Sample records for location-based access control

  1. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  2. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  3. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  4. A passive RFID-based location system for personnel and asset monitoring.

    PubMed

    Hsiao, Rong-Shue; Kao, Chun-Hao; Chen, Tian-Xiang; Chen, Jui-Lun

    2018-01-01

    Typical radio frequency identification (RFID) access control system can be ineffective if an unauthorized person tailgates an authorized person through an access area. To propose a system by using indoor locating and tracking techniques address this problem, which is to prevent unauthorized Alzheimer's and dementia patients from getting lost including by tailgating. To achieve accurate target location, passive RFID deployment strategy is studied and a fingerprinting based passive RFID localization algorithm is proposed. The proposed system was evaluated in a building environment to simulate the performance of access control. RFID reader was installed on ceiling near the access area and tags were stitched on both shoulders of the experiment subject's garments. The probability of the error distance within 0.3 m achieved 97% in the warning area; the location precision achieved 97% within 0.4 m in the monitoring area. The result showed that if an unauthorized person enters the restricted area, the system can initiate an alert signal accurately. Therefore, the proposed system is very suitable to be used in nursing home or hospital to prevent unauthorized personnel and assets entering/exiting a confined location.

  5. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  6. Method and device for maximizing memory system bandwidth by accessing data in a dynamically determined order

    NASA Technical Reports Server (NTRS)

    Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)

    2000-01-01

    A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.

  7. Security middleware infrastructure for DICOM images in health information systems.

    PubMed

    Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A

    2003-12-01

    In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.

  8. Efficient Information Access for Location-Based Services in Mobile Environments

    ERIC Educational Resources Information Center

    Lee, Chi Keung

    2009-01-01

    The demand for pervasive access of location-related information (e.g., local traffic, restaurant locations, navigation maps, weather conditions, pollution index, etc.) fosters a tremendous application base of "Location Based Services (LBSs)". Without loss of generality, we model location-related information as "spatial objects" and the accesses…

  9. Network-based production quality control

    NASA Astrophysics Data System (ADS)

    Kwon, Yongjin; Tseng, Bill; Chiou, Richard

    2007-09-01

    This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.

  10. A needs assessment of unused and expired medication disposal practices: A study from the Medication Safety Research Network of Indiana.

    PubMed

    Kozak, Mary Ann; Melton, Johnna R; Gernant, Stephanie A; Snyder, Margie E

    2016-01-01

    Access and availability of unused and expired medication (UEM) due to improper disposal and storage is a serious issue, potentially leading to abuse and environmental concerns. To describe the extent of the UEM issue in Indiana (U.S. State), identify patient beliefs about UEM, and determine any association between those beliefs and various personal/demographic characteristics. A needs assessment was conducted among community pharmacy patients. A convenience sample of 200 patients from 15 community pharmacies that are part of a practice-based research network (PBRN) in Indiana completed a survey concerning UEM beliefs and behaviors from Feb-March, 2014. Approximately 40% of patients were aware of a UEM take-back location in their community, although only 15% had utilized a UEM take-back location. Seventy-seven percent of patients were willing to drive to a take-back location to return UEM. Particularly vulnerable populations lacking knowledge regarding UEM and access to proper disposal were identified. While states have made efforts to increase accessibility for UEM return, there remains a need for more disposal locations for both non-controlled and controlled medication. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Locating the source of diffusion in complex networks by time-reversal backward spreading.

    PubMed

    Shen, Zhesi; Cao, Shinan; Wang, Wen-Xu; Di, Zengru; Stanley, H Eugene

    2016-03-01

    Locating the source that triggers a dynamical process is a fundamental but challenging problem in complex networks, ranging from epidemic spreading in society and on the Internet to cancer metastasis in the human body. An accurate localization of the source is inherently limited by our ability to simultaneously access the information of all nodes in a large-scale complex network. This thus raises two critical questions: how do we locate the source from incomplete information and can we achieve full localization of sources at any possible location from a given set of observable nodes. Here we develop a time-reversal backward spreading algorithm to locate the source of a diffusion-like process efficiently and propose a general locatability condition. We test the algorithm by employing epidemic spreading and consensus dynamics as typical dynamical processes and apply it to the H1N1 pandemic in China. We find that the sources can be precisely located in arbitrary networks insofar as the locatability condition is assured. Our tools greatly improve our ability to locate the source of diffusion in complex networks based on limited accessibility of nodal information. Moreover, they have implications for controlling a variety of dynamical processes taking place on complex networks, such as inhibiting epidemics, slowing the spread of rumors, pollution control, and environmental protection.

  12. Locating the source of diffusion in complex networks by time-reversal backward spreading

    NASA Astrophysics Data System (ADS)

    Shen, Zhesi; Cao, Shinan; Wang, Wen-Xu; Di, Zengru; Stanley, H. Eugene

    2016-03-01

    Locating the source that triggers a dynamical process is a fundamental but challenging problem in complex networks, ranging from epidemic spreading in society and on the Internet to cancer metastasis in the human body. An accurate localization of the source is inherently limited by our ability to simultaneously access the information of all nodes in a large-scale complex network. This thus raises two critical questions: how do we locate the source from incomplete information and can we achieve full localization of sources at any possible location from a given set of observable nodes. Here we develop a time-reversal backward spreading algorithm to locate the source of a diffusion-like process efficiently and propose a general locatability condition. We test the algorithm by employing epidemic spreading and consensus dynamics as typical dynamical processes and apply it to the H1N1 pandemic in China. We find that the sources can be precisely located in arbitrary networks insofar as the locatability condition is assured. Our tools greatly improve our ability to locate the source of diffusion in complex networks based on limited accessibility of nodal information. Moreover, they have implications for controlling a variety of dynamical processes taking place on complex networks, such as inhibiting epidemics, slowing the spread of rumors, pollution control, and environmental protection.

  13. Virtual collaborative environments: programming and controlling robotic devices remotely

    NASA Astrophysics Data System (ADS)

    Davies, Brady R.; McDonald, Michael J., Jr.; Harrigan, Raymond W.

    1995-12-01

    This paper describes a technology for remote sharing of intelligent electro-mechanical devices. An architecture and actual system have been developed and tested, based on the proposed National Information Infrastructure (NII) or Information Highway, to facilitate programming and control of intelligent programmable machines (like robots, machine tools, etc.). Using appropriate geometric models, integrated sensors, video systems, and computing hardware; computer controlled resources owned and operated by different (in a geographic sense as well as legal sense) entities can be individually or simultaneously programmed and controlled from one or more remote locations. Remote programming and control of intelligent machines will create significant opportunities for sharing of expensive capital equipment. Using the technology described in this paper, university researchers, manufacturing entities, automation consultants, design entities, and others can directly access robotic and machining facilities located across the country. Disparate electro-mechanical resources will be shared in a manner similar to the way supercomputers are accessed by multiple users. Using this technology, it will be possible for researchers developing new robot control algorithms to validate models and algorithms right from their university labs without ever owning a robot. Manufacturers will be able to model, simulate, and measure the performance of prospective robots before selecting robot hardware optimally suited for their intended application. Designers will be able to access CNC machining centers across the country to fabricate prototypic parts during product design validation. An existing prototype architecture and system has been developed and proven. Programming and control of a large gantry robot located at Sandia National Laboratories in Albuquerque, New Mexico, was demonstrated from such remote locations as Washington D.C., Washington State, and Southern California.

  14. Mobile Phone Middleware Architecture for Energy and Context Awareness in Location-Based Services

    PubMed Central

    Galeana-Zapién, Hiram; Torres-Huitzil, César; Rubio-Loyola, Javier

    2014-01-01

    The disruptive innovation of smartphone technology has enabled the development of mobile sensing applications leveraged on specialized sensors embedded in the device. These novel mobile phone applications rely on advanced sensor information processes, which mainly involve raw data acquisition, feature extraction, data interpretation and transmission. However, the continuous accessing of sensing resources to acquire sensor data in smartphones is still very expensive in terms of energy, particularly due to the periodic use of power-intensive sensors, such as the Global Positioning System (GPS) receiver. The key underlying idea to design energy-efficient schemes is to control the duty cycle of the GPS receiver. However, adapting the sensing rate based on dynamic context changes through a flexible middleware has received little attention in the literature. In this paper, we propose a novel modular middleware architecture and runtime environment to directly interface with application programming interfaces (APIs) and embedded sensors in order to manage the duty cycle process based on energy and context aspects. The proposed solution has been implemented in the Android software stack. It allows continuous location tracking in a timely manner and in a transparent way to the user. It also enables the deployment of sensing policies to appropriately control the sampling rate based on both energy and perceived context. We validate the proposed solution taking into account a reference location-based service (LBS) architecture. A cloud-based storage service along with online mobility analysis tools have been used to store and access sensed data. Experimental measurements demonstrate the feasibility and efficiency of our middleware, in terms of energy and location resolution. PMID:25513821

  15. Mobile phone middleware architecture for energy and context awareness in location-based services.

    PubMed

    Galeana-Zapién, Hiram; Torres-Huitzil, César; Rubio-Loyola, Javier

    2014-12-10

    The disruptive innovation of smartphone technology has enabled the development of mobile sensing applications leveraged on specialized sensors embedded in the device. These novel mobile phone applications rely on advanced sensor information processes, which mainly involve raw data acquisition, feature extraction, data interpretation and transmission. However, the continuous accessing of sensing resources to acquire sensor data in smartphones is still very expensive in terms of energy, particularly due to the periodic use of power-intensive sensors, such as the Global Positioning System (GPS) receiver. The key underlying idea to design energy-efficient schemes is to control the duty cycle of the GPS receiver. However, adapting the sensing rate based on dynamic context changes through a flexible middleware has received little attention in the literature. In this paper, we propose a novel modular middleware architecture and runtime environment to directly interface with application programming interfaces (APIs) and embedded sensors in order to manage the duty cycle process based on energy and context aspects. The proposed solution has been implemented in the Android software stack. It allows continuous location tracking in a timely manner and in a transparent way to the user. It also enables the deployment of sensing policies to appropriately control the sampling rate based on both energy and perceived context. We validate the proposed solution taking into account a reference location-based service (LBS) architecture. A cloud-based storage service along with online mobility analysis tools have been used to store and access sensed data. Experimental measurements demonstrate the feasibility and efficiency of our middleware, in terms of energy and location resolution.

  16. 47 CFR 15.711 - Interference avoidance methods.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... channel availability for a TVBD is determined based on the geo-location and database access method described in paragraphs (a) and (b) of this section. (a) Geo-location and database access. A TVBD shall rely on the geo-location and database access mechanism to identify available television channels...

  17. 47 CFR 15.711 - Interference avoidance methods.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... channel availability for a TVBD is determined based on the geo-location and database access method described in paragraphs (a) and (b) of this section. (a) Geo-location and database access. A TVBD shall rely on the geo-location and database access mechanism to identify available television channels...

  18. 47 CFR 15.711 - Interference avoidance methods.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... channel availability for a TVBD is determined based on the geo-location and database access method described in paragraphs (a) and (b) of this section. (a) Geo-location and database access. A TVBD shall rely on the geo-location and database access mechanism to identify available television channels...

  19. 47 CFR 15.711 - Interference avoidance methods.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... channel availability for a TVBD is determined based on the geo-location and database access method described in paragraphs (a) and (b) of this section. (a) Geo-location and database access. A TVBD shall rely on the geo-location and database access mechanism to identify available television channels...

  20. Community-based interventions for enhancing access to or consumption of fruit and vegetables among five to 18-year olds: a scoping review

    PubMed Central

    2012-01-01

    Background Low fruit and vegetable ( FV) consumption is a key risk factor for morbidity and mortality. Consumption of FV is limited by a lack of access to FV. Enhanced understanding of interventions and their impact on both access to and consumption of FV can provide guidance to public health decision-makers. The purpose of this scoping review is to identify and map literature that has evaluated effects of community-based interventions designed to increase FV access or consumption among five to 18-year olds. Methods The search included 21 electronic bibliographic databases, grey literature, targeted organization websites, and 15 key journals for relevant studies published up to May 2011. Retrieved citations were screened in duplicate for relevance. Data extracted from included studies covered: year, country, study design, target audience, intervention setting, intervention strategies, interventionists, and reported outcomes. Results The search located 19,607 unique citations. Full text relevance screening was conducted on 1,908 studies. The final 289 unique studies included 30 knowledge syntheses, 27 randomized controlled trials, 55 quasi-experimental studies, 113 cluster controlled studies, 60 before-after studies, one mixed method study, and three controlled time series studies. Of these studies, 46 included access outcomes and 278 included consumption outcomes. In terms of target population, 110 studies focused on five to seven year olds, 175 targeted eight to 10 year olds, 192 targeted 11 to 14 year olds, 73 targeted 15 to 18 year olds, 55 targeted parents, and 30 targeted teachers, other service providers, or the general public. The most common intervention locations included schools, communities or community centres, and homes. Most studies implemented multi-faceted intervention strategies to increase FV access or consumption. Conclusions While consumption measures were commonly reported, this review identified a small yet important subset of literature examining access to FV. This is a critically important issue since consumption is contingent upon access. Future research should examine the impact of interventions on direct outcome measures of FV access and a focused systematic review that examines these interventions is also needed. In addition, research on interventions in low- and middle-income countries is warranted based on a limited existing knowledge base. PMID:22931474

  1. An approach to plan and evaluate the location of radiotherapy services and its application in the New South Wales, Australia.

    PubMed

    Shukla, Nagesh; Wickramasuriya, Rohan; Miller, Andrew; Perez, Pascal

    2015-11-01

    This paper proposes an integrated modelling approach for location planning of radiotherapy treatment services based on cancer incidence and road network-based accessibility. Previous research efforts have established travel distance/time barriers as a key factor affecting access to cancer treatment services, as well as epidemiological studies have shown that cancer incidence rates vary with population demography. Our study is built on the evidence that the travel distances to treatment centres and demographic profiles of the accessible regions greatly influence the uptake of cancer radiotherapy (RT) services. An integrated service planning approach that combines spatially-explicit cancer incidence projections, and the placement of new RT services based on road network based accessibility measures have never been attempted. This research presents a novel approach for the location planning of RT services, and demonstrates its viability by modelling cancer incidence rates for different age-sex groups in New South Wales, Australia based on observed cancer incidence trends; and estimations of the road network-based access to current NSW treatment centres. Using three indices (General Efficiency, Service Availability and Equity), we show how the best location for a new RT centre may be chosen when there are multiple competing locations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  2. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  3. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    EPA Pesticide Factsheets

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  4. Remotely Accessed Vehicle Traffic Management System

    NASA Astrophysics Data System (ADS)

    Al-Alawi, Raida

    2010-06-01

    The ever increasing number of vehicles in most metropolitan cities around the world and the limitation in altering the transportation infrastructure, led to serious traffic congestion and an increase in the travelling time. In this work we exploit the emergence of novel technologies such as the internet, to design an intelligent Traffic Management System (TMS) that can remotely monitor and control a network of traffic light controllers located at different sites. The system is based on utilizing Embedded Web Servers (EWS) technology to design a web-based TMS. The EWS located at each intersection uses IP technology for communicating remotely with a Central Traffic Management Unit (CTMU) located at the traffic department authority. Friendly GUI software installed at the CTMU will be able to monitor the sequence of operation of the traffic lights and the presence of traffic at each intersection as well as remotely controlling the operation of the signals. The system has been validated by constructing a prototype that resembles the real application.

  5. Access management for Kentucky.

    DOT National Transportation Integrated Search

    2004-02-01

    The Access Management Manual published by the Transportation Research Board in 2003 defines access management as the "systematic control of the location, spacing, design, and operation of driveways, median openings, interchanges, and street connectio...

  6. Impact of community-based health insurance in rural India on self-medication & financial protection of the insured.

    PubMed

    Dror, David M; Chakraborty, Arpita; Majumdar, Atanu; Panda, Pradeep; Koren, Ruth

    2016-06-01

    The evidence-base of the impact of community-based health insurance (CBHI) on access to healthcare and financial protection in India is weak. We investigated the impact of CBHI in rural Uttar Pradesh and Bihar s0 tates of India on insured households' self-medication and financial position. Data originated from (i) household surveys, and (ii) the Management Information System of each CBHI. Study design was "staggered implementation" cluster randomized controlled trial with enrollment of one-third of the treatment group in each of the years 2011, 2012 and 2013. Around 40-50 per cent of the households that were offered to enroll joined. The benefits-packages covered outpatient care in all three locations and in-patient care in two locations. To overcome self-selection enrollment bias, we constructed comparable control and treatment groups using Kernel Propensity Score Matching (K-PSM). To quantify impact, both difference-in-difference (DiD), and conditional-DiD (combined K-PSM with DiD) were used to assess robustness of results. Post-intervention (2013), self-medication was less practiced by insured HHs. Fewer insured households than uninsured households reported borrowing to finance care for non-hospitalization events. Being insured for two years also improved the HH's location along the income distribution, namely insured HHs were more likely to experience income quintile-upgrade in one location, and less likely to experience a quintile-downgrade in two locations. The realized benefits of insurance included better access to healthcare, reduced financial risks and improved economic mobility, suggesting that in our context health insurance creates welfare gains. These findings have implications for theoretical, ethical, policy and practice considerations.

  7. Impact of community-based health insurance in rural India on self-medication & financial protection of the insured

    PubMed Central

    Dror, David M.; Chakraborty, Arpita; Majumdar, Atanu; Panda, Pradeep; Koren, Ruth

    2016-01-01

    Background & objectives: The evidence-base of the impact of community-based health insurance (CBHI) on access to healthcare and financial protection in India is weak. We investigated the impact of CBHI in rural Uttar Pradesh and Bihar States of India on insured households’ self-medication and financial position. Methods: Data originated from (i) household surveys, and (ii) the Management Information System of each CBHI. Study design was “staggered implementation” cluster randomized controlled trial with enrollment of one-third of the treatment group in each of the years 2011, 2012 and 2013. Around 40-50 per cent of the households that were offered to enroll joined. The benefits-packages covered outpatient care in all three locations and in-patient care in two locations. To overcome self-selection enrollment bias, we constructed comparable control and treatment groups using Kernel Propensity Score Matching (K-PSM). To quantify impact, both difference-in-difference (DiD), and conditional-DiD (combined K-PSM with DiD) were used to assess robustness of results. Results: Post-intervention (2013), self-medication was less practiced by insured HHs. Fewer insured households than uninsured households reported borrowing to finance care for non-hospitalization events. Being insured for two years also improved the HH's location along the income distribution, namely insured HHs were more likely to experience income quintile-upgrade in one location, and less likely to experience a quintile-downgrade in two locations. Interpretation & conclusions: The realized benefits of insurance included better access to healthcare, reduced financial risks and improved economic mobility, suggesting that in our context health insurance creates welfare gains. These findings have implications for theoretical, ethical, policy and practice considerations. PMID:27748307

  8. User Access Management Based on Network Pricing for Social Network Applications

    PubMed Central

    Ma, Xingmin; Gu, Qing

    2018-01-01

    Social applications play a very important role in people’s lives, as users communicate with each other through social networks on a daily basis. This presents a challenge: How does one receive high-quality service from social networks at a low cost? Users can access different kinds of wireless networks from various locations. This paper proposes a user access management strategy based on network pricing such that networks can increase its income and improve service quality. Firstly, network price is treated as an optimizing access parameter, and an unascertained membership algorithm is used to make pricing decisions. Secondly, network price is adjusted dynamically in real time according to network load. Finally, selecting a network is managed and controlled in terms of the market economy. Simulation results show that the proposed scheme can effectively balance network load, reduce network congestion, improve the user's quality of service (QoS) requirements, and increase the network’s income. PMID:29495252

  9. Access Control to Information in Pervasive Computing Environments

    DTIC Science & Technology

    2005-08-01

    for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended

  10. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  11. Rural and Urban/Suburban Families' Use of a Web-Based Mental Health Intervention.

    PubMed

    Bunnell, Brian E; Davidson, Tatiana M; Dewey, Daniel; Price, Matthew; Ruggiero, Kenneth J

    2017-05-01

    Background/Introduction: Access to mental healthcare among rural residents is a national concern because unique barriers (e.g., fewer providers, distance to services) create significant challenges for the 60 million Americans who live in these settings. There is now a large body of literature demonstrating the efficacy of a wide range of Internet-based interventions. However, little is known about the extent to which individuals in rural settings will use these approaches and find them acceptable. Research with youths and their caregivers within this scope is particularly limited and, therefore, of great importance. We examined access and completion of a Web-based disaster mental health intervention in a population-based sample of 1,997 rural (n = 676) and urban/suburban (n = 1,321) adolescents and their caregivers who were affected by the Spring 2011 tornadoes that touched down in parts of Missouri and Alabama. Results indicated no differences in the rate of access or completion of Web-based modules based on geographical location. Furthermore, for those who did not access the Web-based resource, no differences were observed with respect to reasons for not accessing modules based on geographical location. These data have promising implications for the reach of Web-based resources to both rural and urban/suburban communities, as well as the willingness of adolescents and their caregivers to access and complete such resources, regardless of geographical location.

  12. Virtual shelves in a digital library: a framework for access to networked information sources.

    PubMed

    Patrick, T B; Springer, G K; Mitchell, J A; Sievert, M E

    1995-01-01

    Develop a framework for collections-based access to networked information sources that addresses the problem of location-dependent access to information sources. This framework uses a metaphor of a virtual shelf. A virtual shelf is a general-purpose server that is dedicated to a particular information subject class. The identifier of one of these servers identifies its subject class. Location-independent call numbers are assigned to information sources. Call numbers are based on standard vocabulary codes. The call numbers are first mapped to the location-independent identifiers of virtual shelves. When access to an information resource is required, a location directory provides a second mapping of these location-independent server identifiers to actual network locations. The framework has been implemented in two different systems. One system is based on the Open System Foundation/Distributed Computing Environment and the other is based on the World Wide Web. This framework applies in new ways traditional methods of library classification and cataloging. It is compatible with two traditional styles of selecting information searching and browsing. Traditional methods may be combined with new paradigms of information searching that will be able to take advantage of the special properties of digital information. Cooperation between the library-informational science community and the informatics community can provide a means for a continuing application of the knowledge and techniques of library science to the new problems of networked information sources.

  13. Rural and Urban/Suburban Families' Use of a Web-Based Mental Health Intervention

    PubMed Central

    Davidson, Tatiana M.; Dewey, Daniel; Price, Matthew; Ruggiero, Kenneth J.

    2017-01-01

    Abstract Background/Introduction: Access to mental healthcare among rural residents is a national concern because unique barriers (e.g., fewer providers, distance to services) create significant challenges for the 60 million Americans who live in these settings. There is now a large body of literature demonstrating the efficacy of a wide range of Internet-based interventions. However, little is known about the extent to which individuals in rural settings will use these approaches and find them acceptable. Research with youths and their caregivers within this scope is particularly limited and, therefore, of great importance. Methods: We examined access and completion of a Web-based disaster mental health intervention in a population-based sample of 1,997 rural (n = 676) and urban/suburban (n = 1,321) adolescents and their caregivers who were affected by the Spring 2011 tornadoes that touched down in parts of Missouri and Alabama. Results: Results indicated no differences in the rate of access or completion of Web-based modules based on geographical location. Furthermore, for those who did not access the Web-based resource, no differences were observed with respect to reasons for not accessing modules based on geographical location. Discussion: These data have promising implications for the reach of Web-based resources to both rural and urban/suburban communities, as well as the willingness of adolescents and their caregivers to access and complete such resources, regardless of geographical location. PMID:27753542

  14. Location Based Application Availability

    NASA Astrophysics Data System (ADS)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  15. An Indoor Location-Based Control System Using Bluetooth Beacons for IoT Systems.

    PubMed

    Huh, Jun-Ho; Seo, Kyungryong

    2017-12-19

    The indoor location-based control system estimates the indoor position of a user to provide the service he/she requires. The major elements involved in the system are the localization server, service-provision client, user application positioning technology. The localization server controls access of terminal devices (e.g., Smart Phones and other wireless devices) to determine their locations within a specified space first and then the service-provision client initiates required services such as indoor navigation and monitoring/surveillance. The user application provides necessary data to let the server to localize the devices or allow the user to receive various services from the client. The major technological elements involved in this system are indoor space partition method, Bluetooth 4.0, RSSI (Received Signal Strength Indication) and trilateration. The system also employs the BLE communication technology when determining the position of the user in an indoor space. The position information obtained is then used to control a specific device(s). These technologies are fundamental in achieving a "Smart Living". An indoor location-based control system that provides services by estimating user's indoor locations has been implemented in this study (First scenario). The algorithm introduced in this study (Second scenario) is effective in extracting valid samples from the RSSI dataset but has it has some drawbacks as well. Although we used a range-average algorithm that measures the shortest distance, there are some limitations because the measurement results depend on the sample size and the sample efficiency depends on sampling speeds and environmental changes. However, the Bluetooth system can be implemented at a relatively low cost so that once the problem of precision is solved, it can be applied to various fields.

  16. An Indoor Location-Based Control System Using Bluetooth Beacons for IoT Systems

    PubMed Central

    Huh, Jun-Ho; Seo, Kyungryong

    2017-01-01

    The indoor location-based control system estimates the indoor position of a user to provide the service he/she requires. The major elements involved in the system are the localization server, service-provision client, user application positioning technology. The localization server controls access of terminal devices (e.g., Smart Phones and other wireless devices) to determine their locations within a specified space first and then the service-provision client initiates required services such as indoor navigation and monitoring/surveillance. The user application provides necessary data to let the server to localize the devices or allow the user to receive various services from the client. The major technological elements involved in this system are indoor space partition method, Bluetooth 4.0, RSSI (Received Signal Strength Indication) and trilateration. The system also employs the BLE communication technology when determining the position of the user in an indoor space. The position information obtained is then used to control a specific device(s). These technologies are fundamental in achieving a “Smart Living”. An indoor location-based control system that provides services by estimating user’s indoor locations has been implemented in this study (First scenario). The algorithm introduced in this study (Second scenario) is effective in extracting valid samples from the RSSI dataset but has it has some drawbacks as well. Although we used a range-average algorithm that measures the shortest distance, there are some limitations because the measurement results depend on the sample size and the sample efficiency depends on sampling speeds and environmental changes. However, the Bluetooth system can be implemented at a relatively low cost so that once the problem of precision is solved, it can be applied to various fields. PMID:29257044

  17. Spatially explicit control of invasive species using a reaction-diffusion model

    USGS Publications Warehouse

    Bonneau, Mathieu; Johnson, Fred A.; Romagosa, Christina M.

    2016-01-01

    Invasive species, which can be responsible for severe economic and environmental damages, must often be managed over a wide area with limited resources, and the optimal allocation of effort in space and time can be challenging. If the spatial range of the invasive species is large, control actions might be applied only on some parcels of land, for example because of property type, accessibility, or limited human resources. Selecting the locations for control is critical and can significantly impact management efficiency. To help make decisions concerning the spatial allocation of control actions, we propose a simulation based approach, where the spatial distribution of the invader is approximated by a reaction–diffusion model. We extend the classic Fisher equation to incorporate the effect of control both in the diffusion and local growth of the invader. The modified reaction–diffusion model that we propose accounts for the effect of control, not only on the controlled locations, but on neighboring locations, which are based on the theoretical speed of the invasion front. Based on simulated examples, we show the superiority of our model compared to the state-of-the-art approach. We illustrate the use of this model for the management of Burmese pythons in the Everglades (Florida, USA). Thanks to the generality of the modified reaction–diffusion model, this framework is potentially suitable for a wide class of management problems and provides a tool for managers to predict the effects of different management strategies.

  18. Virtual shelves in a digital library: a framework for access to networked information sources.

    PubMed Central

    Patrick, T B; Springer, G K; Mitchell, J A; Sievert, M E

    1995-01-01

    OBJECTIVE: Develop a framework for collections-based access to networked information sources that addresses the problem of location-dependent access to information sources. DESIGN: This framework uses a metaphor of a virtual shelf. A virtual shelf is a general-purpose server that is dedicated to a particular information subject class. The identifier of one of these servers identifies its subject class. Location-independent call numbers are assigned to information sources. Call numbers are based on standard vocabulary codes. The call numbers are first mapped to the location-independent identifiers of virtual shelves. When access to an information resource is required, a location directory provides a second mapping of these location-independent server identifiers to actual network locations. RESULTS: The framework has been implemented in two different systems. One system is based on the Open System Foundation/Distributed Computing Environment and the other is based on the World Wide Web. CONCLUSIONS: This framework applies in new ways traditional methods of library classification and cataloging. It is compatible with two traditional styles of selecting information searching and browsing. Traditional methods may be combined with new paradigms of information searching that will be able to take advantage of the special properties of digital information. Cooperation between the library-informational science community and the informatics community can provide a means for a continuing application of the knowledge and techniques of library science to the new problems of networked information sources. PMID:8581554

  19. Comprehensive security framework for the communication and storage of medical images

    NASA Astrophysics Data System (ADS)

    Slik, David; Montour, Mike; Altman, Tym

    2003-05-01

    Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.

  20. Passive Infrared (PIR)-Based Indoor Position Tracking for Smart Homes Using Accessibility Maps and A-Star Algorithm.

    PubMed

    Yang, Dan; Xu, Bin; Rao, Kaiyou; Sheng, Weihua

    2018-01-24

    Indoor occupants' positions are significant for smart home service systems, which usually consist of robot service(s), appliance control and other intelligent applications. In this paper, an innovative localization method is proposed for tracking humans' position in indoor environments based on passive infrared (PIR) sensors using an accessibility map and an A-star algorithm, aiming at providing intelligent services. First the accessibility map reflecting the visiting habits of the occupants is established through the integral training with indoor environments and other prior knowledge. Then the PIR sensors, which placement depends on the training results in the accessibility map, get the rough location information. For more precise positioning, the A-start algorithm is used to refine the localization, fused with the accessibility map and the PIR sensor data. Experiments were conducted in a mock apartment testbed. The ground truth data was obtained from an Opti-track system. The results demonstrate that the proposed method is able to track persons in a smart home environment and provide a solution for home robot localization.

  1. Passive Infrared (PIR)-Based Indoor Position Tracking for Smart Homes Using Accessibility Maps and A-Star Algorithm

    PubMed Central

    Yang, Dan; Xu, Bin; Rao, Kaiyou; Sheng, Weihua

    2018-01-01

    Indoor occupants’ positions are significant for smart home service systems, which usually consist of robot service(s), appliance control and other intelligent applications. In this paper, an innovative localization method is proposed for tracking humans’ position in indoor environments based on passive infrared (PIR) sensors using an accessibility map and an A-star algorithm, aiming at providing intelligent services. First the accessibility map reflecting the visiting habits of the occupants is established through the integral training with indoor environments and other prior knowledge. Then the PIR sensors, which placement depends on the training results in the accessibility map, get the rough location information. For more precise positioning, the A-start algorithm is used to refine the localization, fused with the accessibility map and the PIR sensor data. Experiments were conducted in a mock apartment testbed. The ground truth data was obtained from an Opti-track system. The results demonstrate that the proposed method is able to track persons in a smart home environment and provide a solution for home robot localization. PMID:29364188

  2. Rural and remote dental services shortages: filling the gaps through geo-spatial analysis evidence-based targeting.

    PubMed

    Shiika, Yulia; Kruger, Estie; Tennant, Marc

    Australia has a significant mal-distribution of its limited dental workforce. Outside the major capital cities, the distribution of accessible dental care is at best patchy. This study applied geo-spatial analysis technology to locate gaps in dental service accessibility for rural and remote dwelling Australians, in order to test the hypothesis that there are a few key location points in Australia where further dental services could make a significant contribution to ameliorating the immediate shortage crisis. A total of 2,086 dental practices were located in country areas, covering a combined catchment area of 1.84 million square kilometers, based on 50 km catchment zones around each clinic. Geo-spatial analysis technology was used to identify gaps in the accessibility of dental services for rural and remote dwelling Australians. An extraction of data was obtained to analyse the integrated geographically-aligned database. Results: Resolution of the lack of dental practices for 74 townships (of greater than 500 residents) across Australia could potentially address access for 104,000 people. An examination of the socio-economic mix found that the majority of the dental practices (84%) are located in areas classified as less disadvantaged. Output from the study provided a cohesive national map that has identified locations that could have health improvement via the targeting of dental services to that location. The study identified potential location sites for dental clinics, to address the current inequity in accessing dental services in rural and remote Australia.

  3. Fiber Bragg grating based arterial localization device

    NASA Astrophysics Data System (ADS)

    Ho, Siu Chun Michael; Li, Weijie; Razavi, Mehdi; Song, Gangbing

    2017-06-01

    A critical first step to many surgical procedures is locating and gaining access to a patients vascular system. Vascular access allows the deployment of other surgical instruments and also the monitoring of many physiological parameters. Current methods to locate blood vessels are predominantly based on the landmark technique coupled with ultrasound, fluoroscopy, or Doppler. However, even with experience and technological assistance, locating the required blood vessel is not always an easy task, especially with patients that present atypical anatomy or suffer from conditions such as weak pulsation or obesity that make vascular localization difficult. With recent advances in fiber optic sensors, there is an opportunity to develop a new tool that can make vascular localization safer and easier. In this work, the authors present a new fiber Bragg grating (FBG) based vascular access device that specializes in arterial localization. The device estimates the location towards a local artery based on the bending of a needle inserted near the tissue surrounding the artery. Experimental results obtained from an artificial circulatory loop and a mock artery show the device works best for lower angles of needle insertion and can provide an approximately 40° range of estimation towards the location of a pulsating source (e.g. an artery).

  4. Embedded diagnostic, prognostic, and health management system and method for a humanoid robot

    NASA Technical Reports Server (NTRS)

    Barajas, Leandro G. (Inventor); Strawser, Philip A (Inventor); Sanders, Adam M (Inventor); Reiland, Matthew J (Inventor)

    2013-01-01

    A robotic system includes a humanoid robot with multiple compliant joints, each moveable using one or more of the actuators, and having sensors for measuring control and feedback data. A distributed controller controls the joints and other integrated system components over multiple high-speed communication networks. Diagnostic, prognostic, and health management (DPHM) modules are embedded within the robot at the various control levels. Each DPHM module measures, controls, and records DPHM data for the respective control level/connected device in a location that is accessible over the networks or via an external device. A method of controlling the robot includes embedding a plurality of the DPHM modules within multiple control levels of the distributed controller, using the DPHM modules to measure DPHM data within each of the control levels, and recording the DPHM data in a location that is accessible over at least one of the high-speed communication networks.

  5. MED31/437: A Web-based Diabetes Management System: DiabNet

    PubMed Central

    Zhao, N; Roudsari, A; Carson, E

    1999-01-01

    Introduction A web-based system (DiabNet) was developed to provide instant access to the Electronic Diabetes Records (EDR) for end-users, and real-time information for healthcare professionals to facilitate their decision-making. It integrates portable glucometer, handheld computer, mobile phone and Internet access as a combined telecommunication and mobile computing solution for diabetes management. Methods: Active Server Pages (ASP) embedded with advanced ActiveX controls and VBScript were developed to allow remote data upload, retrieval and interpretation. Some advisory and Internet-based learning features, together with a video teleconferencing component make DiabNet web site an informative platform for Web-consultation. Results The evaluation of the system is being implemented among several UK Internet diabetes discussion groups and the Diabetes Day Centre at the Guy's & St. Thomas' Hospital. Many positive feedback are received from the web site demonstrating DiabNet is an advanced web-based diabetes management system which can help patients to keep closer control of self-monitoring blood glucose remotely, and is an integrated diabetes information resource that offers telemedicine knowledge in diabetes management. Discussion In summary, DiabNet introduces an innovative online diabetes management concept, such as online appointment and consultation, to enable users to access diabetes management information without time and location limitation and security concerns.

  6. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  7. Authomatization of Digital Collection Access Using Mobile and Wireless Data Terminals

    NASA Astrophysics Data System (ADS)

    Leontiev, I. V.

    Information technologies become vital due to information processing needs, database access, data analysis and decision support. Currently, a lot of scientific projects are oriented on database integration of heterogeneous systems. The problem of on-line and rapid access to large integrated systems of digital collections is also very important. Usually users move between different locations, either at work or at home. In most cases users need an efficient and remote access to information, stored in integrated data collections. Desktop computers are unable to fulfill the needs, so mobile and wireless devices become helpful. Handhelds and data terminals are nessessary in medical assistance (they store detailed information about each patient, and helpful for nurses), immediate access to data collections is used in a Highway patrol services (databanks of cars, owners, driver licences). Using mobile access, warehouse operations can be validated. Library and museum items cyclecounting will speed up using online barcode-scanning and central database access. That's why mobile devices - cell phones, PDA, handheld computers with wireless access, WindowsCE and PalmOS terminals become popular. Generally, mobile devices have a relatively slow processor, and limited display capabilities, but they are effective for storing and displaying textual data, recognize user hand-writing with stylus, support GUI. Users can perform operations on handheld terminal, and exchange data with the main system (using immediate radio access, or offline access during syncronization process) for update. In our report, we give an approach for mobile access to data collections, which raises an efficiency of data processing in a book library, helps to control available books, books in stock, validate service charges, eliminate staff mistakes, generate requests for book delivery. Our system uses mobile devices Symbol RF (with radio-channel access), and data terminals Symbol Palm Terminal for batch-processing and synchronization with remote library databases. We discuss the use of PalmOS-compatible devices, and WindowsCE terminals. Our software system is based on modular, scalable three-tier architecture. Additional functionality can be easily customized. Scalability is also supplied by Internet / Intranet technologies, and radio-access points. The base module of the system supports generic warehouse operations: cyclecounting with handheld barcode-scanners, efficient items delivery and issue, item movement, reserving, report generating on finished and in-process operations. Movements are optimized using worker's current location, operations are sorted in a priority order and transmitted to mobile and wireless worker's terminals. Mobile terminals improve of tasks processing control, eliminate staff mistakes, display actual information about main processes, provide data for online-reports, and significantly raise the efficiency of data exchange.

  8. The use of mobile technology for tourism development (case study: banyumas regency)

    NASA Astrophysics Data System (ADS)

    Gunawan, H.

    2018-01-01

    Banyumas is regency in Central Java Province and Purwokerto Capital City. Banyumas has a lot of tourism areas, but not all of the areas are known by tourists because the lack of information. The information on Banyumas government’s website is not updated and uncomplete, so that it needs other information services for the tourism information in Banyumas. An android-based application Banyumas Travel Guide (BMSGuide) is a location-based application to help the people can access the information whenever and wherever they are. The service in this application is using Android which is platform that is now developing rapidly with interface User Friendly and the price is affordable. The application will access Google Maps and show the user location, destination location along with the information, and the navigation to the location. The information is gotten by accessing the satellite with GPS (Global Positioning System) tool of the user’s headset. By using BMSGuide application, the information service of tourism location and the supporting place around is served.

  9. Cathepsin B Cleavage of vcMMAE-Based Antibody-Drug Conjugate Is Not Drug Location or Monoclonal Antibody Carrier Specific.

    PubMed

    Gikanga, Benson; Adeniji, Nia S; Patapoff, Thomas W; Chih, Hung-Wei; Yi, Li

    2016-04-20

    Antibody-drug conjugates (ADCs) require thorough characterization and understanding of product quality attributes. The framework of many ADCs comprises one molecule of antibody that is usually conjugated with multiple drug molecules at various locations. It is unknown whether the drug release rate from the ADC is dependent on drug location, and/or local environment, dictated by the sequence and structure of the antibody carrier. This study addresses these issues with valine-citrulline-monomethylauristatin E (vc-MMAE)-based ADC molecules conjugated at reduced disulfide bonds, by evaluating the cathepsin B catalyzed drug release rate of ADC molecules with different drug distributions or antibody carriers. MMAE drug release rates at different locations on ADC I were compared to evaluate the impact of drug location. No difference in rates was observed for drug released from the V(H), V(L), or C(H)2 domains of ADC I. Furthermore, four vc-MMAE ADC molecules were chosen as substrates for cathepsin B for evaluation of Michaelis-Menten parameters. There was no significant difference in K(M) or k(cat) values, suggesting that different sequences of the antibody carrier do not result in different drug release rates. Comparison between ADCs and small molecules containing vc-MMAE moieties as substrates for cathepsin B suggests that the presence of IgG1 antibody carrier, regardless of its bulkiness, does not impact drug release rate. Finally, a molecular dynamics simulation on ADC II revealed that the val-cit moiety at each of the eight possible conjugation sites was, on average, solvent accessible over 50% of its maximum solvent accessible surface area (SASA) during a 500 ns trajectory. Combined, these results suggest that the cathepsin cleavage sites for conjugated drugs are exposed enough for the enzyme to access and that the drug release rate is rather independent of drug location or monoclonal antibody carrier. Therefore, the distribution of drug conjugation at different sites is not a critical parameter to control in manufacturing of the vc-MMAE-based ADC conjugated at reduced disulfide bonds.

  10. Accessibility and distribution of the Norwegian National Air Emergency Service: 1988-1998.

    PubMed

    Heggestad, Torhild; Børsheim, Knut Yngve

    2002-01-01

    To evaluate the accessibility and distribution of the Norwegian National Air Emergency Service in the 10-year period from 1988 to 1998. The primary material was annual standardized activity data that included all helicopter missions. A multivariate model of determinants for use of the helicopter service was computed by linear regression. Accessibility was measured as the percentage of the population reached in different flying times, and we evaluated the service using a simulation of alternative locations for the helicopter bases. The helicopter service (HEMS) has short access times, with a mean reaction time of 8 minutes and a mean response time of 26 minutes for acute missions. Nearly all patients (98%) are reached within 1 hour. A simulation that tested alternative locations of the helicopter bases compared with current locations showed no increase in accessibility. The use of the service shows large regional differences. Multivariate analyses showed that the distances of the patients from the nearest helicopter base and the nearest hospital are significant determinants for the use of HEMS. Establishment of a national service has given the Norwegian population better access to highly qualified prehospital emergency services. Furthermore, the HEMS has a compensating effect in adjusting for differences in traveling distances to a hospital. Safety, cost-containment, and gatekeeper functions remain challenges.

  11. Programmable DMA controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F. (Inventor)

    1993-01-01

    In a data system having a memory, plural input/output (I/O) devices and a bus connecting each of the I/O devices to the memory, a direct memory access (DMA) controller regulating access of each of the I/O devices to the bus, including a priority register storing priorities of bus access requests from the I/O devices, an interrupt register storing bus access requests of the I/O devices, a resolver for selecting one of the I/O devices to have access to the bus, a pointer register storing addresses of locations in the memory for communication with the one I/O device via the bus, a sequence register storing an address of a location in the memory containing a channel program instruction which is to be executed next, an ALU for incrementing and decrementing addresses stored in the pointer register, computing the next address to be stored in the sequence register, computing an initial contents of each of the register. The memory contains a sequence of channel program instructions defining a set up operation wherein the contents of each of the registers in the channel register is initialized in accordance with the initial contents computed by the ALU and an access operation wherein data is transferred on the bus between a location in the memory whose address is currently stored in the pointer register and the one I/O device enabled by the resolver.

  12. Mobile and Accessible Learning for MOOCs

    ERIC Educational Resources Information Center

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  13. Teaching with Internet Telescopes: Some Lessons Learned

    NASA Astrophysics Data System (ADS)

    Stencel, Robert

    Observational astronomy is often difficult for pre-college students and teachers because: (1) school occurs in daytime and visual observing at night; (2) light pollution hides the stars from students living in cities; (3) few schools have teachers trained to use and maintain astronomy equipment; (4) there is lack of access to expertise when needed; (5) physically disabled students cannot easily access a telescope eypiece. Internet access to computer controlled telescopes with digital cameras can solve many of these difficulties. The Web enables students and teachers to access well-maintained internet-controllable telescopes at dark-site locations and to consult more readily with experts. This paper reports on a three-month pilot project exploring this situation conducted Feb-May 2002 which allowed high school students to access a CCD-equipped accurately-pointing and tracking telescope located in New Mexico controllable over the Web with a user-friendly skymap browser tool. User interest proved phenomenal and user statistics proved diverse. There were distinct lessons learned about how to enhance student participation in the research process. Details available at website www.du.edu/~rstencel/stn.htm. We thank the ICSRC for a grant to Denver University and acknowledge in-kind support from the estate of William Herschel Womble.

  14. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  15. Tracking Human Mobility Using WiFi Signals.

    PubMed

    Sapiezynski, Piotr; Stopczynski, Arkadiusz; Gatej, Radu; Lehmann, Sune

    2015-01-01

    We study six months of human mobility data, including WiFi and GPS traces recorded with high temporal resolution, and find that time series of WiFi scans contain a strong latent location signal. In fact, due to inherent stability and low entropy of human mobility, it is possible to assign location to WiFi access points based on a very small number of GPS samples and then use these access points as location beacons. Using just one GPS observation per day per person allows us to estimate the location of, and subsequently use, WiFi access points to account for 80% of mobility across a population. These results reveal a great opportunity for using ubiquitous WiFi routers for high-resolution outdoor positioning, but also significant privacy implications of such side-channel location tracking.

  16. Advantages and Disadvantages for Receiving Internet-Based HIV/AIDS Interventions at Home or at Community Based Organization

    PubMed Central

    Green, Shana M.; Lockhart, Elizabeth; Marhefka, Stephanie L.

    2015-01-01

    Within recent years public health interventions have become technologically based to reflect the digital age we currently live in and appeal to the public in innovative and novel ways. The Internet breaks down boundaries distance imposes and increases our ability to reach and connect with people. Internet-based interventions have the potential to expand access to effective behavioral interventions. The US National HIV/AIDS Strategy states that people living with HIV should have access to effective behavioral interventions like Healthy Relationships (HR) to help them develop safe sex and disclosure skills. However, access to HR is limited across the country, especially for people in remote or rural areas. Internet-based Healthy Relationships Video Groups (HR-VG) delivered at home or community based organizations (CBOs) can possibly expand access. This study assesses the preferences of women living with HIV (WLH) for participation in HR-VG among 21 WLH who participated in a randomized control trial (RCT) testing HR-VG and completed open-ended semi-structured telephone interviews. Transcripts were thematically analyzed to determine advantages, disadvantages and overall preference for home or agency delivery of HR-VG. Themes relating to convenience, technology access, privacy, distractions, HIV serostatus disclosure and social opportunities were identified as advantages or disadvantages to participating in HR-VG at each location. Overall privacy was the most salient concern of accessing HR-VG at home or at a CBO. Considering the concerns expressed by WLH, further studies are needed to assess how an Internet-based intervention delivered at home for WLH can maintain privacy while being cost effective. PMID:26357907

  17. Advantages and disadvantages for receiving Internet-based HIV/AIDS interventions at home or at community-based organizations.

    PubMed

    Green, Shana M; Lockhart, Elizabeth; Marhefka, Stephanie L

    2015-01-01

    Within recent years, public health interventions have become technology based to reflect the digital age we currently live in and appeal to the public in innovative and novel ways. The Internet breaks down boundaries distance imposes and increases our ability to reach and connect with people. Internet-based interventions have the potential to expand access to effective behavioral interventions (EBIs). The US National HIV/AIDS Strategy states that people living with HIV should have access to EBIs such as healthy relationships (HR) to help them develop safe sex and disclosure skills. However, access to HR is limited across the country, especially for people in remote or rural areas. Internet-based healthy relationships video groups (HR-VG) delivered at home or community-based organizations (CBOs) can possibly expand access. This study assesses the preferences of women living with HIV (WLH) for participation in HR-VG among 21 WLH who participated in a randomized control trial (RCT) testing HR-VG and completed open-ended semi-structured telephone interviews. Transcripts were thematically analyzed to determine advantages and disadvantages of home or CBO delivery of HR-VG. Themes relating to convenience, technology access, privacy, distractions, HIV serostatus disclosure, and social opportunities were identified as advantages or disadvantages to participating in HR-VG at each location. Overall, privacy was the most salient concern of accessing HR-VG at home or at a CBO. Considering the concerns expressed by WLH, further studies are needed to assess how an Internet-based intervention delivered at home for WLH can maintain privacy while being cost effective.

  18. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    NASA Astrophysics Data System (ADS)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  19. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model.

  20. 78 FR 38227 - Connect America Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-26

    ... different per- location support amounts based on the existing level of Internet access ($550 for homes with low-speed Internet access and $775, as in the first round, for homes with only dial-up access), and... Internet access. We adopt a process for challenges to the eligibility of specific areas where price cap...

  1. An All-Optical Access Metro Interface for Hybrid WDM/TDM PON Based on OBS

    NASA Astrophysics Data System (ADS)

    Segarra, Josep; Sales, Vicent; Prat, Josep

    2007-04-01

    A new all-optical access metro network interface based on optical burst switching (OBS) is proposed. A hybrid wavelength-division multiplexing/time-division multiplexing (WDM/TDM) access architecture with reflective optical network units (ONUs), an arrayed-waveguide-grating outside plant, and a tunable laser stack at the optical line terminal (OLT) is presented as a solution for the passive optical network. By means of OBS and a dynamic bandwidth allocation (DBA) protocol, which polls the ONUs, the available access bandwidth is managed. All the network intelligence and costly equipment is located at the OLT, where the DBA module is centrally implemented, providing quality of service (QoS). To scale this access network, an optical cross connect (OXC) is then used to attain a large number of ONUs by the same OLT. The hybrid WDM/TDM structure is also extended toward the metropolitan area network (MAN) by introducing the concept of OBS multiplexer (OBS-M). The network element OBS-M bridges the MAN and access networks by offering all-optical cross connection, wavelength conversion, and data signaling. The proposed innovative OBS-M node yields a full optical data network, interfacing access and metro with a geographically distributed access control. The resulting novel access metro architectures are nonblocking and, with an improved signaling, provide QoS, scalability, and very low latency. Finally, numerical analysis and simulations demonstrate the traffic performance of the proposed access scheme and all-optical access metro interface and architectures.

  2. Performance, implementation and network management techniques for a European CDMA-based land-mobile satellite system

    NASA Astrophysics Data System (ADS)

    Arenaccio, S.; Vernucci, A.; Padovani, R.; Arcidiacono, A.

    Results of a detailed comparative performance assessment between two candidate access solutions for the provision of land-mobile services, i.e., FDMA and CDMA, for the European Land-Mobile Satellite Services (LMSS) provision are presented. The design of the CDMA access system and the network architecture, system procedures, network control, operation in fading environments, and implementation aspects of the system are described. The CDMA system is shown to yield superior traffic capability, despite the absence of polarization reuse due to payload design, especially in the second-generation era (multiple spot-beams). In this case, the advantage was found to be largely dependent on the traffic distribution across spot beams. Power control techniques are proposed to cope with the geographical disadvantage suffered by mobile stations located at the beam borders to compensate for fadings.

  3. Visits to Registered Nurses: An Opportunity to Increase Contraceptive Access in California.

    PubMed

    Parker, Emese C; Kong, Kevin; Watts, Leslie A; Schwarz, Eleanor B; Darney, Philip D; Thiel de Bocanegra, Heike

    In 2013, California passed Assembly Bill (A.B.) 2348, approving registered nurses (RNs) to dispense patient self-administered hormonal contraceptives and administer injections of hormonal contraceptives. The Family Planning, Access, Care and Treatment (Family PACT) program, which came into effect in 1997 to expand low-income, uninsured California resident access to contraceptives at no cost, is one program in which qualified RNs can dispense and administer contraceptives. The aims of this study were to (a) describe utilization of RN visits within California's Family PACT program and (b) evaluate the impact of RN visits on client birth control acquisition during the first 18 months after implementation of A.B. 2348 (January 1, 2013 to June 30, 2014). A descriptive observational design using administrative databases was used. Family PACT claims were retrieved for RN visits and contraception. Paid claims for contraceptive dispensing and/or administration visits by physicians, nurse practitioners, certified nurse midwives, and physician assistants were compared before and after the implementation of A.B. 2348 at practice sites where RN visits were and were not utilized. Contraceptive methods and administration procedures were identified using Healthcare Common Procedure Coding System codes, National Drug Codes, and Common Procedural Terminology codes. Claims data for healthcare facilities were abstracted by site location based on a unique combination of National Provider Identifier (NPI), NPI Owner, and NPI location number. RN visits were found mainly in Northern California and the Central Valley (73%). Sixty-eight percent of RN visits resulted in same-day dispensing and/or administration of hormonal (and/or barrier) methods. Since benefit implementation, RN visits resulted in a 10% increase in access to birth control dispensing and/or administration visits. RN visits were also associated with future birth control acquisition and other healthcare utilization within the subsequent 30 days. RN visits, though underutilized across the state, have resulted in increased access to contraception in some communities, an effect that may continue to grow with time and can serve as a model for other states.

  4. Tracking Human Mobility Using WiFi Signals

    PubMed Central

    Sapiezynski, Piotr; Stopczynski, Arkadiusz; Gatej, Radu; Lehmann, Sune

    2015-01-01

    We study six months of human mobility data, including WiFi and GPS traces recorded with high temporal resolution, and find that time series of WiFi scans contain a strong latent location signal. In fact, due to inherent stability and low entropy of human mobility, it is possible to assign location to WiFi access points based on a very small number of GPS samples and then use these access points as location beacons. Using just one GPS observation per day per person allows us to estimate the location of, and subsequently use, WiFi access points to account for 80% of mobility across a population. These results reveal a great opportunity for using ubiquitous WiFi routers for high-resolution outdoor positioning, but also significant privacy implications of such side-channel location tracking. PMID:26132115

  5. Transmission in situ and operando high temperature X-ray powder diffraction in variable gaseous environments

    NASA Astrophysics Data System (ADS)

    Schlicker, Lukas; Doran, Andrew; Schneppmüller, Peter; Gili, Albert; Czasny, Mathias; Penner, Simon; Gurlo, Aleksander

    2018-03-01

    This work describes a device for time-resolved synchrotron-based in situ and operando X-ray powder diffraction measurements at elevated temperatures under controllable gaseous environments. The respective gaseous sample environment is realized via a gas-tight capillary-in-capillary design, where the gas flow is achieved through an open-end 0.5 mm capillary located inside a 0.7 mm capillary filled with a sample powder. Thermal mass flow controllers provide appropriate gas flows and computer-controlled on-the-fly gas mixing capabilities. The capillary system is centered inside an infrared heated, proportional integral differential-controlled capillary furnace allowing access to temperatures up to 1000 °C.

  6. HTTP-based remote operational options for the Vacuum Tower Telescope, Tenerife

    NASA Astrophysics Data System (ADS)

    Staiger, J.

    2012-09-01

    We are currently developing network based tools for the Vacuum Tower Telescope (VTT), Tenerife which will allow to operate the telescope together with the newly developed 2D-spectrometer HELLRIDE under remote control conditions. The computational configuration can be viewed as a distributed system linking hardware components of various functionality from different locations. We have developed a communication protocol which is basically an extension of the HTTP standard. It will serve as a carrier for command- and data-transfers. The server-client software is based on Berkley-Unix sockets in a C++ programming environment. A customized CMS will allow to create browser accessible information on-the-fly. Java-based applet pages have been tested as optional user access GUI's. An access tool has been implemented to download near-realtime, web-based target information from NASA/SDO. Latency tests have been carried out at the VTT and the Swedish STT at La Palma for concept verification. Short response times indicate that under favorable network conditions remote interactive telescope handling may be possible. The scientific focus of possible future remote operations will be set on the helioseismology of the solar atmosphere, the monitoring of flares and the footpoint analysis of coronal loops and chromospheric events.

  7. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  8. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  9. Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment

    PubMed Central

    Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel

    2008-01-01

    Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979

  10. Stability of Cell Wall Composition and Saccharification Efficiency in Miscanthus across Diverse Environments

    PubMed Central

    van der Weijde, Tim; Dolstra, Oene; Visser, Richard G. F.; Trindade, Luisa M.

    2017-01-01

    To investigate the potential effects of differences between growth locations on the cell wall composition and saccharification efficiency of the bioenergy crop miscanthus, a diverse set of 15 accessions were evaluated in six locations across Europe for the first 3 years following establishment. High-throughput quantification of cellulose, hemicellulose and lignin contents, as well as cellulose and hemicellulose conversion rates was achieved by combining near-infrared reflectance spectroscopy (NIRS) and biochemical analysis. Prediction models were developed and found to predict biomass quality characteristics with high accuracy. Location significantly affected biomass quality characteristics in all three cultivation years, but location-based differences decreased toward the third year as the plants reached maturity and the effect of location-dependent differences in the rate of establishment reduced. In all locations extensive variation in accession performance was observed for quality traits. The performance of the different accessions in the second and third cultivation year was strongly correlated, while accession performance in the first cultivation year did not correlate well with performance in later years. Significant genotype-by-environment (G × E) interactions were observed for most traits, revealing differences between accessions in environmental sensitivity. Stability analysis of accession performance for calculated ethanol yields suggested that selection for good and stable performance is a viable approach. Environmental influence on biomass quality is substantial and should be taken into account in order to match genotype, location and end-use of miscanthus as a lignocellulose feedstock. PMID:28111583

  11. Stability of Cell Wall Composition and Saccharification Efficiency in Miscanthus across Diverse Environments.

    PubMed

    van der Weijde, Tim; Dolstra, Oene; Visser, Richard G F; Trindade, Luisa M

    2016-01-01

    To investigate the potential effects of differences between growth locations on the cell wall composition and saccharification efficiency of the bioenergy crop miscanthus, a diverse set of 15 accessions were evaluated in six locations across Europe for the first 3 years following establishment. High-throughput quantification of cellulose, hemicellulose and lignin contents, as well as cellulose and hemicellulose conversion rates was achieved by combining near-infrared reflectance spectroscopy (NIRS) and biochemical analysis. Prediction models were developed and found to predict biomass quality characteristics with high accuracy. Location significantly affected biomass quality characteristics in all three cultivation years, but location-based differences decreased toward the third year as the plants reached maturity and the effect of location-dependent differences in the rate of establishment reduced. In all locations extensive variation in accession performance was observed for quality traits. The performance of the different accessions in the second and third cultivation year was strongly correlated, while accession performance in the first cultivation year did not correlate well with performance in later years. Significant genotype-by-environment (G × E) interactions were observed for most traits, revealing differences between accessions in environmental sensitivity. Stability analysis of accession performance for calculated ethanol yields suggested that selection for good and stable performance is a viable approach. Environmental influence on biomass quality is substantial and should be taken into account in order to match genotype, location and end-use of miscanthus as a lignocellulose feedstock.

  12. Control system for high power laser drilling workover and completion unit

    DOEpatents

    Zediker, Mark S; Makki, Siamak; Faircloth, Brian O; DeWitt, Ronald A; Allen, Erik C; Underwood, Lance D

    2015-05-12

    A control and monitoring system controls and monitors a high power laser system for performing high power laser operations. The control and monitoring system is configured to perform high power laser operation on, and in, remote and difficult to access locations.

  13. Mobile radio alternative systems study satellite/terrestrial (hybrid) systems concepts

    NASA Technical Reports Server (NTRS)

    Kiesling, J. D.; Anderson, R. E.

    1983-01-01

    The use of satellites for mobile radio service in non-urban areas of the United States in the years from 1985 to 2000 was investigated. Several satellite concepts are considered: a system with single-beam coverage of the fifty United States and Puerto Rico, and multi-beam satellites with greater capacity. All of the needed functions and services identified in the market study are provided by the satellite systems, including nationwide radio access to vehicles without knowledge of vehicle location wideband data transmission from remote sites, two way exchange of short data and control messages between vehicles and dispatch or control centers, and automatic vehicle location (surveillance). The costs of providing the services are within acceptable limits, and the desired returns to the system investors are attractive. The criteria by which the Federal Communication judges the competing demands for public radio spectrum are reviewed with comments on how the criteria might apply to the consideration of land mobile satellites. Institutional arrangements for operating a mobile satellite system are based on the present institutional arrangements in which the services are offered to the end users through wireline and radio common carriers, with direct access by large private and government users.

  14. Skull base tumors: a kaleidoscope of challenge.

    PubMed

    Khanna, J N; Natrajan, Srivalli; Galinde, Jyotsna

    2014-08-01

    Resection of skull base lesions has always been riddled with problems like inadequate access, proximity to major vessels, dural tears, cranial nerve damage, and infection. Understanding the modular concept of the facial skeleton has led to the development of transfacial swing osteotomies that facilitates resection in a difficult area with minimal morbidity and excellent cosmetic results. In spite of the current trend toward endonasal endoscopic management of skull base tumors, our series presents nine cases of diverse extensive skull base lesions, 33% of which were recurrent. These cases were approached through different transfacial swing osteotomies through the mandible, a midfacial swing, or a zygomaticotemporal osteotomy as dictated by the three-dimensional spatial location of the lesion, and its extent and proximity to vital structures. Access osteotomies ensured complete removal and good results through the most direct and safe route and good vascular control. This reiterated the fact that transfacial approaches still hold a special place in the management of extensive skull base lesions.

  15. Skull Base Tumors: A Kaleidoscope of Challenge

    PubMed Central

    Khanna, J.N.; Natrajan, Srivalli; Galinde, Jyotsna

    2014-01-01

    Resection of skull base lesions has always been riddled with problems like inadequate access, proximity to major vessels, dural tears, cranial nerve damage, and infection. Understanding the modular concept of the facial skeleton has led to the development of transfacial swing osteotomies that facilitates resection in a difficult area with minimal morbidity and excellent cosmetic results. In spite of the current trend toward endonasal endoscopic management of skull base tumors, our series presents nine cases of diverse extensive skull base lesions, 33% of which were recurrent. These cases were approached through different transfacial swing osteotomies through the mandible, a midfacial swing, or a zygomaticotemporal osteotomy as dictated by the three-dimensional spatial location of the lesion, and its extent and proximity to vital structures. Access osteotomies ensured complete removal and good results through the most direct and safe route and good vascular control. This reiterated the fact that transfacial approaches still hold a special place in the management of extensive skull base lesions. PMID:25083368

  16. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  17. Simulation and Modeling of a New Medium Access Control Scheme for Multi-Beam Directional Networking

    DTIC Science & Technology

    2017-03-03

    of these packets, it waits until the end of the transmit time and then responds with its own hello packet, containing its own location, as well as...own hello packet. Location Tracking Another important feature is location tracking. Due to node mobility, it is vital that each node tracks the

  18. 18 CFR 1304.209 - Land-based structures/alterations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... steps, pathways, boat launching ramps, marine railways located in the access corridor, bank... (electric, water-intake lines, etc.) may be placed within the access corridor as follows: (1) Power lines...

  19. 18 CFR 1304.209 - Land-based structures/alterations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... steps, pathways, boat launching ramps, marine railways located in the access corridor, bank... (electric, water-intake lines, etc.) may be placed within the access corridor as follows: (1) Power lines...

  20. Modeling livestock population structure: a geospatial database for Ontario swine farms.

    PubMed

    Khan, Salah Uddin; O'Sullivan, Terri L; Poljak, Zvonimir; Alsop, Janet; Greer, Amy L

    2018-01-30

    Infectious diseases in farmed animals have economic, social, and health consequences. Foreign animal diseases (FAD) of swine are of significant concern. Mathematical and simulation models are often used to simulate FAD outbreaks and best practices for control. However, simulation outcomes are sensitive to the population structure used. Within Canada, access to individual swine farm population data with which to parameterize models is a challenge because of privacy concerns. Our objective was to develop a methodology to model the farmed swine population in Ontario, Canada that could represent the existing population structure and improve the efficacy of simulation models. We developed a swine population model based on the factors such as facilities supporting farm infrastructure, land availability, zoning and local regulations, and natural geographic barriers that could affect swine farming in Ontario. Assigned farm locations were equal to the swine farm density described in the 2011 Canadian Census of Agriculture. Farms were then randomly assigned to farm types proportional to the existing swine herd types. We compared the swine population models with a known database of swine farm locations in Ontario and found that the modeled population was representative of farm locations with a high accuracy (AUC: 0.91, Standard deviation: 0.02) suggesting that our algorithm generated a reasonable approximation of farm locations in Ontario. In the absence of a readily accessible dataset providing details of the relative locations of swine farms in Ontario, development of a model livestock population that captures key characteristics of the true population structure while protecting privacy concerns is an important methodological advancement. This methodology will be useful for individuals interested in modeling the spread of pathogens between farms across a landscape and using these models to evaluate disease control strategies.

  1. Evaluation of the success rate of cone beam computed tomography in determining the location and direction of screw access holes in cement-retained implant-supported prostheses: An in vitro study.

    PubMed

    Neshandar Asli, Hamid; Dalili Kajan, Zahra; Gholizade, Fatemeh

    2018-02-21

    Cement-retained implant-supported restorations have advantages over screw-retained restorations but are difficult to retrieve. Identifying the approximate location of the screw access hole (SAH) may reduce damage to the prosthesis. The purpose of this in vitro study was to evaluate the ability of cone beam computed tomography (CBCT) imaging to determine the location and direction of SAHs in cement-retained implant prostheses. Five clear acrylic resin casts were made based on a mandibular model. Several implant osteotomies (n=30) were created on the models with surgical burs, and crowns were made using the standard laboratory method with a transfer coping and the closed tray impression technique. CBCT images from the acrylic resin casts were evaluated by a maxillofacial radiologist who was blind to the locations and angles of the osteotomies. The locations of the access holes were determined on multiplanar reconstruction images and transferred to the clinical crown surface as defined points. Based on cross-sectional images, the predicted angle of the access hole was provided to a prosthodontist who was requested to pierce the crown at the proposed location in the specified direction. If the location and/or direction of the access hole were found, the process was considered successful, as the crown could then be removed from the implant abutment through the SAH. The success rate in the detection of the location and direction of the SAH was calculated, and chi-square and Fisher exact tests were applied for data analysis (α=.05). According to the results of this study, the success rate of CBCT to define the location of SAHs was 83.3% and 80% to determine the direction. No significant differences were found among the different dental groups in determination of the location (P=.79) or the direction (P=.53) of the SAHs. Most of the failures in determining the location and direction of the access hole in the buccolingual and mesiodistal directions were in the buccal and mesial locations of the SAH. The success rate of using CBCT to determine the location of SAHs in straight abutments was 100%. A significant difference was found between angled and straight abutments (P=.042). Using CBCT could help determine the direction and location of SAHs in clinical situations. Copyright © 2017 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.

  2. Improving spatial prediction of Schistosoma haematobium prevalence in southern Ghana through new remote sensors and local water access profiles.

    PubMed

    Kulinkina, Alexandra V; Walz, Yvonne; Koch, Magaly; Biritwum, Nana-Kwadwo; Utzinger, Jürg; Naumova, Elena N

    2018-06-04

    Schistosomiasis is a water-related neglected tropical disease. In many endemic low- and middle-income countries, insufficient surveillance and reporting lead to poor characterization of the demographic and geographic distribution of schistosomiasis cases. Hence, modeling is relied upon to predict areas of high transmission and to inform control strategies. We hypothesized that utilizing remotely sensed (RS) environmental data in combination with water, sanitation, and hygiene (WASH) variables could improve on the current predictive modeling approaches. Schistosoma haematobium prevalence data, collected from 73 rural Ghanaian schools, were used in a random forest model to investigate the predictive capacity of 15 environmental variables derived from RS data (Landsat 8, Sentinel-2, and Global Digital Elevation Model) with fine spatial resolution (10-30 m). Five methods of variable extraction were tested to determine the spatial linkage between school-based prevalence and the environmental conditions of potential transmission sites, including applying the models to known human water contact locations. Lastly, measures of local water access and groundwater quality were incorporated into RS-based models to assess the relative importance of environmental and WASH variables. Predictive models based on environmental characterization of specific locations where people contact surface water bodies offered some improvement as compared to the traditional approach based on environmental characterization of locations where prevalence is measured. A water index (MNDWI) and topographic variables (elevation and slope) were important environmental risk factors, while overall, groundwater iron concentration predominated in the combined model that included WASH variables. The study helps to understand localized drivers of schistosomiasis transmission. Specifically, unsatisfactory water quality in boreholes perpetuates reliance of surface water bodies, indirectly increasing schistosomiasis risk and resulting in rapid reinfection (up to 40% prevalence six months following preventive chemotherapy). Considering WASH-related risk factors in schistosomiasis prediction can help shift the focus of control strategies from treating symptoms to reducing exposure.

  3. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  4. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  5. 29 CFR 1926.406 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... disconnecting means shall not be less than the supply conductor ampacity. (d) X-Ray equipment—(1) Disconnecting... means shall be operable from a location readily accessible from the X-ray control. For equipment... provide equivalent access. (4) Grounding. All exposed metal parts of cranes, monorail hoists, hoists and...

  6. 29 CFR 1926.406 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... disconnecting means shall not be less than the supply conductor ampacity. (d) X-Ray equipment—(1) Disconnecting... means shall be operable from a location readily accessible from the X-ray control. For equipment... provide equivalent access. (4) Grounding. All exposed metal parts of cranes, monorail hoists, hoists and...

  7. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  8. Variation in geographic access to chemotherapy by definitions of providers and service locations: a population-based observational study.

    PubMed

    Schroeder, Mary C; Chapman, Cole G; Nattinger, Matthew C; Halfdanarson, Thorvardur R; Abu-Hejleh, Taher; Tien, Yu-Yu; Brooks, John M

    2016-07-18

    An aging population, with its associated rise in cancer incidence and strain on the oncology workforce, will continue to motivate patients, healthcare providers and policy makers to better understand the existing and growing challenges of access to chemotherapy. Administrative data, and SEER-Medicare data in particular, have been used to assess patterns of healthcare utilization because of its rich information regarding patients, their treatments, and their providers. To create measures of geographic access to chemotherapy, patients and oncologists must first be identified. Others have noted that identifying chemotherapy providers from Medicare claims is not always straightforward, as providers may report multiple or incorrect specialties and/or practice in multiple locations. Although previous studies have found that specialty codes alone fail to identify all oncologists, none have assessed whether various methods of identifying chemotherapy providers and their locations affect estimates of geographic access to care. SEER-Medicare data was used to identify patients, physicians, and chemotherapy use in this population-based observational study. We compared two measures of geographic access to chemotherapy, local area density and distance to nearest provider, across two definitions of chemotherapy provider (identified by specialty codes or billing codes) and two definitions of chemotherapy service location (where chemotherapy services were proven to be or possibly available) using descriptive statistics. Access measures were mapped for three representative registries. In our sample, 57.2 % of physicians who submitted chemotherapy claims reported a specialty of hematology/oncology or medical oncology. These physicians were associated with 91.0 % of the chemotherapy claims. When providers were identified through billing codes instead of specialty codes, an additional 50.0 % of beneficiaries (from 23.8 % to 35.7 %) resided in the same ZIP code as a chemotherapy provider. Beneficiaries were also 1.3 times closer to a provider, in terms of driving time. Our access measures did not differ significantly across definitions of service location. Measures of geographic access to care were sensitive to definitions of chemotherapy providers; far more providers were identified through billing codes than specialty codes. They were not sensitive to definitions of service locations, as providers, regardless of how they are identified, generally provided chemotherapy at each of their practice locations.

  9. Determining accessibility to dermatologists and teledermatology locations in Kentucky: demonstration of an innovative geographic information systems approach.

    PubMed

    Shannon, Gary William; Buker, Carol Marie

    2010-01-01

    Teledermatology provides a partial solution to the problem of accessibility to dermatology services in underserved areas, yet methodologies to determine the locations and geographic dimensions of these areas and the locational efficiency of remote teledermatology sites have been found wanting. This article illustrates an innovative Geographic Information Systems approach using dermatologists' addresses, U.S. Census population data, and the Topologically Integrated Geographic Encoding and Referencing System. Travel-time-based service areas were calculated and mapped for each dermatologist in the state of Kentucky and for possible locations of several remote teledermatology sites. Populations within the current and possible remote service areas were determined. These populations and associated maps permit assessment of the locational efficiency of the current distribution of dermatologists, location of underserved areas, and the potential contribution of proposed hypothetical teledermatology sites. This approach is a valuable and practical tool for evaluating access to current distributions of dermatologists as well as planning for and implementing teledermatology.

  10. Analysis of Natural Allelic Variation of Arabidopsis Seed Germination and Seed Longevity Traits between the Accessions Landsberg erecta and Shakdara, Using a New Recombinant Inbred Line Population1

    PubMed Central

    Clerkx, Emile J.M.; El-Lithy, Mohamed E.; Vierling, Elizabeth; Ruys, Gerda J.; Vries, Hetty Blankestijn-De; Groot, Steven P.C.; Vreugdenhil, Dick; Koornneef, Maarten

    2004-01-01

    Quantitative trait loci (QTL) mapping was used to identify loci controlling various aspects of seed longevity during storage and germination. Similar locations for QTLs controlling different traits might be an indication for a common genetic control of such traits. For this analysis we used a new recombinant inbred line population derived from a cross between the accessions Landsberg erecta (Ler) and Shakdara (Sha). A set of 114 F9 recombinant inbred lines was genotyped with 65 polymerase chain reaction-based markers and the phenotypic marker erecta. The traits analyzed were dormancy, speed of germination, seed sugar content, seed germination after a controlled deterioration test, hydrogen peroxide (H2O2) treatment, and on abscisic acid. Furthermore, the effects of heat stress, salt (NaCl) stress, osmotic (mannitol) stress, and natural aging were analyzed. For all traits one or more QTLs were identified, with some QTLs for different traits colocating. The relevance of colocation for mechanisms underlying the various traits is discussed. PMID:15122038

  11. Non-Intrusive Impedance-Based Cable Tester

    NASA Technical Reports Server (NTRS)

    Medelius, Pedro J. (Inventor); Simpson, Howard J. (Inventor)

    1999-01-01

    A non-intrusive electrical cable tester determines the nature and location of a discontinuity in a cable through application of an oscillating signal to one end of the cable. The frequency of the oscillating signal is varied in increments until a minimum, close to zero voltage is measured at a signal injection point which is indicative of a minimum impedance at that point. The frequency of the test signal at which the minimum impedance occurs is then employed to determine the distance to the discontinuity by employing a formula which relates this distance to the signal frequency and the velocity factor of the cable. A numerically controlled oscillator is provided to generate the oscillating signal, and a microcontroller automatically controls operation of the cable tester to make the desired measurements and display the results. The device is contained in a portable housing which may be hand held to facilitate convenient use of the device in difficult to access locations.

  12. Secure Location Provenance for Mobile Devices

    DTIC Science & Technology

    2015-07-01

    SECURE LOCATION PROVENANCE FOR MOBILE DEVICES UNIVERSITY OF ALABAMA AT BIRMINGHAM JULY 2015 FINAL TECHNICAL REPORT...PROVENANCE FOR MOBILE DEVICES 5a. CONTRACT NUMBER FA8750-12-2-0254 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 69220K 6. AUTHOR(S) Ragib Hasan...based services allow mobile device users to access various services based on the users’ current physical location information. Path-critical applications

  13. Restricted Authentication and Encryption for Cyber-physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kirkpatrick, Michael S; Bertino, Elisa; Sheldon, Frederick T

    2009-01-01

    Cyber-physical systems (CPS) are characterized by the close linkage of computational resources and physical devices. These systems can be deployed in a number of critical infrastructure settings. As a result, the security requirements of CPS are different than traditional computing architectures. For example, critical functions must be identified and isolated from interference by other functions. Similarly, lightweight schemes may be required, as CPS can include devices with limited computing power. One approach that offers promise for CPS security is the use of lightweight, hardware-based authentication. Specifically, we consider the use of Physically Unclonable Functions (PUFs) to bind an access requestmore » to specific hardware with device-specific keys. PUFs are implemented in hardware, such as SRAM, and can be used to uniquely identify the device. This technology could be used in CPS to ensure location-based access control and encryption, both of which would be desirable for CPS implementations.« less

  14. Slooh Takes Observing into the Classroom

    NASA Astrophysics Data System (ADS)

    Godfrey, Paige

    2018-01-01

    For many students, studying space is limited to simulations and a vivid imagination. Slooh is providing a new education tool that gives students an authentic experience, mimicking the practices of professional astronomers by bringing real-time astronomical observing to the classroom. Teachers and students have robotic control of Slooh’s global network of ground-based telescopes located at the Institute of Astrophysics in the Canary Islands and at the Catholic University based in Santiago, Chile. Slooh Classroom and Slooh Astrolab are products designed to offer K-12 and higher education an accessible, affordable way to interact with space. The lab manuals provide fully-designed classroom activities that explore celestial objects representing a robust sample of star clusters, nebulae, galaxies, stars, planets, comets and asteroids. Slooh’s education tools provide a unique online platform for the sharing of space content and access to live-hosted shows that discuss current astronomy events, creating a full STEAM experience.

  15. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model. PMID:25485311

  16. The neighbourhood effects of geographical access to tobacco retailers on individual smoking behaviour.

    PubMed

    Pearce, J; Hiscock, R; Moon, G; Barnett, R

    2009-01-01

    To investigate whether neighbourhood measures of geographical accessibility to outlets selling tobacco (supermarkets, convenience stores and petrol stations) are associated with individual smoking behaviour in New Zealand. Using geographical information systems, travel times from the population-weighted centroid of each neighbourhood to the closest outlet selling tobacco were calculated for all 38,350 neighbourhoods across New Zealand. These measures were appended to the 2002/03 New Zealand Health Survey, a national survey of 12, 529 adults. Two-level logistic regression models were fitted to examine the effects of neighbourhood locational access upon individual smoking behaviour after controlling for potential individual- and neighbourhood-level confounding factors, including deprivation and urban/rural status. After controlling for individual-level demographic and socioeconomic variables, individuals living in the quartiles of neighbourhoods with the best access to supermarkets (OR 1.23, 95% CI 1.06 to 1.42) and convenience stores (OR 1.19, 95% CI 1.03 to 1.38) had a higher odds of smoking compared with individuals in the worst access quartiles. However, the association between neighbourhood accessibility to supermarkets and convenience stores was not apparent once other neighbourhood-level variables (deprivation and rurality) were included. At the national level, there is little evidence to suggest that, after adjustment for neighbourhood deprivation, better locational access to tobacco retail provision in New Zealand is associated with individual-level smoking behaviour.

  17. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  18. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  19. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  20. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  1. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  2. Visits to Registered Nurses

    PubMed Central

    Parker, Emese C.; Kong, Kevin; Watts, Leslie A.; Schwarz, Eleanor B.; Darney, Philip D.; Thiel de Bocanegra, Heike

    2017-01-01

    Background In 2013, California passed Assembly Bill (A.B.) 2348, approving registered nurses (RNs) to dispense patient self-administered hormonal contraceptives and administer injections of hormonal contraceptives. The Family Planning, Access, Care and Treatment (Family PACT) program, which came into effect in 1997 to expand low-income, uninsured California resident access to contraceptives at no cost, is one program in which qualified RNs can dispense and administer contraceptives. Aims The aims of this study were to (a) describe utilization of RN visits within California's Family PACT program and (b) evaluate the impact of RN visits on client birth control acquisition during the first 18 months after implementation of A.B. 2348 (January 1, 2013 to June 30, 2014). Methods A descriptive observational design using administrative databases was used. Family PACT claims were retrieved for RN visits and contraception. Paid claims for contraceptive dispensing and/or administration visits by physicians, nurse practitioners, certified nurse midwives, and physician assistants were compared before and after the implementation of A.B. 2348 at practice sites where RN visits were and were not utilized. Contraceptive methods and administration procedures were identified using Healthcare Common Procedure Coding System codes, National Drug Codes, and Common Procedural Terminology codes. Claims data for healthcare facilities were abstracted by site location based on a unique combination of National Provider Identifier (NPI), NPI Owner, and NPI location number. Results RN visits were found mainly in Northern California and the Central Valley (73%). Sixty-eight percent of RN visits resulted in same-day dispensing and/or administration of hormonal (and/or barrier) methods. Since benefit implementation, RN visits resulted in a 10% increase in access to birth control dispensing and/or administration visits. RN visits were also associated with future birth control acquisition and other healthcare utilization within the subsequent 30 days. Discussion RN visits, though underutilized across the state, have resulted in increased access to contraception in some communities, an effect that may continue to grow with time and can serve as a model for other states. PMID:28604507

  3. Modeling spatial accessibility of immigrants to culturally diverse family physicians.

    PubMed

    Wanga, Lu; Roisman, Deborah

    2011-01-01

    This article uses accessibility as an analytical tool to examine health care access among immigrants in a multicultural urban setting. It applies and improves on two widely used accessibility models—the gravity model and the two-step floating catchment area model—in measuring spatial accessibility by Mainland Chinese immigrants in the Toronto Census Metropolitan Area. Empirical data on physician-seeking behaviors are collected through two rounds of questionnaire surveys. Attention is focused on journey to physician location and utilization of linguistically matched family physicians. Based on the survey data, a two-zone accessibility model is developed by relaxing the travel threshold and distance impedance parameters that are traditionally treated as a constant in the accessibility models. General linear models are used to identify relationships among spatial accessibility, geography, and socioeconomic characteristics of Mainland Chinese immigrants. The results suggest a spatial mismatch in the supply of and demand for culturally sensitive care, and residential location is the primary factor that determines spatial accessibility to family physicians. The article yields important policy implications.

  4. Summary of Meteorological Observations, Surface (SMOS), Glenview, Illinois.

    DTIC Science & Technology

    1984-08-01

    READ INSTRUCTIONS REPORT DOCUMENTATION PAGE BEFORE COMPLETING FORM 1 . REPORT NUMBER 2. GOVT ACCESSION NO. 3. RECIPIENT’S CATALOG NUMBER 4. TITLE (end...CEOCNAPHICAL LOCATION I NANE OF LATITUDE LMCITUSE PEI L OCATIO STATION irkN To STATION IFT) TM NAROITEM SAT 1 . 4eather service office located in Navy 1948...LOCATION CHANCE LOCATION TANSOFT T YPE or5K NU ABOVE______________________ 1 . 1948 Roof of control tower atop Selsyn Triple 77.8’ 1 .Barograph (ML-3

  5. 76 FR 30211 - Product List Transfer

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-24

    ... boxes. Id. at 2 n.5. The Postal Service selected the 6,800 locations based on whether its customers have sufficient access to private mailbox service providers. Id. at 2. In general, these locations serve customers... Service request to transfer Post Office Box Service at 6800 locations from the market dominant product...

  6. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  7. Socio-economic and locational determinants of accessibility and utilization of primary health-care.

    PubMed

    Field, K S; Briggs, D J

    2001-09-01

    Differences in levels of utilization vary and are a function of socio-economic and geographical factors. This paper presents the results of a questionnaire study involving twelve GP practices in Northamptonshire, UK, of factors which affect access and utilization in asthmatics and diabetics; these groups were selected to control for differences in utilization behaviour, as a result of different aetiologies. The questionnaire sought data on: residential location of patients, utilization characteristics of primary health-care, personal circumstances and mobility and hindrances to access and utilization. Key themes were identified relating to age, gender, social class, employment, ethnicity and proximity to the GP surgery. The young, elderly and females report higher rates of utilization, as do nonmanual workers and those who are unemployed. However, accessibility and utilization vary greatly in response to mobility and locational characteristics; these variations tend to be masked by data on overall rates of usage. Optimal scaling techniques were used to investigate the interactions between the factors affecting accessibility and utilization, and to characterize patients in terms of their levels of utilization. Results confirmed that current service provision afforded a differential level of service to patients, which does not directly reflect their level of need.

  8. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  9. Model-Based Control of Observer Bias for the Analysis of Presence-Only Data in Ecology

    PubMed Central

    Warton, David I.; Renner, Ian W.; Ramp, Daniel

    2013-01-01

    Presence-only data, where information is available concerning species presence but not species absence, are subject to bias due to observers being more likely to visit and record sightings at some locations than others (hereafter “observer bias”). In this paper, we describe and evaluate a model-based approach to accounting for observer bias directly – by modelling presence locations as a function of known observer bias variables (such as accessibility variables) in addition to environmental variables, then conditioning on a common level of bias to make predictions of species occurrence free of such observer bias. We implement this idea using point process models with a LASSO penalty, a new presence-only method related to maximum entropy modelling, that implicitly addresses the “pseudo-absence problem” of where to locate pseudo-absences (and how many). The proposed method of bias-correction is evaluated using systematically collected presence/absence data for 62 plant species endemic to the Blue Mountains near Sydney, Australia. It is shown that modelling and controlling for observer bias significantly improves the accuracy of predictions made using presence-only data, and usually improves predictions as compared to pseudo-absence or “inventory” methods of bias correction based on absences from non-target species. Future research will consider the potential for improving the proposed bias-correction approach by estimating the observer bias simultaneously across multiple species. PMID:24260167

  10. Interactive Inventory Monitoring

    NASA Technical Reports Server (NTRS)

    Garud, Sumedha

    2013-01-01

    Method and system for monitoring present location and/or present status of a target inventory item, where the inventory items are located on one or more inventory shelves or other inventory receptacles that communicate with an inventory base station through use of responders such as RFIDs. A user operates a hand held interrogation and display (lAD) module that communicates with, or is part of the base station to provide an initial inquiry. lnformation on location(s) of the larget invenlory item is also indicated visibly and/or audibly on the receptacle(s) for the user. Status information includes an assessment of operation readiness and a time, if known, that the specified inventory item or class was last removed or examined or modified. Presentation of a user access level may be required for access to the target inventgory item. Another embodiment provides inventory informatin for a stack as a sight-impaired or hearing-impaired person adjacent to that stack.

  11. Interactive inventory monitoring

    NASA Technical Reports Server (NTRS)

    Spremo, Stevan M. (Inventor); Udoh, Usen E. (Inventor)

    2009-01-01

    Method and system for monitoring present location and/or present status of a target inventory item, where the inventory items are located on one or more inventory shelves or other inventory receptacles that communicate with an inventory base station through use of responders such as RFIDs. A user operates a hand held interrogation and display (IAD) module that communicates with, or is part of, the base station, to provide an initial inquiry. Information on location(s) of the target inventory item is also indicated visibly and/or audibly on the receptacle(s) for the user. Status information includes an assessment of operation readiness and a time, if known, that the specified inventory item or class was last removed or examined or modified. Presentation of a user access level may be required for access to the target inventory item. Another embodiment provides inventory information for a stack as a sight-impaired or hearing-impaired person passes adjacent to that stack.

  12. 1. NORTHWEST FRONT AND SOUTHWEST SIDE, SHOWING LOCATION OF BUILDING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. NORTHWEST FRONT AND SOUTHWEST SIDE, SHOWING LOCATION OF BUILDING 0520 WEST OF FIRING CONTOL BLOCK HOUSE (BLDG. 0545), BETWEEN SLED TRACK AND CAMERA ACCESS ROAD. - Edwards Air Force Base, South Base Sled Track, Observation Block House, Station "O" area, east end of Sled Track, Lancaster, Los Angeles County, CA

  13. Location Based Services for Outdoor Ecological Learning System: Design and Implementation

    ERIC Educational Resources Information Center

    Hsiao, Hsien-Sheng; Lin, Chih-Cheng; Feng, Ruei-Ting; Li, Kun Jing

    2010-01-01

    This paper aimed to demonstrate how location-based services were implemented in ubiquitous outdoor ecological learning system. In an elementary school in northern Taiwan, two fifth grade classes on an ecology project were randomly selected: The experimental group could access the ecological learning system on hand-held devices while the control…

  14. Semantically Enriched Data Access Policies in eHealth.

    PubMed

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  15. Tele-autonomous control involving contacts: The applications of a high precision laser line range sensor

    NASA Technical Reports Server (NTRS)

    Volz, R. A.; Shao, L.; Walker, M. W.; Conway, L. A.

    1989-01-01

    The object localization algorithm based on line-segment matching is presented. The method is very simple and computationally fast. In most cases, closed-form formulas are used to derive the solution. The method is also quite flexible, because only few surfaces (one or two) need to be accessed (sensed) to gather necessary range data. For example, if the line-segments are extracted from boundaries of a planar surface, only parameters of one surface and two of its boundaries need to be extracted, as compared with traditional point-surface matching or line-surface matching algorithms which need to access at least three surfaces in order to locate a planar object. Therefore, this method is especially suitable for applications when an object is surrounded by many other work pieces and most of the object is very difficult, is not impossible, to be measured; or when not all parts of the object can be reached. The theoretical ground on how to use line range sensor to located an object was laid. Much work has to be done in order to be really useful.

  16. Optimal location of radiation therapy centers with respect to geographic access.

    PubMed

    Santibáñez, Pablo; Gaudet, Marc; French, John; Liu, Emma; Tyldesley, Scott

    2014-07-15

    To develop a framework with which to evaluate locations of radiation therapy (RT) centers in a region based on geographic access. Patient records were obtained for all external beam radiation therapy started in 2011 for the province of British Columbia, Canada. Two metrics of geographic access were defined. The primary analysis was percentage of patients (coverage) within a 90-minute drive from an RT center (C90), and the secondary analysis was the average drive time (ADT) to an RT center. An integer programming model was developed to determine optimal center locations, catchment areas, and capacity required under different scenarios. Records consisted of 11,096 courses of radiation corresponding to 161,616 fractions. Baseline geographic access was estimated at 102.5 minutes ADT (each way, per fraction) and 75.9% C90. Adding 2 and 3 new centers increased C90 to 88% and 92%, respectively, and decreased ADT by between 43% and 61%, respectively. A scenario in which RT was provided in every potential location that could support at least 1 fully utilized linear accelerator resulted in 35.3 minutes' ADT and 93.6% C90. The proposed framework and model provide a data-driven means to quantitatively evaluate alternative configurations of a regional RT system. Results suggest that the choice of location for future centers can significantly improve geographic access to RT. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.

  17. Can your software engineer program your PLC?

    NASA Astrophysics Data System (ADS)

    Borrowman, Alastair J.; Taylor, Philip

    2016-07-01

    The use of Programmable Logic Controllers (PLCs) in the control of large physics experiments is ubiquitous1, 2, 3. The programming of these controllers is normally the domain of engineers with a background in electronics, this paper introduces PLC program development from the software engineer's perspective. PLC programs provide the link between control software running on PC architecture systems and physical hardware controlled and monitored by digital and analog signals. The higher-level software running on the PC is typically responsible for accepting operator input and from this deciding when and how hardware connected to the PLC is controlled. The PLC accepts demands from the PC, considers the current state of its connected hardware and if correct to do so (based upon interlocks or other constraints) adjusts its hardware output signals appropriately for the PC's demands. A published ICD (Interface Control Document) defines the PLC memory locations available to be written and read by the PC to control and monitor the hardware. Historically the method of programming PLCs has been ladder diagrams that closely resemble circuit diagrams, however, PLC manufacturers nowadays also provide, and promote, the use of higher-level programming languages4. Based on techniques used in the development of high-level PC software to control PLCs for multiple telescopes, this paper examines the development of PLC programs to operate the hardware of a medical cyclotron beamline controlled from a PC using the Experimental Physics and Industrial Control System (EPICS), which is also widely used in telescope control5, 6, 7. The PLC used is the new generation Siemens S7-1200 programmed using Siemens Pascal based Structured Control Language (SCL), which is their implementation of Structured Text (ST). The approach described is that from a software engineer's perspective, utilising Siemens Totally Integrated Automation (TIA) Portal integrated development environment (IDE) to create modular PLC programs based upon reusable functions capable of being unit tested without the PLC connected to hardware. Emphasis has been placed on designing an interface between EPICS and SCL that enforces correct operation of hardware through stringent separation of PC accessible PLC memory and hardware I/O addresses used only by the PLC. The paper also introduces the method used to automate the creation, from the same source document, the PLC memory structure (tag) definitions (defining memory used to access hardware I/O and that accessed by the PC) and creation of the PC program data structures (EPICS database records) used to access the permitted PLC addresses. From direct experience this paper demonstrates the advantages of PLC program development being shared between electronic and software engineers, to enable use of the most appropriate processes from both the perspective of the hardware and the higher-level software used to control it.

  18. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  19. Subliminal access to abstract face representations does not rely on attention.

    PubMed

    Harry, Bronson; Davis, Chris; Kim, Jeesun

    2012-03-01

    The present study used masked repetition priming to examine whether face representations can be accessed without attention. Two experiments using a face recognition task (fame judgement) presented masked repetition and control primes in spatially unattended locations prior to target onset. Experiment 1 (n=20) used the same images as primes and as targets and Experiment 2 (n=17) used different images of the same individual as primes and targets. Repetition priming was observed across both experiments regardless of whether spatial attention was cued to the location of the prime. Priming occurred for both famous and non-famous targets in Experiment 1 but was only reliable for famous targets in Experiment 2, suggesting that priming in Experiment 1 indexed access to view-specific representations whereas priming in Experiment 2 indexed access to view-invariant, abstract representations. Overall, the results indicate that subliminal access to abstract face representations does not rely on attention. Copyright © 2011 Elsevier Inc. All rights reserved.

  20. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  1. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  2. Simulation and Modeling of a Novel Medium Access Control Scheme for Multi-Beam Directional Networking

    DTIC Science & Technology

    2017-03-03

    When a neighbor receives one of these packets, it waits until the end of the transmit time and then responds with its own hello packet, containing its...and 3 respond with their own hello packet. Location Tracking Another important feature is location tracking. Due to node mobility, it is vital that

  3. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  4. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  5. Internet Protocol Geolocation: Development of a Delay-Based Hybrid Methodology for Locating the Geographic Location of a Network Node

    DTIC Science & Technology

    2007-03-01

    provides a means for anyone who has access to an Internet connection to collect or disseminate information on a global scale at a very low cost. The......AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED

  6. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  7. Optical design and Initial Results from The National Institute of Standards and Technology’s AMMT/TEMPS Facility

    PubMed Central

    Grantham, Steven; Lane, Brandon; Neira, Jorge; Mekhontsev, Sergey; Vlasea, Mihaela; Hanssen, Leonard

    2017-01-01

    The National Institute of Standards and Technology’s (NIST) Physical Measurement and Engineering Laboratories are jointly developing the Additive Manufacturing Measurement Testbed (AMMT)/ Temperature and Emittance of Melts, Powders and Solids (TEMPS) facilities. These facilities will be co-located on an open architecture laser-based powder bed fusion system allowing users full access to the system’s operation parameters. This will provide users with access to machine-independent monitoring and control of the powder bed fusion process. In this paper there will be emphasis on the AMMT, which incorporates in-line visible light collection optics for monitoring and feedback control of the powder bed fusion process. We shall present an overview of the AMMT/TEMPS program and its goals. The optical and mechanical design of the open architecture powder-bed fusion system and the AMMT will also be described. In addition, preliminary measurement results from the system along with the current status of the system will be described. PMID:28579666

  8. Ecology in the information age: Patterns of use and attrition rates of internet-based citations in ESA journals, 1997–2005

    USGS Publications Warehouse

    Duda, Jeffrey J.; Camp, Richard J.

    2008-01-01

    As the amount of information available on the internet has increased, so too has the number of citations to network-accessible information in scholarly research. We searched all papers in four Ecological Society of America journals from 1997 to 2005 for articles containing a citation to material on the internet. We then tested the links to determine whether the information cited in the paper was still accessible. We identified 877 articles that contained at least one link to information on the internet and a total of 2100 unique links. The majority of these citations were based on an object's location (Uniform Resource Locator; 77%), whereas the rest were based on an object's identity (eg Digital Object Identifier, GenBank Accession number). We found that 19–30% of the location-based links were unavailable and that there was a positive relationship between the age of an article and the probability of the link being inactive. Using an internet search engine, we recovered 72–84% of the lost information, leaving a total of 6.2% of the total citations unavailable. Our results highlight the problem of persistence of information stored on the world wide web and we include recommendations for minimizing this problem.

  9. Variation in cooking and eating quality traits in Japanese rice germplasm accessions

    PubMed Central

    Hori, Kiyosumi; Suzuki, Keitaro; Iijima, Ken; Ebana, Kaworu

    2016-01-01

    The eating quality of cooked rice is important and determines its market price and consumer acceptance. To comprehensively describe the variation of eating quality in 183 rice germplasm accessions, we evaluated 33 eating-quality traits including amylose and protein contents, pasting properties of rice flour, and texture of cooked rice grains. All eating-quality traits varied widely in the germplasm accessions. Principal-components analysis (PCA) revealed that allelic differences in the Wx gene explained the largest proportion of phenotypic variation of the eating-quality traits. In 146 accessions of non-glutinous temperate japonica rice, PCA revealed that protein content and surface texture of the cooked rice grains significantly explained phenotypic variations of the eating-quality traits. An allelic difference based on simple sequence repeats, which was located near a quantitative trait locus (QTL) on the short arm of chromosome 3, was associated with differences in the eating quality of non-glutinous temperate japonica rice. These results suggest that eating quality is controlled by genetic factors, including the Wx gene and the QTL on chromosome 3, in Japanese rice accessions. These genetic factors have been consciously selected for eating quality during rice breeding programs in Japan. PMID:27162502

  10. Variation in cooking and eating quality traits in Japanese rice germplasm accessions.

    PubMed

    Hori, Kiyosumi; Suzuki, Keitaro; Iijima, Ken; Ebana, Kaworu

    2016-03-01

    The eating quality of cooked rice is important and determines its market price and consumer acceptance. To comprehensively describe the variation of eating quality in 183 rice germplasm accessions, we evaluated 33 eating-quality traits including amylose and protein contents, pasting properties of rice flour, and texture of cooked rice grains. All eating-quality traits varied widely in the germplasm accessions. Principal-components analysis (PCA) revealed that allelic differences in the Wx gene explained the largest proportion of phenotypic variation of the eating-quality traits. In 146 accessions of non-glutinous temperate japonica rice, PCA revealed that protein content and surface texture of the cooked rice grains significantly explained phenotypic variations of the eating-quality traits. An allelic difference based on simple sequence repeats, which was located near a quantitative trait locus (QTL) on the short arm of chromosome 3, was associated with differences in the eating quality of non-glutinous temperate japonica rice. These results suggest that eating quality is controlled by genetic factors, including the Wx gene and the QTL on chromosome 3, in Japanese rice accessions. These genetic factors have been consciously selected for eating quality during rice breeding programs in Japan.

  11. Supporting tobacco control: stimulating local newspaper coverage with a technical assistance website for local coalitions.

    PubMed

    Buller, David B; Bettinghaus, Erwin P; Helme, Donald; Young, Walter F; Borland, Ron; Maloy, Julie A; Cutter, Gary R; Andersen, Peter A; Walther, Joseph B

    2011-11-01

    A large and growing literature confirms that well-designed web-based programs can be effective in preventing or treating several chronic diseases. This study examined how the Internet can deliver information and train community activists and specifically tested the effects of web-based technical assistance on local tobacco control coalitions' efforts to use media advocacy to advance their agendas. The authors compared a highly interactive, Enhanced website (intervention) to a noninteractive, Basic text-based website (comparison) in Colorado communities. A total of 24 tobacco control coalitions led by local county health departments and nursing services were enrolled in the project and randomly assigned to use either the intervention or comparison website. A total of 73 local daily and weekly newspapers were identified in the service areas of 23 of the 24 coalitions. A posttest assessment of newspaper coverage was conducted to locate all newspaper articles with tobacco control information published between January 1 and April 9, 2004, the last 3 months of the intervention. Although there was no evidence of a treatment effect on the frequency of newspaper articles on tobacco-related issues, there was, however, evidence that newspapers in counties where the coalition had access to the Enhanced website printed more stories focused on local/regional issues and more anti-tobacco local/regional stories than in the counties where coalitions had access to the Basic website. Coalitions can improve their influence on local media for community tobacco control when high-quality online technical assistance, training, and resources are available to them.

  12. Personnel occupied woven envelope robot

    NASA Technical Reports Server (NTRS)

    Wessling, Francis; Teoh, William; Ziemke, M. Carl

    1988-01-01

    The Personnel Occupied Woven Envelope Robot (POWER) provides an alternative to extravehicular activity (EVA) of space suited astronauts and/or use of long slender manipulator arms such as are used in the Shuttle Remote Manipulator System. POWER provides the capability for a shirt sleeved astronaut to perform such work by entering a control pod through air locks at both ends of an inflated flexible bellows (access tunnel). The exoskeleton of the tunnel is a series of six degrees of freedom (Six-DOF) articulated links compressible to 1/6 of their fully extended length. The operator can maneuver the control pod to almost any location within about 50 m of the base attachment to the space station. POWER can be envisioned as a series of hollow Six-DOF manipulator segments or arms wherein each arm grasps the shoulder of the next arm. Inside the hollow arms ia a bellow-type access tunnel. The control pod is the fist of the series of linked hollow arms. The fingers of the fist are conventional manipulator arms under direct visual control of the nearby operator in the pod. The applications and progress to date of the POWER system is given.

  13. Earth Science Keyword Stewardship: Access and Management through NASA's Global Change Master Directory (GCMD) Keyword Management System (KMS)

    NASA Astrophysics Data System (ADS)

    Stevens, T.; Olsen, L. M.; Ritz, S.; Morahan, M.; Aleman, A.; Cepero, L.; Gokey, C.; Holland, M.; Cordova, R.; Areu, S.; Cherry, T.; Tran-Ho, H.

    2012-12-01

    Discovering Earth science data can be complex if the catalog holding the data lacks structure. Controlled keyword vocabularies within metadata catalogues can improve data discovery. NASA's Global Change Master Directory's (GCMD) Keyword Management System (KMS) is a recently released a RESTful web service for managing and providing access to controlled keywords (science keywords, service keywords, platforms, instruments, providers, locations, projects, data resolution, etc.). The KMS introduces a completely new paradigm for the use and management of the keywords and allows access to these keywords as SKOS Concepts (RDF), OWL, standard XML, and CSV. A universally unique identifier (UUID) is automatically assigned to each keyword, which uniquely identifies each concept and its associated information. A component of the KMS is the keyword manager, an internal tool that allows GCMD science coordinators to manage concepts. This includes adding, modifying, and deleting broader, narrower, or related concepts and associated definitions. The controlled keyword vocabulary represents over 20 years of effort and collaboration with the Earth science community. The maintenance, stability, and ongoing vigilance in maintaining mutually exclusive and parallel keyword lists is important for a "normalized" search and discovery, and provides a unique advantage for the science community. Modifications and additions are made based on community suggestions and internal review. To help maintain keyword integrity, science keyword rules and procedures for modification of keywords were developed. This poster will highlight the use of the KMS as a beneficial service for the stewardship and access of the GCMD keywords. Users will learn how to access the KMS and utilize the keywords. Best practices for managing an extensive keyword hierarchy will also be discussed. Participants will learn the process for making keyword suggestions, which subsequently help in building a controlled keyword vocabulary to improve earth science data discovery and access.

  14. Neighbourhood walkability and home neighbourhood-based physical activity: an observational study of adults with type 2 diabetes.

    PubMed

    Hajna, Samantha; Kestens, Yan; Daskalopoulou, Stella S; Joseph, Lawrence; Thierry, Benoit; Sherman, Mark; Trudeau, Luc; Rabasa-Lhoret, Rémi; Meissner, Leslie; Bacon, Simon L; Gauvin, Lise; Ross, Nancy A; Dasgupta, Kaberi

    2016-09-09

    Converging international evidence suggests that diabetes incidence is lower among adults living in more walkable neighbourhoods. The association between walkability and physical activity (PA), the presumed mediator of this relationship, has not been carefully examined in adults with type 2 diabetes. We investigated the associations of walkability with total PA occurring within home neighbourhoods and overall PA, irrespective of location. Participants (n = 97; 59.5 ± 10.5 years) were recruited through clinics in Montreal (QC, Canada) and wore a GPS-accelerometer device for 7 days. Total PA was expressed as the total Vector of the Dynamic Body Acceleration. PA location was determined using a Global Positioning System (GPS) device (SIRF IV chip). Walkability (street connectivity, land use mix, population density) was assessed using Geographical Information Systems software. The cross-sectional associations between walkability and location-based PA were estimated using robust linear regressions adjusted for age, body mass index, sex, university education, season, car access, residential self-selection, and wear-time. A one standard deviation (SD) increment in walkability was associated with 10.4 % of a SD increment in neighbourhood-based PA (95 % confidence interval (CI) 1.2, 19.7) - equivalent to 165 more steps/day (95 % 19, 312). Car access emerged as an important predictor of neighbourhood-based PA (Not having car access: 38.6 % of a SD increment in neighbourhood-based PA, 95 % CI 17.9, 59.3). Neither walkability nor car access were conclusively associated with overall PA. Higher neighbourhood walkability is associated with higher home neighbourhood-based PA but not with higher overall PA. Other factors will need to be leveraged to facilitate meaningful increases in overall PA among adults with type 2 diabetes.

  15. The development concept of Taman Aloon-Aloon Tulungagung based on visual accessibility, diversity of activities and perception of users

    NASA Astrophysics Data System (ADS)

    Sasongko, W.; Kurniasanti, R. P.; Siregar, J. P.

    2017-06-01

    Tulungagung has a public space that actively used by the community named Taman Aloon-aloon Tulungagung. The importance of research on the Development Concept of Taman Aloon-aloon Tulungagung as open public space is requiring location structuring for appeal aspects of public space in order to spread evenly and can be enjoyed by users of public space. Therefore, this study aimed to assess users’ perceptions of the attractiveness of public space by Importance Performance Analysis (IPA) method and assess the level of users’ visual accessibility by Visibility Graph Analysis (VGA) method and assess the diversity of users’ activity by Behavior Mapping method. As this study shows that the condition of the floor surface, the location of a bird cage, shade conditions of public space and location of lighting lamp become the top priority in the development concept of Taman Aloon-aloon Tulungagung. The location for the prioritized attributes are adjusted to the results of the visual accessibility level evaluation matrix and activities diversity.

  16. Soil erosion model predictions using parent material/soil texture-based parameters compared to using site-specific parameters

    Treesearch

    R. B. Foltz; W. J. Elliot; N. S. Wagenbrenner

    2011-01-01

    Forested areas disturbed by access roads produce large amounts of sediment. One method to predict erosion and, hence, manage forest roads is the use of physically based soil erosion models. A perceived advantage of a physically based model is that it can be parameterized at one location and applied at another location with similar soil texture or geological parent...

  17. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases.

    PubMed

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F L; Utzinger, Jürg; Kristensen, Thomas K; Vounatsou, Penelope

    2011-12-01

    After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature'), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay.

  18. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  19. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  20. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  1. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  2. Optimal Location of Radiation Therapy Centers With Respect to Geographic Access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Santibáñez, Pablo; Gaudet, Marc; French, John

    2014-07-15

    Purpose: To develop a framework with which to evaluate locations of radiation therapy (RT) centers in a region based on geographic access. Methods and Materials: Patient records were obtained for all external beam radiation therapy started in 2011 for the province of British Columbia, Canada. Two metrics of geographic access were defined. The primary analysis was percentage of patients (coverage) within a 90-minute drive from an RT center (C90), and the secondary analysis was the average drive time (ADT) to an RT center. An integer programming model was developed to determine optimal center locations, catchment areas, and capacity required undermore » different scenarios. Results: Records consisted of 11,096 courses of radiation corresponding to 161,616 fractions. Baseline geographic access was estimated at 102.5 minutes ADT (each way, per fraction) and 75.9% C90. Adding 2 and 3 new centers increased C90 to 88% and 92%, respectively, and decreased ADT by between 43% and 61%, respectively. A scenario in which RT was provided in every potential location that could support at least 1 fully utilized linear accelerator resulted in 35.3 minutes' ADT and 93.6% C90. Conclusions: The proposed framework and model provide a data-driven means to quantitatively evaluate alternative configurations of a regional RT system. Results suggest that the choice of location for future centers can significantly improve geographic access to RT.« less

  3. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    PubMed Central

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  4. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  5. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  6. Two-Step Optimization for Spatial Accessibility Improvement: A Case Study of Health Care Planning in Rural China

    PubMed Central

    Luo, Jing; Tian, Lingling; Luo, Lei; Yi, Hong

    2017-01-01

    A recent advancement in location-allocation modeling formulates a two-step approach to a new problem of minimizing disparity of spatial accessibility. Our field work in a health care planning project in a rural county in China indicated that residents valued distance or travel time from the nearest hospital foremost and then considered quality of care including less waiting time as a secondary desirability. Based on the case study, this paper further clarifies the sequential decision-making approach, termed “two-step optimization for spatial accessibility improvement (2SO4SAI).” The first step is to find the best locations to site new facilities by emphasizing accessibility as proximity to the nearest facilities with several alternative objectives under consideration. The second step adjusts the capacities of facilities for minimal inequality in accessibility, where the measure of accessibility accounts for the match ratio of supply and demand and complex spatial interaction between them. The case study illustrates how the two-step optimization method improves both aspects of spatial accessibility for health care access in rural China. PMID:28484707

  7. Two-Step Optimization for Spatial Accessibility Improvement: A Case Study of Health Care Planning in Rural China.

    PubMed

    Luo, Jing; Tian, Lingling; Luo, Lei; Yi, Hong; Wang, Fahui

    2017-01-01

    A recent advancement in location-allocation modeling formulates a two-step approach to a new problem of minimizing disparity of spatial accessibility. Our field work in a health care planning project in a rural county in China indicated that residents valued distance or travel time from the nearest hospital foremost and then considered quality of care including less waiting time as a secondary desirability. Based on the case study, this paper further clarifies the sequential decision-making approach, termed "two-step optimization for spatial accessibility improvement (2SO4SAI)." The first step is to find the best locations to site new facilities by emphasizing accessibility as proximity to the nearest facilities with several alternative objectives under consideration. The second step adjusts the capacities of facilities for minimal inequality in accessibility, where the measure of accessibility accounts for the match ratio of supply and demand and complex spatial interaction between them. The case study illustrates how the two-step optimization method improves both aspects of spatial accessibility for health care access in rural China.

  8. GIS-based smartphone application to support water quality data collection

    USDA-ARS?s Scientific Manuscript database

    Thorough registration of locations, conditions, and operations at sampling sites is essential for any field survey work. The collected information of this type has to be systematic, transferable, and accessible from different locations of data analysis. The handheld data-recording with smart devices...

  9. Skull base tumors: a comprehensive review of transfacial swing osteotomy approaches.

    PubMed

    Moreira-Gonzalez, Andrea; Pieper, Daniel R; Cambra, Jorge Balaguer; Simman, Richard; Jackson, Ian T

    2005-03-01

    Numerous techniques have been proposed for the resection of skull base tumors, each one unique with regard to the region exposed and degree of technical complexity. This study describes the use of transfacial swing osteotomies in accessing lesions located at various levels of the cranial base. Eight patients who underwent transfacial swings for exposure and resection of cranial base lesions between 1996 and 2002 were studied. The mandible was the choice when wide exposure of nasopharyngeal and midline skull base tumors was necessary, especially when they involved the infratemporal fossa. The midfacial swing osteotomy was an option when access to the entire clivus was necessary. An orbital swing approach was used to access large orbital tumors lying inferior to the optic nerve and posterior to the globe, a region that is often difficult to visualize. Gross total tumor excision was possible in all patients. Six patients achieved disease control and two had recurrences. The complications of cerebrospinal fluid leak, infection, hematoma, or cranial nerve damage did not occur. After surgery, some patients experienced temporary symptoms caused by local swelling. The aesthetic result was considered good. Transfacial swing osteotomies provide a wide exposure to tumors that occur in the central skull base area. Excellent knowledge of the detailed anatomy of this region is paramount to the success of this surgery. The team concept is essential; it is built around the craniofacial surgeon and an experienced skull base neurosurgeon.

  10. Beyond Control Centers

    NASA Technical Reports Server (NTRS)

    Trimble, Jay

    2017-01-01

    For NASA's Resource Prospector (RP) Lunar Rover Mission, we are moving away from a control center concept, to a fully distributed operation utilizing control nodes, with decision support from anywhere via mobile devices. This operations concept will utilize distributed information systems, notifications, mobile data access, and optimized mobile data display for off-console decision support. We see this concept of operations as a step in the evolution of mission operations from a central control center concept to a mission operations anywhere concept. The RP example is part of a trend, in which mission expertise for design, development and operations is distributed across countries and across the globe. Future spacecraft operations will be most cost efficient and flexible by following this distributed expertise, enabling operations from anywhere. For the RP mission we arrived at the decision to utilize a fully distributed operations team, where everyone operates from their home institution, based on evaluating the following factors: the requirement for physical proximity for near-real time command and control decisions; the cost of distributed control nodes vs. a centralized control center; the impact on training and mission preparation of flying the team to a central location. Physical proximity for operational decisions is seldom required, though certain categories of decisions, such as launch abort, or close coordination for mission or safety-critical near-real-time command and control decisions may benefit from co-location. The cost of facilities and operational infrastructure has not been found to be a driving factor for location in our studies. Mission training and preparation benefit from having all operators train and operate from home institutions.

  11. 48 CFR 642.1503-70 - Contractor Performance System (CPS).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Performance System (CPS) maintained by the National Institutes of Health. CPS is an Internet-based tool... with access to the Internet shall use CPS to evaluate contractor's past performance for all contracts... the CPS; or (2) At overseas locations where access to the Internet is not practicable. (d) Heads of...

  12. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  13. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  14. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  15. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  16. 18 CFR 1304.209 - Land-based structures/alterations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... steps, pathways, boat launching ramps, marine railways located in the access corridor, bank... (electric, water-intake lines, etc.) may be placed within the access corridor as follows: (1) Power lines, poles, electrical panel, and wiring must be installed: (i) In a way that would not be hazardous to the...

  17. Automated Rocket Propulsion Test Management

    NASA Technical Reports Server (NTRS)

    Walters, Ian; Nelson, Cheryl; Jones, Helene

    2007-01-01

    The Rocket Propulsion Test-Automated Management System provides a central location for managing activities associated with Rocket Propulsion Test Management Board, National Rocket Propulsion Test Alliance, and the Senior Steering Group business management activities. A set of authorized users, both on-site and off-site with regard to Stennis Space Center (SSC), can access the system through a Web interface. Web-based forms are used for user input with generation and electronic distribution of reports easily accessible. Major functions managed by this software include meeting agenda management, meeting minutes, action requests, action items, directives, and recommendations. Additional functions include electronic review, approval, and signatures. A repository/library of documents is available for users, and all items are tracked in the system by unique identification numbers and status (open, closed, percent complete, etc.). The system also provides queries and version control for input of all items.

  18. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  19. Multidimensional display controller for displaying to a user an aspect of a multidimensional space visible from a base viewing location along a desired viewing orientation

    DOEpatents

    Davidson, George S.; Anderson, Thomas G.

    2001-01-01

    A display controller allows a user to control a base viewing location, a base viewing orientation, and a relative viewing orientation. The base viewing orientation and relative viewing orientation are combined to determine a desired viewing orientation. An aspect of a multidimensional space visible from the base viewing location along the desired viewing orientation is displayed to the user. The user can change the base viewing location, base viewing orientation, and relative viewing orientation by changing the location or other properties of input objects.

  20. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  1. Infection control professionals' information-seeking preferences.

    PubMed

    Mortensen, Heidi J; Alexander, Jeffrey L; Nehrenz, Guy M; Porter, Cynthia

    2013-03-01

    The aims of this study were to: 1) establish whether infection control professionals (ICPs) who had access to and utilised medical librarian services for evidence-based medicine (EBM) research perceived this assistance to be useful and 2) to establish whether ICPs who used electronic or hard copy resources for EBM research perceived that those resources had a significant impact on their work. Convenience sampling was used to collect quantitative data via a questionnaire. Study participants were members of South-west and Western chapters of the Association for Professionals in Infection Control and Epidemiology. There were 264 questionnaires distributed in this study; 179 participants completed the questionnaire. The response rate for eligible respondents was 59.5% (157). Results indicated 56.7% (51) of the ICPs with librarian access reported requesting assistance from their work facility librarian. In reference to locating infection control information, 77.9% (95), 87.3% (124) and 93.3% (138) of ICPs found textbooks, journals and the Internet 'very useful' or 'useful', respectively. Study results indicated ICPs who used the assistance of medical librarians and/or hard copy or electronic resources for EBM research perceived such sources to be valuable for obtaining infection control information. © 2012 The authors. Health Information and Libraries Journal © 2012 Health Libraries Group.

  2. Genetic diversity and population structure analysis in Perilla frutescens from Northern areas of China based on simple sequence repeats.

    PubMed

    Ma, S J; Sa, K J; Hong, T K; Lee, J K

    2017-09-21

    In this study, 21 simple sequence repeat (SSR) markers were used to evaluate the genetic diversity and population structure among 77 Perilla accessions from high-latitude and middle-latitude areas of China. Ninety-five alleles were identified with an average of 4.52 alleles per locus. The average polymorphic information content (PIC) and genetic diversity values were 0.346 and 0.372, respectively. The level of genetic diversity and PIC value for cultivated accessions of Perilla frutescens var. frutescens from middle-latitude areas were higher than accessions from high-latitude areas. Based on the dendrogram of unweighted pair group method with arithmetic mean (UPGMA), all accessions were classified into four major groups with a genetic similarity of 46%. All accessions of the cultivated var. frutescens were discriminated from the cultivated P. frutescens var. crispa. Furthermore, most accessions of the cultivated var. frutescens collected in high-latitude and middle-latitude areas were distinguished depending on their geographical location. However, the geographical locations of several accessions of the cultivated var. frutescens have no relation with their positions in the UPGMA dendrogram and population structure. This result implies that the diffusion of accessions of the cultivated Perilla crop in the northern areas of China might be through multiple routes. On the population structure analysis, 77 Perilla accessions were divided into Group I, Group II, and an admixed group based on a membership probability threshold of 0.8. Finally, the findings in this study can provide useful theoretical knowledge for further study on the population structure and genetic diversity of Perilla and benefit for Perilla crop breeding and germplasm conservation.

  3. Relating to monitoring ion sources

    DOEpatents

    Orr, Christopher Henry; Luff, Craig Janson; Dockray, Thomas; Macarthur, Duncan Whittemore; Bounds, John Alan

    2002-01-01

    The apparatus and method provide techniques for monitoring the position on alpha contamination in or on items or locations. The technique is particularly applicable to pipes, conduits and other locations to which access is difficult. The technique uses indirect monitoring of alpha emissions by detecting ions generated by the alpha emissions. The medium containing the ions is moved in a controlled manner frog in proximity with the item or location to the detecting unit and the signals achieved over time are used to generate alpha source position information.

  4. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  5. Doing Your Science While You're in Orbit

    NASA Astrophysics Data System (ADS)

    Green, Mark L.; Miller, Stephen D.; Vazhkudai, Sudharshan S.; Trater, James R.

    2010-11-01

    Large-scale neutron facilities such as the Spallation Neutron Source (SNS) located at Oak Ridge National Laboratory need easy-to-use access to Department of Energy Leadership Computing Facilities and experiment repository data. The Orbiter thick- and thin-client and its supporting Service Oriented Architecture (SOA) based services (available at https://orbiter.sns.gov) consist of standards-based components that are reusable and extensible for accessing high performance computing, data and computational grid infrastructure, and cluster-based resources easily from a user configurable interface. The primary Orbiter system goals consist of (1) developing infrastructure for the creation and automation of virtual instrumentation experiment optimization, (2) developing user interfaces for thin- and thick-client access, (3) provide a prototype incorporating major instrument simulation packages, and (4) facilitate neutron science community access and collaboration. The secure Orbiter SOA authentication and authorization is achieved through the developed Virtual File System (VFS) services, which use Role-Based Access Control (RBAC) for data repository file access, thin-and thick-client functionality and application access, and computational job workflow management. The VFS Relational Database Management System (RDMS) consists of approximately 45 database tables describing 498 user accounts with 495 groups over 432,000 directories with 904,077 repository files. Over 59 million NeXus file metadata records are associated to the 12,800 unique NeXus file field/class names generated from the 52,824 repository NeXus files. Services that enable (a) summary dashboards of data repository status with Quality of Service (QoS) metrics, (b) data repository NeXus file field/class name full text search capabilities within a Google like interface, (c) fully functional RBAC browser for the read-only data repository and shared areas, (d) user/group defined and shared metadata for data repository files, (e) user, group, repository, and web 2.0 based global positioning with additional service capabilities are currently available. The SNS based Orbiter SOA integration progress with the Distributed Data Analysis for Neutron Scattering Experiments (DANSE) software development project is summarized with an emphasis on DANSE Central Services and the Virtual Neutron Facility (VNF). Additionally, the DANSE utilization of the Orbiter SOA authentication, authorization, and data transfer services best practice implementations are presented.

  6. Investigation of multilayer magnetic domain lattice file

    NASA Technical Reports Server (NTRS)

    Torok, E. J.; Kamin, M.; Tolman, C. H.

    1982-01-01

    A theoretical and experimental investigation determined that current accessed self structured bubble memory devices have the potential of meeting projected data density and speed requirements. Device concepts analyzed include multilayer ferrimagnetic devices where the top layer contains a domain structure which defines the data location and the second contains the data. Current aperture and permalloy assisted current propagation devices were evaluated. Based on the result of this work more detailed device research was initiated. Detailed theoretical and experimental studies indicate that the difference in strip and threshold between a single bubble in the control layer and a double bubble which would exist in both the control layer and data layer is adequate to allow for detection of data. Detailed detector designs were investigated.

  7. Remote-area health care delivery through space technology - STARPAHC

    NASA Technical Reports Server (NTRS)

    Belasco, N.; Johnston, R. S.; Stonesifer, J. C.; Pool, S. L.

    1977-01-01

    A joint NASA/HEW project called Space Technology Applied to Rural Papage Advanced Health Care (STARPAHC) has been developed to deliver quality health care to inhabitants of remote geographical areas. The system consists of a hospital-based support control center, a fixed clinic, a mobile clinic, and a referral center with access to specialists via television links to the control center. A strategically located relay station routes television, voice, and data transmissions between system elements. A model system has been installed on the Papage Indian Reservation in Arizona, and is undergoing a 2-year evaluation. The system has been shown to be both effective and cost-efficient, and applications of the concept are planned for future manned spacecraft flights.

  8. Poisonings and clinical toxicology: a template for Ireland.

    PubMed

    Tormey, W P; Moore, T

    2013-03-01

    Poisons information is accessed around the clock in the British Isles from six centres of which two are in Ireland at Dublin and Belfast accompanied by consultant toxicologist advisory service. The numbers of calls in Ireland are down to about 40 per day due to easy access to online data bases. Access to Toxbase, the clinical toxicology database of the National Poisons Information Service is available to National Health Service (NHS) health professionals and to Emergency Departments and Intensive Care units in the Republic of Ireland. There are 59 Toxbase users in the Republic of Ireland and 99 % of activity originates in Emergency Departments. All United States Poison Control Centres primarily use Poisindex which is a commercial database from Thomson Reuters. Information on paracetamol, diazepam, analgesics and psycho-active compounds are the commonest queries. Data from telephone and computer accesses provide an indicator of future trends in both licit and illicit drug poisons which may direct laboratory analytical service developments. Data from National Drug-Related Deaths Index is the most accurate information on toxicological deaths in Ireland. Laboratory toxicology requirements to support emergency departments are listed. Recommendations are made for a web-based open access Toxbase or equivalent; for a co-location of poisons information and laboratory clinical toxicology; for the establishment of a National Clinical Toxicology Institute for Ireland; for a list of accredited medical advisors in clinical toxicology; for multidisciplinary case conferences in complex toxicology cases for coroners; for the establishment of a national clinical toxicology referral out-patients service in Ireland.

  9. Combat Vehicle Command and Control System Architecture Overview

    DTIC Science & Technology

    1994-10-01

    inserted in the software. • Interactive interface displays and controls were prepared using rapidly prototyped software and were retained at the MWTB for...being simulated "* controls , sensor displays, and out-the-window displays for the crew "* computer image generators (CIGs) for out-the-window and...black hot viewing modes. The commander may access a number of capabilities of the CITV simulation, described below, from controls located around the

  10. Breeding of Acrocomia aculeata using genetic diversity parameters and correlations to select accessions based on vegetative, phenological, and reproductive characteristics.

    PubMed

    Coser, S M; Motoike, S Y; Corrêa, T R; Pires, T P; Resende, M D V

    2016-10-17

    Macaw palm (Acrocomia aculeata) is a promising species for use in biofuel production, and establishing breeding programs is important for the development of commercial plantations. The aim of the present study was to analyze genetic diversity, verify correlations between traits, estimate genetic parameters, and select different accessions of A. aculeata in the Macaw Palm Germplasm Bank located in Universidade Federal de Viçosa, to develop a breeding program for this species. Accessions were selected based on precocity (PREC), total spathe (TS), diameter at breast height (DBH), height of the first spathe (HFS), and canopy area (CA). The traits were evaluated in 52 accessions during the 2012/2013 season and analyzed by restricted estimation maximum likelihood/best linear unbiased predictor procedures. Genetic diversity resulted in the formation of four groups by Tocher's clustering method. The correlation analysis showed it was possible to have indirect and early selection for the traits PREC and DBH. Estimated genetic parameters strengthened the genetic variability verified by cluster analysis. Narrow-sense heritability was classified as moderate (PREC, TS, and CA) to high (HFS and DBH), resulting in strong genetic control of the traits and success in obtaining genetic gains by selection. Accuracy values were classified as moderate (PREC and CA) to high (TS, HFS, and DBH), reinforcing the success of the selection process. Selection of accessions for PREC, TS, and HFS by the rank-average method permits selection gains of over 100%, emphasizing the successful use of the accessions in breeding programs and obtaining superior genotypes for commercial plantations.

  11. International Space Station Mechanisms and Maintenance Flight Control Documentation and Training Development

    NASA Technical Reports Server (NTRS)

    Daugherty, Colin C.

    2010-01-01

    International Space Station (ISS) crew and flight controller training documentation is used to aid in training operations. The Generic Simulations References SharePoint (Gen Sim) site is a database used as an aid during flight simulations. The Gen Sim site is used to make individual mission segment timelines, data, and flight information easily accessible to instructors. The Waste and Hygiene Compartment (WHC) training schematic includes simple and complex fluid schematics, as well as overall hardware locations. It is used as a teaching aid during WHC lessons for both ISS crew and flight controllers. ISS flight control documentation is used to support all aspects of ISS mission operations. The Quick Look Database and Consolidated Tool Page are imagery-based references used in real-time to help the Operations Support Officer (OSO) find data faster and improve discussions with the Flight Director and Capsule Communicator (CAPCOM). A Quick Look page was created for the Permanent Multipurpose Module (PMM) by locating photos of the module interior, labeling specific hardware, and organizing them in schematic form to match the layout of the PMM interior. A Tool Page was created for the Maintenance Work Area (MWA) by gathering images, detailed drawings, safety information, procedures, certifications, demonstration videos, and general facts of each MWA component and displaying them in an easily accessible and consistent format. Participation in ISS mechanisms and maintenance lessons, mission simulation On-the-Job Training (OJT), and real-time flight OJT was used as an opportunity to train for day-to-day operations as an OSO, as well as learn how to effectively respond to failures and emergencies during mission simulations and real-time flight operations.

  12. 33 CFR 165.776 - Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Seventh Coast...) Location. The following area is a security zone: All waters from surface to bottom, encompassed by an...

  13. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    PubMed

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.

  14. Universal Payload Information Management

    NASA Technical Reports Server (NTRS)

    Elmore, Ralph B.

    2003-01-01

    As the overall manager and integrator of International Space Station (ISS) science payloads, the Payload Operations Integration Center (POIC) at Marshall Space Flight Center has a critical need to provide an information management system for exchange and control of ISS payload files as well as to coordinate ISS payload related operational changes. The POIC's information management system has a fundamental requirement to provide secure operational access not only to users physically located at the POIC, but also to remote experimenters and International Partners physically located in different parts of the world. The Payload Information Management System (PIMS) is a ground-based electronic document configuration management and collaborative workflow system that was built to service the POIC's information management needs. This paper discusses the application components that comprise the PIMS system, the challenges that influenced its design and architecture, and the selected technologies it employs. This paper will also touch on the advantages of the architecture, details of the user interface, and lessons learned along the way to a successful deployment. With PIMS, a sophisticated software solution has been built that is not only universally accessible for POIC customer s information management needs, but also universally adaptable in implementation and application as a generalized information management system.

  15. A virtual platform for electronic health record (EHR) education for nursing students: moving from in-house solutions to the cloud.

    PubMed

    Kushniruk, Andre W; Kuo, Mu-Hsing; Parapini, Eric; Borycki, Elizabeth M

    2014-01-01

    There is a need to develop cost effective ways to bring hands-on education about essential information technologies, such as electronic health record (EHR) systems to nursing students, nursing faculty and practitioners. This is especially the case as worldwide there is an increased deployment of these systems and they are transforming the practice of healthcare. However, due to technical, financial and knowledge limitations, many nursing schools and programs do not have an adequate way to bring such technology into their classes and curricula. In this paper we describe an approach to developing Web-based EHR education that allows students from any Web-accessible location to access and work with real EHR systems remotely over the Internet for learning purposes. In this paper we describe our work in moving this approach to a cloud-based solution to allow access to EHRs for educational purposes from any location with Web access and to do so in a way that is both educationally sound and cost effective.

  16. An integrated solution for remote data access

    NASA Astrophysics Data System (ADS)

    Sapunenko, Vladimir; D'Urso, Domenico; dell'Agnello, Luca; Vagnoni, Vincenzo; Duranti, Matteo

    2015-12-01

    Data management constitutes one of the major challenges that a geographically- distributed e-Infrastructure has to face, especially when remote data access is involved. We discuss an integrated solution which enables transparent and efficient access to on-line and near-line data through high latency networks. The solution is based on the joint use of the General Parallel File System (GPFS) and of the Tivoli Storage Manager (TSM). Both products, developed by IBM, are well known and extensively used in the HEP computing community. Owing to a new feature introduced in GPFS 3.5, so-called Active File Management (AFM), the definition of a single, geographically-distributed namespace, characterised by automated data flow management between different locations, becomes possible. As a practical example, we present the implementation of AFM-based remote data access between two data centres located in Bologna and Rome, demonstrating the validity of the solution for the use case of the AMS experiment, an astro-particle experiment supported by the INFN CNAF data centre with the large disk space requirements (more than 1.5 PB).

  17. Creating Web-Based Scientific Applications Using Java Servlets

    NASA Technical Reports Server (NTRS)

    Palmer, Grant; Arnold, James O. (Technical Monitor)

    2001-01-01

    There are many advantages to developing web-based scientific applications. Any number of people can access the application concurrently. The application can be accessed from a remote location. The application becomes essentially platform-independent because it can be run from any machine that has internet access and can run a web browser. Maintenance and upgrades to the application are simplified since only one copy of the application exists in a centralized location. This paper details the creation of web-based applications using Java servlets. Java is a powerful, versatile programming language that is well suited to developing web-based programs. A Java servlet provides the interface between the central server and the remote client machines. The servlet accepts input data from the client, runs the application on the server, and sends the output back to the client machine. The type of servlet that supports the HTTP protocol will be discussed in depth. Among the topics the paper will discuss are how to write an http servlet, how the servlet can run applications written in Java and other languages, and how to set up a Java web server. The entire process will be demonstrated by building a web-based application to compute stagnation point heat transfer.

  18. Successful Endovascular Control of Renal Artery in a Transplant Kidney During Nephron Sparing Surgery (NSS) for Large Centrally Located Tumor.

    PubMed

    Shprits, Sagi; Moskovits, Boaz; Sachner, Robert; Nativ, Ofer

    2016-05-01

    Renal cell carcinoma in a transplant kidney is a rare condition. Nephron Sparing Surgery (NSS) is the treatment of choice. One of the main technical challenges is obtaining adequate vascular control. We present a rare case of large centrally located hillar tumor in a kidney 18 years after transplantation treated with NSS. Vascular control was achieved by using a novel approach. Post-operative course was uneventful with minimal decrease in renal function. We believe that this unique choice of treatment can be used in cases of NSS where the access to the renal pedicle is limited.

  19. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  20. Orthogonal frequency-division multiplexing access (OFDMA) based wireless visible light communication (VLC) system

    NASA Astrophysics Data System (ADS)

    Sung, Jiun-Yu; Yeh, Chien-Hung; Chow, Chi-Wai; Lin, Wan-Feng; Liu, Yang

    2015-11-01

    An orthogonal frequency-division multiplexing access (OFDMA) based visible light communication (VLC) system is proposed in this paper. The architecture of the proposed system is divided into several VLC cells, which is defined in this paper. The deployment and upgrade of the system involve only simple combination of the VLC cells. Hence it is economically advantageous. To guarantee smooth communication, nearly equal data rate is provided at every location within the system with no concern on the system scale. The user location monitor strategy is also discussed to solve the region division issues. The characteristics of the proposed system are analyzed in detail in this paper. A one-dimensional experiment was demonstrated with 13.6 Mb/s data rate.

  1. A Cloud Computing Based Patient Centric Medical Information System

    NASA Astrophysics Data System (ADS)

    Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko

    This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.

  2. Identifying malaria vector breeding habitats with remote sensing data and terrain-based landscape indices in Zambia.

    PubMed

    Clennon, Julie A; Kamanga, Aniset; Musapa, Mulenga; Shiff, Clive; Glass, Gregory E

    2010-11-05

    Malaria, caused by the parasite Plasmodium falciparum, is a significant source of morbidity and mortality in southern Zambia. In the Mapanza Chiefdom, where transmission is seasonal, Anopheles arabiensis is the dominant malaria vector. The ability to predict larval habitats can help focus control measures. A survey was conducted in March-April 2007, at the end of the rainy season, to identify and map locations of water pooling and the occurrence anopheline larval habitats; this was repeated in October 2007 at the end of the dry season and in March-April 2008 during the next rainy season. Logistic regression and generalized linear mixed modeling were applied to assess the predictive value of terrain-based landscape indices along with LandSat imagery to identify aquatic habitats and, especially, those with anopheline mosquito larvae. Approximately two hundred aquatic habitat sites were identified with 69 percent positive for anopheline mosquitoes. Nine species of anopheline mosquitoes were identified, of which, 19% were An. arabiensis. Terrain-based landscape indices combined with LandSat predicted sites with water, sites with anopheline mosquitoes and sites specifically with An. arabiensis. These models were especially successful at ruling out potential locations, but had limited ability in predicting which anopheline species inhabited aquatic sites. Terrain indices derived from 90 meter Shuttle Radar Topography Mission (SRTM) digital elevation data (DEM) were better at predicting water drainage patterns and characterizing the landscape than those derived from 30 m Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) DEM. The low number of aquatic habitats available and the ability to locate the limited number of aquatic habitat locations for surveillance, especially those containing anopheline larvae, suggest that larval control maybe a cost-effective control measure in the fight against malaria in Zambia and other regions with seasonal transmission. This work shows that, in areas of seasonal malaria transmission, incorporating terrain-based landscape models to the planning stages of vector control allows for the exclusion of significant portions of landscape that would be unsuitable for water to accumulate and for mosquito larvae occupation. With increasing free availability of satellite imagery such as SRTM and LandSat, the development of satellite imagery-based prediction models is becoming more accessible to vector management coordinators.

  3. Interactive web-based mapping: bridging technology and data for health.

    PubMed

    Highfield, Linda; Arthasarnprasit, Jutas; Ottenweller, Cecelia A; Dasprez, Arnaud

    2011-12-23

    The Community Health Information System (CHIS) online mapping system was first launched in 1998. Its overarching goal was to provide researchers, residents and organizations access to health related data reflecting the overall health and well-being of their communities within the Greater Houston area. In September 2009, initial planning and development began for the next generation of CHIS. The overarching goal for the new version remained to make health data easily accessible for a wide variety of research audiences. However, in the new version we specifically sought to make the CHIS truly interactive and give the user more control over data selection and reporting. In July 2011, a beta version of the next-generation of the application was launched. This next-generation is also a web based interactive mapping tool comprised of two distinct portals: the Breast Health Portal and Project Safety Net. Both are accessed via a Google mapping interface. Geographic coverage for the portals is currently an 8 county region centered on Harris County, Texas. Data accessed by the application include Census 2000, Census 2010 (underway), cancer incidence from the Texas Cancer Registry (TX Dept. of State Health Services), death data from Texas Vital Statistics, clinic locations for free and low-cost health services, along with service lists, hours of operation, payment options and languages spoken, uninsured and poverty data. The system features query on the fly technology, which means the data is not generated until the query is provided to the system. This allows users to interact in real-time with the databases and generate customized reports and maps. To the author's knowledge, the Breast Health Portal and Project Safety Net are the first local-scale interactive online mapping interfaces for public health data which allow users to control the data generated. For example, users may generate breast cancer incidence rates by Census tract, in real time, for women aged 40-64. Conversely, they could then generate the same rates for women aged 35-55. The queries are user controlled.

  4. Availability of alcohol: Location, time and ease of purchase in high- and middle-income countries: Data from the International Alcohol Control study.

    PubMed

    Gray-Phillip, Gaile; Huckle, Taisia; Callinan, Sarah; Parry, Charles D H; Chaiyasong, Surasak; Cuong, Pham Viet; Mackintosh, Anne-Marie; Meier, Petra; Kazantseva, Elena; Piazza, Marina; Parker, Karl; Casswell, Sally

    2018-03-26

    Cross-country studies on alcohol purchasing and access are rare. We examined where and when people access alcohol to understand patterns of availability across a range of middle- and high-income countries. Surveys of drinkers in the International Alcohol Control study in high-income countries (Australia, England, Scotland, New Zealand and St Kitts and Nevis) and middle-income countries (Mongolia, South Africa, Peru, Thailand and Vietnam) were analysed. Measures were: location of purchase from on-premise and take-away outlets, proportion of alcohol consumed on-premise versus take-away outlets, hours of purchase, access among underage drinkers and time to access alcohol. On-premise purchasing was prevalent in the high-income countries. However, the vast majority of alcohol consumed in all countries, except St Kitts and Nevis (high-income), was take-away. Percentages of drinkers purchasing from different types of on-premise and take-away outlets varied between countries. Late purchasing was common in Peru and less common in Thailand and Vietnam. Alcohol was easily accessed by drinkers in all countries, including underage drinkers in the middle-income countries. In nine out of 10 countries the vast majority of alcohol consumed was take-away. Alcohol was readily available and relatively easy for underage drinkers to access, particularly in the middle-income countries. Research is needed to assess the harms associated with take-away consumption including late at night. Attention is needed to address the easy access by underage drinkers in the middle-income countries which has been less of a focus than in high-income countries. © 2018 The Authors Drug and Alcohol Review published by John Wiley & Sons Australia, Ltd on behalf of Australasian Professional Society on Alcohol and other Drugs.

  5. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  6. IT Challenges for Space Medicine or How do We Protect Medical Information and Still Get Useful Work Done?

    NASA Technical Reports Server (NTRS)

    Johnson-Throop, Kathy A.

    2010-01-01

    Space Medicine provides healthcare services of various types for astronauts throughout their lifetime starting from the time they are selected as astronauts. IT challenges include: protection of private medical information, access from locations both inside and outside NASA, nearly 24x7 access, access during disasters, international partner access, data archiving, off-region backup, secure communication of medical data to people outside the NASA system (e.g. expert consultants), efficient movement of medical record information between locations, search and retrieval of relevant information, and providing all of these services/capabilities within a limited budget. In Space Medicine, we have provided for these in various ways: limit the amount of private medical information stored locally, utilize encryption mechanisms that the international partners can also use, utilize 2-factor authentication, virtualize servers, employ concept-based search, and use of standardized terminologies (SNOMED) and messaging (HL7).

  7. Breastfeeding Support in a Community Pharmacy: Improving Access through the Well Babies at Walgreens Program.

    PubMed

    Lenell, Amy; Friesen, Carol A; Hormuth, Laura

    2015-11-01

    Well Babies at Walgreens is a unique community-based corporate partnership program that offers breastfeeding support by a lactation professional in a private room at the pharmacy. Walgreens is a community pharmacy chain with more than 8000 locations in the United States, Puerto Rico, and the US Virgin Islands. The primary goal of Well Babies is to support breastfeeding women using a model that is expandable to other Walgreens pharmacy sites. The Well Babies program offers drop-in services, with a professional consultation by a lactation consultant and baby weight check, if desired. Well Babies creators are developing a business plan for Walgreens and a toolkit that would help other stores implement the program. An additional goal is to improve continuity of care for breastfeeding by engaging pharmacists as vital members of the health care team. Offering breastfeeding support at a pharmacy improves access and encourages support persons to attend while simultaneously allowing the family to complete other errands. This initiative included education for pharmacists to improve the recommendations they make for breastfeeding mothers and to improve awareness among pharmacists of the benefits associated with breastfeeding and the need to preserve the breastfeeding relationship. The first drop-in location opened in April 2012. Grant funding from the US Centers for Disease Control and Prevention, awarded to the Indiana State Department of Health, made it possible to open a second drop-in location in June 2013. Future plans include developing an employee lactation program and expanding Well Babies at Walgreens at other store locations. © The Author(s) 2015.

  8. Using a programmatic mapping approach to plan for HIV prevention and harm reduction interventions for people who inject drugs in three South African cities.

    PubMed

    Scheibe, Andrew; Shelly, Shaun; Lambert, Andrew; Schneider, Andrea; Basson, Rudolf; Medeiros, Nelson; Padayachee, Kalvanya; Savva, Helen; Hausler, Harry

    2017-06-07

    Stigma, criminalisation and a lack of data on drug use contribute to the "invisibility" of people who inject drugs (PWID) and make HIV prevention and treatment service delivery challenging. We aimed to confirm locations where PWID congregate in Cape Town, eThekwini and Tshwane (South Africa) and to estimate PWID population sizes within selected electoral wards in these areas to inform South Africa's first multi-site HIV prevention project for PWID. Field workers (including PWID peers) interviewed community informants to identify suspected injecting locations in selected electoral wards in each city and then visited these locations and interviewed PWID. Interviews were used to gather information about the accessibility of sterile injecting equipment, location coordinates and movement patterns. We used the Delphi method to obtain final population size estimates for the mapped wards based on estimates from wisdom of the crowd methods, the literature and programmatic data. Between January and April 2015, we mapped 45 wards. Tshwane teams interviewed 39 PWID in 12 wards, resulting in an estimated number of accessible PWID ranging from 568 to 1431. In eThekwini, teams interviewed 40 PWID in 15 wards with an estimated number of accessible PWID ranging from 184 to 350. The Cape Town team interviewed 61 PWID in 18 wards with an estimated number of accessible PWID ranging between 398 and 503. Sterile needles were only available at one location. Almost all needles were bought from pharmacies. Between 80 and 86% of PWID frequented more than one location per day. PWID who reported movement visited a median of three locations a day. Programmatic mapping led by PWID peers can be used effectively to identify and reach PWID and build relationships where access to HIV prevention commodities for PWID is limited. PWID reported limited access to sterile injecting equipment, highlighting an important HIV prevention need. Programmatic mapping data show that outreach programmes should be flexible and account for the mobile nature of PWID populations. The PWID population size estimates can be used to develop service delivery targets and as baseline measures.

  9. Rapid-Response Parenting Intervention in Diagnostic Centers as a Patient-Centered Innovation for Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    McMillin, Stephen Edward; Bultas, Margaret W.; Wilmott, Jennifer; Grafeman, Sarah; Zand, Debra H.

    2015-01-01

    Parents of children newly diagnosed with autism spectrum disorders are a high-need population for whom skills-based parenting interventions likely help. Diagnostic centers are compelling locations to deliver parenting interventions because families are served in an accessible location and at a time they receive overwhelming treatment…

  10. Category-Based Errors and the Accessibility of Unbiased Spatial Memories: A Retrieval Model

    ERIC Educational Resources Information Center

    Sampaio, Cristina; Wang, Ranxiao Frances

    2009-01-01

    Studies have consistently shown a spatial memory bias such that a target location is remembered toward the prototypical location of the region to which the target belongs, indicating a blending between the target's specific information and the generic information of its region. The authors investigated whether people retain a veridical…

  11. Population-based geographic access to endocrinologists in the United States, 2012.

    PubMed

    Lu, Hua; Holt, James B; Cheng, Yiling J; Zhang, Xingyou; Onufrak, Stephen; Croft, Janet B

    2015-12-07

    Increases in population and life expectancy of Americans may result in shortages of endocrinologists by 2020. This study aims to assess variations in geographic accessibility to endocrinologists in the US, by age group at state and county levels, and by urban/rural status, and distance. We used the 2012 National Provider Identifier Registry to obtain office locations of all adult and pediatric endocrinologists in the US. The population with geographic access to an endocrinologist within a series of 6 distance radii, centered on endocrinologist practice locations, was estimated using the US Census 2010 block-level population. We assumed that persons living within the same circular buffer zone of an endocrinologist location have the same geographic accessibility to that endocrinologist. The geographic accessibility (the percentage of the population with geographic access to at least one endocrinologist) and the population-to-endocrinologist ratio for each geographic area were estimated. By using 20 miles as the distance radius, geographic accessibility to at least one pediatric/adult endocrinologist for age groups 0-17, 18-64, and ≥ 65 years was 64.1%, 85.4%, and 82.1%. The overall population-to-endocrinologist ratio within 20 miles was 39,492:1 for children, 29,887:1 for adults aged 18-64 years, and 6,194:1 for adults aged ≥ 65 years. These ratios varied considerably by state, county, urban/rural status, and distance. This study demonstrates that there are geographic variations of accessibility to endocrinologists in the US. The areas with poorer geographic accessibility warrant further study of the effect of these variations on disease prevention, detection, and management of endocrine diseases in the US population. Our findings of geographic access to endocrinologists also may provide valuable information for medical education and health resources allocation.

  12. Trends in the location of the HIV-positive population in Australia: implications for access to healthcare services and delivery.

    PubMed

    Carman, Marina; Grierson, Jeffrey; Pitts, Marian; Hurley, Michael; Power, Jennifer

    2010-06-01

    Examining existing and potential trends in the HIV-positive population in Australia is important for current and future healthcare service development and delivery. A new analysis of existing data on this population from the HIV Futures 5 survey was based on linking a geographic breakdown of respondents based on 'area type'--capital city or inner suburban, outer suburban, regional centre and rural--with patterns of healthcare service access. In addition, the distance between the postcode of the respondent's residence and the postcode of the doctor seen for HIV-related treatment was calculated. An analysis of 'area type' by income and age was also conducted. The 'area type' analysis showed important differences in patterns of access to antiretroviral prescriptions and choice of provider for HIV-related and general healthcare. The median distance travelled to see a doctor for HIV-related treatment was higher for those living in outer suburbs than those living in regional centres. Differences in service use appear to be related to geographic accessibility of different service types. However, there may be other important social, economic and cultural factors involved. Ageing and socio-economic pressures may be influencing a move away from inner suburban areas where most HIV-specific care is located. This new analysis assists in finding the right balance between increasing the accessibility of HIV-specific services and 'mainstreaming'. Longitudinal data collection would further assist in tracking trends in geographic location, and how often and at what intervals people living with HIV utilise healthcare services.

  13. Toward the improvement of trail classification in national parks using the recreation opportunity spectrum approach.

    PubMed

    Oishi, Yoshitaka

    2013-06-01

    Trail settings in national parks are essential management tools for improving both ecological conservation efforts and the quality of visitor experiences. This study proposes a plan for the appropriate maintenance of trails in Chubusangaku National Park, Japan, based on the recreation opportunity spectrum (ROS) approach. First, we distributed 452 questionnaires to determine park visitors' preferences for setting a trail (response rate = 68 %). Respondents' preferences were then evaluated according to the following seven parameters: access, remoteness, naturalness, facilities and site management, social encounters, visitor impact, and visitor management. Using nonmetric multidimensional scaling and cluster analysis, the visitors were classified into seven groups. Last, we classified the actual trails according to the visitor questionnaire criteria to examine the discrepancy between visitors' preferences and actual trail settings. The actual trail classification indicated that while most developed trails were located in accessible places, primitive trails were located in remote areas. However, interestingly, two visitor groups seemed to prefer a well-conserved natural environment and, simultaneously, easily accessible trails. This finding does not correspond to a premise of the ROS approach, which supposes that primitive trails should be located in remote areas without ready access. Based on this study's results, we propose that creating trails, which afford visitors the opportunity to experience a well-conserved natural environment in accessible areas is a useful means to provide visitors with diverse recreation opportunities. The process of data collection and analysis in this study can be one approach to produce ROS maps for providing visitors with recreational opportunities of greater diversity and higher quality.

  14. Pulse width modulation inverter with battery charger

    DOEpatents

    Slicker, James M.

    1985-01-01

    An inverter is connected between a source of DC power and a three-phase AC induction motor, and a microprocessor-based circuit controls the inverter using pulse width modulation techniques. In the disclosed method of pulse width modulation, both edges of each pulse of a carrier pulse train are equally modulated by a time proportional to sin .theta., where .theta. is the angular displacement of the pulse center at the motor stator frequency from a fixed reference point on the carrier waveform. The carrier waveform frequency is a multiple of the motor stator frequency. The modulated pulse train is then applied to each of the motor phase inputs with respective phase shifts of 120.degree. at the stator frequency. Switching control commands for electronic switches in the inverter are stored in a random access memory (RAM) and the locations of the RAM are successively read out in a cyclic manner, each bit of a given RAM location controlling a respective phase input of the motor. The DC power source preferably comprises rechargeable batteries and all but one of the electronic switches in the inverter can be disabled, the remaining electronic switch being part of a "flyback" DC-DC converter circuit for recharging the battery.

  15. Pulse width modulation inverter with battery charger

    NASA Technical Reports Server (NTRS)

    Slicker, James M. (Inventor)

    1985-01-01

    An inverter is connected between a source of DC power and a three-phase AC induction motor, and a microprocessor-based circuit controls the inverter using pulse width modulation techniques. In the disclosed method of pulse width modulation, both edges of each pulse of a carrier pulse train are equally modulated by a time proportional to sin .theta., where .theta. is the angular displacement of the pulse center at the motor stator frequency from a fixed reference point on the carrier waveform. The carrier waveform frequency is a multiple of the motor stator frequency. The modulated pulse train is then applied to each of the motor phase inputs with respective phase shifts of 120.degree. at the stator frequency. Switching control commands for electronic switches in the inverter are stored in a random access memory (RAM) and the locations of the RAM are successively read out in a cyclic manner, each bit of a given RAM location controlling a respective phase input of the motor. The DC power source preferably comprises rechargeable batteries and all but one of the electronic switches in the inverter can be disabled, the remaining electronic switch being part of a flyback DC-DC converter circuit for recharging the battery.

  16. The CDC Hemophilia B mutation project mutation list: a new online resource.

    PubMed

    Li, Tengguo; Miller, Connie H; Payne, Amanda B; Craig Hooper, W

    2013-11-01

    Hemophilia B (HB) is caused by mutations in the human gene F9. The mutation type plays a pivotal role in genetic counseling and prediction of inhibitor development. To help the HB community understand the molecular etiology of HB, we have developed a listing of all F9 mutations that are reported to cause HB based on the literature and existing databases. The Centers for Disease Control and Prevention (CDC) Hemophilia B Mutation Project (CHBMP) mutation list is compiled in an easily accessible format of Microsoft Excel and contains 1083 unique mutations that are reported to cause HB. Each mutation is identified using Human Genome Variation Society (HGVS) nomenclature standards. The mutation types and the predicted changes in amino acids, if applicable, are also provided. Related information including the location of mutation, severity of HB, the presence of inhibitor, and original publication reference are listed as well. Therefore, our mutation list provides an easily accessible resource for genetic counselors and HB researchers to predict inhibitors. The CHBMP mutation list is freely accessible at http://www.cdc.gov/hemophiliamutations.

  17. CDC WONDER: a cooperative processing architecture for public health.

    PubMed Central

    Friede, A; Rosen, D H; Reid, J A

    1994-01-01

    CDC WONDER is an information management architecture designed for public health. It provides access to information and communications without the user's needing to know the location of data or communication pathways and mechanisms. CDC WONDER users have access to extractions from some 40 databases; electronic mail (e-mail); and surveillance data processing. System components include the Remote Client, the Communications Server, the Queue Managers, and Data Servers and Process Servers. The Remote Client software resides in the user's machine; other components are at the Centers for Disease Control and Prevention (CDC). The Remote Client, the Communications Server, and the Applications Server provide access to the information and functions in the Data Servers and Process Servers. The system architecture is based on cooperative processing, and components are coupled via pure message passing, using several protocols. This architecture allows flexibility in the choice of hardware and software. One system limitation is that final results from some subsystems are obtained slowly. Although designed for public health, CDC WONDER could be useful for other disciplines that need flexible, integrated information exchange. PMID:7719813

  18. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  19. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay. PMID:22180793

  20. Ranking businesses and municipal locations by spatiotemporal cardiac arrest risk to guide public defibrillator placement

    PubMed Central

    Sun, Christopher L. F.; Brooks, Steven C.; Morrison, Laurie J.; Chan, Timothy C.Y.

    2017-01-01

    Background Efforts to guide automated external defibrillator (AED) placement for out-of-hospital cardiac arrest (OHCA) treatment have focused on identifying broadly defined location categories without considering hours of operation. Broad location categories may be composed of many businesses with varying accessibility. Identifying specific locations for AED deployment incorporating operating hours and time of OHCA occurrence may improve AED accessibility. We aim to identify specific businesses and municipal locations that maximize OHCA coverage based on spatiotemporal assessment of OHCA risk in the immediate vicinity of franchise locations. Methods This study was a retrospective population-based cohort study using data from the Toronto Regional RescuNET Epistry cardiac arrest database. We identified all non-traumatic public OHCAs occurring in Toronto, Canada from Jan. 2007–Dec. 2015. We identified 41 unique businesses and municipal location types with 20 or more locations in Toronto from the YellowPages, Canadian Franchise Association, and the City of Toronto Open Data Portal. We obtained their geographic coordinates and hours of operation from websites, phone, or in-person. We determined the number of OHCAs that occurred within 100 m of each location when it was open (spatiotemporal coverage) for Toronto overall and downtown. The businesses and municipal locations were then ranked by spatiotemporal OHCA coverage. To evaluate temporal stability of the rankings, we calculated intra-class correlation (ICC) of the annual coverage values. Results There were 2,654 non-traumatic public OHCAs. Tim Hortons ranked first in Toronto covering 286 OHCAs. Starbucks ranked first in downtown covering 110 OHCAs. Coffee shops and bank machines from the five largest Canadian banks occupied eight of the top 10 spots in both Toronto and downtown. The rankings exhibited high temporal stability with ICC values of 0.88 (95% CI, 0.83–0.93) in Toronto and 0.79 (95% CI, 0.71–0.86) in downtown. Conclusions We identified and ranked businesses and municipal locations by spatiotemporal OHCA risk in their immediate vicinity. This approach may help policy makers and funders to identify and prioritize potential partnerships for AED deployment in public access defibrillator programs. PMID:28320803

  1. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  2. Simple measurement-based admission control for DiffServ access networks

    NASA Astrophysics Data System (ADS)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  3. Probiotic Candidates from Fish Pond Water in Central Java Indonesia

    NASA Astrophysics Data System (ADS)

    Harjuno Condro Haditomo, Alfabetian; Desrina; Sarjito; Budi Prayitno, S.

    2018-02-01

    Aeromonas hydrophilla is a major bacterial pathogen of intensive fresh water fish culture in Indonesia. An alternative method to control the pathogen is using probiotics. Probiotics is usually consist of live microorganisms which when administered in adequate amounts confer a health benefits on host. The aim of this research was to determine the probiotic candidates against A. hydrophilla which identified based on the 16S rDNA gene sequences. This research was started with field survey to obtained the probiotic candidate and continue with laboratory experiment. Probiotic candidates were isolated from fish pond water located in Boyolali, and Banjarnegara Regency, Central Java, Indonesia. A total of 133 isolates bacteria were isolated and cultured on to TSA, TSB and GSP medium. Out of 133 isolates only 30 isolates showed inhibition to A.hydrophilla activity. Three promising isolates were identified with PCR using primer for 16S rDNA. Based on 16S rDNA sequence analysis, all three isolates were belong to Bacillus genus. Isolate CKlA21, CKlA28, and CBA14 respectively were closely related to Bacillus sp. 13843 (GenBank accession no. JN874760.1 -100% homology), Bacillus subtilis strain H13 (GenBank accession no.KT907045.1 -- 99% homology), and Bacillus sp. strain 22-4 (GenBank accession no. KX816417.1 -- 97% homology).

  4. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  5. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  6. Information Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study

    ERIC Educational Resources Information Center

    Antony, Laljith

    2016-01-01

    Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…

  7. Temporary traffic control and enforcement of traffic laws in closed road sections.

    DOT National Transportation Integrated Search

    2007-06-01

    "Public travel by motor vehicles is often necessary in road and street sections that have been officially closed for construction, repair, and/or other reasons. This authorization is permitted in order to provide access to homes and businesses locate...

  8. 78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.

  9. Surgery for colorectal cancer: Race-related differences in rates and survival among Medicare beneficiaries.

    PubMed

    Cooper, G S; Yuan, Z; Landefeld, C S; Rimm, A A

    1996-04-01

    This study examined surgery for colorectal cancer among Medicare beneficiaries 65 years of age or older with an initial diagnosis in 1987 (n = 81 579). Black patients were less likely than White to undergo surgical resection (68% vs 78%), even after age, comorbidity, and location and extent of tumor were controlled for. Among those who underwent resection, Black patients were more likely to die (a 2-year mortality rate of 40.0% vs 33.5% in White patients); this disparity also remained after confounders had been controlled. The disparities were similar in teaching and nonteaching hospitals and in private and public hospitals. These data may indicate racially based differences among Medicare beneficiaries in access to and quality of care for colorectal cancer.

  10. Tracking target objects orbiting earth using satellite-based telescopes

    DOEpatents

    De Vries, Willem H; Olivier, Scot S; Pertica, Alexander J

    2014-10-14

    A system for tracking objects that are in earth orbit via a constellation or network of satellites having imaging devices is provided. An object tracking system includes a ground controller and, for each satellite in the constellation, an onboard controller. The ground controller receives ephemeris information for a target object and directs that ephemeris information be transmitted to the satellites. Each onboard controller receives ephemeris information for a target object, collects images of the target object based on the expected location of the target object at an expected time, identifies actual locations of the target object from the collected images, and identifies a next expected location at a next expected time based on the identified actual locations of the target object. The onboard controller processes the collected image to identify the actual location of the target object and transmits the actual location information to the ground controller.

  11. Method and apparatus for pulse width modulation control of an AC induction motor

    DOEpatents

    Geppert, Steven; Slicker, James M.

    1984-01-01

    An inverter is connected between a source of DC power and a three-phase AC induction motor, and a micro-processor-based circuit controls the inverter using pulse width modulation techniques. In the disclosed method of pulse width modulation, both edges of each pulse of a carrier pulse train are equally modulated by a time proportional to sin .THETA., where .THETA. is the angular displacement of the pulse center at the motor stator frequency from a fixed reference point on the carrier waveform. The carrier waveform frequency is a multiple of the motor stator frequency. The modulated pulse train is then applied to each of the motor phase inputs with respective phase shifts of 120.degree. at the stator frequency. Switching control commands of electronic switches in the inverter are stored in a random access memory (RAM) and the locations of the RAM are successively read out in a cyclic manner, each bit of a given RAM location controlling a respective phase input of the motor. The DC power source preferably comprises rechargeable batteries and all but one of the electronic switches in the inverter can be disabled, the remaining electronic switch being part of a "flyback" DC-DC converter circuit for recharging the battery.

  12. Method and apparatus for pulse width modulation control of an AC induction motor

    NASA Technical Reports Server (NTRS)

    Geppert, Steven (Inventor); Slicker, James M. (Inventor)

    1984-01-01

    An inverter is connected between a source of DC power and a three-phase AC induction motor, and a micro-processor-based circuit controls the inverter using pulse width modulation techniques. In the disclosed method of pulse width modulation, both edges of each pulse of a carrier pulse train are equally modulated by a time proportional to sin .THETA., where .THETA. is the angular displacement of the pulse center at the motor stator frequency from a fixed reference point on the carrier waveform. The carrier waveform frequency is a multiple of the motor stator frequency. The modulated pulse train is then applied to each of the motor phase inputs with respective phase shifts of 120.degree. at the stator frequency. Switching control commands of electronic switches in the inverter are stored in a random access memory (RAM) and the locations of the RAM are successively read out in a cyclic manner, each bit of a given RAM location controlling a respective phase input of the motor. The DC power source preferably comprises rechargeable batteries and all but one of the electronic switches in the inverter can be disabled, the remaining electronic switch being part of a flyback DC-DC converter circuit for recharging the battery.

  13. Web-based visualization of very large scientific astronomy imagery

    NASA Astrophysics Data System (ADS)

    Bertin, E.; Pillay, R.; Marmo, C.

    2015-04-01

    Visualizing and navigating through large astronomy images from a remote location with current astronomy display tools can be a frustrating experience in terms of speed and ergonomics, especially on mobile devices. In this paper, we present a high performance, versatile and robust client-server system for remote visualization and analysis of extremely large scientific images. Applications of this work include survey image quality control, interactive data query and exploration, citizen science, as well as public outreach. The proposed software is entirely open source and is designed to be generic and applicable to a variety of datasets. It provides access to floating point data at terabyte scales, with the ability to precisely adjust image settings in real-time. The proposed clients are light-weight, platform-independent web applications built on standard HTML5 web technologies and compatible with both touch and mouse-based devices. We put the system to the test and assess the performance of the system and show that a single server can comfortably handle more than a hundred simultaneous users accessing full precision 32 bit astronomy data.

  14. Protection of Location Privacy Based on Distributed Collaborative Recommendations

    PubMed Central

    Wang, Peng; Yang, Jing; Zhang, Jian-Pei

    2016-01-01

    In the existing centralized location services system structure, the server is easily attracted and be the communication bottleneck. It caused the disclosure of users’ location. For this, we presented a new distributed collaborative recommendation strategy that is based on the distributed system. In this strategy, each node establishes profiles of their own location information. When requests for location services appear, the user can obtain the corresponding location services according to the recommendation of the neighboring users’ location information profiles. If no suitable recommended location service results are obtained, then the user can send a service request to the server according to the construction of a k-anonymous data set with a centroid position of the neighbors. In this strategy, we designed a new model of distributed collaborative recommendation location service based on the users’ location information profiles and used generalization and encryption to ensure the safety of the user’s location information privacy. Finally, we used the real location data set to make theoretical and experimental analysis. And the results show that the strategy proposed in this paper is capable of reducing the frequency of access to the location server, providing better location services and protecting better the user’s location privacy. PMID:27649308

  15. Protection of Location Privacy Based on Distributed Collaborative Recommendations.

    PubMed

    Wang, Peng; Yang, Jing; Zhang, Jian-Pei

    2016-01-01

    In the existing centralized location services system structure, the server is easily attracted and be the communication bottleneck. It caused the disclosure of users' location. For this, we presented a new distributed collaborative recommendation strategy that is based on the distributed system. In this strategy, each node establishes profiles of their own location information. When requests for location services appear, the user can obtain the corresponding location services according to the recommendation of the neighboring users' location information profiles. If no suitable recommended location service results are obtained, then the user can send a service request to the server according to the construction of a k-anonymous data set with a centroid position of the neighbors. In this strategy, we designed a new model of distributed collaborative recommendation location service based on the users' location information profiles and used generalization and encryption to ensure the safety of the user's location information privacy. Finally, we used the real location data set to make theoretical and experimental analysis. And the results show that the strategy proposed in this paper is capable of reducing the frequency of access to the location server, providing better location services and protecting better the user's location privacy.

  16. Combining Google Earth and GIS mapping technologies in a dengue surveillance system for developing countries

    PubMed Central

    Chang, Aileen Y; Parrales, Maria E; Jimenez, Javier; Sobieszczyk, Magdalena E; Hammer, Scott M; Copenhaver, David J; Kulkarni, Rajan P

    2009-01-01

    Background Dengue fever is a mosquito-borne illness that places significant burden on tropical developing countries with unplanned urbanization. A surveillance system using Google Earth and GIS mapping technologies was developed in Nicaragua as a management tool. Methods and Results Satellite imagery of the town of Bluefields, Nicaragua captured from Google Earth was used to create a base-map in ArcGIS 9. Indices of larval infestation, locations of tire dumps, cemeteries, large areas of standing water, etc. that may act as larval development sites, and locations of the homes of dengue cases collected during routine epidemiologic surveying were overlaid onto this map. Visual imagery of the location of dengue cases, larval infestation, and locations of potential larval development sites were used by dengue control specialists to prioritize specific neighborhoods for targeted control interventions. Conclusion This dengue surveillance program allows public health workers in resource-limited settings to accurately identify areas with high indices of mosquito infestation and interpret the spatial relationship of these areas with potential larval development sites such as garbage piles and large pools of standing water. As a result, it is possible to prioritize control strategies and to target interventions to highest risk areas in order to eliminate the likely origin of the mosquito vector. This program is well-suited for resource-limited settings since it utilizes readily available technologies that do not rely on Internet access for daily use and can easily be implemented in many developing countries for very little cost. PMID:19627614

  17. A stroke in the woods.

    PubMed

    McQueen, Carl; Roberts, David; Evans, Daniel; Wyse, Matthew

    2013-06-01

    Responding to incidents where access by conventional land-based ambulance assets is limited is an important facet of helicopter emergency medical services operations in rural areas. Often in such cases extra resources must be utilised to enable access to patients and facilitate egress to transport platforms. This case illustrates the importance of coordination and integration with additional resources that can be utilised in remote rural locations.

  18. Defending an Area with Autonomy: Autonomous Intelligence, Surveillance, and Reconnaissance Capabilities Leveraging Unmanned Aerial Systems for Defending Forward Operating Locations

    DTIC Science & Technology

    2017-05-08

    electromagnetic ( EM ) spectrum, cyberspace, and air domain access and dependencies. Access to space-based assets is necessary to provide and share C2ISR...the EM spectrum for communications is necessary for many of the same reasons we need space capabilities, but this spectrum is under threat from...emerging electronic warfare technologies. Both LOS and BLOS radio frequency (RF) communications require access to the EM spectrum for sharing critical

  19. Bi-objective approach for placing ground and air ambulance base and helipad locations in order to optimize EMS response.

    PubMed

    Shahriari, Milad; Bozorgi-Amiri, Ali; Tavakoli, Shayan; Yousefi-Babadi, Abolghasem

    2017-12-01

    Shortening the travel time of patient transfer has clinical implications for many conditions such as cardiac arrest, trauma, stroke and STEMI. As resources are often limited precise calculations are needed. In this paper we consider the location problem for both ground and aerial emergency medical services. Given the uncertainty of when patients are in need of prompt medical attention we consider these demand points to be uncertain. We consider various ways in which ground and helicopter ambulances can work together to make the whole process go faster. We develop a mathematical model that minimizes travel time and maximizes service level. We use a compromising programming method to solve this bi-objective mathematical model. For numerical experiments we apply our model to a case study in Lorestan, Iran, using geographical and population data, and the location of the actual hospital based in the capital of the province. Results show that low-accessibility locations are the main focus of the proposed problem and with mathematical modeling access to a hospital is vastly improved. We also found out that once the budget reaches a certain point which suffices for building certain ambulance bases more investments does not necessarily result in less travel time. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Thermal Control Subsystem Design for the Avionics of a Space Station Payload

    NASA Technical Reports Server (NTRS)

    Moran, Matthew E.

    1996-01-01

    A case study of the thermal control subsystem development for a space based payload is presented from the concept stage through preliminary design. This payload, the Space Acceleration Measurement System 2 (SAMS-2), will measure the acceleration environment at select locations within the International Space Station. Its thermal control subsystem must maintain component temperatures within an acceptable range over a 10 year life span, while restricting accessible surfaces to touch temperature limits and insuring fail safe conditions in the event of loss of cooling. In addition to these primary design objectives, system level requirements and constraints are imposed on the payload, many of which are driven by multidisciplinary issues. Blending these issues into the overall system design required concurrent design sessions with the project team, iterative conceptual design layouts, thermal analysis and modeling, and hardware testing. Multiple tradeoff studies were also performed to investigate the many options which surfaced during the development cycle.

  1. Supporting Management of European Refugee Streams by Earth Observation and Geoinformation

    NASA Astrophysics Data System (ADS)

    Komp, K.-U.; Müterthies, A.

    2016-06-01

    The sharp increase in refugee numbers arriving in the European Union has recently caused major and manifold challenges for the member states and their administrative services. Location based situation reports and maps may support the refugee management from local to European level. The first support is mapping of the geographical distribution of migrating people which needs more or less real time data. The actual data sources are location related observations along the routes of refugees, actual satellite observations and data mining results. These tools and data are used to monitor spatial distributions as well as extrapolate the arrival of refugees for the subsequent weeks. The second support is the short term update of the location of initial registration facilities and first reception facilities, their capacities, and their occupancy. The third management level is the systematic inquiry for unoccupied housing facilities and for empty places within build-up areas. Geo-coded data sets of house numbers have to be cross-referenced with city maps and communal inhabitants address data. The legal aspects of data mining and secured access to personal data are strictly controlled by the administration allowing only limited access and distribution of data and results. However, the paper will not disclose scientific progress in Earth Observation and GIS, but will actually demonstrate an urgently needed new combination of existing methods to support actual needs. The societal benefits of EO/GIS are no longer just potential possibilities, but actual results in real political, administrative and humanitarian day to day reality.

  2. Women, pharmacy and the World Wide Web: could they be the answer to the obesity epidemic?

    PubMed

    Fakih, Souhiela; Hussainy, Safeera; Marriott, Jennifer

    2014-04-01

    The objective of this article is to explore how giving women access to evidence-based information in weight management through pharmacies, and by utilising the World Wide Web, is a much needed step towards dealing with the obesity crisis. Women's needs should be considered when developing evidence-based information on weight. Excess weight places them at high risk of diabetes and cardiovascular disease, infertility and complications following pregnancy and giving birth. Women are also an important population group because they influence decision-making around meal choices for their families and are the biggest consumers of weight-loss products, many of which can be purchased in pharmacies. Pharmacies are readily accessible primary healthcare locations and given the pharmacist's expertise in being able to recognise underlying causes of obesity (e.g. medications, certain disease states), pharmacies are an ideal location to provide women with evidence-based information on all facets of weight management. Considering the exponential rise in the use of the World Wide Web, this information could be delivered as an online educational resource supported by other flexible formats. The time has come for the development of an online, evidence-based educational resource on weight management, which is combined with other flexible formats and targeted at women in general and according to different phases of their lives (pregnancy, post-partum, menopause). By empowering women with this knowledge it will allow them and their families to take better control of their health and wellbeing, and it may just be the much needed answer to complement already existing resources to help curb the obesity epidemic. © 2013 Royal Pharmaceutical Society.

  3. Accessing memory

    DOEpatents

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  4. A search for intact lava tubes on the Moon: Possible lunar base habitats

    NASA Technical Reports Server (NTRS)

    Coombs, Cassandra R.; Hawke, B. Ray

    1992-01-01

    We have surveyed lunar sinuous rilles and other volcanic features in an effort to locate intact lava tubes that could be used to house an advanced lunar base. Criteria were established for identifying intact tube segments. Sixty-seven tube candidates within 20 rilles were identified on the lunar nearside. The rilles, located in four mare regions, varied in size and sinuosity. We identified four rilles that exhibited particularly strong evidence for the existence of intact lava tube segments. These are located in the following areas: (1) south of Gruithuisen K, (2) in the Marius Hills region, (3) in the southeastern Mare Serenitatis, and (4) in the eastern Mare Serenitatis. We rated each of the 67 probable tube segments for lunar base suitability based on its dimensions, stability, location, and access to lunar resources. Nine tube segments associated with three separate rilles are considered prime candidates for use as part of an advanced lunar base.

  5. Influence of active site location on catalytic activity in de novo-designed zinc metalloenzymes.

    PubMed

    Zastrow, Melissa L; Pecoraro, Vincent L

    2013-04-17

    While metalloprotein design has now yielded a number of successful metal-bound and even catalytically active constructs, the question of where to put a metal site along a linear, repetitive sequence has not been thoroughly addressed. Often several possibilities in a given sequence may exist that would appear equivalent but may in fact differ for metal affinity, substrate access, or protein dynamics. We present a systematic variation of active site location for a hydrolytically active ZnHis3O site contained within a de novo-designed three-stranded coiled coil. We find that the maximal rate, substrate access, and metal-binding affinity are dependent on the selected position, while catalytic efficiency for p-nitrophenyl acetate hydrolysis can be retained regardless of the location of the active site. This achievement demonstrates how efficient, tailor-made enzymes which control rate, pKa, substrate and solvent access (and selectivity), and metal-binding affinity may be realized. These findings may be applied to the more advanced de novo design of constructs containing secondary interactions, such as hydrogen-bonding channels. We are now confident that changes to location for accommodating such channels can be achieved without location-dependent loss of catalytic efficiency. These findings bring us closer to our ultimate goal of incorporating the secondary interactions we believe will be necessary in order to improve both active site properties and the catalytic efficiency to be competitive with the native enzyme, carbonic anhydrase.

  6. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  7. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  8. Remote access and operation of telescopes by the scientific users

    NASA Astrophysics Data System (ADS)

    Edwards, P. G.; Amy, S.; Brodrick, D.; Carretti, E.; Hoyle, S.; Indermuehle, B.; McConnell, D.; Mader, S.; Mirtschin, P.; Preisig, B.; Smith, M.; Stevens, J.; Wark, R.; Wieringa, M.; Wu, X.

    2014-08-01

    The Australia Telescope National Facility operates three radio telescopes: the Parkes 64m Telescope, the Australia Telescope Compact Array (ATCA), and the Mopra 22m Telescope. Scientific operation of all these is conducted by members of the investigating teams rather than by professional operators. All three can now be accessed and controlled from any location served by the internet, the telescopes themselves being unattended for part or all of the time. Here we describe the rationale, advantages, and means of implementing this operational model.

  9. System and method of operating toroidal magnetic confinement devices

    DOEpatents

    Chance, Morrell S.; Jardin, Stephen C.; Stix, Thomas H.; Grimm, deceased, Ray C.; Manickam, Janardhan; Okabayashi, Michio

    1987-01-01

    For toroidal magnetic confinement devices the second region of stability against ballooning modes can be accessed with controlled operation. Under certain modes of operation, the first and second stability regions may be joined together. Accessing the second region of stability is accomplished by forming a bean-shaped plasma and increasing the indentation until a critical value of indentation is reached. A pusher coil, located at the inner-major-radius side of the device, is engaged to form a bean-shaped poloidal cross-section in the plasma.

  10. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    PubMed

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  11. StruLocPred: structure-based protein subcellular localisation prediction using multi-class support vector machine.

    PubMed

    Zhou, Wengang; Dickerson, Julie A

    2012-01-01

    Knowledge of protein subcellular locations can help decipher a protein's biological function. This work proposes new features: sequence-based: Hybrid Amino Acid Pair (HAAP) and two structure-based: Secondary Structural Element Composition (SSEC) and solvent accessibility state frequency. A multi-class Support Vector Machine is developed to predict the locations. Testing on two established data sets yields better prediction accuracies than the best available systems. Comparisons with existing methods show comparable results to ESLPred2. When StruLocPred is applied to the entire Arabidopsis proteome, over 77% of proteins with known locations match the prediction results. An implementation of this system is at http://wgzhou.ece. iastate.edu/StruLocPred/.

  12. A Document-Based EHR System That Controls the Disclosure of Clinical Documents Using an Access Control List File Based on the HL7 CDA Header.

    PubMed

    Takeda, Toshihiro; Ueda, Kanayo; Nakagawa, Akito; Manabe, Shirou; Okada, Katsuki; Mihara, Naoki; Matsumura, Yasushi

    2017-01-01

    Electronic health record (EHR) systems are necessary for the sharing of medical information between care delivery organizations (CDOs). We developed a document-based EHR system in which all of the PDF documents that are stored in our electronic medical record system can be disclosed to selected target CDOs. An access control list (ACL) file was designed based on the HL7 CDA header to manage the information that is disclosed.

  13. Mid-Season Influenza Vaccine Effectiveness Estimates for the 2016-2017 Influenza Season (Open Access Publisher’s Version)

    DTIC Science & Technology

    2017-08-01

    controls ; AFHSB used healthy controls (matched to cases by sex, age, date [+/– 3 days] and location). bAFHSB-AF adjusted for age group , month of illness...presented in this report. M E T H O D S The AFHSB–Air Force Satellite Cell (AFHSB-AF) conducted a test-negative case- control study using data from the...ILI). Influenza cases were identified using reverse transcription–polymerase chain reaction (RT-PCR) or viral culture; controls were ILI patients

  14. 49 CFR Figure 1b to Subpart B of... - Example of Location and Staggering of Emergency Window Exits and Location of Rescue Access...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Example of Location and Staggering of Emergency Window Exits and Location of Rescue Access Windows-§§ 238.113 and 238.114 1B Figure 1B to Subpart B of... of Emergency Window Exits and Location of Rescue Access Windows—§§ 238.113 and 238.114 ER01FE08.003...

  15. A Virtual Mission Operations Center: Collaborative Environment

    NASA Technical Reports Server (NTRS)

    Medina, Barbara; Bussman, Marie; Obenschain, Arthur F. (Technical Monitor)

    2002-01-01

    The Virtual Mission Operations Center - Collaborative Environment (VMOC-CE) intent is to have a central access point for all the resources used in a collaborative mission operations environment to assist mission operators in communicating on-site and off-site in the investigation and resolution of anomalies. It is a framework that as a minimum incorporates online chat, realtime file sharing and remote application sharing components in one central location. The use of a collaborative environment in mission operations opens up the possibilities for a central framework for other project members to access and interact with mission operations staff remotely. The goal of the Virtual Mission Operations Center (VMOC) Project is to identify, develop, and infuse technology to enable mission control by on-call personnel in geographically dispersed locations. In order to achieve this goal, the following capabilities are needed: Autonomous mission control systems Automated systems to contact on-call personnel Synthesis and presentation of mission control status and history information Desktop tools for data and situation analysis Secure mechanism for remote collaboration commanding Collaborative environment for remote cooperative work The VMOC-CE is a collaborative environment that facilitates remote cooperative work. It is an application instance of the Virtual System Design Environment (VSDE), developed by NASA Goddard Space Flight Center's (GSFC) Systems Engineering Services & Advanced Concepts (SESAC) Branch. The VSDE is a web-based portal that includes a knowledge repository and collaborative environment to serve science and engineering teams in product development. It is a "one stop shop" for product design, providing users real-time access to product development data, engineering and management tools, and relevant design specifications and resources through the Internet. The initial focus of the VSDE has been to serve teams working in the early portion of the system/product lifecycle - concept development, proposal preparation, and formulation. The VMOC-CE expands the application of the VSDE into the operations portion of the system lifecycle. It will enable meaningful and real-time collaboration regardless of the geographical distribution of project team members. Team members will be able to interact in satellite operations, specifically for resolving anomalies, through access to a desktop computer and the Internet. Mission Operations Management will be able to participate and monitor up to the minute status of anomalies or other mission operations issues. In this paper we present the VMOC-CE project, system capabilities, and technologies.

  16. On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)

    DTIC Science & Technology

    2013-07-01

    Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of

  17. Automated external defibrillators inaccessible to more than half of nearby cardiac arrests in public locations during evening, nighttime, and weekends.

    PubMed

    Hansen, Carolina Malta; Wissenberg, Mads; Weeke, Peter; Ruwald, Martin Huth; Lamberts, Morten; Lippert, Freddy Knudsen; Gislason, Gunnar Hilmar; Nielsen, Søren Loumann; Køber, Lars; Torp-Pedersen, Christian; Folke, Fredrik

    2013-11-12

    Despite wide dissemination, use of automated external defibrillators (AEDs) in community settings is limited. We assessed how AED accessibility affected coverage of cardiac arrests in public locations. We identified cardiac arrests in public locations (1994-2011) in terms of location and time and viewed them in relation to the location and accessibility of all AEDs linked to the emergency dispatch center as of December 31, 2011, in Copenhagen, Denmark. AED coverage of cardiac arrests was defined as cardiac arrests within 100 m (109.4 yd) of an AED and further categorized according to AED accessibility at the time of cardiac arrest. Daytime, evening, and nighttime were defined as 8 am to 3:59 pm, 4 to 11:59 pm, and midnight to 7:59 am, respectively. Of 1864 cardiac arrests in public locations, 61.8% (n=1152) occurred during the evening, nighttime, or weekends. Of 552 registered AEDs, 9.1% (n=50) were accessible at all hours, and 96.4% (n=532) were accessible during the daytime on all weekdays. Regardless of AED accessibility, 28.8% (537 of 1864) of all cardiac arrests were covered by an AED. Limited AED accessibility decreased coverage of cardiac arrests by 4.1% (9 of 217) during the daytime on weekdays and by 53.4% (171 of 320) during the evening, nighttime, and weekends. Limited AED accessibility at the time of cardiac arrest decreased AED coverage by 53.4% during the evening, nighttime, and weekends, which is when 61.8% of all cardiac arrests in public locations occurred. Thus, not only strategic placement but also uninterrupted AED accessibility warrant attention if public-access defibrillation is to improve survival after out-of-hospital cardiac arrest.

  18. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  19. Public access to New Hampshire state waters: a comparison of three cohorts of residents across three distinct geographic

    Treesearch

    Kim Pawlawski; Robert A. Robertson; Laura Pfister

    2003-01-01

    This study was intended to provide New Hampshire agencies with a better understanding of public access-related demand information. Through an analysis of three groups of New Hampshire residents based upon geographic location and length of residency, important issues and attitudes were identified from all over the State. The results of this study will assist in policy-...

  20. Evaluation of genetic diversity in jackfruit (Artocarpus heterophyllus Lam.) based on amplified fragment length polymorphism markers.

    PubMed

    Shyamalamma, S; Chandra, S B C; Hegde, M; Naryanswamy, P

    2008-07-22

    Artocarpus heterophyllus Lam., commonly called jackfruit, is a medium-sized evergreen tree that bears high yields of the largest known edible fruit. Yet, it has been little explored commercially due to wide variation in fruit quality. The genetic diversity and genetic relatedness of 50 jackfruit accessions were studied using amplified fragment length polymorphism markers. Of 16 primer pairs evaluated, eight were selected for screening of genotypes based on the number and quality of polymorphic fragments produced. These primer combinations produced 5976 bands, 1267 (22%) of which were polymorphic. Among the jackfruit accessions, the similarity coefficient ranged from 0.137 to 0.978; the accessions also shared a large number of monomorphic fragments (78%). Cluster analysis and principal component analysis grouped all jackfruit genotypes into three major clusters. Cluster I included the genotypes grown in a jackfruit region of Karnataka, called Tamaka, with very dry conditions; cluster II contained the genotypes collected from locations having medium to heavy rainfall in Karnataka; cluster III grouped the genotypes in distant locations with different environmental conditions. Strong coincidence of these amplified fragment length polymorphism-based groupings with geographical localities as well as morphological characters was observed. We found moderate genetic diversity in these jackfruit accessions. This information should be useful for tree breeding programs, as part of our effort to popularize jackfruit as a commercial crop.

  1. 7 CFR 1755.500 - RUS standard for service installations at customers access locations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false RUS standard for service installations at customers... customers access locations. (a) Sections 1755.501 through 1755.510 cover service installations at permanent or mobile home customer access locations. Sections 1755.501 through 1755.510 do not cover service...

  2. Travel behavior of low income older adults and implementation of an accessibility calculator

    PubMed Central

    Moniruzzaman, Md; Chudyk, Anna; Páez, Antonio; Winters, Meghan; Sims-Gould, Joanie; McKay, Heather

    2016-01-01

    Given the aging demographic landscape, the concept of walkable neighborhoods has emerged as a topic of interest, especially during the last decade. However, we know very little about whether walkable neighborhoods promote walking among older adults, particularly those with lower incomes. Therefore in this paper we: (i) examine the relation between trip distance and sociodemographic attributes and accessibility features of lower income older adults in Metro Vancouver; and, (ii) implement a web-based application to calculate the accessibility of lower income older adults in Metro Vancouver based on their travel behavior. We use multilevel linear regression to estimate the determinants of trip length. We find that in this population distance traveled is associated with gender, living arrangements, and dog ownership. Furthermore, significant geographical variations (measured using a trend surface) were also found. To better visualize the impact of travel behavior on accessibility by personal profile and location, we also implemented a web-based calculator that generates an Accessibility (A)-score using Google Maps API v3 that can be used to evaluate the accessibility of neighborhoods from the perspective of older adults. PMID:27104148

  3. Utilizing patient geographic information system data to plan telemedicine service locations.

    PubMed

    Soares, Neelkamal; Dewalle, Joseph; Marsh, Ben

    2017-09-01

    To understand potential utilization of clinical services at a rural integrated health care system by generating optimal groups of telemedicine locations from electronic health record (EHR) data using geographic information systems (GISs). This retrospective study extracted nonidentifiable grouped data of patients over a 2-year period from the EHR, including geomasked locations. Spatially optimal groupings were created using available telemedicine sites by calculating patients' average travel distance (ATD) to the closest clinic site. A total of 4027 visits by 2049 unique patients were analyzed. The best travel distances for site groupings of 3, 4, 5, or 6 site locations were ranked based on increasing ATD. Each one-site increase in the number of available telemedicine sites decreased minimum ATD by about 8%. For a given group size, the best groupings were very similar in minimum travel distance. There were significant differences in predicted patient load imbalance between otherwise similar groupings. A majority of the best site groupings used the same small number of sites, and urban sites were heavily used. With EHR geospatial data at an individual patient level, we can model potential telemedicine sites for specialty access in a rural geographic area. Relatively few sites could serve most of the population. Direct access to patient GIS data from an EHR provides direct knowledge of the client base compared to methods that allocate aggregated data. Geospatial data and methods can assist health care location planning, generating data about load, load balance, and spatial accessibility. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  4. Overcoming Spatial and Temporal Barriers to Public Access Defibrillators Via Optimization

    PubMed Central

    Sun, Christopher L. F.; Demirtas, Derya; Brooks, Steven C.; Morrison, Laurie J.; Chan, Timothy C.Y.

    2016-01-01

    BACKGROUND Immediate access to an automated external defibrillator (AED) increases the chance of survival from out-of-hospital cardiac arrest (OHCA). Current deployment usually considers spatial AED access, assuming AEDs are available 24 h a day. OBJECTIVES We sought to develop an optimization model for AED deployment, accounting for spatial and temporal accessibility, to evaluate if OHCA coverage would improve compared to deployment based on spatial accessibility alone. METHODS This was a retrospective population-based cohort study using data from the Toronto Regional RescuNET cardiac arrest database. We identified all nontraumatic public-location OHCAs in Toronto, Canada (January 2006 through August 2014) and obtained a list of registered AEDs (March 2015) from Toronto emergency medical services. We quantified coverage loss due to limited temporal access by comparing the number of OHCAs that occurred within 100 meters of a registered AED (assumed 24/7 coverage) with the number that occurred both within 100 meters of a registered AED and when the AED was available (actual coverage). We then developed a spatiotemporal optimization model that determined AED locations to maximize OHCA actual coverage and overcome the reported coverage loss. We computed the coverage gain between the spatiotemporal model and a spatial-only model using 10-fold cross-validation. RESULTS We identified 2,440 atraumatic public OHCAs and 737 registered AED locations. A total of 451 OHCAs were covered by registered AEDs under assumed 24/7 coverage, and 354 OHCAs under actual coverage, representing a coverage loss of 21.5% (p < 0.001). Using the spatiotemporal model to optimize AED deployment, a 25.3% relative increase in actual coverage was achieved over the spatial-only approach (p < 0.001). CONCLUSIONS One in 5 OHCAs occurred near an inaccessible AED at the time of the OHCA. Potential AED use was significantly improved with a spatiotemporal optimization model guiding deployment. PMID:27539176

  5. Effectiveness of a Technology-Based Intervention to Teach Evidence-Based Practice: The EBR Tool.

    PubMed

    Long, JoAnn D; Gannaway, Paula; Ford, Cindy; Doumit, Rita; Zeeni, Nadine; Sukkarieh-Haraty, Ola; Milane, Aline; Byers, Beverly; Harrison, LaNell; Hatch, Daniel; Brown, Justin; Proper, Sharlan; White, Patricia; Song, Huaxin

    2016-02-01

    As the world becomes increasingly digital, advances in technology have changed how students access evidence-based information. Research suggests that students overestimate their ability to locate quality online research and lack the skills needed to evaluate the scientific literature. Clinical nurses report relying on personal experience to answer clinical questions rather than searching evidence-based sources. To address the problem, a web-based, evidence-based research (EBR) tool that is usable from a computer, smartphone, or iPad was developed and tested. The purpose of the EBR tool is to guide students through the basic steps needed to locate and critically appraise the online scientific literature while linking users to quality electronic resources to support evidence-based practice (EBP). Testing of the tool took place in a mixed-method, quasi-experimental, and two-population randomized controlled trial (RCT) design in a U.S. and Middle East university. A statistically significant improvement in overall research skills was supported in the quasi-experimental nursing student group and RCT nutrition student group using the EBR tool. A statistically significant proportional difference was supported in the RCT nutrition and PharmD intervention groups in participants' ability to distinguish the credibility of online source materials compared with controls. The majority of participants could correctly apply PICOTS to a case study when using the tool. The data from this preliminary study suggests that the EBR tool enhanced student overall research skills and selected EBP skills while generating data for assessment of learning outcomes. The EBR tool places evidence-based resources at the fingertips of users by addressing some of the most commonly cited barriers to research utilization while exposing users to information and online literacy standards of practice, meeting a growing need within nursing curricula. © 2016 Sigma Theta Tau International.

  6. Understanding the relationship between access to care and facility-based delivery through analysis of the 2008 Ghana Demographic Health Survey.

    PubMed

    Moyer, Cheryl A; McLaren, Zoë M; Adanu, Richard M; Lantz, Paula M

    2013-09-01

    To determine the types of access to care most strongly associated with facility-based delivery among women in Ghana. Data relating to the "5 As of Access" framework were extracted from the 2008 Ghana Demographic Health Survey and analyzed using multivariate logistic regression. In all, 55.5% of a weighted sample of 1102 women delivered in a healthcare facility, whereas 45.5% delivered at home. Affordability was the strongest access factor associated with delivery location, with health insurance coverage tripling the odds of facility delivery. Availability, accessibility (except urban residence), acceptability, and social access variables were not significant factors in the final models. Social access variables, including needing permission to seek healthcare and not being involved in decisions regarding healthcare, were associated with a reduced likelihood of facility-based delivery when examined individually. Multivariate analysis suggested that these variables reflected maternal literacy, health insurance coverage, and household wealth, all of which attenuated the effects of social access. Affordability was an important determinant of facility delivery in Ghana-even among women with health insurance-but social access variables had a mediating role. Copyright © 2013 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  7. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  8. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  9. Enhancing access and retention in substance abuse treatment: the role of Medicaid payment acceptance and cultural competence.

    PubMed

    Guerrero, Erick G

    2013-10-01

    Health insurance coverage and quality of care are common factors believed to improve access for and retention of racial and ethnic minority groups in health care. However, there is little evidence that acceptance of public insurance and provision of culturally responsive care decrease wait time and retention of minority populations in community-based substance abuse treatment. We analyzed client and program data collected in 2010-2011 from publicly funded treatment programs in Los Angeles County, CA. An analytical sample of 13,328 primarily African American and Latino clients nested within 104 treatment programs located in minority communities was analyzed using multilevel negative binomial regressions on count measures of days to initiate and days spent in treatment. Programs that accepted public insurance (p<.001) and in which staff reported personal involvement (p<.01) and linkages and resources with minority communities (p<.001) were negatively associated with client wait time. Similarly, programs with culturally responsive policies and assessment and treatment practices (p<.05) were positively associated with retention in treatment, after controlling for individual and program characteristics. These preliminary findings provide an evidentiary base for the role of community-based financial and cultural practices in improving accessibility and treatment adherence in a population at high risk of treatment dropout. Implications related to health care reform legislation, which seeks to expand public insurance and enhance culturally competent care, are discussed. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  10. Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks

    DTIC Science & Technology

    2007-01-01

    Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR

  11. 75 FR 8754 - Notice of Environmental Assessment Related to the Issuance of a License Amendment to Masters...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-25

    ... their ADAMS accession numbers. 1. National Health Physics Program Request for Decommissioning for... Amendment. FOR FURTHER INFORMATION CONTACT: Katie Streit, Health Physicist, Materials Control, ISFSI, and... Veteran Affairs (VA) North Florida/South Georgia Veterans Health System located in Gainesville, Florida...

  12. 76 FR 18191 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-01

    ... action would be effective without further notice on May 2, 2011 unless comments are received which result... replace with ``DMDC 10 DoD.'' * * * * * System location: Delete entry and replace with ``Defense Manpower... facilities or using facilities interfacing with Defense Manpower Data Center Physical Access Control Systems...

  13. Constructing Uniform Resource Locators (URLs) for Searching the Marine Realms Information Bank

    USGS Publications Warehouse

    Linck, Guthrie A.; Allwardt, Alan O.; Lightsom, Frances L.

    2009-01-01

    The Marine Realms Information Bank (MRIB) is a digital library that provides access to free online scientific information about the oceans and coastal regions. To search its collection, MRIB uses a Common Gateway Interface (CGI) program, which allows automated search requests using Uniform Resource Locators (URLs). This document provides an overview of how to construct URLs to execute MRIB queries. The parameters listed allow detailed control of which records are retrieved, how they are returned, and how their display is formatted.

  14. Safe, Affordable, Convenient: Environmental Features of Malls and Other Public Spaces Used by Older Adults for Walking.

    PubMed

    King, Diane K; Allen, Peg; Jones, Dina L; Marquez, David X; Brown, David R; Rosenberg, Dori; Janicek, Sarah; Allen, Laila; Belza, Basia

    2016-03-01

    Midlife and older adults use shopping malls for walking, but little research has examined mall characteristics that contribute to their walkability. We used modified versions of the Centers for Disease Control and Prevention (CDC)-Healthy Aging Research Network (HAN) Environmental Audit and the System for Observing Play and Recreation in Communities (SOPARC) tool to systematically observe 443 walkers in 10 shopping malls. We also observed 87 walkers in 6 community-based nonmall/nongym venues where older adults routinely walked for physical activity. All venues had public transit stops and accessible parking. All malls and 67% of nonmalls had wayfinding aids, and most venues (81%) had an established circuitous walking route and clean, well-maintained public restrooms (94%). All venues had level floor surfaces, and one-half had benches along the walking route. Venues varied in hours of access, programming, tripping hazards, traffic control near entrances, and lighting. Despite diversity in location, size, and purpose, the mall and nonmall venues audited shared numerous environmental features known to promote walking in older adults and few barriers to walking. Future research should consider programmatic features and outreach strategies to expand the use of malls and other suitable public spaces for walking.

  15. 7. Administrative structures.

    PubMed

    2014-05-01

    The basic systems of any society rarely can operate independently. Instead, they are dependent and often interdependent upon other entities. Such entities control the resources within their respective systems. Thus, coordination and control agencies require contracts or memoranda of understanding with these entities in order to assure access to the resources required during a crisis. These administrative structures include: (1) governmental institutions and agencies, including the military; (2) intergovernmental organisations; (3) nongovernmental organisations; (4) commercial private sector organisations; and (5) academic institutions. These dependencies create potential barriers to the provision of coordination and control including: (1) the complexity of the administrative structures with which coordination and control must interact; (2) the location of resources; (3) finding responsible person(s); (4) the competence and compatibility; (5) methods of access; (6) payment; (7) contracts and memoranda of understanding; (8) inventories of accessible resources; (9) competition for the mandate, power, and resources; and (10) jealousy. The need for potential interactions between administrative structures requires that agreements for the sharing of resources during crises be reached as part of planning and preparedness. Gaining an understanding of these relationships is an important area for research.

  16. Securely and Flexibly Sharing a Biomedical Data Management System

    PubMed Central

    Wang, Fusheng; Hussels, Phillip; Liu, Peiya

    2011-01-01

    Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285

  17. A Case Study of Modern PLC and LabVIEW Controls: Power Supply Controls for the ORNL ITER ECH Test Stand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barker, Alan M; Killough, Stephen M; Bigelow, Tim S

    2011-01-01

    Power Supply Controls are being developed at Oak Ridge National Laboratory (ORNL) to test transmission line components of the Electron Cyclotron Heating (ECH) system, with a focus on gyrotrons and waveguides, in support of the International Thermonuclear Experimental Reactor (ITER). The control is performed by several Programmable Logic Controllers (PLC s) located near the different equipment. A technique of Supervisory Control and Data Acquisition (SCADA) is presented to monitor, control, and log actions of the PLC s on a PC through use of Allen Bradley s Remote I/O communication interface coupled with an Open Process Control/Object Linking and Embedding [OLE]more » for Process Control (OPC) Server/Client architecture. The OPC data is then linked to a National Instruments (NI) LabVIEW system for monitoring and control. Details of the architecture and insight into applicability to other systems are presented in the rest of this paper. Future integration with an EPICS (Experimental Physics Industrial Control System) based mini-CODAC (Control, Data Access and Communication) SCADA system is under consideration, and integration considerations will be briefly introduced.« less

  18. Optimization modeling to maximize population access to comprehensive stroke centers

    PubMed Central

    Branas, Charles C.; Kasner, Scott E.; Wolff, Catherine; Williams, Justin C.; Albright, Karen C.; Carr, Brendan G.

    2015-01-01

    Objective: The location of comprehensive stroke centers (CSCs) is critical to ensuring rapid access to acute stroke therapies; we conducted a population-level virtual trial simulating change in access to CSCs using optimization modeling to selectively convert primary stroke centers (PSCs) to CSCs. Methods: Up to 20 certified PSCs per state were selected for conversion to maximize the population with 60-minute CSC access by ground and air. Access was compared across states based on region and the presence of state-level emergency medical service policies preferentially routing patients to stroke centers. Results: In 2010, there were 811 Joint Commission PSCs and 0 CSCs in the United States. Of the US population, 65.8% had 60-minute ground access to PSCs. After adding up to 20 optimally located CSCs per state, 63.1% of the US population had 60-minute ground access and 86.0% had 60-minute ground/air access to a CSC. Across states, median CSC access was 55.7% by ground (interquartile range 35.7%–71.5%) and 85.3% by ground/air (interquartile range 59.8%–92.1%). Ground access was lower in Stroke Belt states compared with non–Stroke Belt states (32.0% vs 58.6%, p = 0.02) and lower in states without emergency medical service routing policies (52.7% vs 68.3%, p = 0.04). Conclusion: Optimal system simulation can be used to develop efficient care systems that maximize accessibility. Under optimal conditions, a large proportion of the US population will be unable to access a CSC within 60 minutes. PMID:25740858

  19. Optimization modeling to maximize population access to comprehensive stroke centers.

    PubMed

    Mullen, Michael T; Branas, Charles C; Kasner, Scott E; Wolff, Catherine; Williams, Justin C; Albright, Karen C; Carr, Brendan G

    2015-03-24

    The location of comprehensive stroke centers (CSCs) is critical to ensuring rapid access to acute stroke therapies; we conducted a population-level virtual trial simulating change in access to CSCs using optimization modeling to selectively convert primary stroke centers (PSCs) to CSCs. Up to 20 certified PSCs per state were selected for conversion to maximize the population with 60-minute CSC access by ground and air. Access was compared across states based on region and the presence of state-level emergency medical service policies preferentially routing patients to stroke centers. In 2010, there were 811 Joint Commission PSCs and 0 CSCs in the United States. Of the US population, 65.8% had 60-minute ground access to PSCs. After adding up to 20 optimally located CSCs per state, 63.1% of the US population had 60-minute ground access and 86.0% had 60-minute ground/air access to a CSC. Across states, median CSC access was 55.7% by ground (interquartile range 35.7%-71.5%) and 85.3% by ground/air (interquartile range 59.8%-92.1%). Ground access was lower in Stroke Belt states compared with non-Stroke Belt states (32.0% vs 58.6%, p = 0.02) and lower in states without emergency medical service routing policies (52.7% vs 68.3%, p = 0.04). Optimal system simulation can be used to develop efficient care systems that maximize accessibility. Under optimal conditions, a large proportion of the US population will be unable to access a CSC within 60 minutes. © 2015 American Academy of Neurology.

  20. Daytime Locations in Spatial Mismatch: Job Accessibility and Employment at Reentry From Prison

    PubMed Central

    Lens, Michael C.

    2017-01-01

    Individuals recently released from prison confront many barriers to employment. One potential obstacle is spatial mismatch—the concentration of low-skilled, nonwhite job-seekers within central cities and the prevalence of relevant job opportunities in outlying areas. Prior research has found mixed results about the importance of residential place for reentry outcomes. In this article, we propose that residential location matters for finding work, but this largely static measure does not capture the range of geographic contexts that individuals inhabit throughout the day. We combine novel, real-time GPS information on daytime locations and self-reported employment collected from smartphones with sophisticated measures of job accessibility to test the relative importance of spatial mismatch based on residence and daytime locations. Our findings suggest that the ability of low-skilled, poor, and urban individuals to compensate for their residential deficits by traveling to job-rich areas is an overlooked and salient consideration in spatial mismatch perspectives. PMID:28224468

  1. A model for identifying and ranking need for trauma service in nonmetropolitan regions based on injury risk and access to services.

    PubMed

    Schuurman, Nadine; Bell, Nathaniel; Hameed, Morad S; Simons, Richard

    2008-07-01

    Timely access to definitive trauma care has been shown to improve survival rates after severe injury. Unfortunately, despite development of sophisticated trauma systems, prompt, definitive trauma care remains unavailable to over 50 million North Americans, particularly in rural areas. Measures to quantify social and geographic isolation may provide important insights for the development of health policy aimed at reducing the burden of injury and improving access to trauma care in presently under serviced populations. Indices of social deprivation based on census data, and spatial analyses of access to trauma centers based on street network files were combined into a single index, the Population Isolation Vulnerability Amplifier (PIVA) to characterize vulnerability to trauma in socioeconomically and geographically diverse rural and urban communities across British Columbia. Regions with a sufficient core population that are more than one hour travel time from existing services were ranked based on their level of socioeconomic vulnerability. Ten regions throughout the province were identified as most in need of trauma services based on population, isolation and vulnerability. Likewise, 10 communities were classified as some of the least isolated areas and were simultaneously classified as least vulnerable populations in province. The model was verified using trauma services utilization data from the British Columbia Trauma Registry. These data indicate that including vulnerability in the model provided superior results to running the model based only on population and road travel time. Using the PIVA model we have shown that across Census Urban Areas there are wide variations in population dependence on and distances to accredited tertiary/district trauma centers throughout British Columbia. Many of the factors that influence access to definitive trauma care can be combined into a single quantifiable model that researchers in the health sector can use to predict where to place new services. The model can also be used to locate optimal locations for any basket of health services.

  2. 2D Presentation Techniques of Mind-maps for Blind Meeting Participants.

    PubMed

    Pölzer, Stephan; Miesenberger, Klaus

    2015-01-01

    Mind-maps, used as ideation technique in co-located meetings (e.g. in brainstorming sessions), which meet with increased importance in business and education, show considerably accessibility challenges for blind meeting participants. Besides an overview of general aspects of accessibility issues in co-located meetings, this paper focuses on the design and development of alternative non-visual presentation techniques for mind-maps. The different aspects of serialized presentation techniques (e.g. treeview) for Braille and audio rendering and two dimensional presentation techniques (e.g. tactile two dimensional array matrix and edge-projection method [1]) are discussed based on the user feedback gathered in intermediate tests following a user centered design approach.

  3. Parallel processor-based raster graphics system architecture

    DOEpatents

    Littlefield, Richard J.

    1990-01-01

    An apparatus for generating raster graphics images from the graphics command stream includes a plurality of graphics processors connected in parallel, each adapted to receive any part of the graphics command stream for processing the command stream part into pixel data. The apparatus also includes a frame buffer for mapping the pixel data to pixel locations and an interconnection network for interconnecting the graphics processors to the frame buffer. Through the interconnection network, each graphics processor may access any part of the frame buffer concurrently with another graphics processor accessing any other part of the frame buffer. The plurality of graphics processors can thereby transmit concurrently pixel data to pixel locations in the frame buffer.

  4. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  5. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  6. Counter Clockwise Rotation of Cylinder with Variable Position to Control Base Flows

    NASA Astrophysics Data System (ADS)

    Asadullah, Mohammed; Khan, S. A.; Asrar, Waqar; Sulaeman, E.

    2018-05-01

    Experimental study of supersonic base flow at Mach 2 has been carried out to see the effect of cylinder when rotated counter clockwise inside the dead zone at variable locations near its base to control base pressure for different level of expansion for area ratio 9. Active cylinder of 2 mm diameter rotating counter clockwise when seen from top, is mounted as a controller. Three locations are chosen from the side wall of square duct namely at 2, 4, 6 mm respectively and 8 mm from square nozzle exit in the base region to mount the controller. Base pressure in recirculation zone and wall pressure along the square duct length has been measured with and without control. The experiments were carried out for NPR 2, 3, 6, 7.8 and 8.5. Cylinder when rotated counter clockwise as an active controller were found to reduce the base drag as high as 62 percent at NPR 8.5 when located near to duct wall and 50 percent when located away from duct wall for the same NPR. For perfectly expanded flows at NPR 7.8 the reduction in base drag was 53 percent near duct wall and 44 percent near duct wall. The active controller was up to 19 percentage effective for over expanded flows near to duct wall and up to 12 percent when located away from duct wall. Also, the control did not adversely affect the flow field.

  7. Location-based information retrieval framework

    NASA Astrophysics Data System (ADS)

    Hariharan, Gurushyam; Mehta, Sandeep

    2003-03-01

    The recent advances in mobile communication technologies and their widespread use calls for a host of new value added services for the mobile user. In their current avatar, these deices are not more than mere communication equipments. Now consumer orientated, mobile, internet connected devices which are location aware (that are capable of determining and transmitting their current geographical location) are becoming available everywhere. The availability of internet access and location awareness in portable devices like cell phones, Personal Digital Assistants, etc. opens up a host of new opportunities for services which can en cash on the location of the user. Besides providing navigational information to the user, additional push down information can be sent to the user based on his profile and his preferences. The domain is wide and the number of applications is enormous. This paper presents a design and implementation of a basic location aware service.

  8. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  9. Setting Access Permission through Transitive Relationship in Web-based Social Networks

    NASA Astrophysics Data System (ADS)

    Hong, Dan; Shen, Vincent Y.

    The rising popularity of various social networking websites has created a huge problem on Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc. on the Web, some of these data (such as a person’s location at a particular time, criticisms of a politician, etc.) are private and should not be accessed by unauthorized users. Although social networks facilitate sharing, the fear of sending sensitive data to a third party without knowledge or permission of the data owners discourages people from taking full advantage of some social networking applications. We exploit the existing relationships on social networks and build a ‘‘trust network’’ with transitive relationship to allow controlled data sharing so that the privacy and preferences of data owners are respected. The trust network linking private data owners, private data requesters, and intermediary users is a directed weighted graph. The permission value for each private data requester can be automatically assigned in this network based on the transitive relationship. Experiments were conducted to confirm the feasibility of constructing the trust network from existing social networks, and to assess the validity of permission value assignments in the query process. Since the data owners only need to define the access rights of their closest contacts once, this privacy scheme can make private data sharing easily manageable by social network participants.

  10. Measuring potential access to food stores and food-service places in rural areas in the U.S.

    PubMed

    Sharkey, Joseph R

    2009-04-01

    Geographic access to healthy food resources remains a major focus of research that examines the contribution of the built environment to healthful eating. Methods used to define and measure spatial accessibility can significantly affect the results. Considering the implications for marketing, policy, and programs, adequate measurement of the food environment is important. Little of the published work on food access has focused on rural areas, where the burden of nutrition-related disease is greater. This article seeks to expand our understanding of the challenges to measurement of potential spatial access to food resources in rural areas in the U.S. Key challenges to the accurate measurement of the food environment in rural areas include: (1) defining the rural food environment while recognizing that market factors may be changing; (2) describing characteristics that may differentiate similar types of food stores and food-service places; and (3) determining location coordinates for food stores and food-service places. In order to enhance measurements in rural areas, "ground-truthed" methodology, which includes on-site observation and collection of GPS data, should become the standard for rural areas. Measurement must also recognize the emergence of new and changing store formats. Efforts should be made to determine accessibility, in terms of both proximity to a single location and variety of multiple locations within a specified buffer, from origins other than the home, and consider multipurpose trips and trip chaining. The measurement of food access will be critical for community-based approaches to meet dietary needs. Researchers must be willing to take the steps necessary for rigorous measurement of a dynamic food environment.

  11. LOCATE: a mouse protein subcellular localization database

    PubMed Central

    Fink, J. Lynn; Aturaliya, Rajith N.; Davis, Melissa J.; Zhang, Fasheng; Hanson, Kelly; Teasdale, Melvena S.; Kai, Chikatoshi; Kawai, Jun; Carninci, Piero; Hayashizaki, Yoshihide; Teasdale, Rohan D.

    2006-01-01

    We present here LOCATE, a curated, web-accessible database that houses data describing the membrane organization and subcellular localization of proteins from the FANTOM3 Isoform Protein Sequence set. Membrane organization is predicted by the high-throughput, computational pipeline MemO. The subcellular locations of selected proteins from this set were determined by a high-throughput, immunofluorescence-based assay and by manually reviewing >1700 peer-reviewed publications. LOCATE represents the first effort to catalogue the experimentally verified subcellular location and membrane organization of mammalian proteins using a high-throughput approach and provides localization data for ∼40% of the mouse proteome. It is available at . PMID:16381849

  12. The Relationship Between Exclusions from Gambling Arcades and Accessibility: Evidence from a Newly Introduced Exclusion Program in Hesse, Germany.

    PubMed

    Strohäker, Tanja; Becker, Tilman

    2018-02-28

    An exclusion system for gambling arcades has been introduced recently in the state of Hesse. The aim of this paper is to identify significant predictors that are useful in explaining the variation of exclusions between different Hessian communities. Next to socio-demographic factors, we control for three different accessibility variables in two models: the number of electronic gambling machines (EGMs) in model I, and the number of locations and density of gambling machines at a location in model II. We disentangle the association between EGMs and exclusions of model I into a location and a clustering effect. Considering the socio-demographic variables, the explanatory power of our cross-sectional models is rather low. Only the age group of the 30-39 years old and those who are not in a partnership (in model I) yield significant results. As self-exclusion systems reduce availability for the group of vulnerable players, this analysis provides evidence for the assumption that the two groups-pathological gamblers and vulnerable players-seem to have little overlap concerning sociodemographic characteristics. The accessibility variables, on the other hand, turn out to be significantly associated with the number of exclusions. All three of them are statistically significant and their association is positive. The results of model II show that the location effect is more pronounced then the clustering effect of EGMs, i.e. the effect of an additional single-licensed arcade on the number of exclusions is stronger than the increase in the number of license at one location.

  13. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  14. An in situ accelerator-based diagnostic for plasma-material interactions science on magnetic fusion devices.

    PubMed

    Hartwig, Zachary S; Barnard, Harold S; Lanza, Richard C; Sorbom, Brandon N; Stahle, Peter W; Whyte, Dennis G

    2013-12-01

    This paper presents a novel particle accelerator-based diagnostic that nondestructively measures the evolution of material surface compositions inside magnetic fusion devices. The diagnostic's purpose is to contribute to an integrated understanding of plasma-material interactions in magnetic fusion, which is severely hindered by a dearth of in situ material surface diagnosis. The diagnostic aims to remotely generate isotopic concentration maps on a plasma shot-to-shot timescale that cover a large fraction of the plasma-facing surface inside of a magnetic fusion device without the need for vacuum breaks or physical access to the material surfaces. Our instrument uses a compact (~1 m), high-current (~1 milliamp) radio-frequency quadrupole accelerator to inject 0.9 MeV deuterons into the Alcator C-Mod tokamak at MIT. We control the tokamak magnetic fields--in between plasma shots--to steer the deuterons to material surfaces where the deuterons cause high-Q nuclear reactions with low-Z isotopes ~5 μm into the material. The induced neutrons and gamma rays are measured with scintillation detectors; energy spectra analysis provides quantitative reconstruction of surface compositions. An overview of the diagnostic technique, known as accelerator-based in situ materials surveillance (AIMS), and the first AIMS diagnostic on the Alcator C-Mod tokamak is given. Experimental validation is shown to demonstrate that an optimized deuteron beam is injected into the tokamak, that low-Z isotopes such as deuterium and boron can be quantified on the material surfaces, and that magnetic steering provides access to different measurement locations. The first AIMS analysis, which measures the relative change in deuterium at a single surface location at the end of the Alcator C-Mod FY2012 plasma campaign, is also presented.

  15. Interactive web-based mapping: bridging technology and data for health

    PubMed Central

    2011-01-01

    Background The Community Health Information System (CHIS) online mapping system was first launched in 1998. Its overarching goal was to provide researchers, residents and organizations access to health related data reflecting the overall health and well-being of their communities within the Greater Houston area. In September 2009, initial planning and development began for the next generation of CHIS. The overarching goal for the new version remained to make health data easily accessible for a wide variety of research audiences. However, in the new version we specifically sought to make the CHIS truly interactive and give the user more control over data selection and reporting. Results In July 2011, a beta version of the next-generation of the application was launched. This next-generation is also a web based interactive mapping tool comprised of two distinct portals: the Breast Health Portal and Project Safety Net. Both are accessed via a Google mapping interface. Geographic coverage for the portals is currently an 8 county region centered on Harris County, Texas. Data accessed by the application include Census 2000, Census 2010 (underway), cancer incidence from the Texas Cancer Registry (TX Dept. of State Health Services), death data from Texas Vital Statistics, clinic locations for free and low-cost health services, along with service lists, hours of operation, payment options and languages spoken, uninsured and poverty data. Conclusions The system features query on the fly technology, which means the data is not generated until the query is provided to the system. This allows users to interact in real-time with the databases and generate customized reports and maps. To the author's knowledge, the Breast Health Portal and Project Safety Net are the first local-scale interactive online mapping interfaces for public health data which allow users to control the data generated. For example, users may generate breast cancer incidence rates by Census tract, in real time, for women aged 40-64. Conversely, they could then generate the same rates for women aged 35-55. The queries are user controlled. PMID:22195603

  16. Managing Information On Technical Requirements

    NASA Technical Reports Server (NTRS)

    Mauldin, Lemuel E., III; Hammond, Dana P.

    1993-01-01

    Technical Requirements Analysis and Control Systems/Initial Operating Capability (TRACS/IOC) computer program provides supplemental software tools for analysis, control, and interchange of project requirements so qualified project members have access to pertinent project information, even if in different locations. Enables users to analyze and control requirements, serves as focal point for project requirements, and integrates system supporting efficient and consistent operations. TRACS/IOC is HyperCard stack for use on Macintosh computers running HyperCard 1.2 or later and Oracle 1.2 or later.

  17. RBAC-Matrix-based EMR right management system to improve HIPAA compliance.

    PubMed

    Lee, Hung-Chang; Chang, Shih-Hsin

    2012-10-01

    Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.

  18. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  19. New Directions in Space Operations Services in Support of Interplanetary Exploration

    NASA Technical Reports Server (NTRS)

    Bradford, Robert N.

    2005-01-01

    To gain access to the necessary operational processes and data in support of NASA's Lunar/Mars Exploration Initiative, new services, adequate levels of computing cycles and access to myriad forms of data must be provided to onboard spacecraft and ground based personnel/systems (earth, lunar and Martian) to enable interplanetary exploration by humans. These systems, cycles and access to vast amounts of development, test and operational data will be required to provide a new level of services not currently available to existing spacecraft, on board crews and other operational personnel. Although current voice, video and data systems in support of current space based operations has been adequate, new highly reliable and autonomous processes and services will be necessary for future space exploration activities. These services will range from the more mundane voice in LEO to voice in interplanetary travel which because of the high latencies will require new voice processes and standards. New services, like component failure predictions based on data mining of significant quantities of data, located at disparate locations, will be required. 3D or holographic representation of onboard components, systems or family members will greatly improve maintenance, operations and service restoration not to mention crew morale. Current operational systems and standards, like the Internet Protocol, will not able to provide the level of service required end to end from an end point on the Martian surface like a scientific instrument to a researcher at a university. Ground operations whether earth, lunar or Martian and in flight operations to the moon and especially to Mars will require significant autonomy that will require access to highly reliable processing capabilities, data storage based on network storage technologies. Significant processing cycles will be needed onboard but could be borrowed from other locations either ground based or onboard other spacecraft. Reliability will be a key factor with onboard and distributed backup processing an absolutely necessary requirement. Current cluster processing/Grid technologies may provide the basis for providing these services. An overview of existing services, future services that will be required and the technologies and standards required to be developed will be presented. The purpose of this paper will be to initiate a technological roadmap, albeit at a high level, of current voice, video, data and network technologies and standards (which show promise for adaptation or evolution) to what technologies and standards need to be redefined, adjusted or areas where new ones require development. The roadmap should begin the differentiation between non manned and manned processes/services where applicable. The paper will be based in part on the activities of the CCSDS Monitor and Control working group which is beginning the process of standardization of the these processes. Another element of the paper will be based on an analysis of current technologies supporting space flight processes and services at JSC, MSFC, GSFC and to a lesser extent at KSC. Work being accomplished in areas such as Grid computing, data mining and network storage at ARC, IBM and the University of Alabama at Huntsville will be researched and analyzed.

  20. 38 CFR 1.601 - Qualifications for access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) An applicant for read-only access to VBA automated claims records from a location other than a VA... utilized to obtain access, as well as their location, must be approved in advance by VBA. (c) Each... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Qualifications for access...

  1. Intra-Urban Movement Flow Estimation Using Location Based Social Networking Data

    NASA Astrophysics Data System (ADS)

    Kheiri, A.; Karimipour, F.; Forghani, M.

    2015-12-01

    In recent years, there has been a rapid growth of location-based social networking services, such as Foursquare and Facebook, which have attracted an increasing number of users and greatly enriched their urban experience. Location-based social network data, as a new travel demand data source, seems to be an alternative or complement to survey data in the study of mobility behavior and activity analysis because of its relatively high access and low cost. In this paper, three OD estimation models have been utilized in order to investigate their relative performance when using Location-Based Social Networking (LBSN) data. For this, the Foursquare LBSN data was used to analyze the intra-urban movement behavioral patterns for the study area, Manhattan, the most densely populated of the five boroughs of New York city. The outputs of models are evaluated using real observations based on different criterions including distance distribution, destination travel constraints. The results demonstrate the promising potential of using LBSN data for urban travel demand analysis and monitoring.

  2. Extended Sleeve Products Allow Control and Monitoring of Process Fluid Flows Inside Shielding, Behind Walls and Beneath Floors - 13041

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Mark W.

    2013-07-01

    Throughout power generation, delivery and waste remediation, the ability to control process streams in difficult or impossible locations becomes increasingly necessary as the complexity of processes increases. Example applications include radioactive environments, inside concrete installations, buried in dirt, or inside a shielded or insulated pipe. In these situations, it is necessary to implement innovative solutions to tackle such issues as valve maintenance, valve control from remote locations, equipment cleaning in hazardous environments, and flow stream analysis. The Extended Sleeve family of products provides a scalable solution to tackle some of the most challenging applications in hazardous environments which require flowmore » stream control and monitoring. The Extended Sleeve family of products is defined in three groups: Extended Sleeve (ESV), Extended Bonnet (EBV) and Instrument Enclosure (IE). Each of the products provides a variation on the same requirements: to provide access to the internals of a valve, or to monitor the fluid passing through the pipeline through shielding around the process pipe. The shielding can be as simple as a grout filled pipe covering a process pipe or as complex as a concrete deck protecting a room in which the valves and pipes pass through at varying elevations. Extended Sleeves are available between roughly 30 inches and 18 feet of distance between the pipeline centerline and the top of the surface to which it mounts. The Extended Sleeve provides features such as ± 1.5 inches of adjustment between the pipeline and deck location, internal flush capabilities, automatic alignment of the internal components during assembly and integrated actuator mounting pads. The Extended Bonnet is a shorter fixed height version of the Extended Sleeve which has a removable deck flange to facilitate installation through walls, and is delivered fully assembled. The Instrument Enclosure utilizes many of the same components as an Extended Sleeve, yet allows the installation of process monitoring instruments, such as a turbidity meter to be placed in the flow stream. The basis of the design is a valve body, which, rather than having a directly mounted bonnet has lengths of concentric pipe added, which move the bonnet away from the valve body. The pipe is conceptually similar to an oil field well, with the various strings of casing, and tubing installed. Each concentric pipe provides a required function, such as the outermost pipes, the valve sleeve and penetration sleeve, which provide structural support to the deck flange. For plug valve based designs, the next inner pipe provides compression on the environmental seals at the top of the body to bonnet joint, followed by the innermost pipe which provides rotation of the plug, in the same manner as an extended stem. Ball valve ESVs have an additional pipe to provide compressive loading on the stem packing. Due to the availability of standard pipe grades and weights, the product can be configured to fit a wide array of valve sizes, and application lengths, with current designs as short as seven inches and as tall as 18 feet. Central to the design is the requirement for no special tools or downhole tools to remove parts or configure the product. Off the shelf wrenches, sockets or other hand tools are all that is required. Compared to other products historically available, this design offers a lightweight option, which, while not as rigidly stiff, can deflect compliantly under extreme seismic loading, rather than break. Application conditions vary widely, as the base product is 316 and 304 stainless steel, but utilizes 17-4PH, and other allows as needed based on the temperature range and mechanical requirements. Existing designs are installed in applications as hot as 1400 deg. F, at low pressure, and separately in highly radioactive environments. The selection of plug versus ball valve, metal versus soft seats, and the material of the seals and seats is all dependent on the application requirements. The design of the Extended Sleeve family of products provides a platform which solves a variety of accessibility problems associated with controlling process flow streams in remote, hard to reach locations in harsh environments. Installation of the equipment described has shown to allow access to flow streams that otherwise would require exceptional means to access and control. The Extended Sleeve family of products provides a scalable solution to both control and monitor process fluid flow through shielding, walls or floors when direct connection is advantageous. (authors)« less

  3. Enterprise systems security management: a framework for breakthrough protection

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.

    2010-04-01

    Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.

  4. Design of an Efficient CAC for a Broadband DVB-S/DVB-RCS Satellite Access Network

    NASA Astrophysics Data System (ADS)

    Inzerilli, Tiziano; Montozzi, Simone

    2003-07-01

    This paper deals with efficient utilization of network resources in an advanced broadband satellite access system. It proposes a technique for admission control of IP streams with guaranteed QoS which does not interfere with the particular BoD (Bandwidth on Demand) algorithm that handles access to uplink bandwidth, an essential part of a DVB- RCS architecture. This feature of the admission control greatly simplify its integration in the satellite network. The purpose of this admission control algorithm in particular is to suitably and dynamically configure the overall traffic control parameters, in the access terminal of the user and service segment, with a simple approach which does not introduces limitations and/or constraints to the BoD algorithm. Performance of the proposed algorithm is evaluated thorugh Opnet simulations using an ad-hoc platform modeling DVB-based satellite access.The results presented in this paper were obtained within SATIP6 project, which is sponsored within the 5th EU Research Programme, IST. The aims of the project are to evaluate and demonstrate key issues of the integration of satellite-based access networks into the Internet in order to support multimedia services over wide areas. The satellite link layer is based on DVB-S on the forward link and DVB-RCS on the return link. Adaptation and optimization of the DVB-RCS access standard in order to support QoS provision are central issues of the project. They are handled through an integration of Connection Admission Control (CAC), Traffic Shaping and Policing techniques.

  5. Rapid assessment of disability in the Philippines: understanding prevalence, well-being, and access to the community for people with disabilities to inform the W-DARE project.

    PubMed

    Marella, Manjula; Devine, Alexandra; Armecin, Graeme Ferdinand; Zayas, Jerome; Marco, Ma Jesusa; Vaughan, Cathy

    2016-01-01

    International recognition that people with disabilities were excluded from the Millennium Development Goals has led to better inclusion of people with disabilities in the recently agreed Global Goals for Sustainable Development (SDGs) 2015-2030. Given the current global agenda for disability inclusion, it is crucial to increase the understanding of the situation of people with disabilities in the Philippines. The aim of this study was to estimate the prevalence of disability and compare the well-being and access to the community between people with and without disabilities. A population-based survey was undertaken in District 2 of Quezon City and in Ligao City. 60 clusters of 50 people aged 18 years and older were selected with probability proportion to size sampling from both locations. The Rapid Assessment of Disability (RAD) survey was used to identify people with disabilities based on their responses to activity limitations. The levels of well-being and access to the community for people with disabilities were compared with controls matched by age, gender, and cluster. Information on barriers to accessing the community was also collected. The prevalence of disability was 6.8 (95 % CI: 5.9, 7.9) and 13.6 % (95 % CI: 11.4, 16.2) in Quezon City and Ligao City respectively. Psychological distress was the most commonly reported condition in both locations, although it was often reported with a co-morbid condition related to sensory, physical, cognitive, and communication difficulties. The prevalence of disability was associated with age and no schooling, but not associated with poverty. People with disabilities had significantly lower well-being scores and reduced access to health services, work, rehabilitation, education, government social welfare, and disaster management than people without disability. Having a disability and negative family attitudes were reported as barriers for people with disabilities participating in work, community meetings, religious activities, and social activities. The prevalence of disability among adults in District 2 of Quezon City and in Ligao City is higher than the estimated national prevalence of disability derived from the 2010 Philippines census. Disability is also associated with lower well-being and reduced participation across a number of domains of community life.

  6. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  7. Use of Web-based library resources by medical students in community and ambulatory settings.

    PubMed

    Tannery, Nancy Hrinya; Foust, Jill E; Gregg, Amy L; Hartman, Linda M; Kuller, Alice B; Worona, Paul; Tulsky, Asher A

    2002-07-01

    The purpose was to evaluate the use of Web-based library resources by third-year medical students. Third-year medical students (147) in a twelve-week multidisciplinary primary care rotation in community and ambulatory settings. Individual user surveys and log file analysis of Website were used. Twenty resource topics were compiled into a Website to provide students with access to electronic library resources from any community-based clerkship location. These resource topics, covering subjects such as hypertension and back pain, linked to curriculum training problems, full-text journal articles, MEDLINE searches, electronic book chapters, and relevant Websites. More than half of the students (69%) accessed the Website on a daily or weekly basis. Over 80% thought the Website was a valuable addition to their clerkship. Web-based information resources can provide curriculum support to students for whom access to the library is difficult and time consuming.

  8. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks.

    PubMed

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-10-12

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  9. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    PubMed Central

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-01-01

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel. PMID:27754316

  10. Visualization of historical data for the ATLAS detector controls - DDV

    NASA Astrophysics Data System (ADS)

    Maciejewski, J.; Schlenker, S.

    2017-10-01

    The ATLAS experiment is one of four detectors located on the Large Hardon Collider (LHC) based at CERN. Its detector control system (DCS) stores the slow control data acquired within the back-end of distributed WinCC OA applications, which enables the data to be retrieved for future analysis, debugging and detector development in an Oracle relational database. The ATLAS DCS Data Viewer (DDV) is a client-server application providing access to the historical data outside of the experiment network. The server builds optimized SQL queries, retrieves the data from the database and serves it to the clients via HTTP connections. The server also implements protection methods to prevent malicious use of the database. The client is an AJAX-type web application based on the Vaadin (framework build around the Google Web Toolkit (GWT)) which gives users the possibility to access the data with ease. The DCS metadata can be selected using a column-tree navigation or a search engine supporting regular expressions. The data is visualized by a selection of output modules such as a java script value-over time plots or a lazy loading table widget. Additional plugins give the users the possibility to retrieve the data in ROOT format or as an ASCII file. Control system alarms can also be visualized in a dedicated table if necessary. Python mock-up scripts can be generated by the client, allowing the user to query the pythonic DDV server directly, such that the users can embed the scripts into more complex analysis programs. Users are also able to store searches and output configurations as XML on the server to share with others via URL or to embed in HTML.

  11. Evaluation of Student Learning in Remotely Controlled Instrumental Analyses

    ERIC Educational Resources Information Center

    Meintzer, Chris; Sutherland, Frances; Kennepohl, Dietmar K.

    2017-01-01

    The Canadian Remote Sciences Laboratories (CRSL) website (www.remotelab.ca) was successfully employed in a study of the differences in the performance and perceptions of students' about their learning in the laboratory (in-person) versus learning at a remote location (remote access). The experiment was completed both in-person and via remote…

  12. 29 CFR 1910.306 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... means required by paragraph (e)(1) of this section. (f) X-Ray equipment. This paragraph applies to X-ray... disconnecting means shall be operable from a location readily accessible from the X-ray control. For equipment... suitable nonmetallic raceways or cable trays; or (C) Wire or cable in suitable metal raceways or metal...

  13. 29 CFR 1910.306 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... means required by paragraph (e)(1) of this section. (f) X-Ray equipment. This paragraph applies to X-ray... disconnecting means shall be operable from a location readily accessible from the X-ray control. For equipment... suitable nonmetallic raceways or cable trays; or (C) Wire or cable in suitable metal raceways or metal...

  14. IMPACT OF DECISION-MAKING STRATEGIES AND COMMUNICATION PROCESSES ON THE PUBLIC ACCEPTABILITY OF MUNICIPAL WASTE COMBUSTION RESIDUE UTILIZATION IN THE UNITED STATES

    EPA Science Inventory

    Of the identified current and proposed construction projects in which municipal solid waste combustion residues replace traditionally used materials, approximately half are located on landfills or other property controlled by project sponsors, one third are in publicly accessible...

  15. 46 CFR 58.25-40 - Arrangement of the steering-gear compartment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., separated from any machinery space; (2) Ensure working access to machinery and controls in the compartment; and (3) Include handrails and either gratings or other non-slip surfaces to ensure a safe working environment if hydraulic fluid leaks. Note: Where practicable, all steering gear should be located in the...

  16. Policy-based secure communication with automatic key management for industrial control and automation systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less

  17. Assessing seasonality of travel distance to harm reduction service providers among persons who inject drugs.

    PubMed

    Allen, Sean T; Ruiz, Monica S; Roess, Amira; Jones, Jeff

    2015-10-12

    Prior research has examined access to syringe exchange program (SEP) services among persons who inject drugs (PWID), but no research has been conducted to evaluate variations in SEP access based on season. This is an important gap in the literature given that seasonal weather patterns and inclement weather may affect SEP service utilization. The purpose of this research is to examine differences in access to SEPs by season among PWID in the District of Columbia (DC). A geometric point distance estimation technique was applied to records from a DC SEP that operated from 1996 to 2011. We calculated the walking distance (via sidewalks) from the centroid point of zip code of home residence to the exchange site where PWID presented for services. Analysis of variance (ANOVA) was used to examine differences in walking distance measures by season. Differences in mean walking distance measures were statistically significant between winter and spring with PWID traveling approximately 2.88 and 2.77 miles, respectively, to access the SEP during these seasons. The results of this study suggest that seasonal differences in SEP accessibility may exist between winter and spring. PWID may benefit from harm reduction providers adapting their SEP operations to provide a greater diversity of exchange locations during seasons in which inclement weather may negatively influence engagement with SEPs. Increasing the number of exchange locations based on season may help resolve unmet needs among injectors.

  18. A Rewritable, Random-Access DNA-Based Storage System.

    PubMed

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-18

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  19. A Rewritable, Random-Access DNA-Based Storage System

    NASA Astrophysics Data System (ADS)

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  20. Distributed policy based access to networked heterogeneous ISR data sources

    NASA Astrophysics Data System (ADS)

    Bent, G.; Vyvyan, D.; Wood, David; Zerfos, Petros; Calo, Seraphin

    2010-04-01

    Within a coalition environment, ad hoc Communities of Interest (CoI's) come together, perhaps for only a short time, with different sensors, sensor platforms, data fusion elements, and networks to conduct a task (or set of tasks) with different coalition members taking different roles. In such a coalition, each organization will have its own inherent restrictions on how it will interact with the others. These are usually stated as a set of policies, including security and privacy policies. The capability that we want to enable for a coalition operation is to provide access to information from any coalition partner in conformance with the policies of all. One of the challenges in supporting such ad-hoc coalition operations is that of providing efficient access to distributed sources of data, where the applications requiring the data do not have knowledge of the location of the data within the network. To address this challenge the International Technology Alliance (ITA) program has been developing the concept of a Dynamic Distributed Federated Database (DDFD), also know as a Gaian Database. This type of database provides a means for accessing data across a network of distributed heterogeneous data sources where access to the information is controlled by a mixture of local and global policies. We describe how a network of disparate ISR elements can be expressed as a DDFD and how this approach enables sensor and other information sources to be discovered autonomously or semi-autonomously and/or combined, fused formally defined local and global policies.

  1. A pilot program in rural telepsychiatry for deaf and hard of hearing populations.

    PubMed

    Crowe, Teresa; Jani, Suni; Jani, Sushma; Jani, Niranjan; Jani, Raja

    2016-03-01

    Access to mental health care in deaf communities is limited by cultural considerations, availability of translators, and technological considerations. Telepsychiatry can mitigate the deaf community's lack of access to care by allowing for deaf individuals in remote communities access to care with facilities that cater to their needs. Community Behavioral Health, Arundel Lodge, and Gallaudet University worked in conjunction to test three hypotheses: 1.Telepsychiatry will be as effective as traditional face-to-face psychotherapy with deaf adults who have chronic mental illness.2.Patients living in remote locations will report an improvement in accessibility to mental health services.3.Patients who receive telepsychiatry will report a comparable level of satisfaction of services to those receiving traditional services. The patient sample consisted of 24 participants, 13 women, 11 men. Telepsychiatry sessions were scheduled based on each patient's individual treatment plan against a control group who saw their providers face to face. The telepsychiatry and in-person groups were slightly different at baseline. Analysis of the data revealed no significant difference in coping abilities and psychiatric symptoms between those receiving face-to-face psychotherapy and those receiving telepsychiatry. The quality and outcome of care was equal to in-person for the telepsychiatry in deaf patients. Since telepsychiatry does not compromise the quality of care, it is a good means of reaching out to members of the deaf community that cannot readily access mental health resources that meet their needs.

  2. Developing Information Services and Tools to Access and Evaluate Data Quality in Global Satellite-based Precipitation Products

    NASA Astrophysics Data System (ADS)

    Liu, Z.; Shie, C. L.; Meyer, D. J.

    2017-12-01

    Global satellite-based precipitation products have been widely used in research and applications around the world. Compared to ground-based observations, satellite-based measurements provide precipitation data on a global scale, especially in remote continents and over oceans. Over the years, satellite-based precipitation products have evolved from single sensor and single algorithm to multi-sensors and multi-algorithms. As a result, many satellite-based precipitation products have been enhanced such as spatial and temporal coverages. With inclusion of ground-based measurements, biases of satellite-based precipitation products have been significantly reduced. However, data quality issues still exist and can be caused by many factors such as observations, satellite platform anomaly, algorithms, production, calibration, validation, data services, etc. The NASA Goddard Earth Sciences (GES) Data and Information Services Center (DISC) is home to NASA global precipitation product archives including the Tropical Rainfall Measuring Mission (TRMM), the Global Precipitation Measurement (GPM), as well as other global and regional precipitation products. Precipitation is one of the top downloaded and accessed parameters in the GES DISC data archive. Meanwhile, users want to easily locate and obtain data quality information at regional and global scales to better understand how precipitation products perform and how reliable they are. As data service providers, it is necessary to provide an easy access to data quality information, however, such information normally is not available, and when it is available, it is not in one place and difficult to locate. In this presentation, we will present challenges and activities at the GES DISC to address precipitation data quality issues.

  3. Transport spectroscopy of coupled donors in silicon nano-transistors

    PubMed Central

    Moraru, Daniel; Samanta, Arup; Anh, Le The; Mizuno, Takeshi; Mizuta, Hiroshi; Tabe, Michiharu

    2014-01-01

    The impact of dopant atoms in transistor functionality has significantly changed over the past few decades. In downscaled transistors, discrete dopants with uncontrolled positions and number induce fluctuations in device operation. On the other hand, by gaining access to tunneling through individual dopants, a new type of devices is developed: dopant-atom-based transistors. So far, most studies report transport through dopants randomly located in the channel. However, for practical applications, it is critical to control the location of the donors with simple techniques. Here, we fabricate silicon transistors with selectively nanoscale-doped channels using nano-lithography and thermal-diffusion doping processes. Coupled phosphorus donors form a quantum dot with the ground state split into a number of levels practically equal to the number of coupled donors, when the number of donors is small. Tunneling-transport spectroscopy reveals fine features which can be correlated with the different numbers of donors inside the quantum dot, as also suggested by first-principles simulation results. PMID:25164032

  4. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    NASA Astrophysics Data System (ADS)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  5. United States Navy - Canadian forces solid state flight data recorder/crash position locator experiment on the B-720 controlled impact demonstration

    NASA Technical Reports Server (NTRS)

    Watters, D. M.

    1986-01-01

    The operation of a radio beacon position locator during and after the remotely controlled transport aircraft is discussed. The radio beacon transmission was actuated and was picked up by the Navy P-3A chase aircraft for a short time, after which reception was lost. The pilot reported that he received a signal on both 121.5 MHz and 243 MHz for a period of approximately 5 seconds. Five minutes after the crash a portable direction finding unit located on the roof of the NASA Dryden Flight Research Facility, 4 miles distant from the crash, was unable to pick up the beacon transmission. The fire crews started fighting the fires approximately 90 seconds after the time of impact. Navy personnel access to the crash site was allowed on the morning of December 2, 1984. Radio beacon locator was found resting top side up, 15 feet forward and 13 feet perpendicular from the tray location the starboard side of the aircraft. An immediate inspection indicated the airfoil suffered moderate fire damage with paint peeling but not intumescing. The visual marker strobe lamp housings were intact but extensively burned such that it was impossible to see if the lamps had survived. The airfoil suffered minor structural damage, with assorted dents, etc. The extended plunger on the ARU-21 release unit indicated that the pyrotechnic deployment system operated. The radio beacon base (tray) suffered some heat and fire damage, and was charred and blackened by smoke. The frangible switch in the nose survived and the switch in the belly was recovered and found to have actuated. It is assumed that this switch fired the ARU-21 squib. There were no other release switches installed in the normally open system in the aircraft.

  6. The proposed monitoring system for the Fermilab D0 colliding beams detector

    NASA Astrophysics Data System (ADS)

    Goodwin, Robert; Florian, Robert; Johnson, Marvin; Jones, Alan; Shea, Mike

    1986-06-01

    The Fermilab D0 Detector is a collaborative effort that includes seventeen universities and national laboratories. The monitoring and control system for this detector will be separate from the online detector data system. A distributed, stand-alone, microprocessor-based system is being designed to allow monitoring and control functions to be available to the collaborators at their home institutions during the design, fabrication, and testing phases of the project. Individual stations are VMEbus-based 68000 systems that are networked together during installation using an ARCnet (by Datapoint Corporation) Local Area Network. One station, perhaps a MicroVAX, would have a hard disk to store a backup copy of the distributed database located in non-volatile RAM in the local stations. This station would also serve as a gateway to the online system, so that data from the control system will be available for logging with the detector data. Apple Macintosh personal computers are being developed for use as the local control consoles. Each would be interfaced to ARCnet to provide access to all control system data. Through the use of bit-mapped graphics with multiple windows and pull-down menus, a cost effective, flexible display system can be provided, taking advantage of familiar modern software tools to support the operator interface.

  7. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  8. Quantifying the Effect of DNA Packaging on Gene Expression Level

    NASA Astrophysics Data System (ADS)

    Kim, Harold

    2010-10-01

    Gene expression, the process by which the genetic code comes alive in the form of proteins, is one of the most important biological processes in living cells, and begins when transcription factors bind to specific DNA sequences in the promoter region upstream of a gene. The relationship between gene expression output and transcription factor input which is termed the gene regulation function is specific to each promoter, and predicting this gene regulation function from the locations of transcription factor binding sites is one of the challenges in biology. In eukaryotic organisms (for example, animals, plants, fungi etc), DNA is highly compacted into nucleosomes, 147-bp segments of DNA tightly wrapped around histone protein core, and therefore, the accessibility of transcription factor binding sites depends on their locations with respect to nucleosomes - sites inside nucleosomes are less accessible than those outside nucleosomes. To understand how transcription factor binding sites contribute to gene expression in a quantitative manner, we obtain gene regulation functions of promoters with various configurations of transcription factor binding sites by using fluorescent protein reporters to measure transcription factor input and gene expression output in single yeast cells. In this talk, I will show that the affinity of a transcription factor binding site inside and outside the nucleosome controls different aspects of the gene regulation function, and explain this finding based on a mass-action kinetic model that includes competition between nucleosomes and transcription factors.

  9. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  10. Silent store detection and recording in memory storage

    DOEpatents

    Bose, Pradip; Cher, Chen-Yong; Nair, Ravi

    2017-03-07

    An aspect includes receiving a write request that includes a memory address and write data. Stored data is read from a memory location at the memory address. Based on determining that the memory location was not previously modified, the stored data is compared to the write data. Based on the stored data matching the write data, the write request is completed without writing the write data to the memory and a corresponding silent store bit, in a silent store bitmap is set. Based on the stored data not matching the write data, the write data is written to the memory location, the silent store bit is reset and a corresponding modified bit is set. At least one of an application and an operating system is provided access to the silent store bitmap.

  11. Silent store detection and recording in memory storage

    DOEpatents

    Bose, Pradip; Cher, Chen-Yong; Nair, Ravi

    2016-09-20

    An aspect includes receiving a write request that includes a memory address and write data. Stored data is read from a memory location at the memory address. Based on determining that the memory location was not previously modified, the stored data is compared to the write data. Based on the stored data matching the write data, the write request is completed without writing the write data to the memory and a corresponding silent store bit, in a silent store bitmap is set. Based on the stored data not matching the write data, the write data is written to the memory location, the silent store bit is reset and a corresponding modified bit is set. At least one of an application and an operating system is provided access to the silent store bitmap.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bose, Pradip; Cher, Chen-Yong; Nair, Ravi

    An aspect includes receiving a write request that includes a memory address and write data. Stored data is read from a memory location at the memory address. Based on determining that the memory location was not previously modified, the stored data is compared to the write data. Based on the stored data matching the write data, the write request is completed without writing the write data to the memory and a corresponding silent store bit, in a silent store bitmap is set. Based on the stored data not matching the write data, the write data is written to the memorymore » location, the silent store bit is reset and a corresponding modified bit is set. At least one of an application and an operating system is provided access to the silent store bitmap.« less

  13. ViSA: a neurodynamic model for visuo-spatial working memory, attentional blink, and conscious access.

    PubMed

    Simione, Luca; Raffone, Antonino; Wolters, Gezinus; Salmas, Paola; Nakatani, Chie; Belardinelli, Marta Olivetti; van Leeuwen, Cees

    2012-10-01

    Two separate lines of study have clarified the role of selectivity in conscious access to visual information. Both involve presenting multiple targets and distracters: one simultaneously in a spatially distributed fashion, the other sequentially at a single location. To understand their findings in a unified framework, we propose a neurodynamic model for Visual Selection and Awareness (ViSA). ViSA supports the view that neural representations for conscious access and visuo-spatial working memory are globally distributed and are based on recurrent interactions between perceptual and access control processors. Its flexible global workspace mechanisms enable a unitary account of a broad range of effects: It accounts for the limited storage capacity of visuo-spatial working memory, attentional cueing, and efficient selection with multi-object displays, as well as for the attentional blink and associated sparing and masking effects. In particular, the speed of consolidation for storage in visuo-spatial working memory in ViSA is not fixed but depends adaptively on the input and recurrent signaling. Slowing down of consolidation due to weak bottom-up and recurrent input as a result of brief presentation and masking leads to the attentional blink. Thus, ViSA goes beyond earlier 2-stage and neuronal global workspace accounts of conscious processing limitations. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  14. Location and Modality Effects in Online Dating: Rich Modality Profile and Location-Based Information Cues Increase Social Presence, While Moderating the Impact of Uncertainty Reduction Strategy.

    PubMed

    Jung, Soyoung; Roh, Soojin; Yang, Hyun; Biocca, Frank

    2017-09-01

    This study investigates how different interface modality features of online dating sites, such as location awareness cues and modality of profiles, affect the sense of social presence of a prospective date. We also examined how various user behaviors aimed at reducing uncertainty about online interactions affect social presence perceptions and are affected by the user interface features. Male users felt a greater sense of social presence when exposed to both location and accessibility cues (geographical proximity) and a richer medium (video profiles). Viewing a richer medium significantly increased the sense of social presence among female participants whereas location-based information sharing features did not directly affect their social presence perception. Augmented social presence, as a mediator, contributed to users' greater intention to meet potential dating partners in a face-to-face setting and to buy paid memberships on online dating sites.

  15. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  16. Capacity Estimation Model for Signalized Intersections under the Impact of Access Point

    PubMed Central

    Zhao, Jing; Li, Peng; Zhou, Xizhao

    2016-01-01

    Highway Capacity Manual 2010 provides various factors to adjust the base saturation flow rate for the capacity analysis of signalized intersections. No factors, however, is considered for the potential change of signalized intersections capacity caused by the access point closeing to the signalized intersection. This paper presented a theoretical model to estimate the lane group capacity at signalized intersections with the consideration of the effects of access points. Two scenarios of access point locations, upstream or downstream of the signalized intersection, and impacts of six types of access traffic flow are taken into account. The proposed capacity model was validated based on VISSIM simulation. Results of extensive numerical analysis reveal the substantial impact of access point on the capacity, which has an inverse correlation with both the number of major street lanes and the distance between the intersection and access point. Moreover, among the six types of access traffic flows, the access traffic flow 1 (right-turning traffic from major street), flow 4 (left-turning traffic from access point), and flow 5 (left-turning traffic from major street) cause a more significant effect on lane group capacity than others. Some guidance on the mitigation of the negative effect is provided for practitioners. PMID:26726998

  17. Development of wide area environment accelerator operation and diagnostics method

    NASA Astrophysics Data System (ADS)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  18. Introducing keytagging, a novel technique for the protection of medical image-based tests.

    PubMed

    Rubio, Óscar J; Alesanco, Álvaro; García, José

    2015-08-01

    This paper introduces keytagging, a novel technique to protect medical image-based tests by implementing image authentication, integrity control and location of tampered areas, private captioning with role-based access control, traceability and copyright protection. It relies on the association of tags (binary data strings) to stable, semistable or volatile features of the image, whose access keys (called keytags) depend on both the image and the tag content. Unlike watermarking, this technique can associate information to the most stable features of the image without distortion. Thus, this method preserves the clinical content of the image without the need for assessment, prevents eavesdropping and collusion attacks, and obtains a substantial capacity-robustness tradeoff with simple operations. The evaluation of this technique, involving images of different sizes from various acquisition modalities and image modifications that are typical in the medical context, demonstrates that all the aforementioned security measures can be implemented simultaneously and that the algorithm presents good scalability. In addition to this, keytags can be protected with standard Cryptographic Message Syntax and the keytagging process can be easily combined with JPEG2000 compression since both share the same wavelet transform. This reduces the delays for associating keytags and retrieving the corresponding tags to implement the aforementioned measures to only ≃30 and ≃90ms respectively. As a result, keytags can be seamlessly integrated within DICOM, reducing delays and bandwidth when the image test is updated and shared in secure architectures where different users cooperate, e.g. physicians who interpret the test, clinicians caring for the patient and researchers. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. A GPS-based Real-time Road Traffic Monitoring System

    NASA Astrophysics Data System (ADS)

    Tanti, Kamal Kumar

    In recent years, monitoring systems are astonishingly inclined towards ever more automatic; reliably interconnected, distributed and autonomous operation. Specifically, the measurement, logging, data processing and interpretation activities may be carried out by separate units at different locations in near real-time. The recent evolution of mobile communication devices and communication technologies has fostered a growing interest in the GIS & GPS-based location-aware systems and services. This paper describes a real-time road traffic monitoring system based on integrated mobile field devices (GPS/GSM/IOs) working in tandem with advanced GIS-based application software providing on-the-fly authentications for real-time monitoring and security enhancement. The described system is developed as a fully automated, continuous, real-time monitoring system that employs GPS sensors and Ethernet and/or serial port communication techniques are used to transfer data between GPS receivers at target points and a central processing computer. The data can be processed locally or remotely based on the requirements of client’s satisfaction. Due to the modular architecture of the system, other sensor types may be supported with minimal effort. Data on the distributed network & measurements are transmitted via cellular SIM cards to a Control Unit, which provides for post-processing and network management. The Control Unit may be remotely accessed via an Internet connection. The new system will not only provide more consistent data about the road traffic conditions but also will provide methods for integrating with other Intelligent Transportation Systems (ITS). For communication between the mobile device and central monitoring service GSM technology is used. The resulting system is characterized by autonomy, reliability and a high degree of automation.

  20. Accessibility to health care facilities in Montreal Island: an application of relative accessibility indicators from the perspective of senior and non-senior residents.

    PubMed

    Paez, Antonio; Mercado, Ruben G; Farber, Steven; Morency, Catherine; Roorda, Matthew

    2010-10-25

    Geographical access to health care facilities is known to influence health services usage. As societies age, accessibility to health care becomes an increasingly acute public health concern. It is known that seniors tend to have lower mobility levels, and it is possible that this may negatively affect their ability to reach facilities and services. Therefore, it becomes important to examine the mobility situation of seniors vis-a-vis the spatial distribution of health care facilities, to identify areas where accessibility is low and interventions may be required. Accessibility is implemented using a cumulative opportunities measure. Instead of assuming a fixed bandwidth (i.e. a distance threshold) for measuring accessibility, in this paper the bandwidth is defined using model-based estimates of average trip length. Average trip length is an all-purpose indicator of individual mobility and geographical reach. Adoption of a spatial modelling approach allows us to tailor these estimates of travel behaviour to specific locations and person profiles. Replacing a fixed bandwidth with these estimates permits us to calculate customized location- and person-based accessibility measures that allow inter-personal as well as geographical comparisons. The case study is Montreal Island. Geo-coded travel behaviour data, specifically average trip length, and relevant traveller's attributes are obtained from the Montreal Household Travel Survey. These data are complemented with information from the Census. Health care facilities, also geo-coded, are extracted from a comprehensive business point database. Health care facilities are selected based on Standard Industrial Classification codes 8011-21 (Medical Doctors and Dentists). Model-based estimates of average trip length show that travel behaviour varies widely across space. With the exception of seniors in the downtown area, older residents of Montreal Island tend to be significantly less mobile than people of other age cohorts. The combination of average trip length estimates with the spatial distribution of health care facilities indicates that despite being more mobile, suburban residents tend to have lower levels of accessibility compared to central city residents. The effect is more marked for seniors. Furthermore, the results indicate that accessibility calculated using a fixed bandwidth would produce patterns of exposure to health care facilities that would be difficult to achieve for suburban seniors given actual mobility patterns. The analysis shows large disparities in accessibility between seniors and non-seniors, between urban and suburban seniors, and between vehicle owning and non-owning seniors. This research was concerned with potential accessibility levels. Follow up research could consider the results reported here to select case studies of actual access and usage of health care facilities, and related health outcomes.

  1. Smart Location Mapping

    EPA Pesticide Factsheets

    The Smart Location Database, Access to Jobs and Workers via Transit, and National Walkability Index tools can help assess indicators related to the built environment, transit accessibility, and walkability.

  2. 49 CFR Figure 1a to Subpart B of... - Example of Location of Rescue Access Windows-§ 238.114

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Example of Location of Rescue Access Windows-§ 238.114 1A Figure 1A to Subpart B of Part 238 Transportation Other Regulations Relating to... B of Part 238—Example of Location of Rescue Access Windows—§ 238.114 ER01FE08.002 [73 FR 6403, Feb...

  3. A GIS-based decision support system for determining the shortest and safest route to forest fires: a case study in Mediterranean Region of Turkey.

    PubMed

    Akay, Abdullah E; Wing, Michael G; Sivrikaya, Fatih; Sakar, Dursun

    2012-03-01

    The ability of firefighting vehicles and staff to reach a fire area as quickly as possible is critical in fighting against forest fires. In this study, a Geographical Information System-based decision support system was developed to assist fire managers in determining the fastest and the safest or more reliable access routes from firefighting headquarters to fire areas. The decision support system was tested in the Kahramanmaras Forestry Regional Directoratein the Mediterranean region of Turkey. The study area consisted of forested lands which had been classified according to fire sensitivity. The fire response routing simulations considered firefighting teams located in 20 firefighting headquarter locations. The road network, the locations of the firefighting headquarters, and possible fire locations were mapped for simulation analysis. In alternative application simulations, inaccessible roads which might be closed due to fire or other reasons were indicated in the network analysis so that the optimum route was not only the fastest but also the safest and most reliable path. The selection of which firefighting headquarters to use was evaluated by considering critical response time to potential fire areas based on fire sensitivity levels. Results indicated that new firefighting headquarters should be established in the region in order to provide sufficient firefighting response to all forested lands. In addition, building new fire access roads and increasing the design speed on current roads could also increase firefighting response capabilities within the study area.

  4. 78 FR 34382 - Information Collection Being Submitted for Review and Approval to the Office of Management and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-07

    ... INFORMATION CONTACT: Judith B. Herman, Office of Managing Director, FCC, at 202-418-0214. SUPPLEMENTARY... cable service providers reasonable and nondiscriminatory access to conduits and rights-of-way located in... of certain video antennas on property within the exclusive use or control of the antenna user, where...

  5. 78 FR 56541 - Concept Release on Risk Controls and System Safeguards for Automated Trading Environments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... exchange itself, while proximity hosting indicates services offered by third parties.\\23\\ In 2010, the... offer co-location and/or proximity hosting to offer such services on an equal access basis, ensure that... executed orders, while other personnel provided a range of order, trade processing and back office services...

  6. Social Influences on User Behavior in Group Information Repositories

    ERIC Educational Resources Information Center

    Rader, Emilee Jeanne

    2009-01-01

    Group information repositories are systems for organizing and sharing files kept in a central location that all group members can access. These systems are often assumed to be tools for storage and control of files and their metadata, not tools for communication. The purpose of this research is to better understand user behavior in group…

  7. Phenotypic evaluation and genetic dissection of resistance to Phytophthora sojae in the Chinese soybean mini core collection.

    PubMed

    Huang, Jing; Guo, Na; Li, Yinghui; Sun, Jutao; Hu, Guanjun; Zhang, Haipeng; Li, Yanfei; Zhang, Xing; Zhao, Jinming; Xing, Han; Qiu, Lijuan

    2016-06-18

    Phytophthora root and stem rot (PRR) caused by Phytophthora sojae is one of the most serious diseases affecting soybean (Glycine max (L.) Merr.) production all over the world. The most economical and environmentally-friendly way to control the disease is the exploration and utilization of resistant varieties. We screened a soybean mini core collection composed of 224 germplasm accessions for resistance against eleven P. sojae isolates. Soybean accessions from the Southern and Huanghuai regions, especially the Hubei, Jiangsu, Sichuan and Fujian provinces, had the most varied and broadest spectrum of resistance. Based on gene postulation, Rps1b, Rps1c, Rps4, Rps7 and novel resistance genes were identified in resistant accessions. Consequently, association mapping of resistance to each isolate was performed with 1,645 single nucleotide polymorphism (SNP) markers. A total of 14 marker-trait associations for Phytophthora resistance were identified. Among them, four were located in known PRR resistance loci intervals, five were located in other disease resistance quantitative trait locus (QTL) regions, and five associations unmasked novel loci for PRR resistance. In addition, we also identified candidate genes related to resistance. This is the first P. sojae resistance evaluation conducted using the Chinese soybean mini core collection, which is a representative sample of Chinese soybean cultivars. The resistance reaction analyses provided an excellent database of resistant resources and genetic variations for future breeding programs. The SNP markers associated with resistance will facilitate marker-assisted selection (MAS) in breeding programs for resistance to PRR, and the candidate genes may be useful for exploring the mechanism underlying P. sojae resistance.

  8. Characteristics of Hospital-Based Munchausen Syndrome by Proxy in Japan

    ERIC Educational Resources Information Center

    Fujiwara, Takeo; Okuyama, Makiko; Kasahara, Mari; Nakamura, Ayako

    2008-01-01

    Objective: This article explores characteristics of Munchausen Syndrome by Proxy (MSBP) in Japan, a country which provides an egalitarian, low cost, and easy-access health care system. Methods: We sent a questionnaire survey to 11 leading doctors in the child abuse field in Japan, each located in different hospital-based sites. Child abuse doctors…

  9. A Comparative Study of Two Azimuth Based Non Standard Location Methods

    DTIC Science & Technology

    2017-03-23

    Standard Location Methods Rongsong JIH U.S. Department of State / Arms Control, Verification, and Compliance Bureau, 2201 C Street, NW, Washington...COMPARATIVE STUDY OF TWO AZIMUTH-BASED NON-STANDARD LOCATION METHODS R. Jih Department of State / Arms Control, Verification, and Compliance Bureau...cable. The so-called “Yin Zhong Xian” (“引中线” in Chinese) algorithm, hereafter the YZX method , is an Oriental version of IPB-based procedure. It

  10. Overcoming Spatial and Temporal Barriers to Public Access Defibrillators Via Optimization.

    PubMed

    Sun, Christopher L F; Demirtas, Derya; Brooks, Steven C; Morrison, Laurie J; Chan, Timothy C Y

    2016-08-23

    Immediate access to an automated external defibrillator (AED) increases the chance of survival for out-of-hospital cardiac arrest (OHCA). Current deployment usually considers spatial AED access, assuming AEDs are available 24 h a day. The goal of this study was to develop an optimization model for AED deployment, accounting for spatial and temporal accessibility, to evaluate if OHCA coverage would improve compared with deployment based on spatial accessibility alone. This study was a retrospective population-based cohort trial using data from the Toronto Regional RescuNET Epistry cardiac arrest database. We identified all nontraumatic public location OHCAs in Toronto, Ontario, Canada (January 2006 through August 2014) and obtained a list of registered AEDs (March 2015) from Toronto Paramedic Services. Coverage loss due to limited temporal access was quantified by comparing the number of OHCAs that occurred within 100 meters of a registered AED (assumed coverage 24 h per day, 7 days per week) with the number that occurred both within 100 meters of a registered AED and when the AED was available (actual coverage). A spatiotemporal optimization model was then developed that determined AED locations to maximize OHCA actual coverage and overcome the reported coverage loss. The coverage gain between the spatiotemporal model and a spatial-only model was computed by using 10-fold cross-validation. A total of 2,440 nontraumatic public OHCAs and 737 registered AED locations were identified. A total of 451 OHCAs were covered by registered AEDs under assumed coverage 24 h per day, 7 days per week, and 354 OHCAs under actual coverage, representing a coverage loss of 21.5% (p < 0.001). Using the spatiotemporal model to optimize AED deployment, a 25.3% relative increase in actual coverage was achieved compared with the spatial-only approach (p < 0.001). One in 5 OHCAs occurred near an inaccessible AED at the time of the OHCA. Potential AED use was significantly improved with a spatiotemporal optimization model guiding deployment. Copyright © 2016 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  11. Computer-Assisted Promotion of Recreational Opportunities in Natural Resource Areas: A Demonstration and Case Example

    Treesearch

    Emilyn Sheffield; Leslie Furr; Charles Nelson

    1992-01-01

    Filevision IV is a multilayer imaging and data-base management system that combines drawing, filing and extensive report-writing capabilities (Filevision IV, 1988). Filevision IV users access data by attaching graphics to text-oriented data-base records. Tourist attractions, support services, and geo-graphic features can be located on a base map of an area or region....

  12. Fast decoding techniques for extended single-and-double-error-correcting Reed Solomon codes

    NASA Technical Reports Server (NTRS)

    Costello, D. J., Jr.; Deng, H.; Lin, S.

    1984-01-01

    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. For example, some 256K-bit dynamic random access memories are organized as 32K x 8 bit-bytes. Byte-oriented codes such as Reed Solomon (RS) codes provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. Some special high speed decoding techniques for extended single and double error correcting RS codes. These techniques are designed to find the error locations and the error values directly from the syndrome without having to form the error locator polynomial and solve for its roots.

  13. Access to care and impacts of cancer on daily life: do they differ for metropolitan versus regional hematological cancer survivors?

    PubMed

    Paul, Christine L; Hall, Alix E; Carey, Mariko L; Cameron, Emilie C; Clinton-McHarg, Tara

    2013-08-01

    Little is known about access to care for hematological cancer patients. This study explored patient experiences of barriers to accessing care and associated financial and social impacts of the disease. Metropolitan versus nonmetropolitan experiences were compared. A state-based Australian cancer registry identified adult survivors of hematological cancers (including lymphoma, leukemia and myeloma) diagnosed in the previous 3 years. Survivors were mailed a self-report pen and paper survey. Of the 732 eligible survivors, 268 (37%) completed a survey. Forty percent of participants reported at least one locational barrier which limited access to care. Only 2% reported cancer-related expenses had restricted their treatment choices. Almost two-thirds (64%) reported at least one financial or social impact on their daily lives related to cancer. The most frequently reported impacts were the need to take time off work (44%) and difficulty paying bills (21%). Survivors living in a nonmetropolitan location had 17 times the odds of reporting locational or financial barriers compared with those in metropolitan areas. Preferred potential solutions to alleviate the financial and social impacts of the disease were: free parking for tests or treatment (37%), free medications or treatments (29%), and being able to get treatment in their local region (20%). Providing more equitable access to care for hematological cancer patients in Australia requires addressing distances traveled to attend treatment and their associated financial and social impacts on nonmetropolitan patients. Greater flexibility in service delivery is also needed for patients still in the workforce. © 2013 National Rural Health Association.

  14. Full load estimation of an offshore wind turbine based on SCADA and accelerometer data

    NASA Astrophysics Data System (ADS)

    Noppe, N.; Iliopoulos, A.; Weijtjens, W.; Devriendt, C.

    2016-09-01

    As offshore wind farms (OWFs) grow older, the optimal use of the actual fatigue lifetime of an offshore wind turbine (OWT) and predominantly its foundation will get more important. In case of OWTs, both quasi-static wind/thrust loads and dynamic loads, as induced by turbulence, waves and the turbine's dynamics, contribute to its fatigue life progression. To estimate the remaining useful life of an OWT, the stresses acting on the fatigue critical locations within the structure should be monitored continuously. Unfortunately, in case of the most common monopile foundations these locations are often situated below sea-level and near the mud line and thus difficult or even impossible to access for existing OWTs. Actual strain measurements taken at accessible locations above the sea level show a correlation between thrust load and several SCADA parameters. Therefore a model is created to estimate the thrust load using SCADA data and strain measurements. Afterwards the thrust load acting on the OWT is estimated using the created model and SCADA data only. From this model the quasi static loads on the foundation can be estimated over the lifetime of the OWT. To estimate the contribution of the dynamic loads a modal decomposition and expansion based virtual sensing technique is applied. This method only uses acceleration measurements recorded at accessible locations on the tower. Superimposing both contributions leads to a so-called multi-band virtual sensing. The result is a method that allows to estimate the strain history at any location on the foundation and thus the full load, being a combination of both quasi-static and dynamic loads, acting on the entire structure. This approach is validated using data from an operating Belgian OWF. An initial good match between measured and predicted strains for a short period of time proofs the concept.

  15. Identification and fine-mapping of Xa33, a novel gene for resistance to Xanthomonas oryzae pv. oryzae.

    PubMed

    Kumar, P Natraj; Sujatha, K; Laha, G S; Rao, K Srinivasa; Mishra, B; Viraktamath, B C; Hari, Y; Reddy, C S; Balachandran, S M; Ram, T; Madhav, M Sheshu; Rani, N Shobha; Neeraja, C N; Reddy, G Ashok; Shaik, H; Sundaram, R M

    2012-02-01

    Broadening of the genetic base for identification and transfer of genes for resistance to insect pests and diseases from wild relatives of rice is an important strategy in resistance breeding programs across the world. An accession of Oryza nivara, International Rice Germplasm Collection (IRGC) accession number 105710, was identified to exhibit high level and broad-spectrum resistance to Xanthomonas oryzae pv. oryzae. In order to study the genetics of resistance and to tag and map the resistance gene or genes present in IRGC 105710, it was crossed with the bacterial blight (BB)-susceptible varieties 'TN1' and 'Samba Mahsuri' (SM) and then backcrossed to generate backcross mapping populations. Analysis of these populations and their progeny testing revealed that a single dominant gene controls resistance in IRGC 105710. The BC(1)F(2) population derived from the cross IRGC 105710/TN1//TN1 was screened with a set of 72 polymorphic simple-sequence repeat (SSR) markers distributed across the rice genome and the resistance gene was coarse mapped on chromosome 7 between the SSR markers RM5711 and RM6728 at a genetic distance of 17.0 and 19.3 centimorgans (cM), respectively. After analysis involving 49 SSR markers located between the genomic interval spanned by RM5711 and RM6728, and BC(2)F(2) population consisting of 2,011 individuals derived from the cross IRGC 105710/TN1//TN1, the gene was fine mapped between two SSR markers (RMWR7.1 and RMWR7.6) located at a genetic distance of 0.9 and 1.2 cM, respectively, from the gene and flanking it. The linkage distances were validated in a BC(1)F(2) mapping population derived from the cross IRGC 105710/SM//2 × SM. The BB resistance gene present in the O. nivara accession was identified to be novel based on its unique map location on chromosome 7 and wider spectrum of BB resistance; this gene has been named Xa33. The genomic region between the two closely flanking SSR markers was in silico analyzed for putatively expressed candidate genes. In total, eight genes were identified in the region and a putative gene encoding serinethreonine kinase appears to be a candidate for the Xa33 gene.

  16. The Modeling of Virtual Environment Distance Education

    NASA Astrophysics Data System (ADS)

    Xueqin, Chang

    This research presented a virtual environment that integrates in a virtual mockup services available in a university campus for students and teachers communication in different actual locations. Advantages of this system include: the remote access to a variety of services and educational tools, the representation of real structures and landscapes in an interactive 3D model that favors localization of services and preserves the administrative organization of the university. For that, the system was implemented a control access for users and an interface to allow the use of previous educational equipments and resources not designed for distance education mode.

  17. COMPLIANCE AND ENFORCEMENT REGIONAL TRACKING SYSTEM (CERTS)

    EPA Science Inventory

    The Compliance and Enforcement Regional Tracking System (CERTS) is a system that allows Region 10 employees integrated access to information in EPA national media data bases through the LAN system. CERTS will allow you to identify regulated facilities in a given location such as...

  18. Integration of LDSE and LTVS logs with HIPAA compliant auditing system (HCAS)

    NASA Astrophysics Data System (ADS)

    Zhou, Zheng; Liu, Brent J.; Huang, H. K.; Guo, Bing; Documet, Jorge; King, Nelson

    2006-03-01

    The deadline of HIPAA (Health Insurance Portability and Accountability Act) Security Rules has passed on February 2005; therefore being HIPAA compliant becomes extremely critical to healthcare providers. HIPAA mandates healthcare providers to protect the privacy and integrity of the health data and have the ability to demonstrate examples of mechanisms that can be used to accomplish this task. It is also required that a healthcare institution must be able to provide audit trails on image data access on demand for a specific patient. For these reasons, we have developed a HIPAA compliant auditing system (HCAS) for image data security in a PACS by auditing every image data access. The HCAS was presented in 2005 SPIE. This year, two new components, LDSE (Lossless Digital Signature Embedding) and LTVS (Patient Location Tracking and Verification System) logs, have been added to the HCAS. The LDSE can assure medical image integrity in a PACS, while the LTVS can provide access control for a PACS by creating a security zone in the clinical environment. By integrating the LDSE and LTVS logs with the HCAS, the privacy and integrity of image data can be audited as well. Thus, a PACS with the HCAS installed can become HIPAA compliant in image data privacy and integrity, access control, and audit control.

  19. Safe, Affordable, Convenient: Environmental Features of Malls and Other Public Spaces Used by Older Adults for Walking

    PubMed Central

    King, Diane K.; Allen, Peg; Jones, Dina L.; Marquez, David X.; Brown, David R.; Rosenberg, Dori; Janicek, Sarah; Allen, Laila; Belza, Basia

    2016-01-01

    Background Midlife and older adults use shopping malls for walking, but little research has examined mall characteristics that contribute to their walkability. Methods We used modified versions of the Centers for Disease Control and Prevention (CDC)-Healthy Aging Research Network (HAN) Environmental Audit and the System for Observing Play and Recreation in Communities (SOPARC) tool to systematically observe 443 walkers in 10 shopping malls. We also observed 87 walkers in 6 community-based nonmall/nongym venues where older adults routinely walked for physical activity. Results All venues had public transit stops and accessible parking. All malls and 67% of nonmalls had wayfinding aids, and most venues (81%) had an established circuitous walking route and clean, well-maintained public restrooms (94%). All venues had level floor surfaces, and one-half had benches along the walking route. Venues varied in hours of access, programming, tripping hazards, traffic control near entrances, and lighting. Conclusions Despite diversity in location, size, and purpose, the mall and nonmall venues audited shared numerous environmental features known to promote walking in older adults and few barriers to walking. Future research should consider programmatic features and outreach strategies to expand the use of malls and other suitable public spaces for walking. PMID:26181907

  20. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  1. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  2. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  3. A systematic review of the role of school-based healthcare in adolescent sexual, reproductive, and mental health

    PubMed Central

    2012-01-01

    Background Accessible sexual, reproductive, and mental healthcare services are crucial for adolescent health and wellbeing. It has been reported that school-based healthcare (SBHC) has the potential to improve the availability of services particularly for young people who are normally underserved. Locating health services in schools has the potential to reduce transport costs, increase accessibility and provide links between schools and communities. Methods A systematic review of the literature was undertaken. Pubmed, Psychinfo, Psychnet, Cochrane CENTRAL, and Web of Science were searched for English language papers published between January 1990 and March 2012 Results Twenty-seven studies were found which fitted the criteria, of which, all but one were from North America. Only three measured adolescent sexual, reproductive, or mental health outcomes related to SBHC and none of the studies were randomized controlled trials. The remaining studies explored accessibility of services and clinic utilization or described pertinent contextual factors. Conclusions There is a paucity of high quality research which evaluates SBHC and its effects on adolescent sexual, reproductive, and mental health. However, there is evidence that SBHC is popular with young people, and provides important mental and reproductive health services. Services also appear to have cost benefits in terms of adolescent health and society as a whole by reducing health disparities and attendance at secondary care facilities. However, clearer definitions of what constitutes SBHC and more high quality research is urgently needed. PMID:23098138

  4. Measuring geographic access to health care: raster and network-based methods

    PubMed Central

    2012-01-01

    Background Inequalities in geographic access to health care result from the configuration of facilities, population distribution, and the transportation infrastructure. In recent accessibility studies, the traditional distance measure (Euclidean) has been replaced with more plausible measures such as travel distance or time. Both network and raster-based methods are often utilized for estimating travel time in a Geographic Information System. Therefore, exploring the differences in the underlying data models and associated methods and their impact on geographic accessibility estimates is warranted. Methods We examine the assumptions present in population-based travel time models. Conceptual and practical differences between raster and network data models are reviewed, along with methodological implications for service area estimates. Our case study investigates Limited Access Areas defined by Michigan’s Certificate of Need (CON) Program. Geographic accessibility is calculated by identifying the number of people residing more than 30 minutes from an acute care hospital. Both network and raster-based methods are implemented and their results are compared. We also examine sensitivity to changes in travel speed settings and population assignment. Results In both methods, the areas identified as having limited accessibility were similar in their location, configuration, and shape. However, the number of people identified as having limited accessibility varied substantially between methods. Over all permutations, the raster-based method identified more area and people with limited accessibility. The raster-based method was more sensitive to travel speed settings, while the network-based method was more sensitive to the specific population assignment method employed in Michigan. Conclusions Differences between the underlying data models help to explain the variation in results between raster and network-based methods. Considering that the choice of data model/method may substantially alter the outcomes of a geographic accessibility analysis, we advise researchers to use caution in model selection. For policy, we recommend that Michigan adopt the network-based method or reevaluate the travel speed assignment rule in the raster-based method. Additionally, we recommend that the state revisit the population assignment method. PMID:22587023

  5. Examining differences in types and location of recruitment venues for young males and females from urban neighborhoods: findings from a multi-site HIV prevention study.

    PubMed

    Chutuape, Kate S; Ziff, Mauri; Auerswald, Colette; Castillo, Marné; McFadden, Antionette; Ellen, Jonathan

    2009-01-01

    Finding and accessing members of youth subpopulations, such as young men who have sex with men (YMSM) of color or young females of color, for behavioral or disease surveillance or study recruitment, pose particular challenges. Venue-based sampling strategies--which hinge on where individuals congregate or "hang out" rather than where they live--appear to be effective alternatives. Methods used to identify venues focus on engaging members of social networks to learn where targeted populations congregate. However, it is not always clear if and how these methods differ according to gender, whether the youth accessed at a venue are actually from neighborhoods in which the venues are found, and whether the location of venues relative to neighborhoods of residence is different for young men and young women. This study illustrates the gender differences in venue type and venue location where eligible youth study participants from high-risk neighborhoods could be accessed for HIV research across 15 research sites (sites). The findings indicate that the study's method led to identifying venues where one quarter or more of the youth were eligible study participants and from the high-risk neighborhoods. Sites targeting young women of color had a higher proportion of eligible study participants who were also from the high-risk neighborhoods than sites targeting YMSM. Clubs were most commonly identified by sites targeting YMSM as recruitment venues, whereas neighborhood-based service or commercial centers were more common venues for young women of color. This study reveals how venue-based recruitment strategies can be tailored and resources maximized by understanding the key differences in the types of venues preferred by males and females and by recognizing that female-preferred venues are more likely to be closer to home.

  6. 47 CFR 15.703 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... channels on which the Mode I device, but not the fixed device, may operate. (d) Geo-location capability.../portable device. A personal/portable TVBD that does not use an internal geo-location capability and access.../portable device. A personal/portable TVBD that uses an internal geo-location capability and access to a TV...

  7. Neighbourhood access to open spaces and the physical activity of residents: a national study.

    PubMed

    Witten, Karen; Hiscock, Rosemary; Pearce, Jamie; Blakely, Tony

    2008-09-01

    Increasing population levels of physical activity is high on the health agenda in many countries. There is some evidence that neighbourhood access to public open space can increase physical activity by providing easier and more direct access to opportunities for exercise. This national study examines the relationship between travel time access to parks and beaches, BMI and physical activity in New Zealand neighbourhoods. Access to parks and beaches, measured in minutes taken by a car, was calculated for 38,350 neighbourhoods nationally using Geographic Information Systems. Multilevel regression analyses were used to establish the significance of access to these recreational amenities as a predictor of BMI, and levels of physical activity and sedentary behaviour in the 12,529 participants, living in 1178 neighbourhoods, of the New Zealand Health Survey 2002/3. Neighbourhood access to parks was not associated with BMI, sedentary behaviour or physical activity, after controlling for individual-level socio-economic variables, and neighbourhood-level deprivation and urban/rural status. There was some evidence of a relationship between beach access and BMI and physical activity in the expected direction. This study found little evidence of an association between locational access to open spaces and physical activity.

  8. Silent store detection and recording in memory storage

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bose, Pradip; Cher, Chen-Yong; Nair, Ravi

    An aspect includes receiving a write request that includes a memory address and write data. Stored data is read from a memory location at the memory address. Based on determining that the memory location was not previously modified, the stored data is compared to the write data. Based on the stored data matching the write data, the write request is completed without writing the write data to the memory and a corresponding silent store bit, in a silent store bitmap is set. Based on the stored data not matching the write data, the write data is written to the memorymore » location, the silent store bit is reset and a corresponding modified bit is set. At least one of an application and an operating system is provided access to the silent store bitmap.« less

  9. Protection of electronic health records (EHRs) in cloud.

    PubMed

    Alabdulatif, Abdulatif; Khalil, Ibrahim; Mai, Vu

    2013-01-01

    EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.

  10. Ranking Businesses and Municipal Locations by Spatiotemporal Cardiac Arrest Risk to Guide Public Defibrillator Placement.

    PubMed

    Sun, Christopher L F; Brooks, Steven C; Morrison, Laurie J; Chan, Timothy C Y

    2017-03-21

    Efforts to guide automated external defibrillator placement for out-of-hospital cardiac arrest (OHCA) treatment have focused on identifying broadly defined location categories without considering hours of operation. Broad location categories may be composed of many businesses with varying accessibility. Identifying specific locations for automated external defibrillator deployment incorporating operating hours and time of OHCA occurrence may improve automated external defibrillator accessibility. We aim to identify specific businesses and municipal locations that maximize OHCA coverage on the basis of spatiotemporal assessment of OHCA risk in the immediate vicinity of franchise locations. This study was a retrospective population-based cohort study using data from the Toronto Regional RescuNET Epistry cardiac arrest database. We identified all nontraumatic public OHCAs occurring in Toronto, ON, Canada, from January 2007 through December 2015. We identified 41 unique businesses and municipal location types with ≥20 locations in Toronto from the YellowPages, Canadian Franchise Association, and the City of Toronto Open Data Portal. We obtained their geographic coordinates and hours of operation from Web sites, by phone, or in person. We determined the number of OHCAs that occurred within 100 m of each location when it was open (spatiotemporal coverage) for Toronto overall and downtown. The businesses and municipal locations were then ranked by spatiotemporal OHCA coverage. To evaluate temporal stability of the rankings, we calculated intraclass correlation of the annual coverage values. There were 2654 nontraumatic public OHCAs. Tim Hortons ranked first in Toronto, covering 286 OHCAs. Starbucks ranked first in downtown, covering 110 OHCAs. Coffee shops and bank machines from the 5 largest Canadian banks occupied 8 of the top 10 spots in both Toronto and downtown. The rankings exhibited high temporal stability with intraclass correlation values of 0.88 (95% confidence interval, 0.83-0.93) in Toronto and 0.79 (95% confidence interval, 0.71-0.86) in downtown. We identified and ranked businesses and municipal locations by spatiotemporal OHCA risk in their immediate vicinity. This approach may help policy makers and funders to identify and prioritize potential partnerships for automated external defibrillator deployment in public-access defibrillator programs. © 2017 American Heart Association, Inc.

  11. The CHOICE study: a "taste-test" of utilitarian vs. leisure walking among older adults.

    PubMed

    Hekler, Eric B; Castro, Cynthia M; Buman, Matthew P; King, Abby C

    2012-01-01

    Utilitarian walking (e.g., walking for transport) and leisure walking (e.g., walking for health/recreation) are encouraged to promote health, yet few studies have explored specific preferences for these two forms of physical activity or factors that impact such preferences. A quasi-experimental crossover design was used to evaluate how training underactive midlife and older adults in each type of walking impacted total steps taken and how it was linked to their subsequent choice of walking types. Participants (N = 16) were midlife and older adults (M age = 64 ± 8 years) who were mostly women (81%) and white (75%). To control for order effects, participants were randomized to instruction in either utilitarian or leisure walking for 2 weeks and then the other type for 2 weeks. Participants then entered a 2-week "free choice" phase in which they chose any mixture of the walking types. Outcome variables included walking via OMRON pedometer and the ratio of utilitarian versus leisure walking during the free-choice phase. Participants completed surveys about their neighborhood (NEWS) and daily travel to multiple locations. Instruction in leisure-only, utilitarian-only, and a freely chosen mixture of the two each resulted in significant increases in steps taken relative to baseline (ps < 0.05). Having to go to multiple locations daily and traveling greater distances to locations were associated with engagement in more utilitarian walking. In contrast, good walking paths, neighborhood aesthetics, easy access to exercise facilities, and perceiving easier access to neighborhood services were associated with more leisure walking. Results from this pilot study suggest that midlife and older adults may most easily meet guidelines through either leisure only or a mixture of leisure and utilitarian walking, and tailored suggestions based on the person's neighborhood may be useful.

  12. Predictors of round window accessibility for adult cochlear implantation based on pre-operative CT scan: a prospective observational study.

    PubMed

    Park, Edward; Amoodi, Hosam; Kuthubutheen, Jafri; Chen, Joseph M; Nedzelski, Julian M; Lin, Vincent Y W

    2015-05-28

    Cochlear implantation has become a mainstream treatment option for patients with severe to profound sensorineural hearing loss. During cochlear implant, there are key surgical steps which are influenced by anatomical variations between each patient. The aim of this study is to determine if there are potential predictors of difficulties that may be encountered during the cortical mastoidectomy, facial recess approach and round window access in cochlear implant surgery based upon pre-operative temporal bone CT scan. Fifty seven patients undergoing unilateral cochlear implantation were analyzed. Difficulty with 1) cortical mastoidectomy, 2) facial recess approach, and 3) round window access were scored intra-operatively by the surgeon in a blinded fashion (1 = "easy", 2 = "moderate", 3 = "difficult"). Pre-operative temporal bone CT scans were analyzed for 1) degree of mastoid aeration; 2) location of the sigmoid sinus; 3) height of the tegmen; 4) the presence of air cells in the facial recess, and 5) degree of round window bony overhang. Poor mastoid aeration and lower tegmen position, but not the location of sigmoid sinus, are associated with greater difficulty with the cortical mastoidectomy. Presence of an air cell around the facial nerve was predictive of easier facial recess access. However, the degree of round window bony overhang was not predictive of difficulty associated with round window access. Certain parameters on the pre-operative temporal bone CT scan may be useful in predicting potential difficulties encountered during the key steps involved in cochlear implant surgery.

  13. The effect of centralization of health care services on travel time and its equality.

    PubMed

    Kobayashi, Daisuke; Otsubo, Tetsuya; Imanaka, Yuichi

    2015-03-01

    To analyze the regional variations in travel time between patient residences and medical facilities for the treatment of ischemic heart disease and breast cancer, and to simulate the effects of health care services centralization on travel time and equality of access. We used medical insurance claims data for inpatients and outpatients for the two target diseases that had been filed between September 2008 and May 2009 in Kyoto Prefecture, Japan. Using a geographical information system, patient travel times were calculated based on the driving distance between patient residences and hospitals via highways and toll roads. Locations of residences and hospital locations were identified using postal codes. We then conducted a simulation analysis of centralization of health care services to designated regional core hospitals. The simulated changes in potential spatial access to care were examined. Inequalities in access to care were examined using Gini coefficients, which ranged from 0.4109 to 0.4574. Simulations of health care services centralization showed reduced travel time for most patients and overall improvements in equality of access, except in breast cancer outpatients. Our findings may contribute to the decision-making process in policies aimed at improving the potential spatial access to health care services. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  14. NASA Access Mechanism - Graphical user interface information retrieval system

    NASA Technical Reports Server (NTRS)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  15. NASA access mechanism: Graphical user interface information retrieval system

    NASA Technical Reports Server (NTRS)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  16. ML Crew Access Arm Move

    NASA Image and Video Library

    2017-10-16

    The Orion crew access arm departs Precision Fabricating and Cleaning in Cocoa, Florida, atop a flatbed truck. The access arm is transported to a storage location at NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  17. Finding Food Deserts: A Comparison of Methods Measuring Spatial Access to Food Stores.

    PubMed

    Jaskiewicz, Lara; Block, Daniel; Chavez, Noel

    2016-05-01

    Public health research has increasingly focused on how access to resources affects health behaviors. Mapping environmental factors, such as distance to a supermarket, can identify intervention points toward improving food access in low-income and minority communities. However, the existing literature provides little guidance on choosing the most appropriate measures of spatial access. This study compared the results of different measures of spatial access to large food stores and the locations of high and low access identified by each. The data set included U.S. Census population data and the locations of large food stores in the six-county area around Chicago, Illinois. Six measures of spatial access were calculated at the census block group level and the results compared. The analysis found that there was little agreement in the identified locations of high or low access between measures. This study illustrates the importance of considering the access measure used when conducting research, interpreting results, or comparing studies. Future research should explore the correlation of different measures with health behaviors and health outcomes. © 2015 Society for Public Health Education.

  18. Reproducibility of UAV-based earth topography reconstructions based on Structure-from-Motion algorithms

    NASA Astrophysics Data System (ADS)

    Clapuyt, Francois; Vanacker, Veerle; Van Oost, Kristof

    2016-05-01

    Combination of UAV-based aerial pictures and Structure-from-Motion (SfM) algorithm provides an efficient, low-cost and rapid framework for remote sensing and monitoring of dynamic natural environments. This methodology is particularly suitable for repeated topographic surveys in remote or poorly accessible areas. However, temporal analysis of landform topography requires high accuracy of measurements and reproducibility of the methodology as differencing of digital surface models leads to error propagation. In order to assess the repeatability of the SfM technique, we surveyed a study area characterized by gentle topography with an UAV platform equipped with a standard reflex camera, and varied the focal length of the camera and location of georeferencing targets between flights. Comparison of different SfM-derived topography datasets shows that precision of measurements is in the order of centimetres for identical replications which highlights the excellent performance of the SfM workflow, all parameters being equal. The precision is one order of magnitude higher for 3D topographic reconstructions involving independent sets of ground control points, which results from the fact that the accuracy of the localisation of ground control points strongly propagates into final results.

  19. Tether Elevator Crawler Systems (TECS)

    NASA Technical Reports Server (NTRS)

    Swenson, Frank R.

    1987-01-01

    One of the needs of the experimenters on the space station is access to steady and controlled-variation microgravity environments. A method of providing these environments is to place the experiment on a tether attached to the space station. This provides a high degree of isolation from structural oscillations and vibrations. Crawlers can move these experiments along the tethers to preferred locations, much like an elevator. This report describes the motion control laws developed for these crawlers and the testing of laboratory models of these tether elevator crawlers.

  20. Remotely Delivered Exercise-Based Cardiac Rehabilitation: Design and Content Development of a Novel mHealth Platform.

    PubMed

    Rawstorn, Jonathan C; Gant, Nicholas; Meads, Andrew; Warren, Ian; Maddison, Ralph

    2016-06-24

    Participation in traditional center-based cardiac rehabilitation exercise programs (exCR) is limited by accessibility barriers. Mobile health (mHealth) technologies can overcome these barriers while preserving critical attributes of center-based exCR monitoring and coaching, but these opportunities have not yet been capitalized on. We aimed to design and develop an evidence- and theory-based mHealth platform for remote delivery of exCR to any geographical location. An iterative process was used to design and develop an evidence- and theory-based mHealth platform (REMOTE-CR) that provides real-time remote exercise monitoring and coaching, behavior change education, and social support. The REMOTE-CR platform comprises a commercially available smartphone and wearable sensor, custom smartphone and Web-based applications (apps), and a custom middleware. The platform allows exCR specialists to monitor patients' exercise and provide individualized coaching in real-time, from almost any location, and provide behavior change education and social support. Intervention content incorporates Social Cognitive Theory, Self-determination Theory, and a taxonomy of behavior change techniques. Exercise components are based on guidelines for clinical exercise prescription. The REMOTE-CR platform extends the capabilities of previous telehealth exCR platforms and narrows the gap between existing center- and home-based exCR services. REMOTE-CR can complement center-based exCR by providing an alternative option for patients whose needs are not being met. Remotely monitored exCR may be more cost-effective than establishing additional center-based programs. The effectiveness and acceptability of REMOTE-CR are now being evaluated in a noninferiority randomized controlled trial.

  1. Antioxidant-spotting in micelles and emulsions.

    PubMed

    Aliaga, Carolina; López de Arbina, Amaia; Pastenes, Camila; Rezende, Marcos Caroli

    2018-04-15

    A simple protocol is described for locating the site of action of an antioxidant (AO) in a micro-heterogeneous mixture, based on the pattern of the reactivity curve towards the AO of a series of 4-alkanoyl TEMPO radicals. The resulting cut-off curves yield information regarding the hydrophobic microenvironment surrounding the reactive AO group, and its accessibility by the probe. Convex curves are an indication of an AO located in a more hydrophilic environment, while concave plots originate from AOs in a more hydrophobic location in the micro-heterogeneous system. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. The ADRICOSM STAR GeoPortal

    NASA Astrophysics Data System (ADS)

    Giorgetti, Alessandra; Cesarini, Claudia; Gambetta, Marco; Reseghetti, Franco; Vinci, Matteo

    2010-05-01

    From Stockholm (1972) to Rio de Janeiro (1992) and to Johannesburg (2002), environmental protection objectives are related to the principles of sustainable development. This includes the following important components: participation, information, communication, training (capacity building) and education. Better information ensure more participation from individuals, and allows citizens to take part in many different actions that can influence the policy process. Participation to political decisions need access to reliable and quality controlled information. The ADRICOSM Portal was developed in order to manage data diversity, provide access to any kind of product, provide metadata completeness and accuracy. The product, as defined in ADRICOSM, is anything that can be offered to a client and that might satisfy a want or need. This implied the implementation of services that was taking into consideration the diversity of the objects to be provided to users: observations, model outputs, maps, etc. The implementation of the portal was based on two metadata levels: 1. Directory level - consisting of broad descriptions of the contents of data sets; used to locate data sets of potential interest and 2. Data level - consisting of the actual data objects. The portal was developed as a simplified front end for the partners data management systems, giving emphasis on federated access points focused on thematic aspects. This was based on the idea that specialized customer-related access points can be better carried out by delegated teams of experts who know the needs of different customers, define the user software which is most suited to them. The data management systems provide facilities for two data tracks, one in real-time (or near-realtime) and one in delayed mode. Both tracks are based on the same data sources and transmission systems, but the data follow different routes and are processed differently depending on user requirements. The real-time data and model products are checked after first use for up-grading and additional quality control to ensure that all relevant data are preserved for final archival. In summary the ADRICOSM Geoportal has: - the objective to support data exchange in Adricosm Star and the implementation of tools to facilitate the access to data and information through thematic portals, converting individual data provider systems into a federation. - provide the necessary information to users on content of data that can be accessed in the federated systems. The portal is organised in three modules and a catalog. The module 1 has been realized by giving information on the project and objectives, data policy, reasons to provide products and services, link to the themes. Skilled people can jump to the data/products/services provider by clicking on the geographical map. Module 2 is providing more specific information on centers providing data/products/services. Module 3 is providing a direct access to partners product. It contains a short description of the products and a link. Module 4 contain the catalog for each partner product and is based on What, Where, When and How.

  3. Router Agent Technology for Policy-Based Network Management

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  4. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  5. Space information technologies: future agenda

    NASA Astrophysics Data System (ADS)

    Flournoy, Don M.

    2005-11-01

    Satellites will operate more like wide area broadband computer networks in the 21st Century. Space-based information and communication technologies will therefore be a lot more accessible and functional for the individual user. These developments are the result of earth-based telecommunication and computing innovations being extended to space. The author predicts that the broadband Internet will eventually be available on demand to users of terrestrial networks wherever they are. Earth and space communication assets will be managed as a single network. Space networks will assure that online access is ubiquitous. No matter whether users are located in cities or in remote locations, they will always be within reach of a node on the Internet. Even today, scalable bandwidth can be delivered to active users when moving around in vehicles on the ground, or aboard ships at sea or in the air. Discussion of the innovative technologies produced by NASA's Advanced Communications Technology Satellite (1993-2004) demonstrates future capabilities of satellites that make them uniquely suited to serve as nodes on the broadband Internet.

  6. Enhancing community based health programs in Iran: a multi-objective location-allocation model.

    PubMed

    Khodaparasti, S; Maleki, H R; Jahedi, S; Bruni, M E; Beraldi, P

    2017-12-01

    Community Based Organizations (CBOs) are important health system stakeholders with the mission of addressing the social and economic needs of individuals and groups in a defined geographic area, usually no larger than a county. The access and success efforts of CBOs vary, depending on the integration between health care providers and CBOs but also in relation to the community participation level. To achieve widespread results, it is important to carefully design an efficient network which can serve as a bridge between the community and the health care system. This study addresses this challenge through a location-allocation model that deals with the hierarchical nature of the system explicitly. To reflect social welfare concerns of equity, local accessibility, and efficiency, we develop the model in a multi-objective framework, capturing the ambiguity in the decision makers' aspiration levels through a fuzzy goal programming approach. This study reports the findings for the real case of Shiraz city, Fars province, Iran, obtained by a thorough analysis of the results.

  7. Use of Web-based library resources by medical students in community and ambulatory settings*

    PubMed Central

    Tannery, Nancy Hrinya; Foust, Jill E.; Gregg, Amy L.; Hartman, Linda M.; Kuller, Alice B.; Worona, Paul; Tulsky, Asher A.

    2002-01-01

    Purpose: The purpose was to evaluate the use of Web-based library resources by third-year medical students. Setting/Participants/Resources: Third-year medical students (147) in a twelve-week multidisciplinary primary care rotation in community and ambulatory settings. Methodology: Individual user surveys and log file analysis of Website were used. Results/Outcomes: Twenty resource topics were compiled into a Website to provide students with access to electronic library resources from any community-based clerkship location. These resource topics, covering subjects such as hypertension and back pain, linked to curriculum training problems, full-text journal articles, MEDLINE searches, electronic book chapters, and relevant Websites. More than half of the students (69%) accessed the Website on a daily or weekly basis. Over 80% thought the Website was a valuable addition to their clerkship. Discussion/Conclusion: Web-based information resources can provide curriculum support to students for whom access to the library is difficult and time consuming. PMID:12113515

  8. Distinct Geographical Distribution of the Miscanthus Accessions with Varied Biomass Enzymatic Saccharification

    PubMed Central

    Li, Xukai; Liao, Haofeng; Fan, Chunfen; Hu, Huizhen; Li, Ying; Li, Jing; Yi, Zili; Cai, Xiwen; Peng, Liangcai; Tu, Yuanyuan

    2016-01-01

    Miscanthus is a leading bioenergy candidate for biofuels, and it thus becomes essential to characterize the desire natural Miscanthus germplasm accessions with high biomass saccharification. In this study, total 171 natural Miscanthus accessions were geographically mapped using public database. According to the equation [P(H/L| East) = P(H/L∩East)/P(East)], the probability (P) parameters were calculated on relationships between geographical distributions of Miscanthus accessions in the East of China, and related factors with high(H) or low(L) values including biomass saccahrification under 1% NaOH and 1% H2SO4 pretreatments, lignocellulose features and climate conditions. Based on the maximum P value, a golden cutting line was generated from 42°25’ N, 108°22’ E to 22°58’ N, 116°28’ E on the original locations of Miscanthus accessions with high P(H|East) values (0.800–0.813), indicating that more than 90% Miscanthus accessions were originally located in the East with high biomass saccharification. Furthermore, the averaged insolation showed high P (H|East) and P(East|H) values at 0.782 and 0.754, whereas other climate factors had low P(East|H) values, suggesting that the averaged insolation is unique factor on Miscanthus distributions for biomass saccharification. In terms of cell wall compositions and wall polymer features, both hemicelluloses level and cellulose crystallinity (CrI) of Miscanthus accessions exhibited relative high P values, suggesting that they should be the major factors accounting for geographic distributions of Miscanthus accessions with high biomass digestibility. PMID:27532636

  9. Final Environmental Impact Statement for Development of Facilities to Support Basing US Pacific Fleet F/A-18E/F Aircraft on the West Coast of the United States; Volume 2: Technical Appendices

    DTIC Science & Technology

    1998-05-01

    Federal Register Online via G ?0 Access [wais.access.gpo.gov] [DOCID:fr07ap97 dat-47] DEPARTMENT OF DEFENSE Department of the Navy Notice of Intent To...installation. EIFS estimates its multipliers using a location quotient approach based on the concentration of industries within the region relative to the ...0) 0 o 3 tu m C ft ft 0) X X > 0) H) k co to 0) OJ U II (Ü C >- >. moo *J JJ G ft ft C C O B >i 5^3

  10. Promoting Crew Autonomy: Current Advances and Novel Techniques

    NASA Technical Reports Server (NTRS)

    Harris, Samantha

    2017-01-01

    Since the dawn of the era of human space flight, mission control centers around the world have played an integral role in guiding space travelers toward mission success. In the International Space Station (ISS) program, astronauts and cosmonauts have the benefit of near constant access to the expertise and resources within mission control, as well as lifeboat capability to quickly return to Earth if something were to go wrong. As we move into an era of longer duration missions to more remote locations, rapid and ready access to mission control on earth will no longer be feasible. To prepare for such missions, long duration crews must be prepared to operate more autonomously, and the mission control paradigm that has been successfully employed for decades must be re-examined. The team at NASA's Payload Operations and Integration Center (POIC) in Huntsville, Alabama is playing an integral role in the development of concepts for a more autonomous long duration crew of the future via research on the ISS.

  11. 15 CFR 784.4 - Notification, duration and frequency of complementary access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... costs associated with these activities. The location (in cooperation with the advance team, if available... logistical and administrative preparations for complementary access. The location will engage in activities...

  12. Assessment of the Genetic Diversity of Different Job's Tears (Coix lacryma-jobi L.) Accessions and the Active Composition and Anticancer Effect of Its Seed Oil

    PubMed Central

    Xi, Xiu-Jie; Zhu, Yun-Guo; Tong, Ying-Peng; Yang, Xiao-Ling; Tang, Nan-Nan; Ma, Shu-Min; Li, Shan; Cheng, Zhou

    2016-01-01

    Job’s tears (Coix lachryma-jobi L.) is an important crop used as food and herbal medicine in Asian countries. A drug made of Job’s tears seed oil has been clinically applied to treat multiple cancers. In this study, the genetic diversity of Job’s tears accessions and the fatty acid composition, triglyceride composition, and anti-proliferative effect of Job’s tears seed oil were analyzed using morphological characteristics and ISSR markers, GC-MS, HPLC-ELSD, and the MTT method. ISSR analysis demonstrated low genetic diversity of Job’s tears at the species level (h = 0.21, I = 0.33) and the accession level (h = 0.07, I = 0.10), and strong genetic differentiation (GST = 0.6702) among all accessions. It also clustered the 11 accessions into three cultivated clades corresponding with geographical locations and two evidently divergent wild clades. The grouping patterns based on morphological characteristics and chemical profiles were in accordance with those clustered by ISSR analysis. Significant differences in morphological characteristics, fatty acid composition, triglyceride composition, and inhibition rates of seed oil were detected among different accessions, which showed a highly significant positive correlation with genetic variation. These results suggest that the seed morphological characteristics, fatty acid composition, and triglyceride composition may be mainly attributed to genetic factors. The proportion of palmitic acid and linoleic acid to oleic acid displayed a highly significant positive correlation with the inhibition rates of Job’s tears seed oil for T24 cells, and thus can be an important indicator for quality control for Job’s tears. PMID:27070310

  13. Global Location-Based Access to Web Applications Using Atom-Based Automatic Update

    NASA Astrophysics Data System (ADS)

    Singh, Kulwinder; Park, Dong-Won

    We propose an architecture which enables people to enquire about information available in directory services by voice using regular phones. We implement a Virtual User Agent (VUA) which mediates between the human user and a business directory service. The system enables the user to search for the nearest clinic, gas station by price, motel by price, food / coffee, banks/ATM etc. and fix an appointment, or automatically establish a call between the user and the business party if the user prefers. The user also has an option to receive appointment confirmation by phone, SMS, or e-mail. The VUA is accessible by a toll free DID (Direct Inward Dialing) number using a phone by anyone, anywhere, anytime. We use the Euclidean formula for distance measurement. Since, shorter geodesic distances (on the Earth’s surface) correspond to shorter Euclidean distances (measured by a straight line through the Earth). Our proposed architecture uses Atom XML syndication format protocol for data integration, VoiceXML for creating the voice user interface (VUI) and CCXML for controlling the call components. We also provide an efficient algorithm for parsing Atom feeds which provide data to the system. Moreover, we describe a cost-effective way for providing global access to the VUA based on Asterisk (an open source IP-PBX). We also provide some information on how our system can be integrated with GPS for locating the user coordinates and therefore efficiently and spontaneously enhancing the system response. Additionally, the system has a mechanism for validating the phone numbers in its database, and it updates the number and other information such as daily price of gas, motel etc. automatically using an Atom-based feed. Currently, the commercial directory services (Example 411) do not have facilities to update the listing in the database automatically, so that why callers most of the times get out-of-date phone numbers or other information. Our system can be integrated very easily with an existing web infrastructure, thereby making the wealth of Web information easily available to the user by phone. This kind of system can be deployed as an extension to 911 and 411 services to share the workload with human operators. This paper presents all the underlying principles, architecture, features, and an example of the real world deployment of our proposed system. The source code and documentations are available for commercial productions.

  14. Spanish-language community-based mental health treatment programs, policy-required language-assistance programming, and mental health treatment access among Spanish-speaking clients.

    PubMed

    Snowden, Lonnie R; McClellan, Sean R

    2013-09-01

    We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California's Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997-2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services.

  15. Spanish-Language Community-Based Mental Health Treatment Programs, Policy-Required Language-Assistance Programming, and Mental Health Treatment Access Among Spanish-Speaking Clients

    PubMed Central

    McClellan, Sean R.

    2013-01-01

    Objectives. We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California’s Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Methods. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997–2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. Results. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Conclusions. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services. PMID:23865663

  16. STS-26 MS Hilmers on fixed based (FB) shuttle mission simulator (SMS) middeck

    NASA Technical Reports Server (NTRS)

    1988-01-01

    STS-26 Discovery, Orbiter Vehicle (OV) 103, Mission Specialist (MS) David C. Hilmers prepares to ascend a ladder representing the interdeck access hatch from the shuttle middeck to the flight deck. The STS-26 crew is training in the fixed base (FB) shuttle mission simulator (SMS) located in JSC Mission Simulation and Training Facility Bldg 5.

  17. Employing Virtual Humans for Education and Training in X3D/VRML Worlds

    ERIC Educational Resources Information Center

    Ieronutti, Lucio; Chittaro, Luca

    2007-01-01

    Web-based education and training provides a new paradigm for imparting knowledge; students can access the learning material anytime by operating remotely from any location. Web3D open standards, such as X3D and VRML, support Web-based delivery of Educational Virtual Environments (EVEs). EVEs have a great potential for learning and training…

  18. Avoiding Biased-Feeding in the Scheduling of Collaborative Multipath TCP.

    PubMed

    Tsai, Meng-Hsun; Chou, Chien-Ming; Lan, Kun-Chan

    2016-01-01

    Smartphones have become the major communication and portable computing devices that access the Internet through Wi-Fi or mobile networks. Unfortunately, users without a mobile data subscription can only access the Internet at limited locations, such as hotspots. In this paper, we propose a collaborative bandwidth sharing protocol (CBSP) built on top of MultiPath TCP (MPTCP). CBSP enables users to buy bandwidth on demand from neighbors (called Helpers) and uses virtual interfaces to bind the subflows of MPTCP to avoid modifying the implementation of MPTCP. However, although MPTCP provides the required multi-homing functionality for bandwidth sharing, the current packet scheduling in collaborative MPTCP (e.g., Co-MPTCP) leads to the so-called biased-feeding problem. In this problem, the fastest link might always be selected to send packets whenever it has available cwnd, which results in other links not being fully utilized. In this work, we set out to design an algorithm, called Scheduled Window-based Transmission Control (SWTC), to improve the performance of packet scheduling in MPTCP, and we perform extensive simulations to evaluate its performance.

  19. Avoiding Biased-Feeding in the Scheduling of Collaborative Multipath TCP

    PubMed Central

    2016-01-01

    Smartphones have become the major communication and portable computing devices that access the Internet through Wi-Fi or mobile networks. Unfortunately, users without a mobile data subscription can only access the Internet at limited locations, such as hotspots. In this paper, we propose a collaborative bandwidth sharing protocol (CBSP) built on top of MultiPath TCP (MPTCP). CBSP enables users to buy bandwidth on demand from neighbors (called Helpers) and uses virtual interfaces to bind the subflows of MPTCP to avoid modifying the implementation of MPTCP. However, although MPTCP provides the required multi-homing functionality for bandwidth sharing, the current packet scheduling in collaborative MPTCP (e.g., Co-MPTCP) leads to the so-called biased-feeding problem. In this problem, the fastest link might always be selected to send packets whenever it has available cwnd, which results in other links not being fully utilized. In this work, we set out to design an algorithm, called Scheduled Window-based Transmission Control (SWTC), to improve the performance of packet scheduling in MPTCP, and we perform extensive simulations to evaluate its performance. PMID:27529783

  20. KSC-02pd0589

    NASA Image and Video Library

    2002-04-29

    KENNEDY SPACE CENTER, FLA. - Space Shuttle Endeavour rests on Launch Pad 39A after rollout from the Vehicle Assembly Building. The Shuttle comprises the orbiter, in front, and the taller orange external tank behind it flanked by twin solid rocket boosters. The Shuttle sits on the Mobile Launcher Platform that straddles the flame trench below. On either side of Endeavour's tail and main engines are the tail service masts that support the fluid,, gas and electrical requirements of the orbiter's liquid oxyen and liquid hydrogen aft T-0 umbilicals. In the foreground, left, is the White Room, located at the end of the orbiter access arm. This environmentally controlled area provides access to the cockpit of the orbiter. Mission STS-111 is designated UF-2, the 14th assembly flight to the International Space Station. Endeavour's payload includes the Multi-Purpose Logistics Module Leonardo and Mobile Base System. The mission also will swap resident crews on the Station, carrying the Expedition 5 crew and returning to Earth Expedition 4. Liftoff of Endeavour is scheduled between 4 and 8 p.m. May 30, 2002

  1. Genetic analysis and chromosome mapping of resistance to Fusarium oxysporum f. sp. niveum (FON) race 1 and race 2 in watermelon (Citrullus lanatus L.).

    PubMed

    Ren, Yi; Di Jiao; Gong, Guoyi; Zhang, Haiying; Guo, Shaogui; Zhang, Jie; Xu, Yong

    Fusarium wilt (FW) caused by Fusarium oxysporum f. sp . niveum (FON) is the major soilborne disease of watermelon ( Citrullus lanatus L.). The development and deployment of resistant cultivars is generally considered to be an effective approach to control FW. In this study, an F8 population consisting of 103 recombinant inbred lines derived from a cross between the cultivar 97103 and a wild accession PI 296341-FR was used for FON race 1 and race 2 fungal inoculations. One major QTL on chromosome 1 for FON race 1 resistance was detected with a logarithm of odds of 13.2 and explained phenotypic variation R 2  = 48.1 %; two QTLs of FON race 2 resistance on chromosomes 9 and 10 were discovered based on the high-density integrated genetic map we constructed. The nearest molecular marker should be useful for marker-assisted selection of FON race 1 and race 2 resistance. One receptor kinase, one glucan endo-1,3-β-glucosidase precursors and three acidic chitinase located in the FON-1 QTL genomic region. In Qfon2.1 QTL region, one lipoxygenase gene, five receptor-like kinases and four glutathione S-transferase genes are discovered. One arginine biosynthesis bifunctional protein, two receptor kinase proteins and one lipid-transfer protein located in Qfon2.2 QTL region. Based on SNP analysis by using 20 re-sequenced accessions of watermelon and 231-plant F 2 population generated from Black Diamond × Calhoun Grey, we developed a SNP marker Chr1SNP_502124 for FON-1 detection.

  2. 15 CFR 784.3 - Scope and conduct of complementary access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... presence of a U.S. Government Host Team. No information of direct national security significance shall be... location accessed, the IAEA Team may: (i) Perform visual observation of parts or areas of the location; (ii... unless the Host Team leader, after receiving input from representatives of the location and consulting...

  3. 15 CFR 784.3 - Scope and conduct of complementary access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... presence of a U.S. Government Host Team. No information of direct national security significance shall be... location accessed, the IAEA Team may: (i) Perform visual observation of parts or areas of the location; (ii... unless the Host Team leader, after receiving input from representatives of the location and consulting...

  4. 15 CFR 784.3 - Scope and conduct of complementary access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... presence of a U.S. Government Host Team. No information of direct national security significance shall be... location accessed, the IAEA Team may: (i) Perform visual observation of parts or areas of the location; (ii... unless the Host Team leader, after receiving input from representatives of the location and consulting...

  5. Mobile radio alternative systems study traffic model

    NASA Astrophysics Data System (ADS)

    Tucker, W. T.; Anderson, R. E.

    1983-06-01

    The markets for mobile radio services in non-urban areas of the United States are examined for the years 1985-2000. Three market categories are identified. New Services are defined as those for which there are different expressed ideas but which are not now met by any application of available technology. The complete fulfillment of the needs requires nationwide radio access to vehicles without knowledge of vehicle location, wideband data transmission from remote sites, one- and two way exchange of short data and control messages between vehicles and dispatch or control centers, and automatic vehicle location (surveillance). The commercial and public services market of interest to the study is drawn from existing users of mobile radio in non-urban areas who are dissatisfied with the geographical range or coverage of their systems. The mobile radio telephone market comprises potential users who require access to the public switched telephone network in areas that are not likely to be served by the traditional growth patterns of terrestrial mobile telephone services. Conservative, likely, and optimistic estimates of the markets are presented in terms of numbers of vehicles that will be served and the radio traffic they will generate.

  6. Mobile radio alternative systems study. Volume 1: Traffic model

    NASA Technical Reports Server (NTRS)

    Tucker, W. T.; Anderson, R. E.

    1983-01-01

    The markets for mobile radio services in non-urban areas of the United States are examined for the years 1985-2000. Three market categories are identified. New Services are defined as those for which there are different expressed ideas but which are not now met by any application of available technology. The complete fulfillment of the needs requires nationwide radio access to vehicles without knowledge of vehicle location, wideband data transmission from remote sites, one- and two way exchange of short data and control messages between vehicles and dispatch or control centers, and automatic vehicle location (surveillance). The commercial and public services market of interest to the study is drawn from existing users of mobile radio in non-urban areas who are dissatisfied with the geographical range or coverage of their systems. The mobile radio telephone market comprises potential users who require access to the public switched telephone network in areas that are not likely to be served by the traditional growth patterns of terrestrial mobile telephone services. Conservative, likely, and optimistic estimates of the markets are presented in terms of numbers of vehicles that will be served and the radio traffic they will generate.

  7. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...

  8. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...

  9. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  10. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  11. [Related factors in the elderly's use of municipal institutions: basic study for promoting participation in a care prevention program].

    PubMed

    Hirai, Hiroshi; Kondo, Katsunori

    2008-01-01

    This study was performed to examine factors related to the use of municipal institutions with the focus on 'Accessibility'. The data used in this analysis were from the AGES (Aichi Gerontological Evaluation Study) Project, conducted by Nihon Fukushi University located in Aichi Prefecture, Japan. A self-administrated questionnaires was mailed to 5,759 persons aged 65 years and older who were not disabled in 2006, and 2,795 persons responded. A dependent variable in the analysis was the use of municipal institutions (a Public Health Center, Welfare Center for the elderly and City Hall). Independent variables were age, disease, employment status, IADL (instrumental activities of daily living), depression (GDS: geriatric depression scale), self-rated feeling of health and 'Accessibility' (transportation mode and distance from municipal institutions). Multivariate logistic analysis was used to provide adjusted relative risk estimates for the associations between use of municipal institutions and related factors. In multivariate logistic analysis, 'Accessibility' showed a significant relative risk for the use of municipal institutions after controlling for other related factors. Compared with the elderly whose places of residence was located less than 250 meters from the municipal institutions, the relative risk for the elderly who resided more than 1,500 meters from the municipal institutions was around 0.4 (male: RR = 0.358; female: RR = 0.378). 'Accessibility' is significantly related to the use of municipal institutions. To promote use of the municipal institutions, improving elderly access may well be effective.

  12. Who, When, Where: Obfuscation Preferences in Location-Sharing Applications

    DTIC Science & Technology

    2011-06-01

    location sharing preferences. There has been prior work on using obfuscation as a privacy preserving technique in the context of location based services [1,6,7,4...2004). Privacy in location - based services , concern vs. coolness. MobileHCI 2004 workshop: Location System Privacy and Control. 3. Benisch, M... based services , and the value of location. In Proc. of Ubicomp 2010. 5. Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P

  13. Outcomes of out-of-hospital cardiac arrest by public location in the public-access defibrillation era.

    PubMed

    Murakami, Yukiko; Iwami, Taku; Kitamura, Tetsuhisa; Nishiyama, Chika; Nishiuchi, Tatsuya; Hayashi, Yasuyuki; Kawamura, Takashi

    2014-04-22

    The strategy to place public-access automated external defibrillators (AEDs) has not yet been established in real settings. This, prospective, population-based observational study in Osaka, Japan, included consecutive out-of-hospital cardiac arrest (OHCA) patients with resuscitation attempts during 7 years, from January 2005 through December 2011. The trends in the proportion of public-access AED use and 1-month survival with neurologically favorable outcome were evaluated by location. Factors associated with neurologically favorable outcome (defined as cerebral performance category 1 or 2) after ventricular fibrillation were also assessed using multiple logistic regression analysis. A total of 9453 bystander-witnessed OHCAs of cardiac origin were documented and 894 (9.5%) of them occurred at public places. The proportion of public-access AED use significantly increased from 0.0% (0/20) in 2005 to 41.2% (7/17) in 2011 at railway stations and from 0.0% (0/7) to 56.5% (13/23) at sports facilities. Mean time from collapse to shock was 5.0 minutes among those who received shocks with public-access AEDs. The proportion of neurologically favorable outcome was 28.0% (33/118) at railway stations, 51.6% (48/93) at sports facilities, 23.3% (20/86) in public buildings, and 41.9% (13/31) in schools. In multivariate analysis, early defibrillation, irrespective of bystander or emergency medical service (EMS) personnel, was significantly associated with neurologically favorable outcome (adjusted odds ratio for 1-minute increment, 0.89; 95% confidence interval, 0.87 to 0.92). This large, population-based OHCA registry demonstrated that earlier shock, irrespective the shock provider (bystander or EMS personnel), contributed to improving outcome, and a public-access defibrillation program was successfully implemented so that shocks with public-access AEDs were delivered to over 40% of bystander-witnessed OHCAs and time to shock was shortened in some kinds of public places.

  14. An IBeacon-Based Location System for Smart Home Control.

    PubMed

    Liu, Qinghe; Yang, Xinshuang; Deng, Lizhen

    2018-06-11

    Indoor location and intelligent control system can bring convenience to people’s daily life. In this paper, an indoor control system is designed to achieve equipment remote control by using low-energy Bluetooth (BLE) beacon and Internet of Things (IoT) technology. The proposed system consists of five parts: web server, home gateway, smart terminal, smartphone app and BLE beacons. In the web server, fingerprint matching based on RSSI stochastic characteristic and posture recognition model based on geomagnetic sensing are used to establish a more efficient equipment control system, combined with Pedestrian Dead Reckoning (PDR) technology to improve the accuracy of location. A personalized menu of remote “one-click” control is finally offered to users in a smartphone app. This smart home control system has been implemented by hardware, and precision and stability tests have been conducted, which proved the practicability and good user experience of this solution.

  15. Towards the Interoperability of Web, Database, and Mass Storage Technologies for Petabyte Archives

    NASA Technical Reports Server (NTRS)

    Moore, Reagan; Marciano, Richard; Wan, Michael; Sherwin, Tom; Frost, Richard

    1996-01-01

    At the San Diego Supercomputer Center, a massive data analysis system (MDAS) is being developed to support data-intensive applications that manipulate terabyte sized data sets. The objective is to support scientific application access to data whether it is located at a Web site, stored as an object in a database, and/or storage in an archival storage system. We are developing a suite of demonstration programs which illustrate how Web, database (DBMS), and archival storage (mass storage) technologies can be integrated. An application presentation interface is being designed that integrates data access to all of these sources. We have developed a data movement interface between the Illustra object-relational database and the NSL UniTree archival storage system running in a production mode at the San Diego Supercomputer Center. With this interface, an Illustra client can transparently access data on UniTree under the control of the Illustr DBMS server. The current implementation is based on the creation of a new DBMS storage manager class, and a set of library functions that allow the manipulation and migration of data stored as Illustra 'large objects'. We have extended this interface to allow a Web client application to control data movement between its local disk, the Web server, the DBMS Illustra server, and the UniTree mass storage environment. This paper describes some of the current approaches successfully integrating these technologies. This framework is measured against a representative sample of environmental data extracted from the San Diego Ba Environmental Data Repository. Practical lessons are drawn and critical research areas are highlighted.

  16. A Non-technical User-Oriented Display Notation for XACML Conditions

    NASA Astrophysics Data System (ADS)

    Stepien, Bernard; Felty, Amy; Matwin, Stan

    Ideally, access control to resources in complex IT systems ought to be handled by business decision makers who own a given resource (e.g., the pay and benefits section of an organization should decide and manage the access rules to the payroll system). To make this happen, the security and database communities need to develop vendor-independent access management tools, useable by decision makers, rather than technical personnel detached from a given business function. We have developed and implemented such tool, based on XACML. The XACML is an important emerging tool for managing complex access control applications. As a formal notation, based on an XML schema representing the grammar of a given application, XACML is precise and non-ambiguous. But this very property puts it out of reach of non-technical users. We propose a new notation for displaying and editing XACML rules that is independent of XML, and we develop an editor for it. Our notation combines a tree representation of logical expressions with an accessible natural language layer. Our early experience indicates that such rules can be grasped by non-technical users wishing to develop and control rules for accessing their own resources.

  17. Development of a cloud-based Bioinformatics Training Platform.

    PubMed

    Revote, Jerico; Watson-Haigh, Nathan S; Quenette, Steve; Bethwaite, Blair; McGrath, Annette; Shang, Catherine A

    2017-05-01

    The Bioinformatics Training Platform (BTP) has been developed to provide access to the computational infrastructure required to deliver sophisticated hands-on bioinformatics training courses. The BTP is a cloud-based solution that is in active use for delivering next-generation sequencing training to Australian researchers at geographically dispersed locations. The BTP was built to provide an easy, accessible, consistent and cost-effective approach to delivering workshops at host universities and organizations with a high demand for bioinformatics training but lacking the dedicated bioinformatics training suites required. To support broad uptake of the BTP, the platform has been made compatible with multiple cloud infrastructures. The BTP is an open-source and open-access resource. To date, 20 training workshops have been delivered to over 700 trainees at over 10 venues across Australia using the BTP. © The Author 2016. Published by Oxford University Press.

  18. Development of a cloud-based Bioinformatics Training Platform

    PubMed Central

    Revote, Jerico; Watson-Haigh, Nathan S.; Quenette, Steve; Bethwaite, Blair; McGrath, Annette

    2017-01-01

    Abstract The Bioinformatics Training Platform (BTP) has been developed to provide access to the computational infrastructure required to deliver sophisticated hands-on bioinformatics training courses. The BTP is a cloud-based solution that is in active use for delivering next-generation sequencing training to Australian researchers at geographically dispersed locations. The BTP was built to provide an easy, accessible, consistent and cost-effective approach to delivering workshops at host universities and organizations with a high demand for bioinformatics training but lacking the dedicated bioinformatics training suites required. To support broad uptake of the BTP, the platform has been made compatible with multiple cloud infrastructures. The BTP is an open-source and open-access resource. To date, 20 training workshops have been delivered to over 700 trainees at over 10 venues across Australia using the BTP. PMID:27084333

  19. 75 FR 77305 - Security-Based Swap Data Repository Registration, Duties, and Core Principles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-10

    ... authorities can access and analyze the data from secure, central locations to better monitor for systemic risk... authorities information to help limit systemic risk and by promoting stability through enhanced transparency...) performing market surveillance, prudential supervision, and macroprudential (systemic risk) supervision; and...

  20. Successes and failures of sixty years of vector control in French Guiana: what is the next step?

    PubMed

    Epelboin, Yanouk; Chaney, Sarah C; Guidez, Amandine; Habchi-Hanriot, Nausicaa; Talaga, Stanislas; Wang, Lanjiao; Dusfour, Isabelle

    2018-03-12

    Since the 1940s, French Guiana has implemented vector control to contain or eliminate malaria, yellow fever, and, recently, dengue, chikungunya, and Zika. Over time, strategies have evolved depending on the location, efficacy of the methods, development of insecticide resistance, and advances in vector control techniques. This review summarises the history of vector control in French Guiana by reporting the records found in the private archives of the Institute Pasteur in French Guiana and those accessible in libraries worldwide. This publication highlights successes and failures in vector control and identifies the constraints and expectations for vector control in this French overseas territory in the Americas.

  1. Access and completion of a Web-based treatment in a population-based sample of tornado-affected adolescents.

    PubMed

    Price, Matthew; Yuen, Erica K; Davidson, Tatiana M; Hubel, Grace; Ruggiero, Kenneth J

    2015-08-01

    Although Web-based treatments have significant potential to assess and treat difficult-to-reach populations, such as trauma-exposed adolescents, the extent that such treatments are accessed and used is unclear. The present study evaluated the proportion of adolescents who accessed and completed a Web-based treatment for postdisaster mental health symptoms. Correlates of access and completion were examined. A sample of 2,000 adolescents living in tornado-affected communities was assessed via structured telephone interview and invited to a Web-based treatment. The modular treatment addressed symptoms of posttraumatic stress disorder, depression, and alcohol and tobacco use. Participants were randomized to experimental or control conditions after accessing the site. Overall access for the intervention was 35.8%. Module completion for those who accessed ranged from 52.8% to 85.6%. Adolescents with parents who used the Internet to obtain health-related information were more likely to access the treatment. Adolescent males were less likely to access the treatment. Future work is needed to identify strategies to further increase the reach of Web-based treatments to provide clinical services in a postdisaster context. (c) 2015 APA, all rights reserved).

  2. Access and Completion of a Web-Based Treatment in a Population-Based Sample of Tornado-Affected Adolescents

    PubMed Central

    Price, Matthew; Yuen, Erica; Davidson, Tatiana M.; Hubel, Grace; Ruggiero, Kenneth J.

    2015-01-01

    Although web-based treatments have significant potential to assess and treat difficult to reach populations, such as trauma-exposed adolescents, the extent that such treatments are accessed and used is unclear. The present study evaluated the proportion of adolescents who accessed and completed a web-based treatment for post-disaster mental health symptoms. Correlates of access and completion were examined. A sample of 2,000 adolescents living in tornado-affected communities was assessed via structured telephone interview and invited to a web-based treatment. The modular treatment addressed symptoms of PTSD, depression, and alcohol and tobacco use. Participants were randomized to experimental or control conditions after accessing the site. Overall access for the intervention was 35.8%. Module completion for those who accessed ranged from 52.8% to 85.6%. Adolescents with parents who used the Internet to obtain health-related information were more likely to access the treatment. Adolescent males were less likely to access the treatment. Future work is needed to identify strategies to further increase the reach of web-based treatments to provide clinical services in a post-disaster context. PMID:25622071

  3. Mobile Launcher Crew Access Arm Transport from Cocoa FL to KSC

    NASA Image and Video Library

    2017-10-17

    Two heavy-lift cranes are used to lower the Orion crew access arm onto a work stand in a storage location at NASA's Kennedy Space Center in Florida. The access arm was transported from Precision Fabricating and Cleaning in Cocoa, Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  4. Mobile Launcher Crew Access Arm Prep for Transport to Kennedy Sp

    NASA Image and Video Library

    2017-10-16

    The Orion crew access arm is being secured on a flatbed truck at Precision Fabricating and Cleaning in Cocoa, Florida. The crew access arm will be transported to a storage location near NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  5. Mobile Launcher Crew Access Arm Prep for Transport to Kennedy Sp

    NASA Image and Video Library

    2017-10-16

    The Orion crew access arm is being secured onto a flatbed truck at Precision Fabricating and Cleaning in Cocoa, Florida. The crew access arm will be transported to a storage location near NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  6. Mobile Launcher Crew Access Arm Prep for Transport to Kennedy Sp

    NASA Image and Video Library

    2017-10-16

    The Orion crew access arm is secured on a flatbed truck at Precision Fabricating and Cleaning in Cocoa, Florida. The crew access arm will be transported to a storage location near NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  7. Mobile Launcher Crew Access Arm Prep for Transport to Kennedy Sp

    NASA Image and Video Library

    2017-10-16

    The Orion crew access arm is being moved by crane onto a flatbed truck at Precision Fabricating and Cleaning in Cocoa, Florida. The crew access arm will be transported to a storage location near NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  8. Mobile Launcher Crew Access Arm Transport from Cocoa FL to KSC

    NASA Image and Video Library

    2017-10-17

    A flatbed truck with the Orion crew access arm secured atop travels along a road in Cocoa, Florida, after departing Precision Fabricating and Cleaning. The access arm will be transported to a storage location at NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  9. Mobile Launcher Crew Access Arm Transport from Cocoa FL to KSC

    NASA Image and Video Library

    2017-10-17

    The Orion crew access arm departs Precision Fabricating and Cleaning in Cocoa, Florida, atop a flatbed truck. The access arm will be transported to a storage location at NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  10. Mobile Launcher Crew Access Arm Transport from Cocoa FL to KSC

    NASA Image and Video Library

    2017-10-17

    Two heavy-lift cranes lower the Orion crew access arm onto a work stand in a storage location at NASA's Kennedy Space Center in Florida. The access arm was transported from Precision Fabricating and Cleaning in Cocoa, Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  11. Mobile Launcher Crew Access Arm Transport from Cocoa FL to KSC

    NASA Image and Video Library

    2017-10-17

    A flatbed truck with the Orion crew access arm secured atop arrives in a storage location at NASA's Kennedy Space Center in Florida. The access arm was transported from Precision Fabricating and Cleaning in Cocoa, Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  12. Experimental Evidence that Social Relationships Determine Individual Foraging Behavior.

    PubMed

    Firth, Josh A; Voelkl, Bernhard; Farine, Damien R; Sheldon, Ben C

    2015-12-07

    Social relationships are fundamental to animals living in complex societies. The extent to which individuals base their decisions around their key social relationships, and the consequences this has on their behavior and broader population level processes, remains unknown. Using a novel experiment that controlled where individual wild birds (great tits, Parus major) could access food, we restricted mated pairs from being allowed to forage at the same locations. This introduced a conflict for pair members between maintaining social relationships and accessing resources. We show that individuals reduce their own access to food in order to sustain their relationships and that individual foraging activity was strongly influenced by their key social counterparts. By affecting where individuals go, social relationships determined which conspecifics they encountered and consequently shaped their other social associations. Hence, while resource distribution can determine individuals' spatial and social environment, we illustrate how key social relationships themselves can govern broader social structure. Finally, social relationships also influenced the development of social foraging strategies. In response to forgoing access to resources, maintaining pair bonds led individuals to develop a flexible "scrounging" strategy, particularly by scrounging from their pair mate. This suggests that behavioral plasticity can develop to ameliorate conflicts between social relationships and other demands. Together, these results illustrate the importance of considering social relationships for explaining behavioral variation due to their significant impact on individual behavior and demonstrate the consequences of key relationships for wider processes. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  13. Studies of lightning data in conjunction with geostationary satellite data

    NASA Technical Reports Server (NTRS)

    Auvine, B.; Martin, D.

    1985-01-01

    Since January, work has been proceeding on the first phase of this project: the creation of an extensive real-time lightning data base accessible via the Space Science and Engineering Center McIdas system. The purpose of this endeavor is two-fold: to enhance the availability and ease of access to lightning data among the various networks, governmental and research agencies; and to test the feasiblity and desirability of such efforts in succeeding years. The final steps in the creation of the necessary communications links, hardware, and software are in the process of being completed. Operations ground rules for access among the various users have been discussed and are being refined. While the research planned for the last year of the project will rely for the most part on archived, quality-controlled data from the various networks, the real-time data will provide a valuable first-look at potentially interesting case studies. For this purpose, tools are being developed on McIdas for display and analysis of the data as they become available. In conjunction with concurrent GOES real-time imagery, strike locations can be plotted, gridded and contoured, or displayed in various statistical formats including frequency distributions, histograms, and scatter plots. The user may also perform these functions in relation to arbitrarily defined areas on the satellite image. By mid-May these preparations for the access and analysis of real-time lightning data are expected to be complete.

  14. Where are lifesaving automated external defibrillators located and how hard is it to find them in a large urban city?

    PubMed Central

    Leung, Alison C.; Asch, David A.; Lozada, Kirkland N.; Saynisch, Olivia B.; Asch, Jeremy M.; Becker, Nora; Griffis, Heather M.; Shofer, Frances; Hershey, John C.; Hill, Shawndra; Branas, Charles C.; Nichol, Graham; Becker, Lance B.; Merchant, Raina M.

    2013-01-01

    Objectives Automated external defibrillators (AEDs) are lifesaving, but little is known about where they are located or how to find them. We sought to locate AEDs in high employment areas of Philadelphia and characterize the process of door-to-door surveying to identify these devices. Methods Block groups representing approximately the top 3rd of total primary jobs in Philadelphia were identified using the US Census Local Employment Dynamics database. All buildings within these block groups were surveyed during regular working hours over six weeks during July-August 2011. Buildings were characterized as publically accessible or inaccessible. For accessible buildings, address, location type, and AED presence were collected. Total devices, location description and prior use were gathered in locations with AEDs. Process information (total people contacted, survey duration) was collected for all buildings. Results Of 1420 buildings in 17 block groups, 949 (67%) were accessible, but most 834 (88%) did not have an AED. 283 AEDs were reported in 115 buildings (12%). 81 (29%) were validated through visualization and 68 (24%) through photo because employees often refused access. In buildings with AEDs, several employees (median 2; range 1–8) were contacted to ascertain information, which required several minutes (mean 4; range 1–55). Conclusions Door-to-door surveying is a feasible, but time-consuming method for identifying AEDs in high employment areas. Few buildings reported having AEDs and few permitted visualization, which raises concerns about AED access. To improve cardiac arrest outcomes, efforts are needed to improve the availability of AEDs, awareness of their location and access to them. PMID:23357702

  15. Where are lifesaving automated external defibrillators located and how hard is it to find them in a large urban city?

    PubMed

    Leung, Alison C; Asch, David A; Lozada, Kirkland N; Saynisch, Olivia B; Asch, Jeremy M; Becker, Nora; Griffis, Heather M; Shofer, Frances; Hershey, John C; Hill, Shawndra; Branas, Charles C; Nichol, Graham; Becker, Lance B; Merchant, Raina M

    2013-07-01

    Automated external defibrillators (AEDs) are lifesaving, but little is known about where they are located or how to find them. We sought to locate AEDs in high employment areas of Philadelphia and characterize the process of door-to-door surveying to identify these devices. Block groups representing approximately the top 3rd of total primary jobs in Philadelphia were identified using the US Census Local Employment Dynamics database. All buildings within these block groups were surveyed during regular working hours over six weeks during July-August 2011. Buildings were characterized as publically accessible or inaccessible. For accessible buildings, address, location type, and AED presence were collected. Total devices, location description and prior use were gathered in locations with AEDs. Process information (total people contacted, survey duration) was collected for all buildings. Of 1420 buildings in 17 block groups, 949 (67%) were accessible, but most 834 (88%) did not have an AED. 283 AEDs were reported in 115 buildings (12%). 81 (29%) were validated through visualization and 68 (24%) through photo because employees often refused access. In buildings with AEDs, several employees (median 2; range 1-8) were contacted to ascertain information, which required several minutes (mean 4; range 1-55). Door-to-door surveying is a feasible, but time-consuming method for identifying AEDs in high employment areas. Few buildings reported having AEDs and few permitted visualization, which raises concerns about AED access. To improve cardiac arrest outcomes, efforts are needed to improve the availability of AEDs, awareness of their location and access to them. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  16. Mechanical code comparator

    DOEpatents

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  17. School-based asthma disease management.

    PubMed

    Tinkelman, David; Schwartz, Abby

    2004-06-01

    Asthma is the most common chronic childhood illness and the leading cause of missed school days. School is a potential location for establishing an asthma education program for children and their parents/caregivers designed to improve disease management. To determine whether a comprehensive, school-based asthma management program, in addition to a conventional disease management program, can reduce measures of asthma control, student absenteeism, and caregiver lost workdays. School nurses recruited parents/caregivers of students with asthma from three urban elementary and middle schools. Children were identified as having asthma by a previous diagnosis from their personal physician. Parents were invited to attend educational sessions about the program. Students received peak flow meters and training in their use and had access to an interactive asthma diary to record symptoms, peak flow, and medicine usage. They received monthly asthma education at school and had access to an online asthma education program and additional handouts. Parents received several educational calls regarding asthma and had a 24-hour, 7-days-a-week emergency number to call if problems arose. At 6 months, missed school days and unscheduled doctor visits were reduced by two thirds (n = 41; p< 0.01 for each). Caregivers' perception of children's activity level increased by 11% (n = 26; p = 0.037). Daytime and nighttime frequency of symptoms dropped by 62% and 34%, respectively (n = 32; p < 0.007 and p<0.03 for each). These trends continued at 12 months, although only reduction in frequency of symptoms attained statistical significance. A comprehensive, school-based asthma management program can successfully improve asthma control and reduce absenteeism in elementary and middle school students and caregiver lost workdays.

  18. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  19. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  20. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.

    PubMed

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V

    2017-03-21

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.

  1. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks

    PubMed Central

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.

    2017-01-01

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569

  2. A Time-constrained Network Voronoi Construction and Accessibility Analysis in Location-based Service Technology

    NASA Astrophysics Data System (ADS)

    Yu, W.; Ai, T.

    2014-11-01

    Accessibility analysis usually requires special models of spatial location analysis based on some geometric constructions, such as Voronoi diagram (abbreviated to VD). There are many achievements in classic Voronoi model research, however suffering from the following limitations for location-based services (LBS) applications. (1) It is difficult to objectively reflect the actual service areas of facilities by using traditional planar VDs, because human activities in LBS are usually constrained only to the network portion of the planar space. (2) Although some researchers have adopted network distance to construct VDs, their approaches are used in a static environment, where unrealistic measures of shortest path distance based on assumptions about constant travel speeds through the network were often used. (3) Due to the computational complexity of the shortest-path distance calculating, previous researches tend to be very time consuming, especially for large datasets and if multiple runs are required. To solve the above problems, a novel algorithm is developed in this paper. We apply network-based quadrat system and 1-D sequential expansion to find the corresponding subnetwork for each focus. The idea is inspired by the natural phenomenon that water flow extends along certain linear channels until meets others or arrives at the end of route. In order to accommodate the changes in traffic conditions, the length of network-quadrat is set upon the traffic condition of the corresponding street. The method has the advantage over Dijkstra's algorithm in that the time cost is avoided, and replaced with a linear time operation.

  3. How primary health care staff working in rural and remote areas access skill development and expertise to support health promotion practice.

    PubMed

    McFarlane, Kathryn A; Judd, Jenni; Wapau, Hylda; Nichols, Nina; Watt, Kerrianne; Devine, Sue

    2018-05-01

    Health promotion is a key component of comprehensive primary health care. Health promotion approaches complement healthcare management by enabling individuals to increase control over their health. Many primary healthcare staff have a role to play in health promotion practice, but their ability to integrate health promotion into practice is influenced by their previous training and experience. For primary healthcare staff working in rural and remote locations, access to professional development can be limited by what is locally available and prohibitive in terms of cost for travel and accommodation. This study provides insight into how staff at a large north Queensland Aboriginal community controlled health service access skill development and health promotion expertise to support their work. A qualitative exploratory study was conducted. Small group and individual semi-structured interviews were conducted with staff at Apunipima Cape York Health Council (n=9). A purposive sampling method was used to recruit participants from a number of primary healthcare teams that were more likely to be involved in health promotion work. Both on-the-ground staff and managers were interviewed. All participants were asked how they access skill development and expertise in health promotion practice and what approaches they prefer for ongoing health promotion support. The interviews were transcribed verbatim and analysed thematically. All participants valued access to skill development, advice and support that would assist their health promotion practice. Skill development and expertise in health promotion was accessed from a variety of sources: conferences, workshops, mentoring or shared learning from internal and external colleagues, and access to online information and resources. With limited funds and limited access to professional development locally, participants fostered external and internal organisational relationships to seek in-kind advice and support. Irrespective of where the advice came from, it needed to be applicable to work with Aboriginal and Torres Strait Islander remote communities. To improve health outcomes in rural and remote communities, the focus on health promotion and prevention approaches must be strengthened. Primary healthcare staff require ongoing access to health promotion skill development and expertise to increase their capacity to deliver comprehensive primary health care. Practice-based evidence from staff working in the field provides a greater understanding of how skill development and advice are accessed. Many of these strategies can be formalised through organisational plans and systems, which would ensure that a skilled health promotion workforce is sustained.

  4. 15 CFR 784.2 - Obtaining consent or warrants to conduct complementary access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... consents to a complementary access request, he or she is agreeing to provide the IAEA Team with the same... Team and Host Team to any area of the location, any item on the location, and any records that are necessary to comply with the APR and allow the IAEA Team to accomplish the purpose of complementary access...

  5. 15 CFR 784.2 - Obtaining consent or warrants to conduct complementary access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... consents to a complementary access request, he or she is agreeing to provide the IAEA Team with the same... Team and Host Team to any area of the location, any item on the location, and any records that are necessary to comply with the APR and allow the IAEA Team to accomplish the purpose of complementary access...

  6. 15 CFR 784.2 - Obtaining consent or warrants to conduct complementary access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... consents to a complementary access request, he or she is agreeing to provide the IAEA Team with the same... Team and Host Team to any area of the location, any item on the location, and any records that are necessary to comply with the APR and allow the IAEA Team to accomplish the purpose of complementary access...

  7. 15 CFR 784.2 - Obtaining consent or warrants to conduct complementary access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... consents to a complementary access request, he or she is agreeing to provide the IAEA Team with the same... Team and Host Team to any area of the location, any item on the location, and any records that are necessary to comply with the APR and allow the IAEA Team to accomplish the purpose of complementary access...

  8. 15 CFR 784.2 - Obtaining consent or warrants to conduct complementary access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... consents to a complementary access request, he or she is agreeing to provide the IAEA Team with the same... Team and Host Team to any area of the location, any item on the location, and any records that are necessary to comply with the APR and allow the IAEA Team to accomplish the purpose of complementary access...

  9. Data Grid Management Systems

    NASA Technical Reports Server (NTRS)

    Moore, Reagan W.; Jagatheesan, Arun; Rajasekar, Arcot; Wan, Michael; Schroeder, Wayne

    2004-01-01

    The "Grid" is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are being built around the world as the next generation data handling systems for sharing, publishing, and preserving data residing on storage systems located in multiple administrative domains. A data grid provides logical namespaces for users, digital entities and storage resources to create persistent identifiers for controlling access, enabling discovery, and managing wide area latencies. This paper introduces data grids and describes data grid use cases. The relevance of data grids to digital libraries and persistent archives is demonstrated, and research issues in data grids and grid dataflow management systems are discussed.

  10. Library API for Z-Order Memory Layout

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bethel, E. Wes

    This library provides a simple-to-use API for implementing an altnerative to traditional row-major order in-memory layout, one based on a Morton- order space filling curve (SFC) , specifically, a Z-order variant of the Morton order curve. The library enables programmers to, after a simple initialization step, to convert a multidimensional array from row-major to Z- order layouts, then use a single, generic API call to access data from any arbitrary (i,j,k) location from within the array, whether it it be stored in row- major or z-order format. The motivation for using a SFC in-memory layout is for improved spatial locality,more » which results in increased use of local high speed cache memory. The basic idea is that with row-major order layouts, a data access to some location that is nearby in index space is likely far away in physical memory, resulting in poor spatial locality and slow runtime. On the other hand, with a SFC-based layout, accesses that are nearby in index space are much more likely to also be nearby in physical memory, resulting in much better spatial locality, and better runtime performance. Numerous studies over the years have shown significant runtime performance gains are realized by using a SFC-based memory layout compared to a row-major layout, sometimes by as much as 50%, which result from the better use of the memory and cache hierarchy that are attendant with a SFC-based layout (see, for example, [Beth2012]). This library implementation is intended for use with codes that work with structured, array-based data in 2 or 3 dimensions. It is not appropriate for use with unstructured or point-based data.« less

  11. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  12. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  13. Social and place-focused communities in location-based online social networks

    NASA Astrophysics Data System (ADS)

    Brown, Chloë; Nicosia, Vincenzo; Scellato, Salvatore; Noulas, Anastasios; Mascolo, Cecilia

    2013-06-01

    Thanks to widely available, cheap Internet access and the ubiquity of smartphones, millions of people around the world now use online location-based social networking services. Understanding the structural properties of these systems and their dependence upon users' habits and mobility has many potential applications, including resource recommendation and link prediction. Here, we construct and characterise social and place-focused graphs by using longitudinal information about declared social relationships and about users' visits to physical places collected from a popular online location-based social service. We show that although the social and place-focused graphs are constructed from the same data set, they have quite different structural properties. We find that the social and location-focused graphs have different global and meso-scale structure, and in particular that social and place-focused communities have negligible overlap. Consequently, group inference based on community detection performed on the social graph alone fails to isolate place-focused groups, even though these do exist in the network. By studying the evolution of tie structure within communities, we show that the time period over which location data are aggregated has a substantial impact on the stability of place-focused communities, and that information about place-based groups may be more useful for user-centric applications than that obtained from the analysis of social communities alone.

  14. 77 FR 21973 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... location: Delete entry and replace with ``Amazon Web Services, LLC 13461 Sunrise Valley Drive, Herndon, VA.../JS Privacy Office, Freedom of Information Directorate, Washington Headquarters Services, 1155 Defense..., protocols and/or in briefings of the consequences of improper access or use of the data. The web-based files...

  15. 24 CFR 945.203 - Allocation plan.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... housing needs survey, if available, such as the CHAS, for the jurisdiction within which the area served by the PHA is located; (iii) An estimate of the number of potential tenants who will need accessible units based on information provided by: (A) The needs assessment prepared in accordance with 24 CFR 8.25...

  16. Feature-based and spatial attentional selection in visual working memory.

    PubMed

    Heuer, Anna; Schubö, Anna

    2016-05-01

    The contents of visual working memory (VWM) can be modulated by spatial cues presented during the maintenance interval ("retrocues"). Here, we examined whether attentional selection of representations in VWM can also be based on features. In addition, we investigated whether the mechanisms of feature-based and spatial attention in VWM differ with respect to parallel access to noncontiguous locations. In two experiments, we tested the efficacy of valid retrocues relying on different kinds of information. Specifically, participants were presented with a typical spatial retrocue pointing to two locations, a symbolic spatial retrocue (numbers mapping onto two locations), and two feature-based retrocues: a color retrocue (a blob of the same color as two of the items) and a shape retrocue (an outline of the shape of two of the items). The two cued items were presented at either contiguous or noncontiguous locations. Overall retrocueing benefits, as compared to a neutral condition, were observed for all retrocue types. Whereas feature-based retrocues yielded benefits for cued items presented at both contiguous and noncontiguous locations, spatial retrocues were only effective when the cued items had been presented at contiguous locations. These findings demonstrate that attentional selection and updating in VWM can operate on different kinds of information, allowing for a flexible and efficient use of this limited system. The observation that the representations of items presented at noncontiguous locations could only be reliably selected with feature-based retrocues suggests that feature-based and spatial attentional selection in VWM rely on different mechanisms, as has been shown for attentional orienting in the external world.

  17. National Geothermal Data System: Open Access to Geoscience Data, Maps, and Documents

    NASA Astrophysics Data System (ADS)

    Caudill, C. M.; Richard, S. M.; Musil, L.; Sonnenschein, A.; Good, J.

    2014-12-01

    The U.S. National Geothermal Data System (NGDS) provides free open access to millions of geoscience data records, publications, maps, and reports via distributed web services to propel geothermal research, development, and production. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG), and is compliant with international standards and protocols. NGDS currently serves geoscience information from 60+ data providers in all 50 states. Free and open source software is used in this federated system where data owners maintain control of their data. This interactive online system makes geoscience data easily discoverable, accessible, and interoperable at no cost to users. The dynamic project site http://geothermaldata.org serves as the information source and gateway to the system, allowing data and applications discovery and availability of the system's data feed. It also provides access to NGDS specifications and the free and open source code base (on GitHub), a map-centric and library style search interface, other software applications utilizing NGDS services, NGDS tutorials (via YouTube and USGIN site), and user-created tools and scripts. The user-friendly map-centric web-based application has been created to support finding, visualizing, mapping, and acquisition of data based on topic, location, time, provider, or key words. Geographic datasets visualized through the map interface also allow users to inspect the details of individual GIS data points (e.g. wells, geologic units, etc.). In addition, the interface provides the information necessary for users to access the GIS data from third party software applications such as GoogleEarth, UDig, and ArcGIS. A redistributable, free and open source software package called GINstack (USGIN software stack) was also created to give data providers a simple way to release data using interoperable and shareable standards, upload data and documents, and expose those data as a node in the NGDS or any larger data system through a CSW endpoint. The easy-to-use interface is supported by back-end software including Postgres, GeoServer, and custom CKAN extensions among others.

  18. Developing the Research Database for the School-Based Youth Services Program. Administrative Summary.

    ERIC Educational Resources Information Center

    Veale, James R.

    The School-based Youth Services Program (SBYSP) provides a one-stop location or center accessible to teens within or close to the public school. It is designed to help at-risk students by coordinating services between the community and the school, with the goal of keeping students in school and helping them gain skills that lead to employment,…

  19. ADS pilot program Plan

    NASA Technical Reports Server (NTRS)

    Clauson, J.; Heuser, J.

    1981-01-01

    The Applications Data Service (ADS) is a system based on an electronic data communications network which will permit scientists to share the data stored in data bases at universities and at government and private installations. It is designed to allow users to readily locate and access high quality, timely data from multiple sources. The ADS Pilot program objectives and the current plans for accomplishing those objectives are described.

  20. Mathematic Model of Digital Control System with PID Regulator and Regular Step of Quantization with Information Transfer via the Channel of Plural Access

    NASA Astrophysics Data System (ADS)

    Abramov, G. V.; Emeljanov, A. E.; Ivashin, A. L.

    Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.

  1. Location-Allocation and Accessibility Models for Improving the Spatial Planning of Public Health Services

    PubMed Central

    Polo, Gina; Acosta, C. Mera; Ferreira, Fernando; Dias, Ricardo Augusto

    2015-01-01

    This study integrated accessibility and location-allocation models in geographic information systems as a proposed strategy to improve the spatial planning of public health services. To estimate the spatial accessibility, we modified the two-step floating catchment area (2SFCA) model with a different impedance function, a Gaussian weight for competition among service sites, a friction coefficient, distances along a street network based on the Dijkstra’s algorithm and by performing a vectorial analysis. To check the accuracy of the strategy, we used the data from the public sterilization program for the dogs and cats of Bogot´a, Colombia. Since the proposed strategy is independent of the service, it could also be applied to any other public intervention when the capacity of the service is known. The results of the accessibility model were consistent with the sterilization program data, revealing that the western, central and northern zones are the most isolated areas under the sterilization program. Spatial accessibility improvement was sought by relocating the sterilization sites using the maximum coverage with finite demand and the p-median models. The relocation proposed by the maximum coverage model more effectively maximized the spatial accessibility to the sterilization service given the non-uniform distribution of the populations of dogs and cats throughout the city. The implementation of the proposed strategy would provide direct benefits by improving the effectiveness of different public health interventions and the use of financial and human resources. PMID:25775411

  2. A 2.4-GHz ISM RF and UWB hybrid RFID real-time locating system for industrial enterprise Internet of Things

    NASA Astrophysics Data System (ADS)

    Zhai, Chuanying; Zou, Zhuo; Zhou, Qin; Mao, Jia; Chen, Qiang; Tenhunen, Hannu; Zheng, Lirong; Xu, Lida

    2017-07-01

    This paper presents a 2.4-GHz radio frequency (RF) and ultra-wide bandwidth (UWB) hybrid real-time locating system (RTLS) for industrial enterprise Internet of Things (IoT). It employs asymmetric wireless link, that is, UWB radio is utilised for accurate positioning up to 10 cm in critical sites, whereas 2.4-GHz RF is used for tag control and coarse positioning in non-critical sites. The specified communication protocol and the adaptive tag synchronisation rate ensure reliable and deterministic access with a scalable system capacity and avoid unpredictable latency and additional energy consumption of retransmissions due to collisions. The tag, consisting of a commercial 2.4-GHz transceiver and a customised application-specific integrated circuit (ASIC) UWB transmitter (Tx), is able to achieve up to 3 years' battery life at 1600 tags per position update second with 1000 mAh battery in one cluster. The time difference of arrival (TDoA)-based positioning experiment at UWB radio is performed on the designed software-defined radio (SDR) platform.

  3. How phloem-feeding insects face the challenge of phloem-located defenses

    PubMed Central

    Will, Torsten; Furch, Alexandra C. U.; Zimmermann, Matthias R.

    2013-01-01

    Due to the high content of nutrient, sieve tubes are a primary target for pests, e.g., most phytophagous hemipteran. To protect the integrity of the sieve tubes as well as their content, plants possess diverse chemical and physical defense mechanisms. The latter mechanisms are important because they can potentially interfere with the food source accession of phloem-feeding insects. Physical defense mechanisms are based on callose as well as on proteins and often plug the sieve tube. Insects that feed from sieve tubes are potentially able to overwhelm these defense mechanisms using their saliva. Gel saliva forms a sheath in the apoplast around the stylet and is suggested to seal the stylet penetration site in the cell plasma membrane. In addition, watery saliva is secreted into penetrated cells including sieve elements; the presence of specific enzymes/effectors in this saliva is thought to interfere with plant defense responses. Here we detail several aspects of plant defense and discuss the interaction of plants and phloem-feeding insects. Recent agro-biotechnological phloem-located aphid control strategies are presented. PMID:24009620

  4. Minimizing Spatial Variability of Healthcare Spatial Accessibility-The Case of a Dengue Fever Outbreak.

    PubMed

    Chu, Hone-Jay; Lin, Bo-Cheng; Yu, Ming-Run; Chan, Ta-Chien

    2016-12-13

    Outbreaks of infectious diseases or multi-casualty incidents have the potential to generate a large number of patients. It is a challenge for the healthcare system when demand for care suddenly surges. Traditionally, valuation of heath care spatial accessibility was based on static supply and demand information. In this study, we proposed an optimal model with the three-step floating catchment area (3SFCA) to account for the supply to minimize variability in spatial accessibility. We used empirical dengue fever outbreak data in Tainan City, Taiwan in 2015 to demonstrate the dynamic change in spatial accessibility based on the epidemic trend. The x and y coordinates of dengue-infected patients with precision loss were provided publicly by the Tainan City government, and were used as our model's demand. The spatial accessibility of heath care during the dengue outbreak from August to October 2015 was analyzed spatially and temporally by producing accessibility maps, and conducting capacity change analysis. This study also utilized the particle swarm optimization (PSO) model to decrease the spatial variation in accessibility and shortage areas of healthcare resources as the epidemic went on. The proposed method in this study can help decision makers reallocate healthcare resources spatially when the ratios of demand and supply surge too quickly and form clusters in some locations.

  5. Genetic diversity and relationship of global faba bean (Vicia faba L.) germplasm revealed by ISSR markers.

    PubMed

    Wang, Hai-Fei; Zong, Xu-Xiao; Guan, Jian-Ping; Yang, Tao; Sun, Xue-Lian; Ma, Yu; Redden, Robert

    2012-03-01

    Genetic diversity and relationships of 802 faba bean (Vicia faba L.) landraces and varieties from different geographical locations of China and abroad were examined using ISSR markers. A total of 212 repeatable amplified bands were generated with 11 ISSR primers, of which 209 were polymorphic. Accessions from North China showed highest genetic diversity, while accessions from central China showed low level of diversity. Chinese spring faba bean germplasm was clearly separated from Chinese winter faba bean, based on principal component analysis and UPGMA clustering analysis. Winter accessions from Zhejiang (East China), Jiangxi (East China), Sichuan (Southwest China) and Guizhou (Southwest China) were quite distinct to that from other provinces in China. Great differentiation between Chinese accessions and those from rest of the world was shown with a UPGMA dendrogram. AMOVA analyses demonstrated large variation and differentiation within and among groups of accessions from China. As a continental geographic group, accessions from Europe were genetically closer to those from North Africa. Based on ISSR data, grouping results of accessions from Asia, Europe and Africa were obviously associated with their geographical origin. The overall results indicated that the genetic relationship of faba bean germplasm was closely associated with their geographical origin and their ecological habit.

  6. Intraosseous vascular access in disasters and mass casualty events: A review of the literature.

    PubMed

    Burgert, James M

    2016-01-01

    The intraosseous (IO) route of vascular access has been increasingly used to administer resuscitative fluids and drugs to patients in whom reliable intravenous (IV) access could not be rapidly or easily obtained. It is unknown that to what extent the IO route has been used to gain vascular access during disasters and mass casualty events. The purpose of this review was to examine the existing literature to answer the research question, "What is the utility of the IO route compared to other routes for establishing vascular access in patients resulting from disasters and mass casualty events?" Keyword-based online database search of PubMed, CINAHL, and the Cochrane Database of Systematic Reviews. University-based academic research cell. Included evidence were randomized and nonrandomized trials, systematic reviews with and without meta-analysis, case series, and case reports. Excluded evidence included narrative reviews and expert opinion. Not applicable. Of 297 evidence sources located, 22 met inclusion criteria. Located evidence was organized into four categories including chemical agent poisoning, IO placement, while wearing chemical protective clothing (PPE), military trauma, and infectious disease outbreak. Evidence indicates that the IO route of infusion is pharmacokinetically equal to the IV route and superior to the intramuscular (IM) and endotracheal routes for the administration of antidotal drugs in animal models of chemical agent poisoning while wearing full chemical PPE. The IO route is superior to the IM route for antidote administration during hypovolemic shock. Civilian casualties of explosive attacks and mass shootings would likely benefit from expanded use of the IO route and military resuscitation strategies. The IO route is useful for fluid resuscitation in the management of diarrheal and hemorrhagic infectious disease outbreaks.

  7. 77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-17

    ... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...

  8. Introducing the ICF: the development of an online resource to support learning, teaching and curriculum design.

    PubMed

    Jones, Lester E

    2011-03-01

    The International Classification of Functioning, Disability and Health (ICF) was adopted as one of the key models to support early health professional learning across a suite of new preregistration health science courses. It was decided that an online resource should be developed to enable students, course designers and teaching staff, across all disciplines, to have access to the same definitions, government policies and other supporting information on disability. As part of the comprehensive curriculum review, enquiry-based learning was adopted as the educational approach. Enquiry-based learning promotes deeper learning by encouraging students to engage in authentic challenges. As such, it was important that the online resource was not merely a site for accessing content, but enabled students to make decisions about where else to explore for credible information about the ICF. The selection of a host location that all students and staff could access meant that the resource could not be located in the existing online learning management system. Construction using software being trialled by the library at La Trobe University allowed for the required access, as well as alignment with an enquiry-based learning approach. Consultation for the content of the online resource included formal and informal working groups on curriculum review. The published version included resources from the World Health Organization, examples of research completed within different disciplines, a test of knowledge and a preformatted search page. The format of the online resource allows for updating of information, and feedback on the utilisation of the software has been used to enhance the student experience. The key issues for the development of this online resource were accessibility for students and staff, alignment with the adopted educational approach, consultation with all disciplines, and ease of modification of information and format once published. Copyright © 2010 Chartered Society of Physiotherapy. Published by Elsevier Ltd. All rights reserved.

  9. Relieving the Confusion: Location and Access Made (Relatively) Easy

    ERIC Educational Resources Information Center

    Jansen, Barbara A.

    2005-01-01

    Students need much assistance if they are to successfully use the Location and Access procedure of problem-solving. Guidelines are presented on how classroom teachers and library media specialists can help elementary students manage this Big6 stage.

  10. Improving the Accessibility and Efficiency of Point-of-Care Diagnostics Services in Low- and Middle-Income Countries: Lean and Agile Supply Chain Management.

    PubMed

    Kuupiel, Desmond; Bawontuo, Vitalis; Mashamba-Thompson, Tivani P

    2017-11-29

    Access to point-of-care (POC) diagnostics services is essential for ensuring rapid disease diagnosis, management, control, and surveillance. POC testing services can improve access to healthcare especially where healthcare infrastructure is weak and access to quality and timely medical care is a challenge. Improving the accessibility and efficiency of POC diagnostics services, particularly in resource-limited settings, may be a promising route to improving healthcare outcomes. In this review, the accessibility of POC testing is defined as the distance/proximity to the nearest healthcare facility for POC diagnostics service. This review provides an overview of the impact of POC diagnostics on healthcare outcomes in low- and middle-income countries (LMICs) and factors contributing to the accessibility of POC testing services in LMICs, focusing on characteristics of the supply chain management and quality systems management, characteristics of the geographical location, health infrastructure, and an enabling policy framework for POC diagnostics services. Barriers and challenges related to the accessibility of POC diagnostics in LMICs were also discussed. Bearing in mind the reported barriers and challenges as well as the disease epidemiology in LMICs, we propose a lean and agile supply chain management framework for improving the accessibility and efficiency of POC diagnostics services in these settings.

  11. Improving the Accessibility and Efficiency of Point-of-Care Diagnostics Services in Low- and Middle-Income Countries: Lean and Agile Supply Chain Management

    PubMed Central

    Kuupiel, Desmond; Bawontuo, Vitalis

    2017-01-01

    Access to point-of-care (POC) diagnostics services is essential for ensuring rapid disease diagnosis, management, control, and surveillance. POC testing services can improve access to healthcare especially where healthcare infrastructure is weak and access to quality and timely medical care is a challenge. Improving the accessibility and efficiency of POC diagnostics services, particularly in resource-limited settings, may be a promising route to improving healthcare outcomes. In this review, the accessibility of POC testing is defined as the distance/proximity to the nearest healthcare facility for POC diagnostics service. This review provides an overview of the impact of POC diagnostics on healthcare outcomes in low- and middle-income countries (LMICs) and factors contributing to the accessibility of POC testing services in LMICs, focusing on characteristics of the supply chain management and quality systems management, characteristics of the geographical location, health infrastructure, and an enabling policy framework for POC diagnostics services. Barriers and challenges related to the accessibility of POC diagnostics in LMICs were also discussed. Bearing in mind the reported barriers and challenges as well as the disease epidemiology in LMICs, we propose a lean and agile supply chain management framework for improving the accessibility and efficiency of POC diagnostics services in these settings. PMID:29186013

  12. Using Geographic Information Systems (GIS) to Examine Barriers to Healthcare Access for Hispanic and Latino Immigrants in the U.S. South.

    PubMed

    Edward, Jean; Biddle, Donald J

    2017-04-01

    Geographic barriers to accessing timely and appropriate primary health care services have been identified as significant social determinants of health that contribute to the growing health inequities among Hispanic and Latino immigrants in the United States. The purpose of this study was to examine the geographic factors that serve as barriers to healthcare access for Hispanic and Latino immigrants in the southern community of Louisville, Kentucky. Accessibility to healthcare services was examined using spatial analysis techniques, a Geographic Information System and geographic data from the U.S. Census Bureau and the Louisville and Jefferson County Information Consortium. Results from this study indicated that physical location, socioeconomic factors, distance, and transportation served as barriers to accessing healthcare services. Findings provide significant implications for future research and policy-based interventions focused on eliminating geographic barriers and promoting social and health equity for the underserved.

  13. Physical and Visual Accessibilities in Intensive Care Units: A Comparative Study of Open-Plan and Racetrack Units.

    PubMed

    Rashid, Mahbub; Khan, Nayma; Jones, Belinda

    2016-01-01

    This study compared physical and visual accessibilities and their associations with staff perception and interaction behaviors in 2 intensive care units (ICUs) with open-plan and racetrack layouts. For the study, physical and visual accessibilities were measured using the spatial analysis techniques of Space Syntax. Data on staff perception were collected from 81 clinicians using a questionnaire survey. The locations of 2233 interactions, and the location and length of another 339 interactions in these units were collected using systematic field observation techniques. According to the study, physical and visual accessibilities were different in the 2 ICUs, and clinicians' primary workspaces were physically and visually more accessible in the open-plan ICU. Physical and visual accessibilities affected how well clinicians' knew their peers and where their peers were located in these units. Physical and visual accessibilities also affected clinicians' perception of interaction and communication and of teamwork and collaboration in these units. Additionally, physical and visual accessibilities showed significant positive associations with interaction behaviors in these units, with the open-plan ICU showing stronger associations. However, physical accessibilities were less important than visual accessibilities in relation to interaction behaviors in these ICUs. The implications of these findings for ICU design are discussed.

  14. Mobile Launcher Crew Access Arm Prep for Transport to Kennedy Sp

    NASA Image and Video Library

    2017-10-16

    Two heavy-lift cranes are used to lower the Orion crew access arm onto a flatbed truck at Precision Fabricating and Cleaning in Cocoa, Florida. The crew access arm will be transported to a storage location near NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  15. Mobile Launcher Crew Access Arm Prep for Transport to Kennedy Sp

    NASA Image and Video Library

    2017-10-16

    Two heavy-lift cranes are being used to move the Orion crew access arm and lower it onto a flatbed truck at Precision Fabricating and Cleaning in Cocoa, Florida. The crew access arm will be transported to a storage location near NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  16. Mobile Launcher Crew Access Arm Transport from Cocoa FL to KSC

    NASA Image and Video Library

    2017-10-17

    Two heavy-lift cranes are used to tilt and lower the Orion crew access arm onto a work stand in a storage location at NASA's Kennedy Space Center in Florida. The access arm was transported from Precision Fabricating and Cleaning in Cocoa, Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  17. Mobile Launcher Crew Access Arm Prep for Transport to Kennedy Sp

    NASA Image and Video Library

    2017-10-16

    Two heavy-lift cranes are being used to lower the Orion crew access arm onto a flatbed truck at Precision Fabricating and Cleaning in Cocoa, Florida. The crew access arm will be transported to a storage location near NASA's Kennedy Space Center in Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  18. Mobile Launcher Crew Access Arm Transport from Cocoa FL to KSC

    NASA Image and Video Library

    2017-10-17

    Two heavy-lift cranes are used to lift the Orion crew access arm up from a flatbed truck in a storage location at NASA's Kennedy Space Center in Florida. The access arm was transported from Precision Fabricating and Cleaning in Cocoa, Florida. Later this month, the arm will be transported to the mobile launcher (ML) tower at the center. The crew access arm will be located at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.

  19. 75 FR 63170 - Access to Confidential Business Information by Avanti Corporation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ... control actions. They will also provide computer data base support related to providing information on...: Access to the confidential data will occur no sooner than October 21, 2010. FOR FURTHER INFORMATION... data, including CBI, will continue until October 31, 2015. If the contract is extended, this access...

  20. MRI-powered biomedical devices.

    PubMed

    Hovet, Sierra; Ren, Hongliang; Xu, Sheng; Wood, Bradford; Tokuda, Junichi; Tse, Zion Tsz Ho

    2017-11-16

    Magnetic resonance imaging (MRI) is beneficial for imaging-guided procedures because it provides higher resolution images and better soft tissue contrast than computed tomography (CT), ultrasound, and X-ray. MRI can be used to streamline diagnostics and treatment because it does not require patients to be repositioned between scans of different areas of the body. It is even possible to use MRI to visualize, power, and control medical devices inside the human body to access remote locations and perform minimally invasive procedures. Therefore, MR conditional medical devices have the potential to improve a wide variety of medical procedures; this potential is explored in terms of practical considerations pertaining to clinical applications and the MRI environment. Recent advancements in this field are introduced with a review of clinically relevant research in the areas of interventional tools, endovascular microbots, and closed-loop controlled MRI robots. Challenges related to technology and clinical feasibility are discussed, including MRI based propulsion and control, navigation of medical devices through the human body, clinical adoptability, and regulatory issues. The development of MRI-powered medical devices is an emerging field, but the potential clinical impact of these devices is promising.

  1. Canonical formalism for modelling and control of rigid body dynamics.

    PubMed

    Gurfil, P

    2005-12-01

    This paper develops a new paradigm for stabilization of rigid-body dynamics. The state-space model is formulated using canonical elements, known as the Serret-Andoyer (SA) variables, thus far scarcely used for engineering applications. The main feature of the SA formalism is the reduction of the dynamics via the underlying symmetry stemming from conservation of angular momentum and rotational kinetic energy. The controllability of the system model is examined using the notion of accessibility, and is shown to be accessible from all points. Based on the accessibility proof, two nonlinear asymptotic feedback stabilizers are developed: a damping feedback is designed based on the Jurdjevic-Quinn method, and a Hamiltonian controller is derived by using the Hamiltonian as a natural Lyapunov function for the closed-loop dynamics. It is shown that the Hamiltonian control is both passive and inverse optimal with respect to a meaningful performance index. The performance of the new controllers is examined and compared using simulations of realistic scenarios from the satellite attitude dynamics field.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bouchier, F.; Ahrens, J.S.; Wells, G.

    One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometricmore » device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.« less

  3. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  4. Network-based collaborative research environment LDRD final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davies, B.R.; McDonald, M.J.

    1997-09-01

    The Virtual Collaborative Environment (VCE) and Distributed Collaborative Workbench (DCW) are new technologies that make it possible for diverse users to synthesize and share mechatronic, sensor, and information resources. Using these technologies, university researchers, manufacturers, design firms, and others can directly access and reconfigure systems located throughout the world. The architecture for implementing VCE and DCW has been developed based on the proposed National Information Infrastructure or Information Highway and a tool kit of Sandia-developed software. Further enhancements to the VCE and DCW technologies will facilitate access to other mechatronic resources. This report describes characteristics of VCE and DCW andmore » also includes background information about the evolution of these technologies.« less

  5. Protection detail. Protecting against breach of electronic protected health information.

    PubMed

    Blass, Gerry; Miller, Susan A

    2010-01-01

    Covered entities need to conduct risk assessments that cover the requirements of HIPAA, HITECH and Meaningful use, and create a process for steady and consistent mitigation of known gaps and vulnerabilities based on risk. Reducing risk of vulnerabilities of unauthorized access to your ePHI can be done via safeguards and controls, plus audits and monitoring. When reducing risk is outside of a covered entities control, audits and monitoring are required in order to demonstrate due diligence. Know where your ePHI is stored, where it is at risk, and take steps now to reduce or eliminate the risk. Encrypt vulnerable locations. Encrypt sensitive data. By doing so, you will be protecting your organization by reducing risk of breach of ePHI. Finally, don't forget what is sometimes considered to be the hardest part--documenting your compliance activities in order to demonstrate evidence of due diligence in and avoid major $$$$ penalties for negligence under the HITECH Act of 2009.

  6. 7 CFR 1755.508 - Customer access location protection.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 11 2014-01-01 2014-01-01 false Customer access location protection. 1755.508 Section 1755.508 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE TELECOMMUNICATIONS POLICIES ON SPECIFICATIONS, ACCEPTABLE MATERIALS, AND STANDARD...

  7. 7 CFR 1755.508 - Customer access location protection.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 11 2012-01-01 2012-01-01 false Customer access location protection. 1755.508 Section 1755.508 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE TELECOMMUNICATIONS POLICIES ON SPECIFICATIONS, ACCEPTABLE MATERIALS, AND STANDARD...

  8. 7 CFR 1755.508 - Customer access location protection.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 11 2013-01-01 2013-01-01 false Customer access location protection. 1755.508 Section 1755.508 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE TELECOMMUNICATIONS POLICIES ON SPECIFICATIONS, ACCEPTABLE MATERIALS, AND STANDARD...

  9. Favorable locations for piezo actuators in plates with good control effectiveness and minimal change in system dynamics

    NASA Astrophysics Data System (ADS)

    Dhuri, K. D.; Seshu, P.

    2007-12-01

    Placement and sizing of piezo actuators is normally based on control effectiveness. However, retrofitting of piezoelectric actuators alters the inherent stiffness/mass properties of the parent structure. In rotating structures, the additional mass due to piezo patches contributes to the centrifugal stiffening force. The parent structure is originally designed to have a certain natural frequency spectrum in relation to the disturbance excitation. In the event of failure of the active system, the dynamics of the structure with piezos (now rendered passive) will therefore become significant. Thus it will be helpful to determine locations for mounting piezo patches based on minimal natural frequency change yet with good control authority. In this study, a finite element based procedure for plate structures is presented. Favorable locations for mounting piezos based on minimal natural frequency changes are iteratively evolved from an initial configuration wherein the whole plate is covered with piezos. A modal controllability approach has been used for finding piezo mounting locations from a good controllability perspective. The procedure is demonstrated for simply supported square, swept-back, circular and rotating rectangular plates considering the first four modes.

  10. Medical Equipment Tele- and Condition-Based Maintenance with Enhanced Remote Diagnostic Access (RDA) and Computer Vision

    DTIC Science & Technology

    2010-04-01

    failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE APR 2010 2. REPORT...The second is a ‘mechanical’ part that is controlled by circuit boards and is accessible by the technician via the serial console and running...was the use of conventional remote access solution designed for telecommuters or teleworkers in the Information Technology (IT) world, such as a

  11. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  12. Using NASA's Giovanni Web Portal to Access and Visualize Satellite-based Earth Science Data in the Classroom

    NASA Technical Reports Server (NTRS)

    Lloyd, Steven; Acker, James G.; Prados, Ana I.; Leptoukh, Gregory G.

    2008-01-01

    One of the biggest obstacles for the average Earth science student today is locating and obtaining satellite-based remote sensing data sets in a format that is accessible and optimal for their data analysis needs. At the Goddard Earth Sciences Data and Information Services Center (GES-DISC) alone, on the order of hundreds of Terabytes of data are available for distribution to scientists, students and the general public. The single biggest and time-consuming hurdle for most students when they begin their study of the various datasets is how to slog through this mountain of data to arrive at a properly sub-setted and manageable data set to answer their science question(s). The GES DISC provides a number of tools for data access and visualization, including the Google-like Mirador search engine and the powerful GES-DISC Interactive Online Visualization ANd aNalysis Infrastructure (Giovanni) web interface.

  13. Guiding Ebola patients to suitable health facilities: an SMS-based approach

    PubMed Central

    Trad, Mohamad-Ali; Jurdak, Raja; Rana, Rajib

    2015-01-01

    Access to appropriate health services is a fundamental problem in developing countries, where patients do not have access to information and to the nearest health service facility. We propose building a recommendation system based on simple SMS text messaging to help Ebola patients readily find the closest health service with available and appropriate resources. The system will map people’s reported symptoms to likely Ebola case definitions and suitable health service locations. In addition to providing a valuable individual service to people with curable diseases, the proposed system will also predict population-level disease spread risk for infectious diseases using crowd-sourced symptoms from the population. Health workers will be able to better plan and anticipate responses to the current Ebola outbreak in West Africa. Patients will have improved access to appropriate health care. This system could also be applied in other resource poor or rich settings. PMID:25789162

  14. Spatial access to residential care resources in Beijing, China

    PubMed Central

    2012-01-01

    Background As the population is ageing rapidly in Beijing, the residential care sector is in a fast expansion process with the support of the municipal government. Understanding spatial accessibility to residential care resources by older people supports the need for rational allocation of care resources in future planning. Methods Based on population data and data on residential care resources, this study uses two Geographic Information System (GIS) based methods – shortest path analysis and a two-step floating catchment area (2SFCA) method to analyse spatial accessibility to residential care resources. Results Spatial accessibility varies as the methods and considered factors change. When only time distance is considered, residential care resources are more accessible in the central city than in suburban and exurban areas. If care resources are considered in addition to time distance, spatial accessibility is relatively poor in the central city compared to the northeast to southeast side of the suburban and exurban areas. The resources in the northwest to southwest side of the city are the least accessible, even though several hotspots of residential care resources are located in these areas. Conclusions For policy making, it may require combining various methods for a comprehensive analysis. The methods used in this study provide tools for identifying underserved areas in order to improve equity in access to and efficiency in allocation of residential care resources in future planning. PMID:22877360

  15. Effects of providing total mixed rations indoors and on pasture on the behavior of lactating dairy cattle and their preference to be indoors or on pasture.

    PubMed

    Charlton, G L; Rutter, S M; East, M; Sinclair, L A

    2011-08-01

    Grazing is considered a normal behavior for dairy cattle, although they may not be able to meet their nutritional requirements from grazing alone, and so to sustain higher yields requires access to a total mixed ration (TMR). The study aim was to provide dairy cows with access to TMR indoors and on pasture to establish influence on behavior and preference for each location. The study took place from August to November, 2009, using 36 late-lactation Holstein-Friesian dairy cows. The cows were allocated to 1 of 3 26-d study periods (n=12×3). Within each period the cows were further divided into a control (n=6) or treatment (n=6) group using a crossover design, where the cows were changed between the control and treatment group after 13 d. Treatment cows had access to TMR indoors and on pasture, whereas control cows only had access to TMR indoors. Following a.m. and p.m. milkings the cows were taken to a point equidistant between indoors and pasture and given the choice of going to pasture (1.5 ha) or to a freestall barn. Between milkings the cows had free access between the locations. Initial choice was recorded and a video camera was used to record time spent in each location. Behavior observations were recorded to establish how the cows spent their time during the day. To determine what factors influenced preference, weather conditions, milk yield, body condition score, and lameness were recorded. Initially, the cows chose indoors following milking (96.4±0.80%). Overall, the cows expressed a partial preference for pasture (71.1±1.82%), which was different from 100, 50, and 0%. Study period influenced preference with cows spending less time on pasture as the season progressed (86.7 vs. 68.3 vs. 58.3% for study periods 1, 2, and 3, respectively). Providing the cows with TMR outdoors did not affect pasture use, but resulted in an increase in TMR intake of 2.2±0.41 kg of dry matter/d. The cows spent more time on pasture as the temperature-humidity index indoors (55.6±0.92) and outdoors (54.6±0.82) increased, but rainfall and milk yield did not influence preference. Cows with lameness score >1.5 spent more time indoors (35.4±4.52 vs. 25.2±2.64% for cows with >1.5 vs. ≤1.5 lameness score, respectively). In conclusion, the cows expressed a partial preference for pasture, which was not influenced by providing TMR on pasture. Copyright © 2011 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  16. Collaborative Indoor Access Point Localization Using Autonomous Mobile Robot Swarm.

    PubMed

    Awad, Fahed; Naserllah, Muhammad; Omar, Ammar; Abu-Hantash, Alaa; Al-Taj, Abrar

    2018-01-31

    Localization of access points has become an important research problem due to the wide range of applications it addresses such as dismantling critical security threats caused by rogue access points or optimizing wireless coverage of access points within a service area. Existing proposed solutions have mostly relied on theoretical hypotheses or computer simulation to demonstrate the efficiency of their methods. The techniques that rely on estimating the distance using samples of the received signal strength usually assume prior knowledge of the signal propagation characteristics of the indoor environment in hand and tend to take a relatively large number of uniformly distributed random samples. This paper presents an efficient and practical collaborative approach to detect the location of an access point in an indoor environment without any prior knowledge of the environment. The proposed approach comprises a swarm of wirelessly connected mobile robots that collaboratively and autonomously collect a relatively small number of non-uniformly distributed random samples of the access point's received signal strength. These samples are used to efficiently and accurately estimate the location of the access point. The experimental testing verified that the proposed approach can identify the location of the access point in an accurate and efficient manner.

  17. Collaborative Indoor Access Point Localization Using Autonomous Mobile Robot Swarm

    PubMed Central

    Awad, Fahed; Naserllah, Muhammad; Omar, Ammar; Abu-Hantash, Alaa; Al-Taj, Abrar

    2018-01-01

    Localization of access points has become an important research problem due to the wide range of applications it addresses such as dismantling critical security threats caused by rogue access points or optimizing wireless coverage of access points within a service area. Existing proposed solutions have mostly relied on theoretical hypotheses or computer simulation to demonstrate the efficiency of their methods. The techniques that rely on estimating the distance using samples of the received signal strength usually assume prior knowledge of the signal propagation characteristics of the indoor environment in hand and tend to take a relatively large number of uniformly distributed random samples. This paper presents an efficient and practical collaborative approach to detect the location of an access point in an indoor environment without any prior knowledge of the environment. The proposed approach comprises a swarm of wirelessly connected mobile robots that collaboratively and autonomously collect a relatively small number of non-uniformly distributed random samples of the access point’s received signal strength. These samples are used to efficiently and accurately estimate the location of the access point. The experimental testing verified that the proposed approach can identify the location of the access point in an accurate and efficient manner. PMID:29385042

  18. Remotely Delivered Exercise-Based Cardiac Rehabilitation: Design and Content Development of a Novel mHealth Platform

    PubMed Central

    Gant, Nicholas; Meads, Andrew; Warren, Ian; Maddison, Ralph

    2016-01-01

    Background Participation in traditional center-based cardiac rehabilitation exercise programs (exCR) is limited by accessibility barriers. Mobile health (mHealth) technologies can overcome these barriers while preserving critical attributes of center-based exCR monitoring and coaching, but these opportunities have not yet been capitalized on. Objective We aimed to design and develop an evidence- and theory-based mHealth platform for remote delivery of exCR to any geographical location. Methods An iterative process was used to design and develop an evidence- and theory-based mHealth platform (REMOTE-CR) that provides real-time remote exercise monitoring and coaching, behavior change education, and social support. Results The REMOTE-CR platform comprises a commercially available smartphone and wearable sensor, custom smartphone and Web-based applications (apps), and a custom middleware. The platform allows exCR specialists to monitor patients’ exercise and provide individualized coaching in real-time, from almost any location, and provide behavior change education and social support. Intervention content incorporates Social Cognitive Theory, Self-determination Theory, and a taxonomy of behavior change techniques. Exercise components are based on guidelines for clinical exercise prescription. Conclusions The REMOTE-CR platform extends the capabilities of previous telehealth exCR platforms and narrows the gap between existing center- and home-based exCR services. REMOTE-CR can complement center-based exCR by providing an alternative option for patients whose needs are not being met. Remotely monitored exCR may be more cost-effective than establishing additional center-based programs. The effectiveness and acceptability of REMOTE-CR are now being evaluated in a noninferiority randomized controlled trial. PMID:27342791

  19. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  20. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  1. Communications systems and methods for subsea processors

    DOEpatents

    Gutierrez, Jose; Pereira, Luis

    2016-04-26

    A subsea processor may be located near the seabed of a drilling site and used to coordinate operations of underwater drilling components. The subsea processor may be enclosed in a single interchangeable unit that fits a receptor on an underwater drilling component, such as a blow-out preventer (BOP). The subsea processor may issue commands to control the BOP and receive measurements from sensors located throughout the BOP. A shared communications bus may interconnect the subsea processor and underwater components and the subsea processor and a surface or onshore network. The shared communications bus may be operated according to a time division multiple access (TDMA) scheme.

  2. Trace-Authored Papers from the Annual Conference on Rehabilitation Technology (11th, Montreal, Canada, 1988). Trace Reprint Series.

    ERIC Educational Resources Information Center

    Borden, P. A.; And Others

    Summaries are presented of five conference papers on communication, control, and computer access for handicapped individuals. Papers have the following titles and authors: "Accessibility of Graphically Based User Interface Computer Systems for Individuals with Visual Impairments" (Charles Lee and Gregg Vanderheiden); "Data Base vs. Information…

  3. Predictive modelling of habitat selection by marine predators with respect to the abundance and depth distribution of pelagic prey.

    PubMed

    Boyd, Charlotte; Castillo, Ramiro; Hunt, George L; Punt, André E; VanBlaricom, Glenn R; Weimerskirch, Henri; Bertrand, Sophie

    2015-11-01

    Understanding the ecological processes that underpin species distribution patterns is a fundamental goal in spatial ecology. However, developing predictive models of habitat use is challenging for species that forage in marine environments, as both predators and prey are often highly mobile and difficult to monitor. Consequently, few studies have developed resource selection functions for marine predators based directly on the abundance and distribution of their prey. We analysed contemporaneous data on the diving locations of two seabird species, the shallow-diving Peruvian Booby (Sula variegata) and deeper diving Guanay Cormorant (Phalacrocorax bougainvilliorum), and the abundance and depth distribution of their main prey, Peruvian anchoveta (Engraulis ringens). Based on this unique data set, we developed resource selection functions to test the hypothesis that the probability of seabird diving behaviour at a given location is a function of the relative abundance of prey in the upper water column. For both species, we show that the probability of diving behaviour is mostly explained by the distribution of prey at shallow depths. While the probability of diving behaviour increases sharply with prey abundance at relatively low levels of abundance, support for including abundance in addition to the depth distribution of prey is weak, suggesting that prey abundance was not a major factor determining the location of diving behaviour during the study period. The study thus highlights the importance of the depth distribution of prey for two species of seabird with different diving capabilities. The results complement previous research that points towards the importance of oceanographic processes that enhance the accessibility of prey to seabirds. The implications are that locations where prey is predictably found at accessible depths may be more important for surface foragers, such as seabirds, than locations where prey is predictably abundant. Analysis of the relative importance of abundance and accessibility is essential for the design and evaluation of effective management responses to reduced prey availability for seabirds and other top predators in marine systems. © 2015 The Authors. Journal of Animal Ecology © 2015 British Ecological Society.

  4. The Paperless Solution

    NASA Technical Reports Server (NTRS)

    2001-01-01

    REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.

  5. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  6. Spatial controls of occurrence and spread of wildfires in the Missouri Ozark Highlands.

    PubMed

    Yang, Jian; He, Hong S; Shifley, Stephen R

    2008-07-01

    Understanding spatial controls on wildfires is important when designing adaptive fire management plans and optimizing fuel treatment locations on a forest landscape. Previous research about this topic focused primarily on spatial controls for fire origin locations alone. Fire spread and behavior were largely overlooked. This paper contrasts the relative importance of biotic, abiotic, and anthropogenic constraints on the spatial pattern of fire occurrence with that on burn probability (i.e., the probability that fire will spread to a particular location). Spatial point pattern analysis and landscape succession fire model (LANDIS) were used to create maps to show the contrast. We quantified spatial controls on both fire occurrence and fire spread in the Midwest Ozark Highlands region, USA. This area exhibits a typical anthropogenic surface fire regime. We found that (1) human accessibility and land ownership were primary limiting factors in shaping clustered fire origin locations; (2) vegetation and topography had a negligible influence on fire occurrence in this anthropogenic regime; (3) burn probability was higher in grassland and open woodland than in closed-canopy forest, even though fire occurrence density was less in these vegetation types; and (4) biotic and abiotic factors were secondary descriptive ingredients for determining the spatial patterns of burn probability. This study demonstrates how fire occurrence and spread interact with landscape patterns to affect the spatial distribution of wildfire risk. The application of spatial point pattern data analysis would also be valuable to researchers working on landscape forest fire models to integrate historical ignition location patterns in fire simulation.

  7. Satellite control system nucleus for the Brazilian complete space mission

    NASA Astrophysics Data System (ADS)

    Yamaguti, Wilson; Decarvalhovieira, Anastacio Emanuel; Deoliveira, Julia Leocadia; Cardoso, Paulo Eduardo; Dacosta, Petronio Osorio

    1990-10-01

    The nucleus of the satellite control system for the Brazilian data collecting and remote sensing satellites is described. The system is based on Digital Equipment Computers and the VAX/VMS operating system. The nucleus provides the access control, the system configuration, the event management, history files management, time synchronization, wall display control, and X25 data communication network access facilities. The architecture of the nucleus and its main implementation aspects are described. The implementation experience acquired is considered.

  8. A new approach to the tradeoff between quality and accessibility of health care.

    PubMed

    Tanke, Marit A C; Ikkersheim, David E

    2012-05-01

    Quality of care is associated with patient volume. Regionalization of care is therefore one of the approaches that is suited to improve quality of care. A disadvantage of regionalization is that the accessibility of the facilities can decrease. By investigating the tradeoff between quality and accessibility it is possible to determine the optimal amount of treatment locations in a health care system. In this article we present a new model to quantitatively 'solve' this tradeoff. We use the condition breast cancer in the Netherlands as an example. We calculated the expected quality gains in Quality Adjusted Lifetime Years (QALY's) due to stepwise regionalization using 'volume-outcome' literature for breast cancer. Decreased accessibility was operationalized as increased (travel) costs due to regionalization by using demographic data, drive-time information, and the national median income. The total sum of the quality and accessibility function determines the optimum range of treatment locations for this particular condition, given the 'volume-quality' relationship and Dutch demographics and geography. Currently, 94 locations offer breast cancer treatment in the Netherlands. Our model estimates that the optimum range of treatment locations for this particular condition in the Netherlands varies from 15 locations to 44 locations. Our study shows that the Dutch society would benefit from regionalization of breast cancer care as possible quality gains outweigh heightened travel costs. In addition, this model can be used for other medical conditions and in other countries. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  9. Investigating cold based summit glaciers through direct access to the glacier base: a case study constraining the maximum age of Chli Titlis glacier, Switzerland

    NASA Astrophysics Data System (ADS)

    Bohleber, Pascal; Hoffmann, Helene; Kerch, Johanna; Sold, Leo; Fischer, Andrea

    2018-01-01

    Cold glaciers at the highest locations of the European Alps have been investigated by drilling ice cores to retrieve their stratigraphic climate records. Findings like the Oetztal ice man have demonstrated that small ice bodies at summit locations of comparatively lower altitudes may also contain old ice if locally frozen to the underlying bedrock. In this case, constraining the maximum age of their lowermost ice part may help to identify past periods with minimum ice extent in the Alps. However, with recent warming and consequent glacier mass loss, these sites may not preserve their unique climate information for much longer. Here we utilized an existing ice cave at Chli Titlis (3030 m), central Switzerland, to perform a case study for investigating the maximum age of cold-based summit glaciers in the Alps. The cave offers direct access to the glacier stratigraphy without the logistical effort required in ice core drilling. In addition, a pioneering exploration had already demonstrated stagnant cold ice conditions at Chli Titlis, albeit more than 25 years ago. Our englacial temperature measurements and the analysis of the isotopic and physical properties of ice blocks sampled at three locations within the ice cave show that cold ice still exists fairly unchanged today. State-of-the-art micro-radiocarbon analysis constrains the maximum age of the ice at Chli Titlis to about 5000 years before present. By this means, the approach presented here will contribute to a future systematic investigation of cold-based summit glaciers, also in the Eastern Alps.

  10. A novel PON based UMTS broadband wireless access network architecture with an algorithm to guarantee end to end QoS

    NASA Astrophysics Data System (ADS)

    Sana, Ajaz; Hussain, Shahab; Ali, Mohammed A.; Ahmed, Samir

    2007-09-01

    In this paper we proposes a novel Passive Optical Network (PON) based broadband wireless access network architecture to provide multimedia services (video telephony, video streaming, mobile TV, mobile emails etc) to mobile users. In the conventional wireless access networks, the base stations (Node B) and Radio Network Controllers (RNC) are connected by point to point T1/E1 lines (Iub interface). The T1/E1 lines are expensive and add up to operating costs. Also the resources (transceivers and T1/E1) are designed for peak hours traffic, so most of the time the dedicated resources are idle and wasted. Further more the T1/E1 lines are not capable of supporting bandwidth (BW) required by next generation wireless multimedia services proposed by High Speed Packet Access (HSPA, Rel.5) for Universal Mobile Telecommunications System (UMTS) and Evolution Data only (EV-DO) for Code Division Multiple Access 2000 (CDMA2000). The proposed PON based back haul can provide Giga bit data rates and Iub interface can be dynamically shared by Node Bs. The BW is dynamically allocated and the unused BW from lightly loaded Node Bs is assigned to heavily loaded Node Bs. We also propose a novel algorithm to provide end to end Quality of Service (QoS) (between RNC and user equipment).The algorithm provides QoS bounds in the wired domain as well as in wireless domain with compensation for wireless link errors. Because of the air interface there can be certain times when the user equipment (UE) is unable to communicate with Node B (usually referred to as link error). Since the link errors are bursty and location dependent. For a proposed approach, the scheduler at the Node B maps priorities and weights for QoS into wireless MAC. The compensations for errored links is provided by the swapping of services between the active users and the user data is divided into flows, with flows allowed to lag or lead. The algorithm guarantees (1)delay and throughput for error-free flows,(2)short term fairness among error-free flows,(3)long term fairness among errored and error-free flows,(4)graceful degradation for leading flows and graceful compensation for lagging flows.

  11. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    PubMed

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  12. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

    PubMed Central

    Yang, Yixian; Shi, Yuxiang

    2018-01-01

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269

  13. Foursquare: A Health Education Specialist Checks-In--A Commentary

    ERIC Educational Resources Information Center

    Haithcox-Dennis, Melissa

    2011-01-01

    More and more, health education specialists are integrating technology into their work. Whereas most are familiar with social media sites like Facebook, Twitter and LinkedIn, one relatively new form of social media, location based services (LBS), may be less familiar. Developed in 2000, LBS are software applications that are accessible from a…

  14. 47 CFR 15.703 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... database or spectrum sensing. (b) Client device. A TVBD operating in client mode. (c) Client mode. An... TVBD is able to select a channel itself based on a list provided by the database and initiate a network... does not require use of a geo-location capability or access to the TV bands database and requires...

  15. Pathways to College Access and Success

    ERIC Educational Resources Information Center

    Journal for Vocational Special Needs Education, 2006

    2006-01-01

    This report provides an in-depth look at five different programs, all of which currently, or are making efforts to, include a broad range of students. The five Credit-Based Transition Programs (CBTPs) studied are located in five states--California, Iowa, Minnesota, New York and Texas--and included two dual enrollment programs (one with a career…

  16. Simple Search Aids with a Little Help from My Friends

    ERIC Educational Resources Information Center

    Spitzer, Stephan

    2008-01-01

    The Uniformed Services University of the Health Sciences, located on the National Naval Medical Center's campus in Bethesda, Md., is a medical education and research facility for the nation's military and public health community. The university's James A. Zimble Learning Resource Center provides web-based access to more than 9,000 electronic…

  17. Anomaly and signature filtering improve classifier performance for detection of suspicious access to EHRs.

    PubMed

    Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila

    2011-01-01

    Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10(-6). Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful.

  18. Anomaly and Signature Filtering Improve Classifier Performance For Detection Of Suspicious Access To EHRs

    PubMed Central

    Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila

    2011-01-01

    Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10−6. Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful. PMID:22195129

  19. Using local clinical educators and shared resources to deliver simulation training activities across rural and remote South Australia and south-west Victoria: A distributed collaborative model.

    PubMed

    Masters, Stacey C; Elliott, Sandi; Boyd, Sarah; Dunbar, James A

    2017-10-01

    There is a lack of access to simulation-based education (SBE) for professional entry students (PES) and health professionals at rural and remote locations. A descriptive study. Health and education facilities in regional South Australia and south-west Victoria. Number of training recipients who participated in SBE; geographical distribution and locations where SBE was delivered; number of rural clinical educators providing SBE. A distributed model to deliver SBE in rural and remote locations in collaboration with local health and community services, education providers and the general public. Face-to-face meetings with health services and education providers identified gaps in locally delivered clinical skills training and availability of simulation resources. Clinical leadership, professional development and community of practice strategies were implemented to enhance capacity of rural clinical educators to deliver SBE. The number of SBE participants and training hours delivered exceeded targets. The distributed model enabled access to regular, localised training for PES and health professionals, minimising travel and staff backfill costs incurred when attending regional centres. The skills acquired by local educators remain in rural areas to support future training. The distributed collaborative model substantially increased access to clinical skills training for PES and health professionals in rural and remote locations. Developing the teaching skills of rural clinicians optimised the use of simulation resources. Consequently, health services were able to provide students with flexible and realistic learning opportunities in clinical procedures, communication techniques and teamwork skills. © 2017 National Rural Health Alliance Inc.

  20. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    NASA Astrophysics Data System (ADS)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

Top