postural control. Subjects' supine flexion performance was significantly related to the quantity and quality of their static and dynamic balance performance, whereas prone extension performance was related only to the quality of dynamic balance performance. Quality scale measurements (r = .90) indicated that the children in this study had not yet developed full antigravity or postural control. The study results revealed differences between sexes in the quality of static balance and prone extension performance and ethnic differences in static balance, dynamic balance, and prone extension performance.
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
Evolution of the VLT instrument control system toward industry standards
NASA Astrophysics Data System (ADS)
Kiekebusch, Mario J.; Chiozzi, Gianluca; Knudstrup, Jens; Popovic, Dan; Zins, Gerard
2010-07-01
The VLT control system is a large distributed system consisting of Linux Workstations providing the high level coordination and interfaces to the users, and VME-based Local Control Units (LCU's) running the VxWorks real-time operating system with commercial and proprietary boards acting as the interface to the instrument functions. After more than 10 years of VLT operations, some of the applied technologies used by the astronomical instruments are being discontinued making it difficult to find adequate hardware for future projects. In order to deal with this obsolescence, the VLT Instrumentation Framework is being extended to adopt well established Commercial Off The Shelf (COTS) components connected through industry standard fieldbuses. This ensures a flexible state of the art hardware configuration for the next generation VLT instruments allowing the access to instrument devices via more compact and simpler control units like PC-based Programmable Logical Controllers (PLC's). It also makes it possible to control devices directly from the Instrument Workstation through a normal Ethernet connection. This paper outlines the requirements that motivated this work, as well as the architecture and the design of the framework extension. In addition, it describes the preliminary results on a use case which is a VLTI visitor instrument used as a pilot project to validate the concepts and the suitability of some COTS products like a PC-based PLCs, EtherCAT8 and OPC UA6 as solutions for instrument control.
Capacity Estimation Model for Signalized Intersections under the Impact of Access Point
Zhao, Jing; Li, Peng; Zhou, Xizhao
2016-01-01
Highway Capacity Manual 2010 provides various factors to adjust the base saturation flow rate for the capacity analysis of signalized intersections. No factors, however, is considered for the potential change of signalized intersections capacity caused by the access point closeing to the signalized intersection. This paper presented a theoretical model to estimate the lane group capacity at signalized intersections with the consideration of the effects of access points. Two scenarios of access point locations, upstream or downstream of the signalized intersection, and impacts of six types of access traffic flow are taken into account. The proposed capacity model was validated based on VISSIM simulation. Results of extensive numerical analysis reveal the substantial impact of access point on the capacity, which has an inverse correlation with both the number of major street lanes and the distance between the intersection and access point. Moreover, among the six types of access traffic flows, the access traffic flow 1 (right-turning traffic from major street), flow 4 (left-turning traffic from access point), and flow 5 (left-turning traffic from major street) cause a more significant effect on lane group capacity than others. Some guidance on the mitigation of the negative effect is provided for practitioners. PMID:26726998
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
Nitrogen regulation of transpiration controls mass-flow acquisition of nutrients.
Matimati, Ignatious; Verboom, G Anthony; Cramer, Michael D
2014-01-01
Transpiration may enhance mass-flow of nutrients to roots, especially in low-nutrient soils or where the root system is not extensively developed. Previous work suggested that nitrogen (N) may regulate mass-flow of nutrients. Experiments were conducted to determine whether N regulates water fluxes, and whether this regulation has a functional role in controlling the mass-flow of nutrients to roots. Phaseolus vulgaris were grown in troughs designed to create an N availability gradient by restricting roots from intercepting a slow-release N source, which was placed at one of six distances behind a 25 μm mesh from which nutrients could move by diffusion or mass-flow (termed 'mass-flow' treatment). Control plants had the N source supplied directly to their root zone so that N was available through interception, mass-flow, and diffusion (termed 'interception' treatment). 'Mass-flow' plants closest to the N source exhibited 2.9-fold higher transpiration (E), 2.6-fold higher stomatal conductance (gs), 1.2-fold higher intercellular [CO2] (Ci), and 3.4-fold lower water use efficiency than 'interception' plants, despite comparable values of photosynthetic rate (A). E, gs, and Ci first increased and then decreased with increasing distance from the N source to values even lower than those of 'interception' plants. 'Mass-flow' plants accumulated phosphorus and potassium, and had maximum concentrations at 10mm from the N source. Overall, N availability regulated transpiration-driven mass-flow of nutrients from substrate zones that were inaccessible to roots. Thus when water is available, mass-flow may partially substitute for root density in providing access to nutrients without incurring the costs of root extension, although the efficacy of mass-flow also depends on soil nutrient retention and hydraulic properties.
Nitrogen regulation of transpiration controls mass-flow acquisition of nutrients
Matimati, Ignatious
2014-01-01
Transpiration may enhance mass-flow of nutrients to roots, especially in low-nutrient soils or where the root system is not extensively developed. Previous work suggested that nitrogen (N) may regulate mass-flow of nutrients. Experiments were conducted to determine whether N regulates water fluxes, and whether this regulation has a functional role in controlling the mass-flow of nutrients to roots. Phaseolus vulgaris were grown in troughs designed to create an N availability gradient by restricting roots from intercepting a slow-release N source, which was placed at one of six distances behind a 25 μm mesh from which nutrients could move by diffusion or mass-flow (termed ‘mass-flow’ treatment). Control plants had the N source supplied directly to their root zone so that N was available through interception, mass-flow, and diffusion (termed ‘interception’ treatment). ‘Mass-flow’ plants closest to the N source exhibited 2.9-fold higher transpiration (E), 2.6-fold higher stomatal conductance (g s), 1.2-fold higher intercellular [CO2] (C i), and 3.4-fold lower water use efficiency than ‘interception’ plants, despite comparable values of photosynthetic rate (A). E, g s, and C i first increased and then decreased with increasing distance from the N source to values even lower than those of ‘interception’ plants. ‘Mass-flow’ plants accumulated phosphorus and potassium, and had maximum concentrations at 10mm from the N source. Overall, N availability regulated transpiration-driven mass-flow of nutrients from substrate zones that were inaccessible to roots. Thus when water is available, mass-flow may partially substitute for root density in providing access to nutrients without incurring the costs of root extension, although the efficacy of mass-flow also depends on soil nutrient retention and hydraulic properties. PMID:24231035
Vempati, Uma D; Chung, Caty; Mader, Chris; Koleti, Amar; Datar, Nakul; Vidović, Dušica; Wrobel, David; Erickson, Sean; Muhlich, Jeremy L; Berriz, Gabriel; Benes, Cyril H; Subramanian, Aravind; Pillai, Ajay; Shamu, Caroline E; Schürer, Stephan C
2014-06-01
The National Institutes of Health Library of Integrated Network-based Cellular Signatures (LINCS) program is generating extensive multidimensional data sets, including biochemical, genome-wide transcriptional, and phenotypic cellular response signatures to a variety of small-molecule and genetic perturbations with the goal of creating a sustainable, widely applicable, and readily accessible systems biology knowledge resource. Integration and analysis of diverse LINCS data sets depend on the availability of sufficient metadata to describe the assays and screening results and on their syntactic, structural, and semantic consistency. Here we report metadata specifications for the most important molecular and cellular components and recommend them for adoption beyond the LINCS project. We focus on the minimum required information to model LINCS assays and results based on a number of use cases, and we recommend controlled terminologies and ontologies to annotate assays with syntactic consistency and semantic integrity. We also report specifications for a simple annotation format (SAF) to describe assays and screening results based on our metadata specifications with explicit controlled vocabularies. SAF specifically serves to programmatically access and exchange LINCS data as a prerequisite for a distributed information management infrastructure. We applied the metadata specifications to annotate large numbers of LINCS cell lines, proteins, and small molecules. The resources generated and presented here are freely available. © 2014 Society for Laboratory Automation and Screening.
Pluto, Delores M; Phillips, Martha M; Matson-Koffman, Dyann; Shepard, Dennis M; Raczynski, James M; Brownstein, J Nell
2004-04-01
Investigators in South Carolina and Alabama assessed the availability of data for measuring 31 policy and environmental indicators for heart disease and stroke prevention. The indicators were intended to determine policy and environmental support for adopting heart disease and stroke prevention guidelines and selected risk factors in 4 settings: community, school, work site, and health care. Research teams used literature searches and key informant interviews to explore the availability of data sources for each indicator. Investigators documented the following 5 qualities for each data source identified: 1) the degree to which the data fit the indicator; 2) the frequency and regularity with which data were collected; 3) the consistency of data collected across time; 4) the costs (time, money, personnel) associated with data collection or access; and 5) the accessibility of data. Among the 31 indicators, 11 (35%) have readily available data sources and 4 (13%) have sources that could provide partial measurement. Data sources are available for most indicators in the school setting and for tobacco control policies in all settings. Data sources for measuring policy and environmental indicators for heart disease and stroke prevention are limited in availability. Effort and resources are required to develop and implement mechanisms for collecting state and local data on policy and environmental indicators in different settings. The level of work needed to expand data sources is comparable to the extensive work already completed in the school setting and for tobacco control.
Damschroder, Laura J; Pritts, Joy L; Neblo, Michael A; Kalarickal, Rosemarie J; Creswell, John W; Hayward, Rodney A
2007-01-01
The federal Privacy Rule, implemented in the United States in 2003, as part of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), created new restrictions on the release of medical information for research. Many believe that its restrictions have fallen disproportionately on researchers prompting some to call for changes to the Rule. Here we ask what patients think about researchers' access to medical records, and what influences these opinions. A sample of 217 patients from 4 Veteran Affairs (VA) facilities deliberated in small groups at each location with the opportunity to question experts and inform themselves about privacy issues related to medical records research. After extensive deliberation, these patients were united in their inclination to share their medical records for research. Yet they were also united in their recommendations to institute procedures that would give them more control over whether and how their medical records are used for research. We integrated qualitative and quantitative results to derive a better understanding of this apparent paradox. Our findings can best be presented as answers to questions related to five dimensions of trust: Patients' trust in VA researchers was the most powerful determinant of the kind of control they want over their medical records. More specifically, those who had lower trust in VA researchers were more likely to recommend a more stringent process for obtaining individual consent. Insights on the critical role of trust suggest actions that researchers and others can take to more fully engage patients in research.
Space environment data storage and access: lessons learned and recommendations for the future
NASA Astrophysics Data System (ADS)
Evans, Hugh; Heynderickx, Daniel
2012-07-01
With the ever increasing volume of space environment data available at present and planned for the near future, the demands on data storage and access methods are increasing as well. In addition, continued access to historical, archived data remains crucial. On the basis of many years of experience, the authors identify the following issues as important for continued and efficient handling of datasets now and in the future: The huge data volumes currently or very soon avaiable from a number of space missions will limi direct Internet download access to even relatively short epoch ranges of data. Therefore, data providers should establish or extend standardised data (post-) processing services so that only data query results should be downloaded. Although a single standardised data format will in all likelihood remain utopia, data providers should at least include extensive metadata with their data products, according to established standards and practices (e.g. ISTP, SPASE). Standardisation of (sets of) metadata greatly facilitates data mining and querying. The use of SQL database storage should be considered instead of, or in parallel with, classic storage of data files. The use of SQL does away with having to handle file parsing and processing, while at the same time standard access protocols can be used to (remotely) connect to such data repositories. Many data holdings are still lacking in extensive descriptions of data provenance (e.g. instrument description), content and format. Unfortunately, detailed data information is usually rejected by scientific and technical journals. Re-processing of historical archived datasets into modern formats, making them easily available and usable, is urgently required, as knowledge is being lost. A global data directory has still not been achieved; policy makers should enforce stricter rules for "broadcasting" dataset information.
Improving School Access Control
ERIC Educational Resources Information Center
National Clearinghouse for Educational Facilities, 2008
2008-01-01
Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…
77 FR 551 - Privacy Act of 1974; Amended System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-05
... Act system of records entitled ``Treasury/BEP .027--Access Control and Alarm Monitoring Systems (ACAMS... .027--Access Control and Alarm Monitoring Systems (ACAMS).'' BEP proposes to amend that system of... records entitled ``BEP .027--Access Control and Alarm Monitoring Systems (ACAMS),'' as follows: Treasury...
Wu, Sarah Jinhui; Raghupathi, Wullianallur
2012-10-22
In this exploratory research, we use panel data analysis to examine the correlation between Information and Communication Technology (ICTs) and public health delivery at the country level. The goal of this exploratory research is to examine the strategic association over time between ICTs and country-level public health. Using data from the World Development Indicators, we construct a panel data set of countries of five different income levels and look closely at the period from 2000 to 2008. The panel data analysis allows us to explore this dynamic relationship under the control for unobserved country-specific effects by using a fixed-effects estimation method. In particular,, we examine the association of five ICT factors with five public health indicators: adolescent fertility rate, child immunization coverage, tuberculosis case detected, life expectancy, and adult mortality rate. First, overall ICTs' factors substantially improve a country's public health delivery on the top of wealth effect. Second, among all the ICTs' factors, accessibility is the only one that is associated with improvements in all aspects of public health delivery, while the contributions from the usage, quality, and applications are negligible. ICTs' accessibility factor is associated with a considerable extension to life expectancy and reduced adult mortality rate. Third, all entity-specific factors are significant in each model, indicating that countries' economic development level does influence their public health delivery. Our results indicate that ICT accessibility has a strong association with effective delivery of public health. There are others, but the key strategic applications are eHealth and mHealth. The findings of this study will help government officials and public health policy makers to formulate strategic decisions regarding the best ICT investments and deployment. For example, the study shows that providing accessibility should be a critical focus.
36 CFR 1256.70 - What controls access to national security-classified information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...
Code of Federal Regulations, 2010 CFR
2010-04-01
... is extensive. Swimming, fishing, boating, and other water oriented activities have regional and local economic benefit as well as recreational benefit. (b) The Commission shall cooperate with public and... programs and projects within the basin and shall: (1) Promote public access to and recreational use of...
Development of a Multidisciplinary Approach to Access Sustainability
There are a number of established, scientifically supported metrics of sustainability. Many of the metrics are data intensive and require extensive effort to collect data and compute the metrics. Moreover, individual metrics do not capture all aspects of a system that are relevan...
Whither the White Knight: CDROM in Technical Services.
ERIC Educational Resources Information Center
Campbell, Brian
1987-01-01
Outlines evaluative criteria and compares optical data disk products used in library technical processes, including bibliographic records for cataloging, acquisition databases, and local public access catalogs. An extensive table provides information on specific products, including updates, interfaces, edit screens, installation help, manuals,…
DOT National Transportation Integrated Search
1998-09-16
Highways provide needed access to destinations in small cities. Many small city highways are very wide and traffic speeds excessively high. Extensive paved areas, narrow sidewalks, and little greenery has resulted in a dangerous, unpleasant environme...
NASA Astrophysics Data System (ADS)
Michold, U.; Cummins, M.; Watson, J. M.; Holmquist, J.; Shobbrook, R.
Contents: library catalogs and holdings; indexing and abstract services; preprint services; electronic journals and newsletters; alerting services; commercial databases; informal networking; use of a thesaurus for on-line searching. An extensive list of access pointers for library catalogs and services, electronic newsletters, and publishers and bookshops is enclosed.
NASA Astrophysics Data System (ADS)
Alvarez, Alejandro; Beche, Alexandre; Furano, Fabrizio; Hellmich, Martin; Keeble, Oliver; Rocha, Ricardo
2012-12-01
The Disk Pool Manager (DPM) is a lightweight solution for grid enabled disk storage management. Operated at more than 240 sites it has the widest distribution of all grid storage solutions in the WLCG infrastructure. It provides an easy way to manage and configure disk pools, and exposes multiple interfaces for data access (rfio, xroot, nfs, gridftp and http/dav) and control (srm). During the last year we have been working on providing stable, high performant data access to our storage system using standard protocols, while extending the storage management functionality and adapting both configuration and deployment procedures to reuse commonly used building blocks. In this contribution we cover in detail the extensive evaluation we have performed of our new HTTP/WebDAV and NFS 4.1 frontends, in terms of functionality and performance. We summarize the issues we faced and the solutions we developed to turn them into valid alternatives to the existing grid protocols - namely the additional work required to provide multi-stream transfers for high performance wide area access, support for third party copies, credential delegation or the required changes in the experiment and fabric management frameworks and tools. We describe new functionality that has been added to ease system administration, such as different filesystem weights and a faster disk drain, and new configuration and monitoring solutions based on the industry standards Puppet and Nagios. Finally, we explain some of the internal changes we had to do in the DPM architecture to better handle the additional load from the analysis use cases.
A Hybrid Lifetime Extended Directional Approach for WBANs
Li, Changle; Yuan, Xiaoming; Yang, Li; Song, Yueyang
2015-01-01
Wireless Body Area Networks (WBANs) can provide real-time and reliable health monitoring, attributing to the human-centered and sensor interoperability properties. WBANs have become a key component of the ubiquitous eHealth (electronic health) revolution that prospers on the basis of information and communication technologies. The prime consideration in WBAN is how to maximize the network lifetime with battery-powered sensor nodes in energy constraint. Novel solutions in Medium Access Control (MAC) protocols are imperative to satisfy the particular BAN scenario and the need of excellent energy efficiency in healthcare applications. In this paper, we propose a hybrid Lifetime Extended Directional Approach (LEDA) MAC protocol based on IEEE 802.15.6 to reduce energy consumption and prolong network lifetime. The LEDA MAC protocol takes full advantages of directional superiority in energy saving that employs multi-beam directional mode in Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) and single-beam directional mode in Time Division Multiple Access (TDMA) for alternative in data reservation and transmission according to the traffic varieties. Moreover, the impacts of some inherent problems of directional antennas such as deafness and hidden terminal problem can be decreased owing to that all nodes generate individual beam according to user priorities designated. Furthermore, LEDA MAC employs a Dynamic Polled Allocation Period (DPAP) for burst data transmissions to increase the network reliability and adaptability. Extensive analysis and simulation results show that the proposed LEDA MAC protocol achieves extended network lifetime with improved performance compared with IEEE 802.15.6. PMID:26556357
Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943
Baek, Seungsoo; Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.
78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
NASA Technical Reports Server (NTRS)
Potter, Don; Serian, Charles; Sweet, Robert; Sapir, Babak; Gamez, Enrique; Mays, David
2008-01-01
The Problem Reporting System (PRS) is a Web application, running on two Web servers (load-balanced) and two database servers (RAID-5), which establishes a system for submission, editing, and sharing of reports to manage risk assessment of anomalies identified in NASA's flight projects. PRS consolidates diverse anomaly-reporting systems, maintains a rich database set, and incorporates a robust engine, which allows tracking of any hardware, software, or paper process by configuring an appropriate life cycle. Global and specific project administration and setup tools allow lifecycle tailoring, along with customizable controls for user, e-mail, notifications, and more. PRS is accessible via the World Wide Web for authorized user at most any location. Upon successful log-in, the user receives a customizable window, which displays time-critical 'To Do' items (anomalies requiring the user s input before the system moves the anomaly to the next phase of the lifecycle), anomalies originated by the user, anomalies the user has addressed, and custom queries that can be saved for future use. Access controls exist depending on a user's role as system administrator, project administrator, user, or developer, and then, further by association with user, project, subsystem, company, or item with provisions for business-to-business exclusions, limitations on access according to the covert or overt nature of a given project, all with multiple layers of filtration, as needed. Reporting of metrics is built in. There is a provision for proxy access (in which the user may choose to grant one or more other users to view screens and perform actions as though they were the user, during any part of a tracking life cycle - especially useful during tight build schedules and vacations to keep things moving). The system also provides users the ability to have an anomaly link to or notify other systems, including QA Inspection Reports, Safety, GIDEP (Government-Industry Data Exchange Program) Alert, Corrective Actions, and Lessons Learned. The PRS tracking engine was designed as a very extensible and scalable system, able to support additional applications, with future development possibilities already discussed, including Incident Surprise Anomalies (for anomalies occurring during Operations phases of NASA Flight projects), GIDEP and NASA Alerts, and others.
2001-11-01
that there were· no· target misses. The Hellfire missile does not have a depleted uranium head . . -,, 2.2.2.3 Tank movement During the test, the...guide otber users through the use of this. complicated program. The_input data files for NOISEMAP consist of a root file name with several extensions...SOURCES subdirectory. This file will have the root file name followed by an accession number, then the .bps extension. The user must check the *.log
2014-06-17
This document announces changes to the payment adjustment for low-volume hospitals and to the Medicare-dependent hospital (MDH) program under the hospital inpatient prospective payment systems (IPPS) for the second half of FY 2014 (April 1, 2014 through September 30, 2014) in accordance with sections 105 and 106, respectively, of the Protecting Access to Medicare Act of 2014 (PAMA).
McKinney, Bill; Meyer, Peter A; Crosas, Mercè; Sliz, Piotr
2017-01-01
Access to experimental X-ray diffraction image data is important for validation and reproduction of macromolecular models and indispensable for the development of structural biology processing methods. In response to the evolving needs of the structural biology community, we recently established a diffraction data publication system, the Structural Biology Data Grid (SBDG, data.sbgrid.org), to preserve primary experimental datasets supporting scientific publications. All datasets published through the SBDG are freely available to the research community under a public domain dedication license, with metadata compliant with the DataCite Schema (schema.datacite.org). A proof-of-concept study demonstrated community interest and utility. Publication of large datasets is a challenge shared by several fields, and the SBDG has begun collaborating with the Institute for Quantitative Social Science at Harvard University to extend the Dataverse (dataverse.org) open-source data repository system to structural biology datasets. Several extensions are necessary to support the size and metadata requirements for structural biology datasets. In this paper, we describe one such extension-functionality supporting preservation of file system structure within Dataverse-which is essential for both in-place computation and supporting non-HTTP data transfers. © 2016 New York Academy of Sciences.
Typing for Conflict Detection in Access Control Policies
NASA Astrophysics Data System (ADS)
Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge
In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.
NASA Astrophysics Data System (ADS)
Hartsough, P. C.; Roudneva, E.; Malazian, A. I.; Meadows, M. W.; Kelly, A. E.; Bales, R. C.; Goulden, M.; Hopmans, J. W.
2011-12-01
Two trees were instrumented with heat pulse sapflux sensors in the Southern Sierra Critical Zone Observatory (SSCZO) within the Kings River Experimental Watershed (KREW) to better understand transpiration as it relates to water availability from deeper sources. At the first instrumented site, CZT-1, a White Fir (Abies concolor) was instrumented on a flat ridge with access to deep soil moisture. Extensive monitoring of shallow and deep soil regions confirm that there is significant soil water available from 100-400cm as the tree exhausts water from shallower depths. A root excavation of an adjacent tree shows the roots distributed from 30-150cm with limited roots available to access deeper soil water and water stored in the saprolite. At the second instrumented site, CZT-2, a Ponderosa Pine (Pinus Ponderosa) was instrumented with a similar suite of sap flow and soil sensors. The CZT-2 site is on a slight slope and is characterized by shallow soils (<90cm) with extensive cobbles and bedrock outcrops with limited access to deeper soil or saprolite water. The second site also sits in the open while the first site is more protected in a closed forest. The two sites show different responses to changes in rain and snow loading from above as well as soil drainage and water depletion from below. They also have different thresholds for transpiration shut down both due to late season water deficit and also during winter periods where air temperatures are high enough to permit photosynthesis. Sap flux data are supplemented by extensive soil water content and potential measurements around both trees as well as evapotranspiration measurements from a 50m flux tower located between the two instrumented trees.
Elastic Extension of a CMS Computing Centre Resources on External Clouds
NASA Astrophysics Data System (ADS)
Codispoti, G.; Di Maria, R.; Aiftimiei, C.; Bonacorsi, D.; Calligola, P.; Ciaschini, V.; Costantini, A.; Dal Pra, S.; DeGirolamo, D.; Grandi, C.; Michelotto, D.; Panella, M.; Peco, G.; Sapunenko, V.; Sgaravatto, M.; Taneja, S.; Zizzi, G.
2016-10-01
After the successful LHC data taking in Run-I and in view of the future runs, the LHC experiments are facing new challenges in the design and operation of the computing facilities. The computing infrastructure for Run-II is dimensioned to cope at most with the average amount of data recorded. The usage peaks, as already observed in Run-I, may however originate large backlogs, thus delaying the completion of the data reconstruction and ultimately the data availability for physics analysis. In order to cope with the production peaks, CMS - along the lines followed by other LHC experiments - is exploring the opportunity to access Cloud resources provided by external partners or commercial providers. Specific use cases have already been explored and successfully exploited during Long Shutdown 1 (LS1) and the first part of Run 2. In this work we present the proof of concept of the elastic extension of a CMS site, specifically the Bologna Tier-3, on an external OpenStack infrastructure. We focus on the “Cloud Bursting” of a CMS Grid site using a newly designed LSF configuration that allows the dynamic registration of new worker nodes to LSF. In this approach, the dynamically added worker nodes instantiated on the OpenStack infrastructure are transparently accessed by the LHC Grid tools and at the same time they serve as an extension of the farm for the local usage. The amount of resources allocated thus can be elastically modeled to cope up with the needs of CMS experiment and local users. Moreover, a direct access/integration of OpenStack resources to the CMS workload management system is explored. In this paper we present this approach, we report on the performances of the on-demand allocated resources, and we discuss the lessons learned and the next steps.
An extension of incidental teaching procedures to reading instruction for autistic children.
McGee, G G; Krantz, P J; McClannahan, L E
1986-01-01
In an extension of incidental teaching procedures to reading instruction, two autistic children acquired functional sight-word reading skills in the context of a play activity. Children gained access to preferred toys by selecting the label of the toy in tasks requiring increasingly complex visual discriminations. In addition to demonstrating rapid acquisition of 5-choice discriminations, they showed comprehension on probes requiring reading skills to locate toys stored in labeled boxes. Also examined was postteaching transfer across stimulus materials and response modalities. Implications are that extensions of incidental teaching to new response classes may produce the same benefits documented in communication training, in terms of producing generalization concurrent with skill acquisition in the course of child-preferred activities. PMID:3733586
Stratton, J; Toribio, J-A L M L; Suon, S; Young, J R; Cowled, B; Windsor, P A
2017-04-01
A cross-sectional survey of 445 Village Animal Health Workers (VAHWs) from 19 provinces in Cambodia was undertaken. The aim was to establish their levels of training, farm visit frequency, reasons for visits and disease reporting practices, enabling the strengths and weaknesses of the VAHW system in Cambodia to be determined, in providing both a fee-based smallholder livestock clinical service and a government partnership in transboundary animal disease (TAD) surveillance and control. The study used 'guided group interviews' and identified that VAHWs had good contact with farmers with 61.5% making more than one farm visit daily. However, incomes from services remained low, with 45% VAHWs obtaining between 20 and 40% of their household income from VAHW activities. VAHWs recorded relatively high rates of disease reporting, with 72% claiming they report diseases immediately and 74% undertaking monthly reporting to veterinary authorities. Logistic regression analysis revealed VAHW contact frequency with district and/or provincial officers was associated with more VAHW farm visits, and frequency of VAHW visits to smallholder farms was positively associated with average monthly expenditure on animal medication and equipment. This suggests that increased veterinary extension to VAHWs and access to veterinary equipment, vaccines and drugs may further increase VAHW-farmer engagement. VAHWs provide an accessible, market-based, animal health 'treatment and reporting' service linked to livestock smallholders across Cambodia. However, for improved TAD prevention and more efficient control of outbreaks, research that assesses provision of an animal health 'preventive-based' business model is urgently needed to reduce both the costs to farmers and the risks to the economy due to foot-and-mouth disease and other TADs in Cambodia. © 2015 Blackwell Verlag GmbH.
Open versus Controlled-Access Data | Office of Cancer Genomics
OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data
Review of SDDOT's highway access control process
DOT National Transportation Integrated Search
2000-02-01
This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...
DOT National Transportation Integrated Search
1974-06-01
The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...
Jiang, Bo; Li, Cuiling; Qian, Huayu; Hossain, Md Shahriar A; Malgras, Victor; Yamauchi, Yusuke
2017-06-26
Although multilayer films have been extensively reported, most compositions have been limited to non-catalytically active materials (e.g. polymers, proteins, lipids, or nucleic acids). Herein, we report the preparation of binder-free multilayer metallic mesoporous films with sufficient accessibility for high electrocatalytic activity by using a programmed electrochemical strategy. By precisely tuning the deposition potential and duration, multilayer mesoporous architectures consisting of alternating mesoporous Pd layers and mesoporous PdPt layers with controlled layer thicknesses can be synthesized within a single electrolyte, containing polymeric micelles as soft templates. This novel architecture, combining the advantages of bimetallic alloys, multilayer architectures, and mesoporous structures, exhibits high electrocatalytic activity for both the methanol oxidation reaction (MOR) and the ethanol oxidation reaction (EOR). © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
pysimm: A Python Package for Simulation of Molecular Systems
NASA Astrophysics Data System (ADS)
Fortunato, Michael; Colina, Coray
pysimm, short for python simulation interface for molecular modeling, is a python package designed to facilitate the structure generation and simulation of molecular systems through convenient and programmatic access to object-oriented representations of molecular system data. This poster presents core features of pysimm and design philosophies that highlight a generalized methodology for incorporation of third-party software packages through API interfaces. The integration with the LAMMPS simulation package is explained to demonstrate this methodology. pysimm began as a back-end python library that powered a cloud-based application on nanohub.org for amorphous polymer simulation. The extension from a specific application library to general purpose simulation interface is explained. Additionally, this poster highlights the rapid development of new applications to construct polymer chains capable of controlling chain morphology such as molecular weight distribution and monomer composition.
NASA Technical Reports Server (NTRS)
Olsen, Lola; Morahan, Michael; Aleman, Alicia; Cepero, Laurel; Stevens, Tyler; Ritz, Scott; Holland, Monica
2011-01-01
The Global Change Master Directory (GCMD) provides an extensive directory of descriptive and spatial information about data sets and data-related services, which are relevant to Earth science research. The directory's data discovery components include controlled keywords, free-text searches, and map/date searches. The GCMD portal for NASA's Land Atmosphere Near-real-time Capability for EOS (LANCE) data products leverages these discovery features by providing users a direct route to NASA's Near-Real-Time (NRT) collections. This portal offers direct access to collection entries by instrument name, informing users of the availability of data. After a relevant collection entry is found through the GCMD's search components, the "Get Data" URL within the entry directs the user to the desired data. http://gcmd.nasa.gov/r/p/gcmd_lance_nrt.
Free space optics: a viable last-mile alternative
NASA Astrophysics Data System (ADS)
Willebrand, Heinz A.; Clark, Gerald R.
2001-10-01
This paper explores Free Space Optics (FSO) as an access technology in the last mile of metropolitan area networks (MANs). These networks are based in part on fiber-optic telecommunications infrastructure, including network architectures of Synchronous Optical Network (commonly referred to as SONET), the North American standard for synchronous data transmission; and Synchronous Digital Hierarchy (commonly referred to as SDH), the international standard and equivalent of SONET. Several converging forces have moved FSO beyond a niche technology for use only in local area networks (LANs) as a bridge connecting two facilities. FSO now allows service providers to cost effectively provide optical bandwidth for access networks and accelerate the extension of metro optical networks bridging what has been termed by industry experts as the optical dead zone. The optical dead zone refers to both the slowdown in capital investment in the short-term future and the actual connectivity gap that exists today between core metro optical networks and the access optical networks. Service providers have built extensive core and minimal metro networks but have not yet provided optical bandwidth to the access market largely due to the non-compelling economics to bridge the dead zone with fiber. Historically, such infrastructure build-out slowdowns have been blamed on a combination of economics, time-to-market constraints and limited technology options. However, new technology developments and market acceptance of FSO give service providers a new cost-effective alternative to provide high-bandwidth services with optical bandwidth in the access networks. Merrill Lynch predicts FSO will grow into a $2 billion market by 2005. The drivers for this market are a mere 5%- 6% penetration of fiber to business buildings; cost effective solution versus RF or fiber; and significant capacity which can only be matched by a physical fiber link, Merrill Lynch reports. This paper will describe FSO technology, its capabilities and its limitations. The paper will investigate how FSO technology has evolved to its current stage for deployment in MANs, LANs, wireless backhaul and metropolitan network extensions - applications that fall within the category of last mile. The paper will address the market, drivers and the adoption of FSO, plus provide a projection of future FSO technology, based on today's product roadmaps. The paper concludes with a summary of findings and recommendations.
Nolan, Anne
2011-10-01
In the Republic of Ireland, approximately 30 per cent of the population ('medical card patients') are entitled to free GP services. Eligibility is determined primarily on the basis of an income means test. The remaining 70 per cent of the population ('private patients') must pay the full cost of GP consultations. In July 2001, eligibility for a medical card was extended to all those over 70 years of age, regardless of income. This extension in eligibility provides a natural experiment whereby we can examine the influence of access to free GP services on avoidable hospitalisations. Avoidable hospitalisations are those that are potentially avoidable with timely and effective access to primary care services or that can be treated more appropriately in a primary care setting. Using hospital discharge data for the period 1999-2004, the purpose of this paper is to test the proposition that enhanced access to GP services for the over 70s after July 2001 led to a decline in avoidable hospitalisations among this group. The results indicate that while avoidable hospitalisations for the over 70s did decline after 2001, they also fell for the under 70s, meaning that a significant difference-in-difference effect could not be identified. Copyright © 2011 Elsevier Ltd. All rights reserved.
Remote sensing education and Internet/World Wide Web technology
Griffith, J.A.; Egbert, S.L.
2001-01-01
Remote sensing education is increasingly in demand across academic and professional disciplines. Meanwhile, Internet technology and the World Wide Web (WWW) are being more frequently employed as teaching tools in remote sensing and other disciplines. The current wealth of information on the Internet and World Wide Web must be distilled, nonetheless, to be useful in remote sensing education. An extensive literature base is developing on the WWW as a tool in education and in teaching remote sensing. This literature reveals benefits and limitations of the WWW, and can guide its implementation. Among the most beneficial aspects of the Web are increased access to remote sensing expertise regardless of geographic location, increased access to current material, and access to extensive archives of satellite imagery and aerial photography. As with other teaching innovations, using the WWW/Internet may well mean more work, not less, for teachers, at least at the stage of early adoption. Also, information posted on Web sites is not always accurate. Development stages of this technology range from on-line posting of syllabi and lecture notes to on-line laboratory exercises and animated landscape flyovers and on-line image processing. The advantages of WWW/Internet technology may likely outweigh the costs of implementing it as a teaching tool.
ERIC Educational Resources Information Center
Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.
One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…
Instrument Remote Control via the Astronomical Instrument Markup Language
NASA Technical Reports Server (NTRS)
Sall, Ken; Ames, Troy; Warsaw, Craig; Koons, Lisa; Shafer, Richard
1998-01-01
The Instrument Remote Control (IRC) project ongoing at NASA's Goddard Space Flight Center's (GSFC) Information Systems Center (ISC) supports NASA's mission by defining an adaptive intranet-based framework that provides robust interactive and distributed control and monitoring of remote instruments. An astronomical IRC architecture that combines the platform-independent processing capabilities of Java with the power of Extensible Markup Language (XML) to express hierarchical data in an equally platform-independent, as well as human readable manner, has been developed. This architecture is implemented using a variety of XML support tools and Application Programming Interfaces (API) written in Java. IRC will enable trusted astronomers from around the world to easily access infrared instruments (e.g., telescopes, cameras, and spectrometers) located in remote, inhospitable environments, such as the South Pole, a high Chilean mountaintop, or an airborne observatory aboard a Boeing 747. Using IRC's frameworks, an astronomer or other scientist can easily define the type of onboard instrument, control the instrument remotely, and return monitoring data all through the intranet. The Astronomical Instrument Markup Language (AIML) is the first implementation of the more general Instrument Markup Language (IML). The key aspects of our approach to instrument description and control applies to many domains, from medical instruments to machine assembly lines. The concepts behind AIML apply equally well to the description and control of instruments in general. IRC enables us to apply our techniques to several instruments, preferably from different observatories.
Stochastic Packet Loss Model to Evaluate QoE Impairments
NASA Astrophysics Data System (ADS)
Hohlfeld, Oliver
With provisioning of broadband access for mass market—even in wireless and mobile networks—multimedia content, especially real-time streaming of high-quality audio and video, is extensively viewed and exchanged over the Internet. Quality of Experience (QoE) aspects, describing the service quality perceived by the user, is a vital factor in ensuring customer satisfaction in today's communication networks. Frameworks for accessing quality degradations in streamed video currently are investigated as a complex multi-layered research topic, involving network traffic load, codec functions and measures of user perception of video quality.
Why is CDMA the solution for mobile satellite communication
NASA Technical Reports Server (NTRS)
Gilhousen, Klein S.; Jacobs, Irwin M.; Padovani, Roberto; Weaver, Lindsay A.
1989-01-01
It is demonstrated that spread spectrum Code Division Multiple Access (CDMA) systems provide an economically superior solution to satellite mobile communications by increasing the system maximum capacity with respect to single channel per carrier Frequency Division Multiple Access (FDMA) systems. Following the comparative analysis of CDMA and FDMA systems, the design of a model that was developed to test the feasibility of the approach and the performance of a spread spectrum system in a mobile environment. Results of extensive computer simulations as well as laboratory and field tests results are presented.
The Publications pages provide lists of all CISNET publications since the inception of CISNET. Publications are listed by Cancer Site or by Research Topic. The Publication Support and Modeling Resources pages provides access to technical modeling information, raw data, and publication extensions stemming from the work of the CISNET consortium.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-27
... plan can be accessed at: http://www.nasa.gov/pdf/581545main_Final%20Plan%20for%20Retrospective0%20Analysis%20of%20Existing%20Regulations.pdf . DATES: Effective Date: March 29, 2013. FOR FURTHER INFORMATION...
Miami University Information Manual.
ERIC Educational Resources Information Center
Miami Univ., Oxford, OH.
The 1975 information manual is designed to provide current data on policies, procedures, services, facilities, organization and governance of Miami University and, through the extensive index, quick access to this information. The manual is complementary to the university catalog and directory. Information relating to students is in the Student…
76 FR 18743 - Commission Information Collection Activities (FERC-603); Comment Request; Extension
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... FERC-603 ``Critical Energy Infrastructure Information'' (OMB No. 1902-0197) is used by the Commission to implement procedures for gaining access to critical energy infrastructure information (CEII) that... information about ``existing or proposed critical infrastructure that (i) relates to the production...
ERIC Educational Resources Information Center
Renyi, Judith
1997-01-01
Designed by the National Foundation for the Improvement of education, Bill Gates's The Road Ahead Program features extensive Internet access for all students and teacher opportunities to work with networks and multimedia technologies. Each school in the 22 participating communities is paired with a community organization. Staff development should…
HANDBOOK FOR OIL SPILL PROTECTION AND CLEANUP PRIORITIES
This handbook was developed in an easily accessible yet extensive field format for use by federally designated on-scene coordinators (OSC) to guide them in assessing priorities during all phases of an oil spill response. The guidelines presented will enable the OSC to (1) determi...
Pedestrian/bicyclist warning devices and signs at CTA rail-highway grade crossings.
DOT National Transportation Integrated Search
2015-12-14
The focus of this research was on individuals who utilize legally authorized CTA highway-rail crossings with pedestrian access. While trespassing is a major public safety issue, it is not the focus of this research. : An extensive review of the liter...
The Publications pages provide lists of all CISNET publications since the inception of CISNET. Publications are listed by Cancer Site or by Research Topic. The Publication Support and Modeling Resources pages provides access to technical modeling information, raw data, and publication extensions stemming from the work of the CISNET consortium.
17 CFR 200.309 - General provisions.
Code of Federal Regulations, 2011 CFR
2011-04-01
...; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Privacy of Individuals and Systems of Records Maintained by the Commission § 200.309 General provisions. (a) Extensions of time... a request for information, access or amendment by an individual with respect to records maintained...
17 CFR 200.309 - General provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
...; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Privacy of Individuals and Systems of Records Maintained by the Commission § 200.309 General provisions. (a) Extensions of time... a request for information, access or amendment by an individual with respect to records maintained...
45 CFR 150.217 - Preliminary determination.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS CMS Enforcement Processes for Determining Whether States... the end of the 30-day period (and any extension), the State has not established to CMS's satisfaction...
MyDas, an Extensible Java DAS Server
Jimenez, Rafael C.; Quinn, Antony F.; Jenkinson, Andrew M.; Mulder, Nicola; Martin, Maria; Hunter, Sarah; Hermjakob, Henning
2012-01-01
A large number of diverse, complex, and distributed data resources are currently available in the Bioinformatics domain. The pace of discovery and the diversity of information means that centralised reference databases like UniProt and Ensembl cannot integrate all potentially relevant information sources. From a user perspective however, centralised access to all relevant information concerning a specific query is essential. The Distributed Annotation System (DAS) defines a communication protocol to exchange annotations on genomic and protein sequences; this standardisation enables clients to retrieve data from a myriad of sources, thus offering centralised access to end-users. We introduce MyDas, a web server that facilitates the publishing of biological annotations according to the DAS specification. It deals with the common functionality requirements of making data available, while also providing an extension mechanism in order to implement the specifics of data store interaction. MyDas allows the user to define where the required information is located along with its structure, and is then responsible for the communication protocol details. PMID:23028496
MyDas, an extensible Java DAS server.
Salazar, Gustavo A; García, Leyla J; Jones, Philip; Jimenez, Rafael C; Quinn, Antony F; Jenkinson, Andrew M; Mulder, Nicola; Martin, Maria; Hunter, Sarah; Hermjakob, Henning
2012-01-01
A large number of diverse, complex, and distributed data resources are currently available in the Bioinformatics domain. The pace of discovery and the diversity of information means that centralised reference databases like UniProt and Ensembl cannot integrate all potentially relevant information sources. From a user perspective however, centralised access to all relevant information concerning a specific query is essential. The Distributed Annotation System (DAS) defines a communication protocol to exchange annotations on genomic and protein sequences; this standardisation enables clients to retrieve data from a myriad of sources, thus offering centralised access to end-users.We introduce MyDas, a web server that facilitates the publishing of biological annotations according to the DAS specification. It deals with the common functionality requirements of making data available, while also providing an extension mechanism in order to implement the specifics of data store interaction. MyDas allows the user to define where the required information is located along with its structure, and is then responsible for the communication protocol details.