75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...
Securely and Flexibly Sharing a Biomedical Data Management System
Wang, Fusheng; Hussels, Phillip; Liu, Peiya
2011-01-01
Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285
DOT National Transportation Integrated Search
2015-06-01
The success of access management depends on the coordination of access management planning and land use planning, : but the Virginia Department of Transportation (VDOT) has control over access management in Virginia and cities and counties : adjacent...
Access management for Kentucky.
DOT National Transportation Integrated Search
2004-02-01
The Access Management Manual published by the Transportation Research Board in 2003 defines access management as the "systematic control of the location, spacing, design, and operation of driveways, median openings, interchanges, and street connectio...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
... Change Relating to New Market Access Risk Management Service, EdgeRisk Controls SM June 26, 2012... access risk management service, called EdgeRisk Controls\\SM\\ (the ``Service''). II. Self-Regulatory... and maintain a system of risk management controls and supervisory procedures that are reasonably...
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
... Change Relating to New Market Access Risk Management Service, EdgeRisk Controls SM June 26, 2012... access risk management service, called EdgeRisk Controls SM (the ``Service''). II. Self-Regulatory..., document and maintain a system of risk management controls and supervisory procedures that are reasonably...
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2011 CFR
2011-04-01
... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2012 CFR
2012-04-01
... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...
Reflective Database Access Control
ERIC Educational Resources Information Center
Olson, Lars E.
2009-01-01
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Method and apparatus for managing access to a memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeBenedictis, Erik
A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operationalmore » memory layout reduces an amount of energy consumed by the processor to perform the computing job.« less
Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel
2016-12-01
Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
... applicable in connection with market access.\\9\\ The required financial risk management controls and... Act of 1934 August 15, 2011. I. Introduction Pursuant to Rule 15c3-5(f) under the Securities Exchange... maintain a system of risk management controls and supervisory procedures that, among other things, is...
Access Control Management for SCADA Systems
NASA Astrophysics Data System (ADS)
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
NASA Astrophysics Data System (ADS)
Stevens, T.; Olsen, L. M.; Ritz, S.; Morahan, M.; Aleman, A.; Cepero, L.; Gokey, C.; Holland, M.; Cordova, R.; Areu, S.; Cherry, T.; Tran-Ho, H.
2012-12-01
Discovering Earth science data can be complex if the catalog holding the data lacks structure. Controlled keyword vocabularies within metadata catalogues can improve data discovery. NASA's Global Change Master Directory's (GCMD) Keyword Management System (KMS) is a recently released a RESTful web service for managing and providing access to controlled keywords (science keywords, service keywords, platforms, instruments, providers, locations, projects, data resolution, etc.). The KMS introduces a completely new paradigm for the use and management of the keywords and allows access to these keywords as SKOS Concepts (RDF), OWL, standard XML, and CSV. A universally unique identifier (UUID) is automatically assigned to each keyword, which uniquely identifies each concept and its associated information. A component of the KMS is the keyword manager, an internal tool that allows GCMD science coordinators to manage concepts. This includes adding, modifying, and deleting broader, narrower, or related concepts and associated definitions. The controlled keyword vocabulary represents over 20 years of effort and collaboration with the Earth science community. The maintenance, stability, and ongoing vigilance in maintaining mutually exclusive and parallel keyword lists is important for a "normalized" search and discovery, and provides a unique advantage for the science community. Modifications and additions are made based on community suggestions and internal review. To help maintain keyword integrity, science keyword rules and procedures for modification of keywords were developed. This poster will highlight the use of the KMS as a beneficial service for the stewardship and access of the GCMD keywords. Users will learn how to access the KMS and utilize the keywords. Best practices for managing an extensive keyword hierarchy will also be discussed. Participants will learn the process for making keyword suggestions, which subsequently help in building a controlled keyword vocabulary to improve earth science data discovery and access.
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Proximity Displays for Access Control
ERIC Educational Resources Information Center
Vaniea, Kami
2012-01-01
Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…
50 CFR 648.262 - Effort-control program for red crab limited access vessels.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...
Satellite control system nucleus for the Brazilian complete space mission
NASA Astrophysics Data System (ADS)
Yamaguti, Wilson; Decarvalhovieira, Anastacio Emanuel; Deoliveira, Julia Leocadia; Cardoso, Paulo Eduardo; Dacosta, Petronio Osorio
1990-10-01
The nucleus of the satellite control system for the Brazilian data collecting and remote sensing satellites is described. The system is based on Digital Equipment Computers and the VAX/VMS operating system. The nucleus provides the access control, the system configuration, the event management, history files management, time synchronization, wall display control, and X25 data communication network access facilities. The architecture of the nucleus and its main implementation aspects are described. The implementation experience acquired is considered.
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)
2013-07-01
Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of
A Non-technical User-Oriented Display Notation for XACML Conditions
NASA Astrophysics Data System (ADS)
Stepien, Bernard; Felty, Amy; Matwin, Stan
Ideally, access control to resources in complex IT systems ought to be handled by business decision makers who own a given resource (e.g., the pay and benefits section of an organization should decide and manage the access rules to the payroll system). To make this happen, the security and database communities need to develop vendor-independent access management tools, useable by decision makers, rather than technical personnel detached from a given business function. We have developed and implemented such tool, based on XACML. The XACML is an important emerging tool for managing complex access control applications. As a formal notation, based on an XML schema representing the grammar of a given application, XACML is precise and non-ambiguous. But this very property puts it out of reach of non-technical users. We propose a new notation for displaying and editing XACML rules that is independent of XML, and we develop an editor for it. Our notation combines a tree representation of logical expressions with an accessible natural language layer. Our early experience indicates that such rules can be grasped by non-technical users wishing to develop and control rules for accessing their own resources.
78 FR 52808 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-26
... access to customers or other persons, to implement risk management controls and supervisory procedures... requires brokers or dealers to establish, document, and maintain certain risk management controls and... of its risk management controls as part of its books and records in a manner consistent with Rule 17a...
Hickey, M E
1995-10-01
Professional "revenge of the nerds" is currently taking place, as managed care evolves generalist physicians into new professional prominence. Primary care physicians are finding themselves at the center of health care market reform as health plans, insurers, and other financing organizations turn to them as the key to cost control. In short supply, they are prospering financially from the demand. As the source of patients, they are gaining in prestige from specialists and hospitals who once demeaned them. But these newfound roles are only the initial steps in the transformation of the primary care practitioner. The change that the generalists are experiencing is essentially managing access to care, not truly managing care itself. There are large and crucial differences between managing access to care and actually managing care. These differences are, in many ways, a higher calling for primary care practitioners as they refocus attention on patient outcomes, which will in itself result in a lower resource utilization above and beyond the crude controlling of access. What those differences are, what new roles they require, and what impact they will have on organizations that either house or contract with primary care physicians will be the focus of this article.
Organization and management of heterogeneous, dispersed data bases in nuclear engineering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eastman, C.M.
1986-01-01
Large, complex, multiperson engineering projects in many areas, nuclear, aerospace, electronics, and manufacturing, have inherent needs for coordination, control, and management of the related engineering data. Taken in the abstract, the notion of an integrated engineering data base (IED) for such projects is attractive. The potential capabilities of an (IED) are that all data are managed in a coordinated way, are made accessible to all users who need it, allow relations between all parts of the data to be tracked and managed, provide backup, recovery, audit trails, security and access control, and allow overall project status to be monitored andmore » managed. Common data accessing schemes and user interfaces to applications are also part of an IED. This paper describes a new software product that allows incremental realization of many of the capabilities of an IED, without the massive disruption and risk.« less
News from ESO Archive Services: Next Generation Request Handler and Data Access Delegation
NASA Astrophysics Data System (ADS)
Fourniol, N.; Lockhart, J.; Suchar, D.; Tacconi-Garman, L. E.; Moins, C.; Bierwirth, T.; Eglitis, P.; Vuong, M.; Micol, A.; Delmotte, N.; Vera, I.; Dobrzycki, A.; Forchì, V.; Lange, U.; Sogni, F.
2012-09-01
We present the new ESO Archive services which improve the electronic data access via the Download Manager and also provide PIs with the option to delegate data access to their collaborators via the Data Access Control.
[Access control management in electronic health records: a systematic literature review].
Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio
2012-01-01
This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.
Traffic management mechanism for intranets with available-bit-rate access to the Internet
NASA Astrophysics Data System (ADS)
Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed
1997-10-01
The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
RBAC-Matrix-based EMR right management system to improve HIPAA compliance.
Lee, Hung-Chang; Chang, Shih-Hsin
2012-10-01
Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.
ERIC Educational Resources Information Center
Ya-chun, Lian
An automated minicomputer-based library management system is being developed at the Swedish Royal Institute of Technology Library (RITL). RAMAS (the RITL Automated Management System) currently deals with periodical check-in, claiming, index-handling, and binding control. A RAMAS bibliographic record can be accessed from eight different points…
78 FR 65718 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... maintain certain risk management controls and supervisory procedures as well as regularly review such... supervisory procedures and a written description of its risk management controls as part of its books and... providing sponsored or direct market access to customers or other persons, to implement risk management...
The Unicorn Collection Management System: Its Structure and Features.
ERIC Educational Resources Information Center
Young, Jacky; Veatch, James R., Jr.
1988-01-01
Discusses the design principles behind the Unicorn Collection Management System, an integrated library system which includes modules for bibliographic and inventory control, circulation, academic reserves, serials control, authority control, acquisition, electronic mail, bulletin board, and enhanced public access. The flexibility of the system is…
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses
NASA Astrophysics Data System (ADS)
Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon
This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.
An SSH key management system: easing the pain of managing key/user/account associations
NASA Astrophysics Data System (ADS)
Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.
2008-07-01
Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
NASA Astrophysics Data System (ADS)
Park, Chang-Seop; Kang, Hyun-Sun
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-10
... Office of Management and Budget (OMB) for Approval; OMB Control Number 1024-0252; The Interagency Access and Senior Pass Application Processes AGENCY: National Park Service, Interior. ACTION: Notice; request.... Title: The Interagency Access and Senior Pass Application Processes. Form Number: None. Type of Request...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-04
... Agencywide Documents Access and Management System (ADAMS) under Accession Number ML092670242. The proposed... and Maintenance Program'' is being proposed for Section [5.5] [``Administrative Controls--Programs and... and Management System (ADAMS): Publicly available documents created or received at the NRC are...
Task Delegation Based Access Control Models for Workflow Systems
NASA Astrophysics Data System (ADS)
Gaaloul, Khaled; Charoy, François
e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.
Kuupiel, Desmond; Bawontuo, Vitalis; Mashamba-Thompson, Tivani P
2017-11-29
Access to point-of-care (POC) diagnostics services is essential for ensuring rapid disease diagnosis, management, control, and surveillance. POC testing services can improve access to healthcare especially where healthcare infrastructure is weak and access to quality and timely medical care is a challenge. Improving the accessibility and efficiency of POC diagnostics services, particularly in resource-limited settings, may be a promising route to improving healthcare outcomes. In this review, the accessibility of POC testing is defined as the distance/proximity to the nearest healthcare facility for POC diagnostics service. This review provides an overview of the impact of POC diagnostics on healthcare outcomes in low- and middle-income countries (LMICs) and factors contributing to the accessibility of POC testing services in LMICs, focusing on characteristics of the supply chain management and quality systems management, characteristics of the geographical location, health infrastructure, and an enabling policy framework for POC diagnostics services. Barriers and challenges related to the accessibility of POC diagnostics in LMICs were also discussed. Bearing in mind the reported barriers and challenges as well as the disease epidemiology in LMICs, we propose a lean and agile supply chain management framework for improving the accessibility and efficiency of POC diagnostics services in these settings.
Kuupiel, Desmond; Bawontuo, Vitalis
2017-01-01
Access to point-of-care (POC) diagnostics services is essential for ensuring rapid disease diagnosis, management, control, and surveillance. POC testing services can improve access to healthcare especially where healthcare infrastructure is weak and access to quality and timely medical care is a challenge. Improving the accessibility and efficiency of POC diagnostics services, particularly in resource-limited settings, may be a promising route to improving healthcare outcomes. In this review, the accessibility of POC testing is defined as the distance/proximity to the nearest healthcare facility for POC diagnostics service. This review provides an overview of the impact of POC diagnostics on healthcare outcomes in low- and middle-income countries (LMICs) and factors contributing to the accessibility of POC testing services in LMICs, focusing on characteristics of the supply chain management and quality systems management, characteristics of the geographical location, health infrastructure, and an enabling policy framework for POC diagnostics services. Barriers and challenges related to the accessibility of POC diagnostics in LMICs were also discussed. Bearing in mind the reported barriers and challenges as well as the disease epidemiology in LMICs, we propose a lean and agile supply chain management framework for improving the accessibility and efficiency of POC diagnostics services in these settings. PMID:29186013
Advanced systems engineering and network planning support
NASA Technical Reports Server (NTRS)
Walters, David H.; Barrett, Larry K.; Boyd, Ronald; Bazaj, Suresh; Mitchell, Lionel; Brosi, Fred
1990-01-01
The objective of this task was to take a fresh look at the NASA Space Network Control (SNC) element for the Advanced Tracking and Data Relay Satellite System (ATDRSS) such that it can be made more efficient and responsive to the user by introducing new concepts and technologies appropriate for the 1997 timeframe. In particular, it was desired to investigate the technologies and concepts employed in similar systems that may be applicable to the SNC. The recommendations resulting from this study include resource partitioning, on-line access to subsets of the SN schedule, fluid scheduling, increased use of demand access on the MA service, automating Inter-System Control functions using monitor by exception, increase automation for distributed data management and distributed work management, viewing SN operational control in terms of the OSI Management framework, and the introduction of automated interface management.
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-20
... initiated a rulemaking proceeding in accordance with provisions added by the Digital Millennium Copyright... available in digital copies. Proponent: The Open Book Alliance. 2. Literary works, distributed electronically, that: (1) Contain digital rights management and/or other access controls which either prevent the...
An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments
ERIC Educational Resources Information Center
Zhang, Yue
2010-01-01
Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…
Management of Information Technology Access Controls
1991-01-01
Management Information Systems , (New York: American Elsevier Publishing Company, 1968), 8. 2. Webster’s Third New International Dictionary, Unabridged... Management Information Systems (New York: American Elsevier Publishing company, 1968), 37. 5. Ibid. 6. Ibid. 7. Gerald M. Ward and Jonathan D. Harris, "Data...Controls: A Visual Approach Through Integrated Management Information Systems . New York: American Elsevier Publishing Company, 1968. Brancheau, James C
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nicklaus, Dennis J.
2013-10-13
We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less
The E-Book: Pipe Dream or Potential Disaster?
ERIC Educational Resources Information Center
Dorman, David
1999-01-01
Discusses the development of electronic books and considers marketing and distribution, rights management, and technical standards. Economic and institutional relationships, copyrights, Extensible Markup Language (XML), access to content, free access versus fees, preservation versus loss of control over long-term storage and access, and trusted…
Patients' experiences of an open access follow up arrangement in managing inflammatory bowel disease
Rogers, A; Kennedy, A; Nelson, E; Robinson, A
2004-01-01
Background: Improving access is a key policy issue in improving quality of care and extending patient choice and participation. People's experience of changing from fixed outpatient appointments to more flexible direct access arrangements for chronic disease has been underexplored. Objectives: To examine patients' views on using an open system of access compared with fixed outpatient appointments as part of a guided self-management intervention for inflammatory bowel disease (IBD). Design: Embedded qualitative study undertaken alongside a randomised controlled trial. Semi-structured interviews were undertaken to obtain an in depth understanding of patients' experience of the change in access arrangements. Participants: A purposive sample (n = 30) was drawn from the intervention group (n = 700) according to a range of responses to the trial baseline and follow up quantitative measures. Results: 28 interviews were included in the analysis. Compared with the previous system of fixed appointments, preference for the new open access system was based on enhanced personal control in contacting services and the view that it fitted better with everyday routine management and the requirement for urgent medical contact when symptoms fail to respond to medication. Preference for retaining fixed appointments was based on a sense of security from gaining access which did not require the individual to initiate the request for medical help. Conclusions: Open access may fit better with patients' self-management of their condition and everyday routines, roles and responsibilities. Ensuring that outpatient organisational arrangements and personnel are responsive to patient initiated requests for appointments is likely to impact on the acceptability of this type of access arrangement. Some people may continue to prefer the fixed appointment system which should be retained if patient choice is to be respected. PMID:15465941
Kent E. Watson; Jim Horner; Louise Mozingo
1989-01-01
Innovative techniques for restoring riparian habitats are of little value without a community endorsed plan for their implementation. A flood control district commissioned the Arroyo Management Plan in order to determine how it might provide public access and improve habitat along its current and future channels in a fast-growing area of Northern California. The Plan,...
Wireless Sensor Network Radio Power Management and Simulation Models
2010-01-01
The Open Electrical & Electronic Engineering Journal, 2010, 4, 21-31 21 1874-1290/10 2010 Bentham Open Open Access Wireless Sensor Network Radio...Air Force Institute of Technology, Wright-Patterson AFB, OH, USA Abstract: Wireless sensor networks (WSNs) create a new frontier in collecting and...consumption. Keywords: Wireless sensor network , power management, energy-efficiency, medium access control (MAC), simulation pa- rameters. 1
5 CFR 1320.14 - Public access.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Public access. 1320.14 Section 1320.14 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CONTROLLING PAPERWORK BURDENS ON THE PUBLIC § 1320.14 Public access. (a) In order to enable the public to participate in and provide comments...
NASA Astrophysics Data System (ADS)
Impemba, Ernesto; Inzerilli, Tiziano
2003-07-01
Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.
Embedded diagnostic, prognostic, and health management system and method for a humanoid robot
NASA Technical Reports Server (NTRS)
Barajas, Leandro G. (Inventor); Strawser, Philip A (Inventor); Sanders, Adam M (Inventor); Reiland, Matthew J (Inventor)
2013-01-01
A robotic system includes a humanoid robot with multiple compliant joints, each moveable using one or more of the actuators, and having sensors for measuring control and feedback data. A distributed controller controls the joints and other integrated system components over multiple high-speed communication networks. Diagnostic, prognostic, and health management (DPHM) modules are embedded within the robot at the various control levels. Each DPHM module measures, controls, and records DPHM data for the respective control level/connected device in a location that is accessible over the networks or via an external device. A method of controlling the robot includes embedding a plurality of the DPHM modules within multiple control levels of the distributed controller, using the DPHM modules to measure DPHM data within each of the control levels, and recording the DPHM data in a location that is accessible over at least one of the high-speed communication networks.
ERIC Educational Resources Information Center
Hill, Linda L.; Crosier, Scott J.; Smith, Terrence R.; Goodchild, Michael; Iannella, Renato; Erickson, John S.; Reich, Vicky; Rosenthal, David S. H.
2001-01-01
Includes five articles. Topics include requirements for a content standard to describe computational models; architectures for digital rights management systems; access control for digital information objects; LOCKSS (Lots of Copies Keep Stuff Safe) that allows libraries to run Web caches for specific journals; and a Web site from the U.S.…
NASA Technical Reports Server (NTRS)
2001-01-01
REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.
76 FR 54190 - Proposed Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-31
... decentralized, with each mission area and agency managing its respective FOIA programs. At the end of each year...-know basis. Role-based access controls are used, and FX is only accessible via the Internet using USDA...
75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... relationship with the ultimate customer, can more effectively implement them. In addition, a broker or dealer... specific risk management controls and supervisory procedures to a customer that is a registered broker... such customer, based on its position in the transaction and relationship with the ultimate customer...
Ver-i-Fus: an integrated access control and information monitoring and management system
NASA Astrophysics Data System (ADS)
Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.
1997-01-01
This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.
An Overview of Public Access Computer Software Management Tools for Libraries
ERIC Educational Resources Information Center
Wayne, Richard
2004-01-01
An IT decision maker gives an overview of public access PC software that's useful in controlling session length and scheduling, Internet access, print output, security, and the latest headaches: spyware and adware. In this article, the author describes a representative sample of software tools in several important categories such as setup…
An Introduction to Database Structure and Database Machines.
ERIC Educational Resources Information Center
Detweiler, Karen
1984-01-01
Enumerates principal management objectives of database management systems (data independence, quality, security, multiuser access, central control) and criteria for comparison (response time, size, flexibility, other features). Conventional database management systems, relational databases, and database machines used for backend processing are…
Financial management systems under decentralization and their effect on malaria control in Uganda.
Kivumbi, George W; Nangendo, Florence; Ndyabahika, Boniface Rutagira
2004-01-01
A descriptive case study with multiple sites and a single level of analysis was carried out in four purposefully selected administrative districts of Uganda to investigate the effect of financial management systems under decentralization on malaria control. Data were primarily collected from 36 interviews with district managers, staff at health units and local leaders. A review of records and documents related to decentralization at the central and district level was also used to generate data for the study. We found that a long, tedious, and bureaucratic process combined with lack of knowledge in working with new financial systems by several actors characterized financial flow under decentralization. This affected the timely use of financial resources for malaria control in that there were funds in the system that could not be accessed for use. We were also told that sometimes these funds were returned to the central government because of non-use due to difficulties in accessing them and/or stringent conditions not to divert them to other uses. Our data showed that a cocktail of bureaucratic control systems, corruption and incompetence make the financial management system under decentralization counter-productive for malaria control. The main conclusion is that good governance through appropriate and efficient financial management systems is very important for effective malaria control under decentralization.
Access Control of Web and Java Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan
2011-01-01
Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.
Evaluation of Standards for Access Control Enabling PHR-S Federation.
Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan
2017-01-01
The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.
NASA Technical Reports Server (NTRS)
1993-01-01
C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.
Review and Evaluation of Internal Control in the Department of the Navy.
1984-03-01
marketing Formulating adver- Controlling placement policies tising programs of advertisements Setting research Deciding on policies research projects Choosing...proper command level. with laws, regulations, treatires, and management policy. The command, base, or unit Written defintions of authorized activities...informa- tion to the members of the operating management ... Management also has a responsibility to maintain its access to the capital market and ... to
Wireless local area network in a prehospital environment
Chen, Dongquan; Soong, Seng-jaw; Grimes, Gary J; Orthner, Helmuth F
2004-01-01
Background Wireless local area networks (WLANs) are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home) using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG) machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER). The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management. PMID:15339336
Wireless local area network in a prehospital environment.
Chen, Dongquan; Soong, Seng-jaw; Grimes, Gary J; Orthner, Helmuth F
2004-08-31
Wireless local area networks (WLANs) are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home) using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG) machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER). The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651
An action-based fine-grained access control mechanism for structured documents and its application.
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
Router Agent Technology for Policy-Based Network Management
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston
2011-01-01
This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.
Kawuma, Herman Joseph S
2007-03-01
General Health Services that pay due attention to the management of skin conditions are opportune for suspecting and diagnosing early leprosy. In many developing countries, patients with dermatological conditions can only access specialist services in the larger cities and university hospitals; unaffordable costs make the services even less accessible if they can only be provided in the private sector. The high profile of dermatologists in the health services, gives them the opportunity to facilitate the development and implementation of a referral system that includes leprosy. This potential benefit for leprosy control must be initiated by current National Leprosy Programme Managers through establishing formal relationships with the dermatologists and involving them and other partners in the re-designing of leprosy control strategies to keep them in tandem with changing epidemiological patterns, national policies and on -going health sector reforms. The same health service managers should avail of the opportunities from the dermatologists (both in public and private sectors) about the current knowledge on the management and control of leprosy.
MED31/437: A Web-based Diabetes Management System: DiabNet
Zhao, N; Roudsari, A; Carson, E
1999-01-01
Introduction A web-based system (DiabNet) was developed to provide instant access to the Electronic Diabetes Records (EDR) for end-users, and real-time information for healthcare professionals to facilitate their decision-making. It integrates portable glucometer, handheld computer, mobile phone and Internet access as a combined telecommunication and mobile computing solution for diabetes management. Methods: Active Server Pages (ASP) embedded with advanced ActiveX controls and VBScript were developed to allow remote data upload, retrieval and interpretation. Some advisory and Internet-based learning features, together with a video teleconferencing component make DiabNet web site an informative platform for Web-consultation. Results The evaluation of the system is being implemented among several UK Internet diabetes discussion groups and the Diabetes Day Centre at the Guy's & St. Thomas' Hospital. Many positive feedback are received from the web site demonstrating DiabNet is an advanced web-based diabetes management system which can help patients to keep closer control of self-monitoring blood glucose remotely, and is an integrated diabetes information resource that offers telemedicine knowledge in diabetes management. Discussion In summary, DiabNet introduces an innovative online diabetes management concept, such as online appointment and consultation, to enable users to access diabetes management information without time and location limitation and security concerns.
Land and Resource Management Issues Relevant to Deploying In-Situ Thermal Technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keiter, Robert; Ruple, John; Tanana, Heather
2011-01-01
Utah is home to oil shale resources containing roughly 1.3 trillion barrels of oil equivalent and our nation’s richest oil sands resources. If economically feasible and environmentally responsible means of tapping these resources can be developed, these resources could provide a safe and stable domestic energy source for decades to come. In Utah, oil shale and oil sands resources underlay a patchwork of federal, state, private, and tribal lands that are subject to different regulatory schemes and conflicting management objectives. Evaluating the development potential of Utah’s oil shale and oil sands resources requires an understanding of jurisdictional issues and themore » challenges they present to deployment and efficient utilization of emerging technologies. The jurisdictional patchwork and divergent management requirements inhibit efficient, economic, and environmentally sustainable development. This report examines these barriers to resource development, methods of obtaining access to landlocked resources, and options for consolidating resource ownership. This report also examines recent legislative efforts to wrest control of western public lands from the federal government. If successful, these efforts could dramatically reshape resource control and access, though these efforts appear to fall far short of their stated goals. The unintended consequences of adversarial approaches to obtaining resource access may outweigh their benefits, hardening positions and increasing tensions to the detriment of overall coordination between resource managers. Federal land exchanges represent a more efficient and mutually beneficial means of consolidating management control and improving management efficiency. Independent of exchange proposals, resource managers must improve coordination, moving beyond mere consultation with neighboring landowners and sister agencies to coordinating actions with them.« less
Wireless-PDA-controlled image workflow from PACS: the next trend in the health care enterprise?
NASA Astrophysics Data System (ADS)
Erberich, Stephan G.; Documet, Jorge; Zhou, Michael Z.; Cao, Fei; Liu, Brent J.; Mogel, Greg T.; Huang, H. K.
2003-05-01
Image workflow in today's Picture Archiving and Communication Systems (PACS) is controlled from fixed Display Workstations (DW) using proprietary control interfaces. A remote access to the Hospital Information System (HIS) and Radiology Information System (RIS) for urgent patient information retrieval does not exist or gradually become available. The lack for remote access and workflow control for HIS and RIS is especially true when it comes to medical images of a PACS on Department or Hospital level. As images become more complex and data sizes expand rapidly with new image techniques like functional MRI, Mammography or routine spiral CT to name a few, the access and manageability becomes an important issue. Long image downloads or incomplete work lists cannot be tolerated in a busy health care environment. In addition, the domain of the PACS is no longer limited to the imaging department and PACS is also being used in the ER and emergency care units. Thus a prompt and secure access and manageability not only by the radiologist, but also from the physician becomes crucial to optimally utilize the PACS in the health care enterprise of the new millennium. The purpose of this paper is to introduce a concept and its implementation of a remote access and workflow control of the PACS combining wireless, Internet and Internet2 technologies. A wireless device, the Personal Digital Assistant (PDA), is used to communicate to a PACS web server that acts as a gateway controlling the commands for which the user has access to the PACS server. The commands implemented for this test-bed are query/retrieve of the patient list and study list including modality, examination, series and image selection and pushing any list items to a selected DW on the PACS network.
Cunningham, P J
1999-04-01
To examine the effects of managed care penetration and the uninsurance rate in an area on access to care of low-income uninsured persons and to compare differences in access between low-income insured and uninsured persons across these different market areas. Primarily the Community Tracking Study household survey. Other market-level data were obtained from the Community Tracking Study physician survey, American Hospital Association annual survey of hospitals, Area Resource File, HCFA Administrative Data, Bureau of Primary Care data on Community Health Centers. Individuals are grouped based on the level of managed care penetration and uninsurance rate in the site where they reside. Measures of managed care include overall managed care penetration in the site, and the level of Medicaid managed care penetration in the state. Uninsurance rate is defined as the percentage of people uninsured in the site. Measures of access include the percentage with a usual source of care, percentage with any ambulatory care use, and percentage of persons who reported unmet medical care needs. Estimates are adjusted to control for other confounding factors, including both individual and market-level characteristics. A survey, primarily telephoned, of households concentrated in 60 sites, defined as metropolitan statistical areas and nonmetropolitan areas. Access to care for low-income uninsured persons is lower in states with high Medicaid managed care penetration, compared to uninsured persons in states with low Medicaid managed care penetration. Access to care for low-income uninsured persons is also lower in areas with high uninsurance rates. The "access gap" (differences in access between insured and uninsured persons) is also larger in areas with high Medicaid managed care penetration and areas with high uninsurance rates. Efforts to achieve cost savings under managed care may result in financial pressures that limit cross-subsidization of care to the medically indigent, particularly for those providers who are heavily dependent on Medicaid revenue. High demand for care (as reflected in high uninsurance rates) may further strain limited resources for indigent care, further limiting access to care for uninsured persons.
Mandatory and Location-Aware Access Control for Relational Databases
NASA Astrophysics Data System (ADS)
Decker, Michael
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
Arndt, Jamie; Greenberg, Jeff; Cook, Alison
2002-09-01
Seven experiments assessed the hypothesis derived from terror management theory that reminding people of their mortality would increase accessibility of constructs central to their worldview. Experiment 1 found that mortality primes, relative to control primes, increased accessibility of nationalistic constructs for men but not for women. Experiment 2 replicated this finding and also found that mortality salience increased romantic accessibility for women but not for men. Four subsequent experiments supported the role of unconscious death-related ideation in producing these effects. A final experiment demonstrated that situational primes can increase the accessibility of nationalistic constructs for women after mortality salience. The roles of situational cues and individual differences in the effects of exposure to death-related stimuli on worldview-relevant construct accessibility are discussed.
Long-Term Surveillance and Maintenance Records: Maintaining Access to the Knowledge - 13122
DOE Office of Scientific and Technical Information (OSTI.GOV)
Montgomery, John; Gueretta, Jeanie; McKinney, Ruth
The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is an integral part of DOE's strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. In the area of environmental legacy management, records management is crucial to the protection of health, environmental, and legal interests of the Department and the public. LM is responsible for maintaining long-term surveillance and maintenance (LTS and M) records in performance of its mission. Maintaining access to the knowledge contained in these record collections is one of LM's primary responsibilities. Tomore » fulfill this responsibility, LM established a consolidated records management facility, the LM Business Center (LMBC), to house physical media records and electronic records. A new electronic record keeping system (ERKS) was needed to replace an obsolete system while helping to ensure LM is able to meet ongoing responsibilities to maintain access to knowledge and control the life cycle management of records. (authors)« less
Nøst, Torunn Hatlen; Steinsbekk, Aslak; Bratås, Ola; Grønning, Kjersti
2016-07-18
People struggling with chronic pain may benefit from different types of non-pharmacological interventions such as self-management courses. Self-management courses aim to increase participants' skills and knowledge in managing chronic conditions. Community health-care services in Norway have increasingly established Healthy Life Centres (HLCs) to offer easily accessible interventions to people in need of support to better handle a life with chronic illness. The aim of this trial is to investigate the expectations, effect and experience of an easily accessible, group-based self-management course delivered at a HLC for people with chronic pain. This is an open pragmatic two-armed randomised controlled trial with an embedded qualitative study. The intervention is a self-management course comprising education, discussions, exchange of experiences between the participants, and physical movement exercises. The control group is offered a drop-in outdoor physical activity. The intervention period is 6 weeks. The primary outcome is patient activation measured by the patient activation measure (PAM). The secondary outcomes include measures of self-efficacy, pain and quality of life. Data will be collected at baseline, and after 3, 6 and 12 months. Using a mixed linear model, the number needed in each arm to achieve a power of 80 % becomes 55. To allow for dropout, the aim is to include 120 participants. Analysis will be done using mixed linear models. In the embedded qualitative study, we will perform semi-structured face-to-face interviews with a sample from both trial arms before randomisation and after 3 and 12 months. The topics elaborated will be motivation for participation and experiences with the activity related to possible changes in managing and coping with chronic pain. There is need for more knowledge on interventions delivering self-care support in an easily accessible way that aim to reach those in need of this kind of health service. This trial will produce important knowledge on the effect and the experiences of participants in such an easily accessible self-management course delivered in Norwegian public primary care. ClinicalTrials.gov: NCT02531282 . Registered on 21 August 2015.
A web-based biosignal data management system for U-health data integration.
Ro, Dongwoo; Yoo, Sooyoung; Choi, Jinwook
2008-11-06
In the ubiquitous healthcare environment, the biosignal data should be easily accessed and properly maintained. This paper describes a web-based data management system. It consists of a device interface, a data upload control, a central repository, and a web server. For the user-specific web services, a MFER Upload ActiveX Control was developed.
User Access Management Based on Network Pricing for Social Network Applications
Ma, Xingmin; Gu, Qing
2018-01-01
Social applications play a very important role in people’s lives, as users communicate with each other through social networks on a daily basis. This presents a challenge: How does one receive high-quality service from social networks at a low cost? Users can access different kinds of wireless networks from various locations. This paper proposes a user access management strategy based on network pricing such that networks can increase its income and improve service quality. Firstly, network price is treated as an optimizing access parameter, and an unascertained membership algorithm is used to make pricing decisions. Secondly, network price is adjusted dynamically in real time according to network load. Finally, selecting a network is managed and controlled in terms of the market economy. Simulation results show that the proposed scheme can effectively balance network load, reduce network congestion, improve the user's quality of service (QoS) requirements, and increase the network’s income. PMID:29495252
NASA Astrophysics Data System (ADS)
Mesick, S.; Weathers, K. W.
2017-12-01
Data complexity can be seen as a continuum from complex to simple. The term data complexity refers to data collections that are disorganized, poorly documented, and generally do not follow best data management practices. Complex data collections are challenging and expensive to manage. Simplified collections readily support automated archival processes, enhanced discovery and data access, as well as production of services that make data easier to reuse. In this session, NOAA NCEI scientific data stewards will discuss the data complexity continuum. This talk will explore data simplification concepts, methods, and tools that data managers can employ which may offer more control over data management costs and processes, while achieving policy goals for open data access and ready reuse. Topics will include guidance for data managers on best allocation of limited data management resources; models for partnering with NCEI to accomplish shared data management goals; and will demonstrate through case studies the benefits of investing in documentation, accessibility, and services to increase data value and return on investment.
Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley
2010-10-01
Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2014 CFR
2014-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2013 CFR
2013-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2012 CFR
2012-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
25 CFR 542.15 - What are the minimum internal control standards for credit?
Code of Federal Regulations, 2011 CFR
2011-04-01
...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...
The Management of Online Resources: Problems and Opportunities.
ERIC Educational Resources Information Center
Lewis, D. A.; Adkins, R.
1981-01-01
Describes the management of online information services at ICI Plastics Division in terms of control and development, reviews implications for higher management, and identifies problems and opportunities related to manpower, money, materials, machinery, and time. Project RADIUS (Rapid Access to Data and Information by Untrained Scientists) is also…
In-school asthma management and physical activity: children’s perspectives
Walker, Timothy J.; Reznik, Marina
2014-01-01
OBJECTIVE Regular physical activity (PA) is an important component of pediatric asthma management. No studies have examined how in-school asthma management influences PA from children’s perspectives. The aim of this study was to explore children’s perceptions of the impact of in-school asthma management on PA. METHODS Qualitative interviews with 23 inner-city minority children with asthma (ages 8–10 yrs; 12 girls, 11 boys) were conducted in 10 Bronx, New York elementary schools. Sampling continued until saturation was reached. Interviews were recorded, transcribed and independently coded for common themes. RESULTS Interviews produced five themes representing students’ perceptions about 1) asthma symptoms during in-school PA; 2) methods to control asthma episodes during school PA; 3) methods to prevent asthma episodes during school; 4) limited accessibility of asthma medications; and 5) negative feelings about asthma and medication use. The majority of students experienced asthma symptoms while performing PA during school. Primary methods of managing asthma symptoms were sitting out during activity, drinking water, and visiting the nurse. Students lacked awareness or adherence to action plans to prevent or control asthma. Students reported limited access to medication during school and feelings of embarrassment and/or concerns of teasing when medicating in front of others. CONCLUSIONS Our results indicate inappropriate in-school management of asthma symptoms, poor asthma control, lack of accessible medication, and stigma around publicly using asthma medication. Thus, students often missed or were withheld from PA. Interventions to improve in-school asthma care must consider ways to address these issues. PMID:24796650
2015-03-01
a hotel and a hospital. 2. Event handler for emergency policies (item 2 above): this has been implemented in two UG projects, one project developed a...Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia, Brazil , September 2014. Electronic Notes in Theoretical Computer Science (to...Brasilia, Brazil , September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on
Takeda, Toshihiro; Ueda, Kanayo; Nakagawa, Akito; Manabe, Shirou; Okada, Katsuki; Mihara, Naoki; Matsumura, Yasushi
2017-01-01
Electronic health record (EHR) systems are necessary for the sharing of medical information between care delivery organizations (CDOs). We developed a document-based EHR system in which all of the PDF documents that are stored in our electronic medical record system can be disclosed to selected target CDOs. An access control list (ACL) file was designed based on the HL7 CDA header to manage the information that is disclosed.
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Baldridge, Tim
2005-01-01
The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.
OASIS: A Data Fusion System Optimized for Access to Distributed Archives
NASA Astrophysics Data System (ADS)
Berriman, G. B.; Kong, M.; Good, J. C.
2002-05-01
The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.
PIMS-Universal Payload Information Management
NASA Technical Reports Server (NTRS)
Elmore, Ralph; McNair, Ann R. (Technical Monitor)
2002-01-01
As the overall manager and integrator of International Space Station (ISS) science payloads and experiments, the Payload Operations Integration Center (POIC) at Marshall Space Flight Center had a critical need to provide an information management system for exchange and management of ISS payload files as well as to coordinate ISS payload related operational changes. The POIC's information management system has a fundamental requirement to provide secure operational access not only to users physically located at the POIC, but also to provide collaborative access to remote experimenters and International Partners. The Payload Information Management System (PIMS) is a ground based electronic document configuration management and workflow system that was built to service that need. Functionally, PIMS provides the following document management related capabilities: 1. File access control, storage and retrieval from a central repository vault. 2. Collect supplemental data about files in the vault. 3. File exchange with a PMS GUI client, or any FTP connection. 4. Files placement into an FTP accessible dropbox for pickup by interfacing facilities, included files transmitted for spacecraft uplink. 5. Transmission of email messages to users notifying them of new version availability. 6. Polling of intermediate facility dropboxes for files that will automatically be processed by PIMS. 7. Provide an API that allows other POIC applications to access PIMS information. Functionally, PIMS provides the following Change Request processing capabilities: 1. Ability to create, view, manipulate, and query information about Operations Change Requests (OCRs). 2. Provides an adaptable workflow approval of OCRs with routing through developers, facility leads, POIC leads, reviewers, and implementers. Email messages can be sent to users either involving them in the workflow process or simply notifying them of OCR approval progress. All PIMS document management and OCR workflow controls are coordinated through and routed to individual user's "to do" list tasks. A user is given a task when it is their turn to perform some action relating to the approval of the Document or OCR. The user's available actions are restricted to only functions available for the assigned task. Certain actions, such as review or action implementation by non-PIMS users, can also be coordinated through automated emails.
Effective Materials Property Information Management for the 21st Century
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ren, Weiju; Cebon, David; Arnold, Steve
2010-01-01
This paper discusses key principles for the development of materials property information management software systems. There are growing needs for automated materials information management in industry, research organizations and government agencies. In part these are fuelled by the demands for higher efficiency in material testing, product design and development and engineering analysis. But equally important, organizations are being driven to employ sophisticated methods and software tools for managing their mission-critical materials information by the needs for consistency, quality and traceability of data, as well as control of access to proprietary or sensitive information. Furthermore the use of increasingly sophisticated nonlinear,more » anisotropic and multi-scale engineering analysis approaches, particularly for composite materials, requires both processing of much larger volumes of test data for development of constitutive models and much more complex materials data input requirements for Computer-Aided Engineering (CAE) software. And finally, the globalization of engineering processes and outsourcing of design and development activities generates much greater needs for sharing a single gold source of materials information between members of global engineering teams in extended supply-chains. Fortunately material property management systems have kept pace with the growing user demands. They have evolved from hard copy archives, through simple electronic databases, to versatile data management systems that can be customized to specific user needs. The more sophisticated of these provide facilities for: (i) data management functions such as access control, version control, and quality control; (ii) a wide range of data import, export and analysis capabilities; (iii) mechanisms for ensuring that all data is traceable to its pedigree sources: details of testing programs, published sources, etc; (iv) tools for searching, reporting and viewing the data; and (v) access to the information via a wide range of interfaces, including web browsers, rich clients, programmatic access and clients embedded in third-party applications, such as CAE systems. This paper discusses the important requirements for advanced material data management systems as well as the future challenges and opportunities such as automated error checking, automated data quality assessment and characterization, identification of gaps in data, as well as functionalities and business models to keep users returning to the source: to generate user demand to fuel database growth and maintenance.« less
NASA Technical Reports Server (NTRS)
Karl, D. R.
1972-01-01
An evaluation was made of the feasibility of utilizing a simplified man machine interface concept to manage and control a complex space system involving multiple redundant computers that control multiple redundant subsystems. The concept involves the use of a CRT for display and a simple keyboard for control, with a tree-type control logic for accessing and controlling mission, systems, and subsystem elements. The concept was evaluated in terms of the Phase B space shuttle orbiter, to utilize the wide scope of data management and subsystem control inherent in the central data management subsystem provided by the Phase B design philosophy. Results of these investigations are reported in four volumes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.
A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less
Kuhn, Stefan; Schlörer, Nils E
2015-08-01
nmrshiftdb2 supports with its laboratory information management system the integration of an electronic lab administration and management into academic NMR facilities. Also, it offers the setup of a local database, while full access to nmrshiftdb2's World Wide Web database is granted. This freely available system allows on the one hand the submission of orders for measurement, transfers recorded data automatically or manually, and enables download of spectra via web interface, as well as the integrated access to prediction, search, and assignment tools of the NMR database for lab users. On the other hand, for the staff and lab administration, flow of all orders can be supervised; administrative tools also include user and hardware management, a statistic functionality for accounting purposes, and a 'QuickCheck' function for assignment control, to facilitate quality control of assignments submitted to the (local) database. Laboratory information management system and database are based on a web interface as front end and are therefore independent of the operating system in use. Copyright © 2015 John Wiley & Sons, Ltd.
Technical Standards for Command and Control Information Systems (CCISs)
1992-01-01
initiation, Conformance Testing 149 management, scheduling, resource allocation , logical and IEEE P1 003 146 physical device access, interrupt handling...70 5.2.3 Remote Data Access (RDA) ........................................... 72 5.2.4 Information Resource Dictionary...146 7.2.1.2 POSIX Conformance Testing .............................. 149 7.2.2 Consortia Recommendations
Remote Authentication: The Obvia Solution.
ERIC Educational Resources Information Center
Eckley, Tami-Jo
1999-01-01
This article focuses on Obvia Corporation, a New York-based company that offers remote data access (RDA) through a server software system allowing for an easy, controllable, cost-effective management solution to the remote access problem. Using Obvia's RDA service, librarians can focus on administrative and professional decisions and spend more…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-11
... Management and Budget (OMB) a request to review and approve a previously approved information collection... collection to make determinations on granting unescorted physical access to GSA-controlled facilities. The approval is critical for GSA to continue to make physical access determinations for temporary contractors...
10 CFR 9.65 - Access determinations; appeals.
Code of Federal Regulations, 2010 CFR
2010-01-01
... NUCLEAR REGULATORY COMMISSION PUBLIC RECORDS Privacy Act Regulations Determinations and Appeals § 9.65... access to the record is available under the Privacy Act. For all other agency records, the Freedom of Information Act and Privacy Act Officer with the advice of the system manager having control of the record to...
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.
Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro
2018-02-13
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors
Huarte, Maider; Romaña, Pedro
2018-01-01
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338
AEGIS: a wildfire prevention and management information system
Kostas Kalabokidis; Alan Ager; Mark Finney; Nikos Athanasis; Palaiologos Palaiologou; Christos Vasilakos
2016-01-01
We describe a Web-GIS wildfire prevention and management platform (AEGIS) developed as an integrated and easy-to-use decision support tool to manage wildland fire hazards in Greece (http://aegis.aegean.gr). The AEGIS platform assists with early fire warning, fire planning, fire control and coordination of firefighting forces by providing online access to...
OLMS: Online Learning Management System for E-Learning
ERIC Educational Resources Information Center
Ippakayala, Vinay Kumar; El-Ocla, Hosam
2017-01-01
In this paper we introduce a learning management system that provides a management system for centralized control of course content. A secure system to record lectures is implemented as a key feature of this application. This feature would be accessed through web camera and mobile recording. These features are mainly designed for e-learning…
Practice management companies improve practices' financial position.
Dupell, T
1997-11-01
To maintain control over healthcare delivery and financial decisions, as well as increase access to capital markets, some group practices are forming their own physician practice management companies. These companies should be organized to balance the expectations of physicians with the values of capital markets. This organization should include retained earnings, financial reporting in accordance with generally accepted accounting principles (GAAP), predictable earnings and cash flow, physician ownership and leadership, and incentives for high-quality management. Three large, primary care and multispecialty clinics that merged to form a new physician practice management company increased their access to capital markets and improved their overall financial position, which will help them achieve long-term survival.
Cognitive and Learning Impairments
NASA Astrophysics Data System (ADS)
Lewis, Clayton
People with cognitive disabilities are gaining in a long struggle for recognition of their right to control their lives. In the information society access to the Web is essential to this control. Cognitive barriers to this access are diverse, reflecting the complexity of human cognitive faculties. These barriers are not well managed in current accessibility practice and policy, in part because cognitive accessibility, like usability, cannot be reduced to a checklist of simple attributes. Advances in representing the meaning as well as the form of information, and in supporting configurable presentation and interaction methods, will yield progress. Increased inclusion of people with cognitive disabilities in the processes of technology development and policy making will also pay off.
Web Extensible Display Manager
DOE Office of Scientific and Technical Information (OSTI.GOV)
Slominski, Ryan; Larrieu, Theodore L.
Jefferson Lab's Web Extensible Display Manager (WEDM) allows staff to access EDM control system screens from a web browser in remote offices and from mobile devices. Native browser technologies are leveraged to avoid installing and managing software on remote clients such as browser plugins, tunnel applications, or an EDM environment. Since standard network ports are used firewall exceptions are minimized. To avoid security concerns from remote users modifying a control system, WEDM exposes read-only access and basic web authentication can be used to further restrict access. Updates of monitored EPICS channels are delivered via a Web Socket using a webmore » gateway. The software translates EDM description files (denoted with the edl suffix) to HTML with Scalable Vector Graphics (SVG) following the EDM's edl file vector drawing rules to create faithful screen renderings. The WEDM server parses edl files and creates the HTML equivalent in real-time allowing existing screens to work without modification. Alternatively, the familiar drag and drop EDM screen creation tool can be used to create optimized screens sized specifically for smart phones and then rendered by WEDM.« less
Guljas, Rebecca; Ahmed, Azza; Chang, Karen; Whitlock, Analei
2014-01-01
Patients with diabetes who have limited access to healthcare services are less likely to maintain adequate diabetes control. Telemedicine represents a useful solution to the strict follow up required in diabetes management. This review analyzes the impact that telemedicine has on the management of type 1 diabetes among school-age children and adolescents, as measured by compliance with blood glucose monitoring, glycemic control, satisfaction, and self management. In general, this review supports the use of telemedicine in maintaining glycemic control. Further studies are desired to observe the impact of telemedicine in managing type 1 diabetes in school-age children and adolescents. Copyright © 2014 Elsevier Inc. All rights reserved.
Automated Rocket Propulsion Test Management
NASA Technical Reports Server (NTRS)
Walters, Ian; Nelson, Cheryl; Jones, Helene
2007-01-01
The Rocket Propulsion Test-Automated Management System provides a central location for managing activities associated with Rocket Propulsion Test Management Board, National Rocket Propulsion Test Alliance, and the Senior Steering Group business management activities. A set of authorized users, both on-site and off-site with regard to Stennis Space Center (SSC), can access the system through a Web interface. Web-based forms are used for user input with generation and electronic distribution of reports easily accessible. Major functions managed by this software include meeting agenda management, meeting minutes, action requests, action items, directives, and recommendations. Additional functions include electronic review, approval, and signatures. A repository/library of documents is available for users, and all items are tracked in the system by unique identification numbers and status (open, closed, percent complete, etc.). The system also provides queries and version control for input of all items.
How can the German Electronic Health Card support patient's role in care management.
Pharow, Peter; Blobel, Bernd; Hildebrand, Claudia
2008-01-01
All types of advanced communication, collaboration, and cooperation in healthcare require a strong involvement of all addressed parties including health professionals and patients. Modern healthcare aims at involving patients having them take over responsibility for their own health status. Allowing them to take on their changed roles as emancipated partners in advanced care management, health professionals need to be educated and patients need to be empowered. From a security viewpoint, health issues have to be communicated via trusted health networks. To provide communication and cooperation between professionals and patients as well as to guarantee the required level of involvement of patients in shared care management environments, cards are widely used as person identifiers, on the one hand, and as security tokens, on the other. Being introduced as storage media and portable personalized application system, cards enable a patient controlled access to personalized health services as well as proper use and exchange of personal health data for specific purposes such as emergency. Furthermore, cards allow access to the wider electronic patient record via pointers or tickets. Cards can empower patients. The German Electronic Health Card (eGK) shall thus support care management and specific workflow processes e.g. for prescription and disease management. Regardless whether designed as data or pointer card - international standardization is a prerequisite also for national solutions. The more information patients have regarding different procedures and processes in healthcare, the more are they able to play their dedicated role within care management. Cards can and will contribute by allowing patients to get controlled access to administrative and medical data stored either on cards or in networks. Card holders determine who has access to their health information.
Spatiotemporal access model based on reputation for the sensing layer of the IoT.
Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.
NASA Astrophysics Data System (ADS)
Hirono, Masahiko; Nojima, Toshio
This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.
2012-08-14
Improvement Act requirements and secure access to two payroll offices at Indianapolis, Indiana, that process sensitive payroll information. We...Without adequate controls over physical access, individuals could gain unauthorized access to computers and sensitive payroll data contained in online...and resolved. 2 Personnel and payroll data transmitted to and from interfacing systems were transferred completely, accurately, and timely
Purdue ionomics information management system. An integrated functional genomics platform.
Baxter, Ivan; Ouzzani, Mourad; Orcun, Seza; Kennedy, Brad; Jandhyala, Shrinivas S; Salt, David E
2007-02-01
The advent of high-throughput phenotyping technologies has created a deluge of information that is difficult to deal with without the appropriate data management tools. These data management tools should integrate defined workflow controls for genomic-scale data acquisition and validation, data storage and retrieval, and data analysis, indexed around the genomic information of the organism of interest. To maximize the impact of these large datasets, it is critical that they are rapidly disseminated to the broader research community, allowing open access for data mining and discovery. We describe here a system that incorporates such functionalities developed around the Purdue University high-throughput ionomics phenotyping platform. The Purdue Ionomics Information Management System (PiiMS) provides integrated workflow control, data storage, and analysis to facilitate high-throughput data acquisition, along with integrated tools for data search, retrieval, and visualization for hypothesis development. PiiMS is deployed as a World Wide Web-enabled system, allowing for integration of distributed workflow processes and open access to raw data for analysis by numerous laboratories. PiiMS currently contains data on shoot concentrations of P, Ca, K, Mg, Cu, Fe, Zn, Mn, Co, Ni, B, Se, Mo, Na, As, and Cd in over 60,000 shoot tissue samples of Arabidopsis (Arabidopsis thaliana), including ethyl methanesulfonate, fast-neutron and defined T-DNA mutants, and natural accession and populations of recombinant inbred lines from over 800 separate experiments, representing over 1,000,000 fully quantitative elemental concentrations. PiiMS is accessible at www.purdue.edu/dp/ionomics.
NASA Technical Reports Server (NTRS)
Moore, Reagan W.; Jagatheesan, Arun; Rajasekar, Arcot; Wan, Michael; Schroeder, Wayne
2004-01-01
The "Grid" is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are being built around the world as the next generation data handling systems for sharing, publishing, and preserving data residing on storage systems located in multiple administrative domains. A data grid provides logical namespaces for users, digital entities and storage resources to create persistent identifiers for controlling access, enabling discovery, and managing wide area latencies. This paper introduces data grids and describes data grid use cases. The relevance of data grids to digital libraries and persistent archives is demonstrated, and research issues in data grids and grid dataflow management systems are discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-03
... Means Parents in School Application Package AGENCY: Department of Education (ED), Office of... of Collection: Child Care Access Means Parents in School Application Package. OMB Control Number... Estimated Number of Annual Burden Hours: 8,750 Abstract: The Child Care Access Means Parents In School...
NASA Astrophysics Data System (ADS)
Clark, Nathan E.
2017-10-01
This paper explores from the view of the data recipient and user the complexities of creating a common licensing scheme for the access and use of satellite earth observation (EO) data in international disaster management (DM) activities. EO data contributions in major disaster events often involve numerous data providers with separate licensing mechanisms for controlling the access, uses, and distribution of data by the end users. A lack of standardization among the terminology, wording, and conditions within these licenses creates a complex legal environment for users, and often prevents them from using, sharing and combining datasets in an effective and timely manner. It also creates uncertainty among data providers as to the types of licensing controls that should be applied in disaster scenarios. This paper builds from an ongoing comparative analysis of the common and conflicting conditions among data licenses that must be addressed in order to facilitate easier access and use of EO data within the DM sector and offers recommendations towards the alignment of the structural and technical aspects of licenses among data providers.
Liberal Learning and Management: A Mutually Beneficial Relationship.
ERIC Educational Resources Information Center
Butler, David W.
1986-01-01
Management, which generates wealth, determines the distribution of wealth, and helps control the direction and accessibility of careers in most developed countries, is a subject worthy of the humanities, and deserves to be pursued more aggressively as a point of contact among disciplines. (MSE)
7 CFR 650.24 - Scenic beauty (visual resource).
Code of Federal Regulations, 2012 CFR
2012-01-01
... planning assistance to individual landowners, groups, units of government, and watershed and resource... management, access roads, critical area treatment; design and management of ponds, stream margins, odd areas..., erosion control, and recreation or wildlife uses be carried out with full attention to visual resource...
7 CFR 650.24 - Scenic beauty (visual resource).
Code of Federal Regulations, 2011 CFR
2011-01-01
... planning assistance to individual landowners, groups, units of government, and watershed and resource... management, access roads, critical area treatment; design and management of ponds, stream margins, odd areas..., erosion control, and recreation or wildlife uses be carried out with full attention to visual resource...
ERIC Educational Resources Information Center
Smith-Khan, Laura
2017-01-01
Theories of language policy increasingly emphasise focusing on the specific contexts in which language management occurs. In government settings, policy seeks to shape how individuals interact with officials. Australian asylum procedure is an area where policy aims at tight control. I examine how communication is managed in this setting, in which…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-30
...This notice announces that the Gulf of Mexico Fishery Management Council (Council) is considering creating additional restrictions limiting participation in the Red Snapper Individual Fishing Quota (IFQ) Program. If such management measures are implemented, the Council is considering January 1, 2012, as a possible control date. Anyone entering the program after the control date will not be assured of future access should a management regime that limits participation in the program be prepared and implemented. NMFS invites comments on the establishment of this control date.
Shalowitz, M U; Eng, J S; McKinney, C O; Krohn, J; Lapin, B; Wang, C-H; Nodine, E
2017-05-15
Successful Type 2 diabetes management requires adopting a high nutrient-density diet made up of food items that both meet dietary needs and preferences and can be feasibly obtained on a regular basis. However, access to affordable, nutrient-dense foods often is lacking in poorer neighbourhoods. Therefore, low food security should directly impair glucose control, even when patients have full access to and utilize comprehensive medical management. The present study sought to determine whether food security is related longitudinally to glucose control, over-and-above ongoing medication management, among Type 2 diabetes patients receiving comprehensive care at a Midwestern multi-site federally qualified health centre (FQHC). In this longitudinal observational study, we completed a baseline assessment of patients' food security (using the US Household Food Security Module), demographics (via Census items), and diabetes history/management (using a structured clinical encounter form) when patients began receiving diabetes care at the health centre. We then recorded those patients' A1C levels several times during a 24-month follow-up period. Three hundred and ninety-nine patients (56% with low food security) had a baseline A1c measurement; a subsample of 336 (median age=52 years; 56% female; 60% Hispanic, 27% African American, and 9% White) also had at least one follow-up A1c measurement. Patients with lower (vs higher) food security were more likely to be on insulin and have higher A1c levels at baseline. Moreover, the disparity in glucose control by food security status persisted throughout the next 2 years. Although results were based on one multi-site FQHC, potentially limiting their generalizability, they seem to suggest that among Type 2 diabetes patients, low food security directly impairs glucose control-even when patients receive full access to comprehensive medical management-thereby increasing their long-term risks of high morbidity, early mortality, and high health-care utilization and cost.
Scalable Lunar Surface Networks and Adaptive Orbit Access
NASA Technical Reports Server (NTRS)
Wang, Xudong
2015-01-01
Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.
An Extended Role-Based Access Control Model for Delegating Obligations
NASA Astrophysics Data System (ADS)
Ben-Ghorbel-Talbi, Meriam; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Bouhoula, Adel
The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the administration and delegation of obligations. Managing such delegations implies more requirements than managing traditional privileges delegation. In fact, delegating obligations may include two interpretations: the delegation of the obligation and the delegation of the responsibility related to this obligation. Therefore, it is important to deal with these two notions separately. Moreover, since delegating an obligation involves the delegation of sanctions, then the consent of the user who receives this delegation may be required in some cases. We address in this paper these requirements and we propose a formalism to deal with them.
Mature data transport and command management services for the Space Station
NASA Technical Reports Server (NTRS)
Carper, R. D.
1986-01-01
The duplex space/ground/space data services for the Space Station are described. The need to separate the uplink data service functions from the command functions is discussed. Command management is a process shared by an operation control center and a command management system and consists of four functions: (1) uplink data communications, (2) management of the on-board computer, (3) flight resource allocation and management, and (4) real command management. The new data service capabilities provided by microprocessors, ground and flight nodes, and closed loop and open loop capabilities are studied. The need for and functions of a flight resource allocation management service are examined. The system is designed so only users can access the system; the problems encountered with open loop uplink access are analyzed. The procedures for delivery of operational, verification, computer, and surveillance and monitoring data directly to users are reviewed.
Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations
Ahn, David K; Unde, Bhagyashree; Gage, H Donald; Carr, J Jeffrey
2013-01-01
Background Current image sharing is carried out by manual transportation of CDs by patients or organization-coordinated sharing networks. The former places a significant burden on patients and providers. The latter faces challenges to patient privacy. Objective To allow healthcare providers efficient access to medical imaging data acquired at other unaffiliated healthcare facilities while ensuring strong protection of patient privacy and minimizing burden on patients, providers, and the information technology infrastructure. Methods An image sharing framework is described that involves patients as an integral part of, and with full control of, the image sharing process. Central to this framework is the Patient Controlled Access-key REgistry (PCARE) which manages the access keys issued by image source facilities. When digitally signed by patients, the access keys are used by any requesting facility to retrieve the associated imaging data from the source facility. A centralized patient portal, called a PCARE patient control portal, allows patients to manage all the access keys in PCARE. Results A prototype of the PCARE framework has been developed by extending open-source technology. The results for feasibility, performance, and user assessments are encouraging and demonstrate the benefits of patient-controlled image sharing. Discussion The PCARE framework is effective in many important clinical cases of image sharing and can be used to integrate organization-coordinated sharing networks. The same framework can also be used to realize a longitudinal virtual electronic health record. Conclusion The PCARE framework allows prior imaging data to be shared among unaffiliated healthcare facilities while protecting patient privacy with minimal burden on patients, providers, and infrastructure. A prototype has been implemented to demonstrate the feasibility and benefits of this approach. PMID:22886546
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database
NASA Astrophysics Data System (ADS)
Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin
2014-06-01
The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.
Effective Materials Property Information Management for the 21st Century
NASA Technical Reports Server (NTRS)
Ren, Weiju; Cebon, David; Arnold, Steve
2009-01-01
This paper discusses key principles for the development of materials property information management software systems. There are growing needs for automated materials information management in various organizations. In part these are fueled by the demands for higher efficiency in material testing, product design and engineering analysis. But equally important, organizations are being driven by the need for consistency, quality and traceability of data, as well as control of access to sensitive information such as proprietary data. Further, the use of increasingly sophisticated nonlinear, anisotropic and multi-scale engineering analyses requires both processing of large volumes of test data for development of constitutive models and complex materials data input for Computer-Aided Engineering (CAE) software. And finally, the globalization of economy often generates great needs for sharing a single "gold source" of materials information between members of global engineering teams in extended supply chains. Fortunately, material property management systems have kept pace with the growing user demands and evolved to versatile data management systems that can be customized to specific user needs. The more sophisticated of these provide facilities for: (i) data management functions such as access, version, and quality controls; (ii) a wide range of data import, export and analysis capabilities; (iii) data "pedigree" traceability mechanisms; (iv) data searching, reporting and viewing tools; and (v) access to the information via a wide range of interfaces. In this paper the important requirements for advanced material data management systems, future challenges and opportunities such as automated error checking, data quality characterization, identification of gaps in datasets, as well as functionalities and business models to fuel database growth and maintenance are discussed.
A software for managing after-hours activities in research user facilities
Camino, F. E.
2017-05-01
Here, we present an afterhours activity management program for shared facilities, which handles the processes required for afterhours access (request, approval, extension, etc.). It implements the concept of permitted afterhours activities, which consists of a list of well-defined activities that each user can perform afterhours. The program provides an easy and unambiguous way for users to know which activities they are allowed to perform afterhours. In addition, the program can enhance its safety efficacy by interacting with lab and instrument access control systems commonly present in user facilities.
A software for managing after-hours activities in research user facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Camino, F. E.
Here, we present an afterhours activity management program for shared facilities, which handles the processes required for afterhours access (request, approval, extension, etc.). It implements the concept of permitted afterhours activities, which consists of a list of well-defined activities that each user can perform afterhours. The program provides an easy and unambiguous way for users to know which activities they are allowed to perform afterhours. In addition, the program can enhance its safety efficacy by interacting with lab and instrument access control systems commonly present in user facilities.
Diabetes care and service access among elderly Vietnamese with type 2 diabetes.
Carolan-Olah, Mary C; Cassar, Angie; Quiazon, Regina; Lynch, Sean
2013-10-29
Vietnamese patients are disproportionately represented in type 2 diabetes mellitus statistics and also incur high rates of diabetes complications. This situation is compounded by limited access to health care. The aim of this project was to gain a deeper understanding of the difficulties Vietnamese patients experience when accessing services and managing their type 2 diabetes mellitus, and to identify factors that are important in promoting health service use. Three focus groups with 15 Vietnamese participants with type 2 diabetes mellitus, 60 to >70 years of age, were conducted in Vietnamese. Open-ended questions were used and focussed on experiences of living with diabetes and access to healthcare services in the Inner Northwest Melbourne region. Audio recordings were transcribed and then translated into English. Data were analysed using a thematic analysis framework. Findings indicate four main themes, which together provide some insight into the experiences of living with diabetes and accessing ongoing care and support, for elderly Vietnamese with type 2 diabetes. Themes included: (1) the value of being healthy; (2) controlling diabetes; (3) staying healthy; and (4) improving services and information access. Participants in this study were encouraged to adhere to diabetes self-management principles, based largely on a fear of medical complications. Important aspects of healthcare access were identified as; being treated with respect, having their questions answered and having access to interpreters and information in Vietnamese. Attention to these details is likely to lead to improved access to healthcare services and ultimately to improve glycemic control and overall health status for this community.
Internet-based stress management for distressed managers: results from a randomised controlled trial
Dagöö, Jesper; Fjellström, Ida; Niemi, Linnea; Hansson, Katja; Zeraati, Forough; Ziuzina, Masha; Geraedts, Anna; Ljótsson, Brjánn; Carlbring, Per; Andersson, Gerhard
2018-01-01
Objective The aim of this randomised controlled trial (RCT) was to evaluate the efficacy of a guided internet-based stress management intervention (iSMI) among distressed managers compared with a attention control group (AC) with full access to treatment-as-usual. Method A total sample of 117 distressed managers, mainly employed in the healthcare, IT, communication and educational sector, were randomised to either iSMI (n=59) or an AC group (n=58). The iSMI consisted of eight modules including cognitive behavioural stress management and positive management techniques. Participants received a minimal and weekly guidance from a psychologist or master-level psychology student focusing on support, feedback and adherence to the intervention. Self-report data were assessed at pre, post and 6 months after the intervention. The primary outcome was perceived stress (Perceived Stress Scale-14). The secondary outcomes included mental and work-related health outcomes. Results Participants in the iSMI intervention reported significantly less symptoms of perceived stress (d=0.74, 95% CI 0.30 to 1.19) and burnout (d=0.95, 95% CI 0.53 to 1.37) compared with controls, at postassessment. Significant medium-to-large effect sizes were also found for depression, insomnia and job satisfaction. Long-term effects (6 months) were seen on the mental health outcomes. Conclusion This is one of the first studies showing that iSMIs can be an effective, accessible and potentially time-effective approach of reducing stress and other mental-related and work-related health symptoms among distressed managers. Future studies are needed addressing distressed managers and the potential of indirect effects on employee stress and satisfaction at work. PMID:28855344
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei
2016-05-01
This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.
Comin, Eva; Catalan-Ramos, Arantxa; Iglesias-Rodal, Manuel; Grau, Maria; Del Val, Jose Luis; Consola, Alicia; Amado, Ester; Pons, Angels; Mata-Cases, Manel; Franzi, Alicia; Ciurana, Ramon; Frigola, Eva; Cos, Xavier; Davins, Josep; Verdu-Rotellar, Jose M
To evaluate the impact of computerized clinical practice guidelines on the management, diagnosis, treatment, control, and follow-up of the main cardiovascular risk factors: hypertension, hypercholesterolaemia, and type 2 diabetes mellitus. Pre-post controlled study. Catalonia, autonomous community located in north-eastern Spain. Individuals aged 35-74 years assigned to general practitioners of the Catalan Health Institute. The intervention group consisted of individuals whose general practitioners had accessed the computerized clinical practice guidelines at least twice a day, while the control group consisted of individuals whose general practitioner had never accessed the computerized clinical practice guidelines platform. The Chi-squared test was used to detect significant differences in the follow-up, control, and treatment variables for all three disorders (hypertension, hypercholesterolaemia, and type 2 diabetes mellitus) between individuals assigned to users and non-users of the computerized clinical practice guidelines, respectively. A total of 189,067 patients were included in this study, with a mean age of 56 years (standard deviation 12), and 55.5% of whom were women. Significant differences were observed in hypertension management, treatment and control; type 2 diabetes mellitus management, treatment and diagnoses, and the management and control of hypercholesterolaemia in both sexes. Computerized clinical practice guidelines are an effective tool for the control and follow-up of patients diagnosed with hypertension, type 2 diabetes mellitus, and hypercholesterolaemia. The usefulness of computerized clinical practice guidelines to diagnose and adequately treat individuals with these disorders remains unclear. Copyright © 2016 Elsevier España, S.L.U. All rights reserved.
Access Control for Mobile Assessment Systems Using ID.
Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma
2015-01-01
The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.
Protection of electronic health records (EHRs) in cloud.
Alabdulatif, Abdulatif; Khalil, Ibrahim; Mai, Vu
2013-01-01
EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.
Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT
Guo, Yunchuan; Yin, Lihua; Li, Chao
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731
ERIC Educational Resources Information Center
Lytle, Michael A.
Legal methods and related case law that can be used by public higher education administrators to deal with intrusions by outsiders onto the campus are examined. The following legal factors related to control of campus access are addressed: risk management, police power, general trespass, school related trespass/loitering statutes, First and…
76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-30
... securities to give broker- dealers with market access additional time to develop, test, and implement the... that exceed appropriate pre-set credit or capital thresholds,\\5\\ or that appear to be erroneous.\\6\\ The... satisfied on a pre-order entry basis,\\7\\ prevent the entry of orders that the broker- dealers or customer is...
A proposed site index for red spruce in the Northeast
T. F. McLintock; C. A. Bickford
1957-01-01
A basic principle that should be recognized at the start of any forward-looking forest-management plan is that the intensity or level of management that can be profitably applied to a given tract will be controlled largely by four factors: markets, labor supply, accessibility, and site. The more favorable these factors are, the higher the intensity of management that...
Oliver, Thomas A; Oleson, Kirsten L L; Ratsimbazafy, Hajanaina; Raberinary, Daniel; Benbow, Sophie; Harris, Alasdair
2015-01-01
Eight years of octopus fishery records from southwest Madagascar reveal significant positive impacts from 36 periodic closures on: (a) fishery catches and (b) village fishery income, such that (c) economic benefits from increased landings outweigh costs of foregone catch. Closures covered ~20% of a village's fished area and lasted 2-7 months. Octopus landings and catch per unit effort (CPUE) significantly increased in the 30 days following a closure's reopening, relative to the 30 days before a closure (landings: +718%, p<0.0001; CPUE: +87%, p<0.0001; n = 36). Open-access control sites showed no before/after change when they occurred independently of other management ("no ban", n = 17/36). On the other hand, open-access control sites showed modest catch increases when they extended a 6-week seasonal fishery shutdown ("ban", n = 19/36). The seasonal fishery shutdown affects the entire region, so confound all potential control sites. In villages implementing a closure, octopus fishery income doubled in the 30 days after a closure, relative to 30 days before (+132%, p<0.001, n = 28). Control villages not implementing a closure showed no increase in income after "no ban" closures and modest increases after "ban" closures. Villages did not show a significant decline in income during closure events. Landings in closure sites generated more revenue than simulated landings assuming continued open-access fishing at that site (27/36 show positive net earnings; mean +$305/closure; mean +57.7% monthly). Benefits accrued faster than local fishers' time preferences during 17-27 of the 36 closures. High reported rates of illegal fishing during closures correlated with poor economic performance. We discuss the implications of our findings for broader co-management arrangements, particularly for catalyzing more comprehensive management.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
... System. OMB Control Number: Pending. Type of Review: New collection, request for a new OMB Control Number... been issued the required two factor authentication tokens can access the FS SAS. The FS SAS allows...
Improving access to adequate pain management in Taiwan.
Scholten, Willem
2015-06-01
There is a global crisis in access to pain management in the world. WHO estimates that 4.65 billion people live in countries where medical opioid consumption is near to zero. For 2010, WHO considered a per capita consumption of 216.7 mg morphine equivalents adequate, while Taiwan had a per capita consumption of 0.05 mg morphine equivalents in 2007. In Asia, the use of opioids is sensitive because of the Opium Wars in the 19th century and for this reason, the focus of controlled substances policies has been on the prevention of diversion and dependence. However, an optimal public health outcome requires that also the beneficial aspects of these substances are acknowledged. Therefore, WHO recommends a policy based on the Principle of Balance: ensuring access for medical and scientific purposes while preventing diversion, harmful use and dependence. Furthermore, international law requires that countries ensure access to opioid analgesics for medical and scientific purposes. There is evidence that opioid analgesics for chronic pain are not associated with a major risk for developing dependence. Barriers for access can be classified in the categories of overly restrictive laws and regulations; insufficient medical training on pain management and problems related to assessment of medical needs; attitudes like an excessive fear for dependence or diversion; and economic and logistical problems. The GOPI project found many examples of such barriers in Asia. Access to opioid medicines in Taiwan can be improved by analysing the national situation and drafting a plan. The WHO policy guidelines Ensuring Balance in National Policies on Controlled Substances can be helpful for achieving this purpose, as well as international guidelines for pain treatment. Copyright © 2015. Published by Elsevier B.V.
Integration of EGA secure data access into Galaxy.
Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J A Fijneman, Remond; Boiten, Jan-Willem; A Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne
2016-01-01
High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study. The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.
Integration of EGA secure data access into Galaxy
Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; Fijneman, Remond J.A.; Boiten, Jan-Willem; A. Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne
2016-01-01
High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study. The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer. PMID:28232859
Multimedia case management system implemented in Java
NASA Astrophysics Data System (ADS)
Stewart, Howard D.; Davis, Midge L.; Handy, Dale L.; Kvarfordt, Kent B.; Ford, Glenn
1999-01-01
Managing the timely access of information is a major challenge facing law enforcement agencies. One of the areas of greatest need is that of the case management process. During the course of FY98, the Office of National Drug Control Policy (ONDCP), the Counterdrug Technology Assessment Center (CTAC), the Idaho National Engineering and Environmental Laboratory (INEEL), and the Criminal Investigative Bureau (CIB) of the state of Idaho, created a Northwest testbed to develop and integrate a multimedia case management system. A system was developed to assist investigators in tracking and maintaining investigative cases and improving access to internal and external data resources. In this paper, we discuss the results of our case management system development and the ability to present state and federal information incorporating object oriented and multimedia techniques. We then outline our plans for future research and development.
Management: A bibliography for NASA managers
NASA Technical Reports Server (NTRS)
1985-01-01
This bibliography lists 706 reports, articles, and other documents introduced into the NASA scientific and technical information system in 1984. Entries, which include abstracts, are arranged in the following categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs, and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy. Subject, personal author, corporate source, contract number, report number, and accession number indexes are included.
Geissbuhler, Antoine; Spahni, Stéphane; Assimacopoulos, André; Raetzo, Marc-André; Gobet, Gérard
2004-01-01
to design a community healthcare information network for all 450,000 citizen in the State of Geneva, Switzerland, connecting public and private healthcare professionals. Requirements include the decentralized storage of information at the source of its production, the creation of a virtual patient record at the time of the consultation, the control by the patient of the access rights to the information, and the interoperability with other similar networks at the national and european level. a participative approach and real-world pilot projects are used to design, test and validate key components of the network, including its technical architecture and the strategy for the management of access rights by the patients. a distributed architecture using peer-to-peer communication of information mediators can implement the various requirements while limiting to an absolute minimum the amount of centralized information. Access control can be managed by the patient with the help of a medical information mediator, the physician of trust.
Waverijn, Geeke; Heijmans, Monique; Spreeuwenberg, Peter; Groenewegen, Peter P
2016-01-01
Health literacy skills are important for health and self-management for people with chronic illness. Neighborhood social capital can provide resources, such as access to information and informal social control over unhealthy behavior. The benefit of these resources, and the access people have to these resources, might depend on levels of health literacy. We investigated whether neighborhood social capital is differentially related to the health of people with chronic illness according to health literacy skills. This study focused on health literacy skills in 4 domains related to the ability to access and understand health information and to the ability to perform self-management. We found a significant positive interaction between social capital and health literacy skills for accessing and understanding health information. This suggests that health literacy enhances people's ability to gain access to and use neighborhood resources to benefit health. There was no interaction effect between social capital and health literacy skills in the other 2 domains. More research is needed to investigate how people with chronic illness can benefit from knowledge, support, and other social resources for health and self-management also whether they have limited health literacy skills.
Morrison, Deborah; Wyke, Sally; Thomson, Neil C; McConnachie, Alex; Agur, Karolina; Saunderson, Kathryn; Chaudhuri, Rekha; Mair, Frances S
2014-05-24
The financial costs associated with asthma care continue to increase while care remains suboptimal. Promoting optimal self-management, including the use of asthma action plans, along with regular health professional review has been shown to be an effective strategy and is recommended in asthma guidelines internationally. Despite evidence of benefit, guided self-management remains underused, however the potential for online resources to promote self-management behaviors is gaining increasing recognition. The aim of this paper is to describe the protocol for a pilot evaluation of a website 'Living well with asthma' which has been developed with the aim of promoting self-management behaviors shown to improve outcomes. The study is a parallel randomized controlled trial, where adults with asthma are randomly assigned to either access to the website for 12 weeks, or usual asthma care for 12 weeks (followed by access to the website if desired). Individuals are included if they are over 16-years-old, have a diagnosis of asthma with an Asthma Control Questionnaire (ACQ) score of greater than, or equal to 1, and have access to the internet. Primary outcomes for this evaluation include recruitment and retention rates, changes at 12 weeks from baseline for both ACQ and Asthma Quality of Life Questionnaire (AQLQ) scores, and quantitative data describing website usage (number of times logged on, length of time logged on, number of times individual pages looked at, and for how long). Secondary outcomes include clinical outcomes (medication use, health services use, lung function) and patient reported outcomes (including adherence, patient activation measures, and health status). Piloting of complex interventions is considered best practice and will maximise the potential of any future large-scale randomized controlled trial to successfully recruit and be able to report on necessary outcomes. Here we will provide results across a range of outcomes which will provide estimates of efficacy to inform the design of a future full-scale randomized controlled trial of the 'Living well with asthma' website. This trial is registered with Current Controlled Trials ISRCTN78556552 on 18/06/13.
Purdue Ionomics Information Management System. An Integrated Functional Genomics Platform1[C][W][OA
Baxter, Ivan; Ouzzani, Mourad; Orcun, Seza; Kennedy, Brad; Jandhyala, Shrinivas S.; Salt, David E.
2007-01-01
The advent of high-throughput phenotyping technologies has created a deluge of information that is difficult to deal with without the appropriate data management tools. These data management tools should integrate defined workflow controls for genomic-scale data acquisition and validation, data storage and retrieval, and data analysis, indexed around the genomic information of the organism of interest. To maximize the impact of these large datasets, it is critical that they are rapidly disseminated to the broader research community, allowing open access for data mining and discovery. We describe here a system that incorporates such functionalities developed around the Purdue University high-throughput ionomics phenotyping platform. The Purdue Ionomics Information Management System (PiiMS) provides integrated workflow control, data storage, and analysis to facilitate high-throughput data acquisition, along with integrated tools for data search, retrieval, and visualization for hypothesis development. PiiMS is deployed as a World Wide Web-enabled system, allowing for integration of distributed workflow processes and open access to raw data for analysis by numerous laboratories. PiiMS currently contains data on shoot concentrations of P, Ca, K, Mg, Cu, Fe, Zn, Mn, Co, Ni, B, Se, Mo, Na, As, and Cd in over 60,000 shoot tissue samples of Arabidopsis (Arabidopsis thaliana), including ethyl methanesulfonate, fast-neutron and defined T-DNA mutants, and natural accession and populations of recombinant inbred lines from over 800 separate experiments, representing over 1,000,000 fully quantitative elemental concentrations. PiiMS is accessible at www.purdue.edu/dp/ionomics. PMID:17189337
Cloud-assisted mobile-access of health data with privacy and auditability.
Tong, Yue; Sun, Jinyuan; Chow, Sherman S M; Li, Pan
2014-03-01
Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and auditability for misusing health data. Specifically, we propose to integrate key management from pseudorandom number generator for unlinkability, a secure indexing method for privacy-preserving keyword search which hides both search and access patterns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with auditability to prevent potential misbehavior, in both normal and emergency cases.
An Evaluation of the Latent Tuberculosis Control Program in the United States Military at Accession
2010-10-15
and costs associated with lost productivity. Cost-of-illness estimates for the health outcomes will be obtained from the TRICARE management agency...National Collaborating Centre for Chronic Conditions. Tuberculosis: national clinical guidelines for diagnosis, management , prevention, and control...N, Ranganathan SC. A three- way comparison of tuberculin skin testing, QuantiFERON-TB gold and T-SPOT.TB in children. PLoS ONE. 2008;3(7):e2624
Martin, Julien; Fackler, Paul L.; Nichols, James D.; Runge, Michael C.; McIntyre, Carol L.; Lubow, Bruce L.; McCluskie, Maggie C.; Schmutz, Joel A.
2011-01-01
Unintended effects of recreational activities in protected areas are of growing concern. We used an adaptive-management framework to develop guidelines for optimally managing hiking activities to maintain desired levels of territory occupancy and reproductive success of Golden Eagles (Aquila chrysaetos) in Denali National Park (Alaska, U.S.A.). The management decision was to restrict human access (hikers) to particular nesting territories to reduce disturbance. The management objective was to minimize restrictions on hikers while maintaining reproductive performance of eagles above some specified level. We based our decision analysis on predictive models of site occupancy of eagles developed using a combination of expert opinion and data collected from 93 eagle territories over 20 years. The best predictive model showed that restricting human access to eagle territories had little effect on occupancy dynamics. However, when considering important sources of uncertainty in the models, including environmental stochasticity, imperfect detection of hares on which eagles prey, and model uncertainty, restricting access of territories to hikers improved eagle reproduction substantially. An adaptive management framework such as ours may help reduce uncertainty of the effects of hiking activities on Golden Eagles
[Endovascular interventions for multiple trauma].
Kinstner, C; Funovics, M
2014-09-01
In recent years interventional radiology has significantly changed the management of injured patients with multiple trauma. Currently nearly all vessels can be reached within a reasonably short time with the help of specially preshaped catheters and guide wires to achieve bleeding control of arterial und venous bleeding. Whereas bleeding control formerly required extensive open surgery, current interventional methods allow temporary vessel occlusion (occlusion balloons), permanent embolization and stenting. In injured patients with multiple trauma preinterventional procedural planning is performed with the help of multidetector computed tomography whenever possible. Interventional radiology not only allows minimization of therapeutic trauma but also a considerably shorter treatment time. Interventional bleeding control has developed into a standard method in the management of vascular trauma of the chest and abdomen as well as in vascular injuries of the upper and lower extremities when open surgical access is associated with increased risk. Additionally, pelvic trauma, vascular trauma of the superior thoracic aperture and parenchymal arterial lacerations of organs that can be at least partially preserved are primarily managed by interventional methods. In an interdisciplinary setting interventional radiology provides a safe and efficient means of rapid bleeding control in nearly all vascular territories in addition to open surgical access.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-28
... Landings History, and Referendum Eligibility in the Small- Mesh Multispecies Fishery AGENCY: National... history for a limited access or allocation-based management program and limits on the accumulation of..., landings history from Federal waters. DATES: November 28, 2012, shall be known as the ``control date'' for...
Conceptual framework of the Controlling Asthma in American Cities Project.
Herman, Elizabeth Jane
2011-02-01
The Controlling Asthma in American Cities Project (CAACP) was designed to improve the control of asthma in inner-city populations of children with a disparate burden of symptoms and adverse outcomes. As with many chronic diseases, asthma is the manifestation of multiple biologic, environmental, and social determinants. In addition to appropriate medical management, individuals with asthma must have logistical, financial, and cultural access to environments that allow avoidance of asthma triggers and encourage good asthma management practices. In recognition of this complexity, the CAACP required the seven project sites to coordinate and synchronize multiple interventions (education, healthcare access, medical management, trigger reduction) at multiple levels (individual, home, school, community, and policy) through the collaboration of relevant groups, institutions, and individuals. This paper describes the "program theory" of the CAACP project-the assumptions about how the project worked, how the components were linked, and what outcomes were anticipated. It relates the subsequent papers in the supplement to the program theory and describes how the papers can inform and guide other community-based interventions, and advance the translation of scientific knowledge to effective interventions in communities of need.
A Data Management System for Multi-Phase Case-Control Studies
Gibeau, Joanne M.; Steinfeldt, Lois C.; Stine, Mark J.; Tullis, Katherine V.; Lynch, H. Keith
1983-01-01
The design of a computerized system for the management of data in multi-phase epidemiologic case-control studies is described. Typical study phases include case-control selection, abstracting of data from medical records, and interview of study subjects or next of kin. In consultation with project personnel, requirements for the system were established: integration of data from all study phases into one data base, accurate follow-up of subjects through the study, sophisticated data editing capabilities, ready accessibility of specified programs to project personnel, and generation of current status and exception reports for project managment. SIR (Scientific Information Retrieval), a commercially available data base management system, was selected as the foundation of this system. The system forms a comprehensive data management system applicable to many types of public health research studies.
Hogerzeil, Hans V; Liberman, Jonathan; Wirtz, Veronika J; Kishore, Sandeep P; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N; von Schoen-Angerer, Tido
2013-02-23
Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and vaccines for such diseases. 30 years of experience with policies for essential medicines and 10 years of scaling up of HIV treatment have provided the knowledge needed to address barriers to long-term effective treatment and prevention of NCDs. More medicines can be acquired within existing budgets with efficient selection, procurement, and use of generic medicines. Furthermore, low-income and middle-income countries need to increase mobilisation of domestic resources to cater for the many patients with NCDs who do not have access to treatment. Existing initiatives for HIV treatment offer useful lessons that can enhance access to pharmaceutical management of NCDs and improve adherence to long-term treatment of chronic illness; policy makers should also address unacceptable inequities in access to controlled opioid analgesics. In addition to off-patent medicines, governments can promote access to new and future on-patent medicinal products through coherent and equitable health and trade policies, particularly those for intellectual property. Frequent conflicts of interest need to be identified and managed, and indicators and targets for access to NCD medicines should be used to monitor progress. Only with these approaches can a difference be made to the lives of hundreds of millions of current and future patients with NCDs. Copyright © 2013 Elsevier Ltd. All rights reserved.
Oliver, Thomas A.; Oleson, Kirsten L. L.; Ratsimbazafy, Hajanaina; Raberinary, Daniel; Benbow, Sophie; Harris, Alasdair
2015-01-01
Overview Eight years of octopus fishery records from southwest Madagascar reveal significant positive impacts from 36 periodic closures on: (a) fishery catches and (b) village fishery income, such that (c) economic benefits from increased landings outweigh costs of foregone catch. Closures covered ~20% of a village’s fished area and lasted 2-7 months. Fishery Catches from Each Closed Site Octopus landings and catch per unit effort (CPUE) significantly increased in the 30 days following a closure’s reopening, relative to the 30 days before a closure (landings: +718%, p<0.0001; CPUE: +87%, p<0.0001; n = 36). Open-access control sites showed no before/after change when they occurred independently of other management (“no ban”, n = 17/36). On the other hand, open-access control sites showed modest catch increases when they extended a 6-week seasonal fishery shutdown (“ban”, n = 19/36). The seasonal fishery shutdown affects the entire region, so confound all potential control sites. Fishery Income in Implementing Villages In villages implementing a closure, octopus fishery income doubled in the 30 days after a closure, relative to 30 days before (+132%, p<0.001, n = 28). Control villages not implementing a closure showed no increase in income after “no ban” closures and modest increases after “ban” closures. Villages did not show a significant decline in income during closure events. Net Economic Benefits from Each Closed Site Landings in closure sites generated more revenue than simulated landings assuming continued open-access fishing at that site (27/36 show positive net earnings; mean +$305/closure; mean +57.7% monthly). Benefits accrued faster than local fishers’ time preferences during 17-27 of the 36 closures. High reported rates of illegal fishing during closures correlated with poor economic performance. Broader Co-Management We discuss the implications of our findings for broader co-management arrangements, particularly for catalyzing more comprehensive management. PMID:26083862
Time for a new language for asthma control: results from REALISE Asia
Price, David; David-Wang, Aileen; Cho, Sang-Heon; Ho, James Chung-Man; Jeong, Jae-Won; Liam, Chong-Kin; Lin, Jiangtao; Muttalif, Abdul Razak; Perng, Diahn-Warng; Tan, Tze-Lee; Yunus, Faisal; Neira, Glenn
2015-01-01
Purpose Asthma is a global health problem, and asthma prevalence in Asia is increasing. The REcognise Asthma and LInk to Symptoms and Experience Asia study assessed patients’ perception of asthma control and attitudes toward treatment in an accessible, real-life adult Asian population. Patients and methods An online survey of 2,467 patients with asthma from eight Asian countries/regions, aged 18–50 years, showed greater than or equal to two prescriptions in previous 2 years and access to social media. Patients were asked about their asthma symptoms, exacerbations and treatment type, views and perceptions of asthma control, attitudes toward asthma management, and sources of asthma information. Results Patients had a mean age of 34.2 (±7.4) years and were diagnosed with asthma for 12.5 (±9.7) years. Half had the Global Initiative for Asthma-defined uncontrolled asthma. During the previous year, 38% of patients visited the emergency department, 33% were hospitalized, and 73% had greater than or equal to one course of oral corticosteroids. About 90% of patients felt that their asthma was under control, 82% considered their condition as not serious, and 59% were concerned about their condition. In all, 66% of patients viewed asthma control as managing attacks and 24% saw it as an absence of or minimal symptoms. About 14% of patients who correctly identified their controller inhalers had controlled asthma compared to 6% who could not. Conclusion Patients consistently overestimated their level of asthma control contrary to what their symptoms suggest. They perceived control as management of exacerbations, reflective of a crisis-oriented mind-set. Interventions can leverage on patients’ trust in health care providers and desire for self-management via a new language to generate a paradigm shift toward symptom control and preventive care. PMID:26445555
The resurgence of selective contracting restrictions.
Marsteller, J A; Bovbjerg, R R; Nichols, L M; Verrilli, D K
1997-10-01
As managed care has spread, so has legislation to force plans to contract with any willing provider (AWP) and give patients freedom of choice (FOC). Managed care organizations' selective networks and provider integration reduce patient access to providers, along with provider access to paying patients, so many providers have lobbied for AWP-FOC laws. In opposition are managed care organizations (MCOs), which want full freedom to contract selectively to control prices and utilization. This article comprehensively describes laws in all fifty-one jurisdictions, classifies their relative strength, and assesses the implications of the laws. Most are relatively weak forms and all are limited in application by ERISA and the federal HMO Act. The article also uses an associative multivariate analysis to relate the selective contracting environments to HMO penetration rates, rural population, physician density, and other variables. States with weak laws also have higher HMO penetration and higher physician density, but smaller rural populations. We conclude that the strongest laws overly restrict the management of care, to the likely detriment of cost control. But where market power is rapidly concentrating, not restricting selective contracting could diminish long-term competition and patient access to care. In the face of uncertainty about the impact of these laws, an intermediate approach may be better than all or nothing. States should consider mandating that plans offer point-of-service options, for a separate premium. This option expands patient choice of plans at the time of enrollment and of providers at the time of care, yet maintains plans' ability to control core providers.
Plan characteristics and SSI enrollees' access to and quality of care in four TennCare MCOs.
Hill, Steven C; Wooldridge, Judith
2002-10-01
To assess hypotheses about which managed care organization (MCO) characteristics affect access to care and quality of care--including access to specialists, providers' knowledge about disability, and coordination of care--for people with disabilities. Survey of blind/disabled Supplemental Security Income (SSI) enrollees in four MCOs serving TennCare, Tennessee's Medicaid managed care program, in Memphis, conducted from 1998 through spring 1999. We compared enrollee reports of access and quality across the four MCOs using regression methods, and we use case study methods to assess whether patterns both within and across MCOs are consistent with the hypotheses. We conducted computer-assisted telephone surveys and used regression analysis to compare access and quality controlling for enrollee characteristics. Although the four MCOs' characteristics varied, access to providers, coordination of care, and access to some services were generally similar across MCOs. Enrollees in one plan, the only MCO with a larger provider network and that paid physicians on a fee-for-service basis, reported their providers were more knowledgeable, and they had more secondary preventive care visits. Differences found in access to specialists and delays in approving care appear to be unrelated to characteristics reported by the MCOs, but instead may be related to how tightly utilization is reviewed. Plan networks, financial incentives, utilization management methods, and state requirements are important areas for further study, and, in the meantime, ongoing monitoring of SSI enrollees in each MCO may be important for detecting problems and successes.
A knowledge-based system for controlling automobile traffic
NASA Technical Reports Server (NTRS)
Maravas, Alexander; Stengel, Robert F.
1994-01-01
Transportation network capacity variations arising from accidents, roadway maintenance activity, and special events as well as fluctuations in commuters' travel demands complicate traffic management. Artificial intelligence concepts and expert systems can be useful in framing policies for incident detection, congestion anticipation, and optimal traffic management. This paper examines the applicability of intelligent route guidance and control as decision aids for traffic management. Basic requirements for managing traffic are reviewed, concepts for studying traffic flow are introduced, and mathematical models for modeling traffic flow are examined. Measures for quantifying transportation network performance levels are chosen, and surveillance and control strategies are evaluated. It can be concluded that automated decision support holds great promise for aiding the efficient flow of automobile traffic over limited-access roadways, bridges, and tunnels.
Sub-Network Access Control Technology Demonstrator: Software Design of the Network Management System
2002-08-01
Canadian Operational Fleet. Requirements The proposed network management solution must provide the normal monitoring and configuration mechanisms generally...Joint Warrior Inter- operability Demonstrations (JWID) m and the Communication System Network Inter- Operability (CSNI) Navy Network Trials. In short...management functional area normally includes two main functions: fault isolation and diagnosis, and restoration of the system . In short, an operator
1985-08-01
from the mainframe to the terminals is approximately 56k bits per second (21:3). Score: 8. Expandability. The number of terminals available to the 0...the systems controllers may access any files. For modem link up, a callback system is to be implemented to prevent unauthorized off post access (10:2
NASA Astrophysics Data System (ADS)
Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung
According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.
Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F L; Utzinger, Jürg; Kristensen, Thomas K; Vounatsou, Penelope
2011-12-01
After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature'), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay.
Effective Materials Property Information Management for the 21st Century
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ren, Weiju; Cebon, David; Barabash, Oleg M
2011-01-01
This paper discusses key principles for the development of materials property information management software systems. There are growing needs for automated materials information management in various organizations. In part these are fuelled by the demands for higher efficiency in material testing, product design and engineering analysis. But equally important, organizations are being driven by the needs for consistency, quality and traceability of data, as well as control of access to proprietary or sensitive information. Further, the use of increasingly sophisticated nonlinear, anisotropic and multi-scale engineering analyses requires both processing of large volumes of test data for development of constitutive modelsmore » and complex materials data input for Computer-Aided Engineering (CAE) software. And finally, the globalization of economy often generates great needs for sharing a single gold source of materials information between members of global engineering teams in extended supply-chains. Fortunately material property management systems have kept pace with the growing user demands and evolved to versatile data management systems that can be customized to specific user needs. The more sophisticated of these provide facilities for: (i) data management functions such as access, version, and quality controls; (ii) a wide range of data import, export and analysis capabilities; (iii) data pedigree traceability mechanisms; (iv) data searching, reporting and viewing tools; and (v) access to the information via a wide range of interfaces. In this paper the important requirements for advanced material data management systems, future challenges and opportunities such as automated error checking, data quality characterization, identification of gaps in datasets, as well as functionalities and business models to fuel database growth and maintenance are discussed.« less
... controlled. Talk openly with your partner about your relationship and sex life. Seek counseling if you and your ... Accessed January 23, 2018. Burnett AL. Evaluation and management of erectile dysfunction. In: Wein AJ, Kavoussi LR, ...
Patient empowerment and choice in chronic pain management.
Barrie, Janette
Service provision and access to pain services vary considerably in the UK, with only a small percentage of people with chronic pain accessing specialist services. Government policy supports giving patients more choice and control over their care. Empowerment involves ensuring patients have the knowledge, skills, attitudes and self-awareness to improve the quality of their lives. As most healthcare professionals provide care to people with chronic pain at some point, it is their responsibility to prepare patients to make informed decisions about their treatment. Empowering patients to self-manage their chronic pain can lead to improved person-centred outcomes.
Securing Ground Data System Applications for Space Operations
NASA Technical Reports Server (NTRS)
Pajevski, Michael J.; Tso, Kam S.; Johnson, Bryan
2014-01-01
The increasing prevalence and sophistication of cyber attacks has prompted the Multimission Ground Systems and Services (MGSS) Program Office at Jet Propulsion Laboratory (JPL) to initiate the Common Access Manager (CAM) effort to protect software applications used in Ground Data Systems (GDSs) at JPL and other NASA Centers. The CAM software provides centralized services and software components used by GDS subsystems to meet access control requirements and ensure data integrity, confidentiality, and availability. In this paper we describe the CAM software; examples of its integration with spacecraft commanding software applications and an information management service; and measurements of its performance and reliability.
Empowering citizens with access control mechanisms to their personal health resources.
Calvillo, J; Román, I; Roa, L M
2013-01-01
Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms are essential keys for this approach and they are accomplished by using semantic technologies (i.e., ontologies, rule languages, and inference engines). The results are mainly focused on the security and access control of the proposed scenario. An ontology has been designed and developed for the POVO covering the terminology of the scenario and easing the automation of administration tasks. Over that ontology, an access control mechanism based on rule languages allows specifying access control policies, and an inference engine performs the decision making process automatically. The usability of solutions to ease administration tasks to the SoC is improved by the Me-As-An-Admin (M3A) application. This guides the SoC through the specification of personal access control policies to his/her distributed resources by using semantic technologies (e.g., metamodeling, model-to-text transformations, etc.). All results are developed as services and included in an architecture in accordance with standards and principles of openness and interoperability. Current technology can bring health, social and well-being care actually centered on citizens, and granting each person the management of his/her health information. However, the application of technology without adopting methodologies or normalized guidelines will reduce the interoperability of solutions developed, failing in the development of advanced services and improved scenarios for health delivery. Standards and reference architectures can be cornerstones for future-proof and powerful developments. Finally, not only technology must follow citizen-centric approaches, but also the gaps needing legislative efforts that support these new paradigms of healthcare delivery must be identified and addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Identity and Access Management and Security in Higher Education.
ERIC Educational Resources Information Center
Bruhn, Mark; Gettes, Michael; West, Ann
2003-01-01
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Cai, L; Dong, J; Cui, W L; You, D Y; Golden, A R
2017-06-01
This study investigates socioeconomic differences in prevalence, awareness, control and self-management of hypertension in rural China. A cross-sectional survey was conducted among four ethnic minority groups in Yunnan Province: Na Xi, Li Shu, Dai and Jing Po. Approximately 5532 consenting individuals aged ⩾35 years (48.4% of whom were male) were selected to participate in the study using a stratified, multistage sampling technique. Information about participants' demographic characteristics and hypertension awareness, treatment, control and self-management practices was obtained using a standard questionnaire. The age-standardised prevalence of hypertension in the study population was 33.6%. In hypertensive subjects, the overall levels of awareness, treatment and control of hypertension were 42.1%, 28.5% and 6.7%, respectively. Approximately 58.7% of hypertensive patients regularly self-monitored blood pressure (BP), 64.7% adhered to their physician-prescribed anti-hypertensive drugs, and 88.0% took at least one measure to control BP. Hypertensive patients of Jing Po ethnicity had the lowest rates of awareness, treatment, control and self-management of hypertension among the four ethnic minority groups studied. Individuals with lower levels of education were more likely to be hypertensive. Further, individuals with lower levels of education had a lower probability of awareness of their hypertensive status and of treatment with antihypertensive medication. Access to medical services was positively associated with awareness of suffering from hypertension, being treated with antihypertensive medication, and compliance with antihypertensive drug treatment. This study suggests that effective strategies to enhance awareness, treatment and management of hypertension should focus on individuals with low levels of education and poor access to medical services.
Kaasalainen, Sharon; Wickson-Griffiths, Abigail; Akhtar-Danesh, Noori; Brazil, Kevin; Donald, Faith; Martin-Misener, Ruth; DiCenso, Alba; Hadjistavropoulos, Thomas; Dolovich, Lisa
2016-10-01
Considering the high rates of pain as well as its under-management in long-term care (LTC) settings, research is needed to explore innovations in pain management that take into account limited resource realities. It has been suggested that nurse practitioners, working within an inter-professional model, could potentially address the under-management of pain in LTC. This study evaluated the effectiveness of implementing a nurse practitioner-led, inter-professional pain management team in LTC in improving (a) pain-related resident outcomes; (b) clinical practice behaviours (e.g., documentation of pain assessments, use of non-pharmacological and pharmacological interventions); and, (c) quality of pain medication prescribing practices. A mixed method design was used to evaluate a nurse practitioner-led pain management team, including both a quantitative and qualitative component. Using a controlled before-after study, six LTC homes were allocated to one of three groups: 1) a nurse practitioner-led pain team (full intervention); 2) nurse practitioner but no pain management team (partial intervention); or, 3) no nurse practitioner, no pain management team (control group). In total, 345 LTC residents were recruited to participate in the study; 139 residents for the full intervention group, 108 for the partial intervention group, and 98 residents for the control group. Data was collected in Canada from 2010 to 2012. Implementing a nurse practitioner-led pain team in LTC significantly reduced residents' pain and improved functional status compared to usual care without access to a nurse practitioner. Positive changes in clinical practice behaviours (e.g., assessing pain, developing care plans related to pain management, documenting effectiveness of pain interventions) occurred over the intervention period for both the nurse practitioner-led pain team and nurse practitioner-only groups; these changes did not occur to the same extent, if at all, in the control group. Qualitative analysis highlighted the perceived benefits of LTC staff about having access to a nurse practitioner and benefits of the pain team, along with barriers to managing pain in LTC. The findings from this study showed that implementing a nurse practitioner-led pain team can significantly improve resident pain and functional status as well as clinical practice behaviours of LTC staff. LTC homes should employ a nurse practitioner, ideally located onsite as opposed to an offsite consultative role, to enhance inter-professional collaboration and facilitate more consistent and timely access to pain management. Copyright © 2016 Elsevier Ltd. All rights reserved.
Monitoring and controlling ATLAS data management: The Rucio web user interface
NASA Astrophysics Data System (ADS)
Lassnig, M.; Beermann, T.; Vigne, R.; Barisits, M.; Garonne, V.; Serfon, C.
2015-12-01
The monitoring and controlling interfaces of the previous data management system DQ2 followed the evolutionary requirements and needs of the ATLAS collaboration. The new data management system, Rucio, has put in place a redesigned web-based interface based upon the lessons learnt from DQ2, and the increased volume of managed information. This interface encompasses both a monitoring and controlling component, and allows easy integration for usergenerated views. The interface follows three design principles. First, the collection and storage of data from internal and external systems is asynchronous to reduce latency. This includes the use of technologies like ActiveMQ or Nagios. Second, analysis of the data into information is done massively parallel due to its volume, using a combined approach with an Oracle database and Hadoop MapReduce. Third, sharing of the information does not distinguish between human or programmatic access, making it easy to access selective parts of the information both in constrained frontends like web-browsers as well as remote services. This contribution will detail the reasons for these principles and the design choices taken. Additionally, the implementation, the interactions with external systems, and an evaluation of the system in production, both from a technological and user perspective, conclude this contribution.
New model helps find missing link between financial and clinical health care management.
Dasso, E; Wilson, T
2001-01-01
U.S. health care is missing a link between the financial managers and clinical health managers of defined patient populations. Utilization and cost management try to bridge the gap by focusing on restricted access to care or tightly managed provider reimbursement to control costs. But frequently, they do not take clinical outcomes or health status into consideration. Take a look at another method based on the science of epidemiology that brings a more balanced knowledge of the clinical world to financial managers and more financial insight to clinicians.
Inter-Domain Roaming Mechanism Transparent to Mobile Nodes among PMIPv6 Networks
NASA Astrophysics Data System (ADS)
Park, Soochang; Lee, Euisin; Jin, Min-Sook; Kim, Sang-Ha
In Proxy Mobile IPv6 (PMIPv6), when a Mobile Node (MN) enters a PMIPv6 domain and attaches to an access link, the router on the access link detects attachment of the MN by the link-layer access. All elements of PMIPv6 including the router then provide network-based mobility management service for the MN. If the MN moves to another router in this PMIPv6 domain, the new router emulates attachment to the previous router by providing same network prefix to the MN. In other words, PMIPv6 provides rapid mobility management based on layer-2 attachment and transparent mobility support to the MN by emulating layer-3 attachment with respect to intra-domain roaming. However, when the MN moves to other PMIPv6 domains, although the domains also provide the network-based mobility management service, the MN should exploit the host-based mobility management protocol, i.e. Mobile IPv6 (MIPv6), for the inter-domain roaming. Hence, this letter proposes the rapid and transparent inter-domain roaming mechanism controlled by the networks adopting PMIPv6.
War Coverage: The Case of the Falklands.
ERIC Educational Resources Information Center
Bellando, Edourado
The Falkland-Malvinas conflict is a classic example of how a government can manage news in wartime. The rules of the game as evinced by the British government and Ministry of Defense were simple and effective. They controlled access to the fighting, controlled all communications facilities, excluded all neutral correspondents and carefully…
Tools for distributed application management
NASA Technical Reports Server (NTRS)
Marzullo, Keith; Cooper, Robert; Wood, Mark; Birman, Kenneth P.
1990-01-01
Distributed application management consists of monitoring and controlling an application as it executes in a distributed environment. It encompasses such activities as configuration, initialization, performance monitoring, resource scheduling, and failure response. The Meta system (a collection of tools for constructing distributed application management software) is described. Meta provides the mechanism, while the programmer specifies the policy for application management. The policy is manifested as a control program which is a soft real-time reactive program. The underlying application is instrumented with a variety of built-in and user-defined sensors and actuators. These define the interface between the control program and the application. The control program also has access to a database describing the structure of the application and the characteristics of its environment. Some of the more difficult problems for application management occur when preexisting, nondistributed programs are integrated into a distributed application for which they may not have been intended. Meta allows management functions to be retrofitted to such programs with a minimum of effort.
Tools for distributed application management
NASA Technical Reports Server (NTRS)
Marzullo, Keith; Wood, Mark; Cooper, Robert; Birman, Kenneth P.
1990-01-01
Distributed application management consists of monitoring and controlling an application as it executes in a distributed environment. It encompasses such activities as configuration, initialization, performance monitoring, resource scheduling, and failure response. The Meta system is described: a collection of tools for constructing distributed application management software. Meta provides the mechanism, while the programmer specifies the policy for application management. The policy is manifested as a control program which is a soft real time reactive program. The underlying application is instrumented with a variety of built-in and user defined sensors and actuators. These define the interface between the control program and the application. The control program also has access to a database describing the structure of the application and the characteristics of its environment. Some of the more difficult problems for application management occur when pre-existing, nondistributed programs are integrated into a distributed application for which they may not have been intended. Meta allows management functions to be retrofitted to such programs with a minimum of effort.
Women’s Role in Disaster Management and Implications for National Security
2017-07-11
management policies, plans and decision making processes,” available at http://www.unisdr.org/we/ inform /publications/1037. Beijing Agenda for Global...1 WOMEN’S ROLE IN DISASTER MANAGEMENT AND IMPLICATIONS FOR NATIONAL SECURITY By Jessica Ear Introduction Disasters are increasing in...frequency and intensity. For those lacking control and access to services and resources such as education and information , disaster risks are even
Access to Inter-Organization Computer Networks.
1985-08-01
management of computing and information systems, system management . 20. ABSTRACT (Continue on reverse aide it neceeery end identify by block number) When two...necessary control mechanisms. Message-based gateways that support non-real-time invocation of services (e.g., file and print servers, financial ...operations (C.2.3), electronic mail (H.4.3), public policy issues (K.4.1), organizationa impacts (K.4.3), management of computing and information systems (K.6
... Accessed February 28, 2018. Durrani SR, Busse WW. Management of asthma in adolescents and adults. In: Adkinson NF Jr, Bochner BS, Burks AW, et al, eds. Middleton's Allergy: Principles and Practice . 8th ed. Philadelphia, PA: Elsevier Saunders; ...
Code of Federal Regulations, 2010 CFR
2010-04-01
... accessible at all times. (Approved by the Office of Management and Budget under control number 1535-0089) [61... paragraph (b) of this section shall make and preserve a journal, blotter, or other record of original entry...
Application-Defined Decentralized Access Control
Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett
2014-01-01
DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-07
... INFORMATION CONTACT: Judith B. Herman, Office of Managing Director, FCC, at 202-418-0214. SUPPLEMENTARY... cable service providers reasonable and nondiscriminatory access to conduits and rights-of-way located in... of certain video antennas on property within the exclusive use or control of the antenna user, where...
Legido-Quigley, Helena; Camacho Lopez, Paul Anthony; Balabanova, Dina; Perel, Pablo; Lopez-Jaramillo, Patricio; Nieuwlaat, Robby; Schwalm, J-D; McCready, Tara; Yusuf, Salim; McKee, Martin
2015-01-01
Hypertension is a leading cause of premature death worldwide and the most important modifiable risk factor for cardiovascular disease. Effective screening programs, communication with patients, regular monitoring, and adherence to treatment are essential to successful management but may be challenging in health systems facing resource constraints. This qualitative study explored patients' knowledge, attitudes, behaviour and health care seeking experiences in relation to detection, treatment and control of hypertension in Colombia. We conducted in-depth interviews and focus group discussions with 26 individuals with hypertension and 4 family members in two regions. Few participants were aware of ways to prevent high blood pressure. Once diagnosed, most reported taking medication but had little information about their condition and had a poor understanding of their treatment regime. The desire for good communication and a trusting relationship with the doctor emerged as key themes in promoting adherence to medication and regular attendance at medical appointments. Barriers to accessing treatment included co-payments for medication; costs of transport to health care facilities; unavailability of drugs; and poor access to specialist care. Some patients overcame these barriers with support from social networks, family members and neighbours. However, those who lacked such support, experienced loneliness and struggled to access health care services. The health insurance scheme was frequently described as administratively confusing and those accessing the state subsidized system believed that the treatment was inferior to that provided under the compulsory contributory system. Measures that should be addressed to improve hypertension management in Colombia include better communication between health care professionals and patients, measures to improve understanding of the importance of adherence to treatment, reduction of co-payments and transport costs, and easier access to care, especially in rural areas.
Legido-Quigley, Helena; Camacho Lopez, Paul Anthony; Balabanova, Dina; Perel, Pablo; Lopez-Jaramillo, Patricio; Nieuwlaat, Robby; Schwalm, J-D; McCready, Tara; Yusuf, Salim; McKee, Martin
2015-01-01
Hypertension is a leading cause of premature death worldwide and the most important modifiable risk factor for cardiovascular disease. Effective screening programs, communication with patients, regular monitoring, and adherence to treatment are essential to successful management but may be challenging in health systems facing resource constraints. This qualitative study explored patients’ knowledge, attitudes, behaviour and health care seeking experiences in relation to detection, treatment and control of hypertension in Colombia. We conducted in-depth interviews and focus group discussions with 26 individuals with hypertension and 4 family members in two regions. Few participants were aware of ways to prevent high blood pressure. Once diagnosed, most reported taking medication but had little information about their condition and had a poor understanding of their treatment regime. The desire for good communication and a trusting relationship with the doctor emerged as key themes in promoting adherence to medication and regular attendance at medical appointments. Barriers to accessing treatment included co-payments for medication; costs of transport to health care facilities; unavailability of drugs; and poor access to specialist care. Some patients overcame these barriers with support from social networks, family members and neighbours. However, those who lacked such support, experienced loneliness and struggled to access health care services. The health insurance scheme was frequently described as administratively confusing and those accessing the state subsidized system believed that the treatment was inferior to that provided under the compulsory contributory system. Measures that should be addressed to improve hypertension management in Colombia include better communication between health care professionals and patients, measures to improve understanding of the importance of adherence to treatment, reduction of co-payments and transport costs, and easier access to care, especially in rural areas. PMID:25909595
Collaboration between primary care and psychiatric services: does it help family physicians?
Kisely, Stephen; Duerden, Debbie; Shaddick, Susan; Jayabarathan, Ajantha
2006-07-01
To compare family physicians' reports of their experiences managing patients with psychiatric disorders in settings with and without access to collaborative mental health services. Survey using a questionnaire adapted from a similar study in Australia. Family physicians were asked about their knowledge, skills, and degree of comfort in managing the following psychiatric disorders derived from the primary care version of the 10th edition of the International Classification of Diseases: psychosis, depression, anxiety, childhood disorders, and stress-related disorders. We also compared the 2 groups of physicians regarding their satisfaction with mental health services in general. The Capital District Health Authority (CDHA) in Nova Scotia. All family physicians practising in the CDHA. Self-reported knowledge, skills, and degree of comfort in managing psychiatric problems; satisfaction with mental health services, adjusted for family physicians' demographics; and stated interest in mental health. We received 101 responses (37 from physicians with access to collaborative care and 64 from physicians without access) from 7 communities in the CDHA. Family physicians who had access to collaborative care reported significantly greater knowledge in the areas of psychosis, alcohol or substance use, and childhood behavioural problems; and better skills in managing psychosis, alcohol or substance use, childhood depression or anxiety, childhood behavioural disorders, and relationship problems. Their comfort levels in managing relationship problems and childhood behavioural disorders were also significantly higher. Family physicians with access to collaborative care were significantly more satisfied with mental health services, over and above shared care. All these differences remained significant after controlling for sex, level of interest in mental health, and years in practice. Family physicians with access to collaborative care reported greater knowledge, better skills, and more comfort in managing psychiatric disorders and greater satisfaction with mental health services. Further work is needed to establish why this is so and to determine any effect on patient outcomes, such as symptoms, quality of life, and psychosocial functioning.
50 CFR 660.330 - Open access fishery-management measures.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 50 Wildlife and Fisheries 13 2014-10-01 2014-10-01 false Open access fishery-management measures... West Coast Groundfish-Open Access Fisheries § 660.330 Open access fishery—management measures. (a) General. Groundfish species taken in open access fisheries will be managed with cumulative trip limits...
50 CFR 660.330 - Open access fishery-management measures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-management measures... West Coast Groundfish-Open Access Fisheries § 660.330 Open access fishery—management measures. (a) General. Groundfish species taken in open access fisheries will be managed with cumulative trip limits...
50 CFR 660.330 - Open access fishery-management measures.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 50 Wildlife and Fisheries 13 2013-10-01 2013-10-01 false Open access fishery-management measures... West Coast Groundfish-Open Access Fisheries § 660.330 Open access fishery—management measures. (a) General. Groundfish species taken in open access fisheries will be managed with cumulative trip limits...
50 CFR 660.330 - Open access fishery-management measures.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 50 Wildlife and Fisheries 13 2012-10-01 2012-10-01 false Open access fishery-management measures... West Coast Groundfish-Open Access Fisheries § 660.330 Open access fishery—management measures. (a) General. Groundfish species taken in open access fisheries will be managed with cumulative trip limits...
50 CFR 660.330 - Open access fishery-management measures.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 50 Wildlife and Fisheries 11 2011-10-01 2011-10-01 false Open access fishery-management measures... West Coast Groundfish-Open Access Fisheries § 660.330 Open access fishery—management measures. (a) General. Groundfish species taken in open access fisheries will be managed with cumulative trip limits...
A Framework for Managing Inter-Site Storage Area Networks using Grid Technologies
NASA Technical Reports Server (NTRS)
Kobler, Ben; McCall, Fritz; Smorul, Mike
2006-01-01
The NASA Goddard Space Flight Center and the University of Maryland Institute for Advanced Computer Studies are studying mechanisms for installing and managing Storage Area Networks (SANs) that span multiple independent collaborating institutions using Storage Area Network Routers (SAN Routers). We present a framework for managing inter-site distributed SANs that uses Grid Technologies to balance the competing needs to control local resources, share information, delegate administrative access, and manage the complex trust relationships between the participating sites.
Sahoo, Satya S; Ramesh, Priya; Welter, Elisabeth; Bukach, Ashley; Valdez, Joshua; Tatsuoka, Curtis; Bamps, Yvan; Stoll, Shelley; Jobst, Barbara C; Sajatovic, Martha
2016-10-01
We present Insight as an integrated database and analysis platform for epilepsy self-management research as part of the national Managing Epilepsy Well Network. Insight is the only available informatics platform for accessing and analyzing integrated data from multiple epilepsy self-management research studies with several new data management features and user-friendly functionalities. The features of Insight include, (1) use of Common Data Elements defined by members of the research community and an epilepsy domain ontology for data integration and querying, (2) visualization tools to support real time exploration of data distribution across research studies, and (3) an interactive visual query interface for provenance-enabled research cohort identification. The Insight platform contains data from five completed epilepsy self-management research studies covering various categories of data, including depression, quality of life, seizure frequency, and socioeconomic information. The data represents over 400 participants with 7552 data points. The Insight data exploration and cohort identification query interface has been developed using Ruby on Rails Web technology and open source Web Ontology Language Application Programming Interface to support ontology-based reasoning. We have developed an efficient ontology management module that automatically updates the ontology mappings each time a new version of the Epilepsy and Seizure Ontology is released. The Insight platform features a Role-based Access Control module to authenticate and effectively manage user access to different research studies. User access to Insight is managed by the Managing Epilepsy Well Network database steering committee consisting of representatives of all current collaborating centers of the Managing Epilepsy Well Network. New research studies are being continuously added to the Insight database and the size as well as the unique coverage of the dataset allows investigators to conduct aggregate data analysis that will inform the next generation of epilepsy self-management studies. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Management: A continuing literature survey with indexes
NASA Technical Reports Server (NTRS)
1978-01-01
This bibliography lists 782 reports, articles, and other documents introduced into the NASA scientific and technical information system in 1977. The citations, and abstracts when available, are reproduced exactly as they appeared originally in IAA and STAR, including the original accession numbers from the respective announcement journals. Topics cover the management of research and development contracts, production, logistics, personnel, safety, reliability and quality control citations. Includes references on: program, project and systems management; management policy, philosophy, tools, and techniques; decisionmaking processes for managers; technology assessment; management of urban problems; and information for managers on Federal resources, expenditures, financing, and budgeting.
Distance management of inflammatory bowel disease: Systematic review and meta-analysis
Huang, Vivian W; Reich, Krista M; Fedorak, Richard N
2014-01-01
AIM: To review the effectiveness of distance management methods in the management of adult inflammatory bowel disease (IBD) patients. METHODS: A systematic review and meta-analysis of randomized controlled trials comparing distance management and standard clinic follow-up in the management of adult IBD patients. Distance management intervention was defined as any remote management method in which there is a patient self-management component whereby the patient interacts remotely via a self-guided management program, electronic interface, or self-directs open access to clinic follow up. The search strategy included electronic databases (Medline, PubMed, CINAHL, The Cochrane Central Register of Controlled Trials, EMBASE, KTPlus, Web of Science, and SCOPUS), conference proceedings, and internet search for web publications. The primary outcome was the mean difference in quality of life, and the secondary outcomes included mean difference in relapse rate, clinic visit rate, and hospital admission rate. Study selection, data extraction, and risk of bias assessment were completed by two independent reviewers. RESULTS: The search strategy identified a total of 4061 articles, but only 6 randomized controlled trials met the inclusion and exclusion criteria for the systematic review and meta-analysis. Three trials involved telemanagement, and three trials involved directed patient self-management and open access clinics. The total sample size was 1463 patients. There was a trend towards improved quality of life in distance management patients with an end IBDQ quality of life score being 7.28 (95%CI: -3.25-17.81) points higher than standard clinic follow-up. There was a significant decrease in the clinic visit rate among distance management patients mean difference -1.08 (95%CI: -1.60--0.55), but no significant change in relapse rate or hospital admission rate. CONCLUSION: Distance management of IBD significantly decreases clinic visit utilization, but does not significantly affect relapse rates or hospital admission rates. PMID:24574756
Safety evaluation of access management policies and techniques, TechBrief
DOT National Transportation Integrated Search
2015-08-01
Access management is the process that provides (or manages) access to land development while simultaneously preserving the flow of traffic on the surrounding road network for safety, capacity, and speed. Access management provides important benefits ...
Project management; considerations for success.
Maas, Jos
2013-01-01
During the past two years the author was a project leader for three Information Communication Technology (ICT) security related systems projects for a newly built healthcare facility. These projects were: a CCTV system, an Access Control system and an Identity & Access Management system. During those two years he gained experiences on how to coop with ICT projects related to security and healthcare as well as some pitfalls to be contended with along the way. With this article, he shares his experiences so that colleagues can benefit from them when they are a project leaders for their health facility and need to better decide how or how not to address their project and project issues.
34 CFR 691.16 - Rigorous secondary school program of study.
Code of Federal Regulations, 2010 CFR
2010-07-01
... MATHEMATICS ACCESS TO RETAIN TALENT GRANT (NATIONAL SMART GRANT) PROGRAMS Application Procedures § 691.16..., 2009. (Approved by the Office of Management and Budget under control number 1845-0078] (Authority: 20 U...
DOD Information Technology Standard Guidance (ITSG) Version 3.1
1997-04-07
from NGSBs later (e.g., OSFs Motif specification became the basis for IEEE 1295 . 1). Most consortia specifications are available now, do not overlap...Illumination) CIM Center for Information Management (DISA) CINC Conumnder in Chief CIS CASE Integration Services CJCS Chairman of the Joint Chiefs of...Compound Text Encoding CUA Common User Access DAC Discretionary Access Controls DAD Draft Addendum (ISO) DAM Draft Amendment (ISO) DAP Document
Health information security: a case study of three selected medical centers in iran.
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-03-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.
Management of infection control in dental practice.
Smith, A; Creanor, S; Hurrell, D; Bagg, J; McCowan, M
2009-04-01
This was an observational study in which the management policies and procedures associated with infection control and instrument decontamination were examined in 179 dental surgeries by a team of trained surveyors. Information relating to the management of a wide range of infection control procedures, in particular the decontamination of dental instruments, was collected by interview and by examination of practice documentation. This study found that although the majority of surgeries (70%) claimed to have a management policy on infection control, only 50% of these were documented. For infection control policies, 79% of surgeries had access to the British Dental Association Advice Sheet A12. Infection control policies were claimed to be present in 89% of surgeries, of which 62% were documented. Seventy-seven per cent of staff claimed to have received specific infection control training, but for instrument decontamination this was provided mainly by demonstration (97%) or observed practice (88%). Many dental nurses (74%) and dental practitioners (57%) did not recognise the symbol used to designate a single-use device. Audit of infection control or decontamination activities was undertaken in 11% of surgeries. The majority of surgeries have policies and procedures for the management of infection control in dental practice, but in many instances these are not documented. The training of staff in infection control and its documentation is poorly managed and consideration should be given to development of quality management systems for use in dental practice.
van der Meer, Victor; van Stel, Henk F; Detmar, Symone B; Otten, Wilma; Sterk, Peter J; Sont, Jacob K
2007-07-01
Internet and short message service are emerging tools for chronic disease management in adolescents, but few data exist on the barriers to and benefits of internet-based asthma self-management. Our objective was to reveal the barriers and benefits perceived by adolescents with well-controlled and poorly controlled asthma to current and internet-based asthma management. Ninety-seven adolescents with mild-to-moderate persistent asthma monitored their asthma control on a designated Web site. After 4 weeks, 35 adolescents participated in eight focus groups. Participants were stratified in terms of age, gender, and asthma control level. We used qualitative and quantitative methods to analyze the written focus group transcripts. Limited self-efficacy to control asthma was a significant barrier to current asthma management in adolescents with poor asthma control (65%) compared to adolescents with good asthma control (17%; p < 0.01). The former group revealed the following several benefits from internet-based asthma self-management: feasible electronic monitoring; easily accessible information; e-mail communication; and use of an electronic action plan. Personal benefits included the ability to react to change and to optimize asthma control. Patients with poor asthma control were able and ready to incorporate internet-based asthma self-management for a long period of time (65%), whereas patients with good control were not (11%; p < 0.01). Our findings reveal a need for the support of self-management in adolescents with poorly controlled asthma that can be met by the application of novel information and communication technologies. Internet-based self-management should therefore target adolescents with poor asthma control.
Mobula, Linda Meta; Sarfo, Stephen; Arthur, Lynda; Burnham, Gilbert; Plange-Rhule, Jacob; Ansong, Daniel; Gavor, Edith; Ofori-Adjei, David
2018-02-07
Background: There is evidence to suggest that the prevalence of non-communicable diseases (NCDs), in particular cardiovascular diseases and diabetes, are being recognized as forming a substantial proportion of the burden of disease among populations in Low- and Middle-Income Countries (LMICs). Access to treatment is likely a key barrier to the control and prevention of NCD outcomes. Differential pricing, an approach used to price drugs based on the purchasing power of patients in different socioeconomic segments, has been shown to be beneficial and leads to improved access and affordability. Methods: This is a quasi-experimental study, with a pragmatic trial design, to be conducted over the course of three years. A mixed methods design will be used to evaluate the effects of health systems strengthening and differential pricing on the management of diabetes, hypertension and selected cancers in Ghana. A public private partnership was established between all sites that will receive multi-level interventions, including health systems strengthening and access to medicines interventions. Study populations and sites: Study participants will include individuals with new or recently diagnosed hypertension and diabetes (n=3,300), who present to two major referral hospitals, Komfo Anokye Teaching Hospital and Tamale Teaching Hospital, as well as three district hospitals, namely Kings Medical Centre, Agogo Presbyterian District Hospital, and Atua Government Hospital. Discussion: The objective of this study aims to test approaches intended to improve access to drugs for the treatment of hypertension and diabetes, and improve disease control. Patients with these conditions will benefit from health systems strengthening interventions (education, counseling, improved management of disease), and increased access to innovative medicines via differential pricing. Pilot programs also will facilitate health system strengthening at the participating institutions, which includes training of clinicians and updating of guidelines and production of protocols for the treatment of diabetes, hypertension and cancer.
Mauch, Verena; Weil, Diana; Munim, Aayid; Boillot, Francois; Coninx, Rudi; Huseynova, Sevil; Powell, Clydette; Seita, Akihiro; Wembanyama, Henriette; van den Hof, Susan
2010-07-01
Health care delivery is particularly problematic in fragile states often connected with increased incidence of communicable diseases, among them tuberculosis. This article draws upon experiences in tuberculosis control in four fragile states from which four lessons learned were derived. A structured inventory to extract common themes specific for TB control in fragile states was conducted among twelve providers of technical assistance who have worked in fragile states. The themes were applied to the TB control programs of Afghanistan, DR Congo, Haiti and Somalia during the years 2000-2006. Case notifications and treatment outcomes have increased in all four countries since 2003 (treatment success rates 81-90%). Access to care and case detection however have remained insufficient (case detection rates 39-62%); There are four lessons learned: 1. TB control programs can function in fragile states. 2. National program leadership and stewardship are essential for quality and sustained TB control. 3. Partnerships with non-governmental providers are vital for continuous service delivery; 4. TB control programs in fragile states require consistent donor support. Despite challenges in management, coordination, security, logistics and funding, TB control programs can function in fragile states, but face considerable problems in access to diagnosis and treatment and therefore case detection. Copyright (c) 2010 Elsevier Ireland Ltd. All rights reserved.
Managing EEE part standardisation and procurement
NASA Astrophysics Data System (ADS)
Serieys, C.; Bensoussan, A.; Petitmangin, A.; Rigaud, M.; Barbaresco, P.; Lyan, C.
2002-12-01
This paper presents the development activities in space components selection and procurement dealing with a new data base tool implemented at Alcatel Space using TransForm softwaa re configurator developed by Techform S.A. Based on TransForm, Access Ingenierie has devv eloped a software product named OLG@DOS which facilitate the part nomenclatures analyses for new equipment design and manufacturing in term of ACCESS data base implementation. Hi-Rel EEE part type technical, production and quality information are collected and compiled usingproduction data base issued from production tools implemented for equipment definition, description and production based on Manufacturing Resource Planning (MRP II Control Open) and Parametric Design Manager (PDM Work Manager). The analysis of any new equipment nomenclature may be conducted through this means for standardisation purpose, cost containment program and management procurement activities as well as preparation of Component reviews as Part Approval Document and Declared Part List validation.
Buscemi, Joanna; Hawkins, Misty A. W.; Wang, Monica L.; Breland, Jessica Y.; Ross, Kathryn M.; Kommu, Anupama
2018-01-01
Obesity is a prevalent health care issue associated with disability, premature morality, and high costs. Behavioral weight management interventions lead to clinically significant weight losses in overweight and obese individuals; however, many individuals are not able to participate in these face-to-face treatments due to limited access, cost, and/or time constraints. Technological advances such as widespread access to the Internet, increased use of smartphones, and newer behavioral self-monitoring tools have resulted in the development of a variety of eHealth weight management programs. In the present paper, a summary of the most current literature is provided along with potential solutions to methodological challenges (e.g., high attrition, minimal participant racial/ethnic diversity, heterogeneity of technology delivery modes). Dissemination and policy implications will be highlighted as future directions for the field of eHealth weight management. PMID:27783259
The Global Opioid Policy Initiative: a wealth of information, but what is next?
Scholten, Willem
2014-03-01
Recently, the outcomes were published of the Global Opioid Policy Initiative, evaluating the availability, cost of opioid medicines and the regulatory barriers that are possibly impeding access for the management of cancer pain in developing countries. Other studies have shown that the vast majority of the world population has no access to opioid analgesics. This study shows by country which opioid medicines are available, what they cost to the patient, and investigates the presence of barriers for access to these medicines. Data from the project will be an important resource for those who advocate for improved access to opioid analgesics. Yet, like so often, many more aspects of inadequate opioid analgesic consumption require exploration and reporting, including legislative barriers. The last publication on the project is a "What's next?" that is over focusing on palliative care, forgetting that outside palliative care is also a huge need for opioid analgesics in moderate and severe pain. While promoting access to palliative care and pain management, their recognition as a human right by UN bodies would be of great help. Moreover, WHO's Access to Controlled Medicines Programme, could be an important programme to support the countries in making these improvements.
Green, Beverly B; Ralston, James D; Fishman, Paul A; Catz, Sheryl L; Cook, Andrea; Carlson, Jim; Tyll, Lynda; Carrell, David; Thompson, Robert S
2008-05-01
Randomized controlled trials have provided unequivocal evidence that treatment of hypertension decreases mortality and major disability from cardiovascular disease; however, blood pressure remains inadequately treated in most affected individuals. This large gap continues despite the facts that more than 90% of adults with hypertension have health insurance, and hypertension is the leading cause of visits to the doctor. New approaches are needed to improve hypertension care. The Electronic Communications and Home Blood Pressure Monitoring (e-BP) study is a three-arm randomized controlled trial designed to determine whether care based on the Chronic Care Model and delivered over the Internet improves hypertension care. The primary study outcomes are systolic, diastolic, and blood pressure control; secondary outcomes are medication adherence, patient self-efficacy, satisfaction and quality of life, and healthcare utilization and costs. Hypertensive patients receiving care at Group Health medical centers are eligible if they have uncontrolled blood pressure on two screening visits and access to the Web and an e-mail address. Study participants are randomly assigned to three intervention groups: (a) usual care; (b) home blood pressure monitoring receipt and proficiency training on its use and the Group Health secure patient website (with secure e-mail access to their healthcare provider, access to a shared medical record, prescription refill and other services); or (c) this plus pharmacist care management (collaborative care management between the patient, the pharmacist, and the patient's physician via a secure patient website and the electronic medical record). We will determine whether a new model of patient-centered care that leverages Web communications, self-monitoring, and collaborative care management improves hypertension control. If this model proves successful and cost-effective, similar interventions could be used to improve the care of large numbers of patients with uncontrolled hypertension.
Wee, Liang En; Wong, Jolene; Chin, Run Ting; Lin, Zhi Yong; Goh, Daniel E Q; Vijakumar, Kalpana; Vong, Kiat Yee; Tay, Wei Ling; Lim, Hui Ting; Koh, Gerald C H
2013-09-01
This study investigated the effect of an access-enhanced intervention on hypertension screening and management, as well as on health behaviours among newly diagnosed hypertensives, in a multi-ethnic low socioeconomic status (SES) community. Factors associated with hypertension screening, treatment, and control in the community were also determined. The study involved all residents aged ≥40 years in 2 public rental housing precincts (low SES), between 2009 and 2011, who were followed-up prospectively for 1 year after a 6-month community-based intervention comprising a 3-month access-enhanced screening component and a 3-month follow-up (outreach) component. Blood pressure was measured at baseline and follow-up. Multivariate Cox regression determined predictors of hypertension management at follow-up. The follow-up rate was 80.9% (467/577). At baseline, 60.4% (282/467) were hypertensive; 53.5% (151/282) were untreated; 54.2% (71/131) uncontrolled. One year later, postintervention, 51.6% (78/151) of untreated hypertensives were treated; combined with treated hypertensives previously uncontrolled, 53.0% (79/149) achieved control. Older age independently predicted treatment (adjusted relative risk, aRR = 1.98, CI, 1.08 to 3.65); majority ethnicity (aRR = 1.76, CI, 1.05 to 2.96), employment (aRR = 1.85, CI, 1.26 to 2.80) and newly treated hypertension (aRR=1.52, CI, 1.01 to 2.32) predicted control. A total of 52.4% (97/185) were irregularly screened at baseline; at follow-up 61.9% (60/97) were regularly screened. Cost and misperceptions were common barriers to screening and treatment. Newly diagnosed hypertensives were also less likely to go for additional cardiovascular screening (aRR = 0.54, CI, 0.29 to 0.99). An access-enhanced intervention had some success in improving hypertension management within low SES communities; however, it was less successful in improving cardiovascular risk management, especially in encouraging lifestyle changes and additional cardiovascular screening amongst newly diagnosed hypertensives.
Moving Toward Real Time Data Handling: Data Management at the IRIS DMC
NASA Astrophysics Data System (ADS)
Ahern, T. K.; Benson, R. B.
2001-12-01
The IRIS Data Management Center at the University of Washington has become a major archive and distribution center for a wide variety of seismological data. With a mass storage system with a 360-terabyte capacity, the center is well positioned to manage the data flow, both inbound and outbound, from all anticipated seismic sources for the foreseeable future. As data flow in and out of the IRIS DMC at an increasing rate, new methods to deal with data using purely automated techniques are being developed. The on-line and self-service data repositories of SPYDERr and FARM are collections of seismograms for all larger events. The WWW tool WILBER and the client application WEED are examples of tools that provide convenient access to the 1/2 terabyte of SPYDERr and FARM data. The Buffer of Uniform Data (BUD) system provides access to continuous data available in real time from GSN, FDSN, US regional networks, and other globally distributed stations. Continuous data that have received quality control are always available from the archive of continuous data. This presentation will review current and future data access techniques supported at IRIS. One of the most difficult tasks at the DMC is the management of the metadata that describes all the stations, sensors, and data holdings. Demonstrations of tools that provide access to the metadata will be presented. This presentation will focus on the new techniques of data management now being developed at the IRIS DMC. We believe that these techniques are generally applicable to other types of geophysical data management as well.
Wilson, Charlotte; Alam, Rahul; Latif, Saima; Knighting, Katherine; Williamson, Susan; Beaver, Kinta
2012-01-01
A higher risk of diabetes mellitus in South Asian and Black African populations combined with lower reported access and self-management-related health outcomes informed the aims of this study. Our aims were to synthesise and evaluate evidence relating to patient self-management and access to healthcare services for ethnic minority groups living with diabetes. A comprehensive search strategy was developed capturing a full range of study types from 1995-2010, including relevant hand-searched literature pre-dating 1995. Systematic database searches of MEDLINE, Cochrane, DARE, HTA and NHSEED, the British Nursing Index, CAB abstracts, EMBASE, Global Health, Health Management Information Consortium and PsychInfo were conducted, yielding 21,288 abstracts. Following search strategy refinement and the application of review eligibility criteria; 11 randomised controlled trials (RCTs), 18 qualitative studies and 18 quantitative studies were evaluated and principal results extracted. Results suggest that self-management practices are in need of targeted intervention in terms of patients' knowledge and understanding of their illness, inadequacy of information and language and communication difficulties arising from cultural differences. Access to health-care is similarly hindered by a lack of cultural sensitivity in service provision and under use of clinic-based interpreters and community-based services. Recommendations for practice and subsequent intervention primarily rest at the service level but key barriers at patient and provider levels are also identified. © 2011 Blackwell Publishing Ltd.
Pinnacle: The Army’s Effort to Reform Its Accession Process
2011-02-24
Philip Kotler emphasizes the importance of market conditions on organization design and strategy. According to Kotler , “Companies need to give the...Leadership, interview by author, December 6, 2010. 68 Philip Kotler , Marketing Management: Analysis, Planning, Implementation and Control...2010. 75 U.S. Army Recruiting Command, Pinnacle Army Research Consortium, September 1, 2009. 76 Philip Kotler , Marketing Management: Analysis
An Audit of Diabetes Control and Management (ADCM).
Mastura, I; Zanariah, H; Fatanah, I; Feisul Idzwan, M; Wan Shaariah, M Y; Jamaiyah, H; Geeta, A
2008-09-01
Diabetes is a chronic condition that is one of the major causes of illness, disability, and death in Malaysia. Cost in managing diabetes plus indirect cost of lost work, pain, and suffering have all increased. The optimal management of patients with diabetes require the tracking of patients over time to monitor the progression of the disease, compliance with treatment, and preventive care. Diabetes care can be improved by standardizing access to, and improving the use of, clinical information. Access to timely, accurate and well-organized electronic data will improve the quality of care for patients with diabetes. Clinical Research Center convened an expert workshop to forecast how physicians, hospitals and clinics will employ clinical information technology (IT) applications to diabetes care over the next year. Workshop participants included experts from research organizations, government, and the IT vendor. This is a summary of the workshop organised for the purpose of the Audit of Diabetes Control and Management (ADCM) project. We hope to identify the gaps, if any, that exists in delivering diabetes care and to improve the quality of care. In future, we hope to develop an expansion of this project for the Adult Diabetes Registry that will be implemented for the whole country.
NASA Technical Reports Server (NTRS)
Whalen, Edward A.
2016-01-01
This document serves as the final report for the Flight Services and Aircraft Access task order NNL14AA57T as part of NASA Environmentally Responsible Aviation (ERA) Project ITD12A+. It includes descriptions of flight test preparations and execution for the Active Flow Control (AFC) Vertical Tail and Insect Accretion and Mitigation (IAM) experiments conducted on the 757 ecoDemonstrator. For the AFC Vertical Tail, this is the culmination of efforts under two task orders. The task order was managed by Boeing Research & Technology and executed by an enterprise-wide Boeing team that included Boeing Research & Technology, Boeing Commercial Airplanes, Boeing Defense and Space and Boeing Test and Evaluation. Boeing BR&T in St. Louis was responsible for overall Boeing project management and coordination with NASA. The 757 flight test asset was provided and managed by the BCA ecoDemonstrator Program, in partnership with Stifel Aircraft Leasing and the TUI Group. With this report, all of the required deliverables related to management of this task order have been met and delivered to NASA as summarized in Table 1. In addition, this task order is part of a broader collaboration between NASA and Boeing.
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
Research on a dynamic workflow access control model
NASA Astrophysics Data System (ADS)
Liu, Yiliang; Deng, Jinxia
2007-12-01
In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.
Centralized Accounting and Electronic Filing Provides Efficient Receivables Collection.
ERIC Educational Resources Information Center
School Business Affairs, 1983
1983-01-01
An electronic filing system makes financial control manageable at Bowling Green State University, Ohio. The system enables quick access to computer-stored consolidated account data and microfilm images of charges, statements, and other billing documents. (MLF)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, T.
SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, Tony
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
SPI/U3.2. Security Profile Inspector for UNIX Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, A.
1994-08-01
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment
Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel
2008-01-01
Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979
Meigs, James B; Cagliero, Enrico; Dubey, Anil; Murphy-Sheehy, Patricia; Gildesgame, Catharyn; Chueh, Henry; Barry, Michael J; Singer, Daniel E; Nathan, David M
2003-03-01
To test effects of a web-based decision support tool, the diabetes Disease Management Application (DMA), developed to improve evidence-based management of type 2 diabetes. We conducted a group randomized controlled trial of 12 intervention and 14 control staff providers and 307 intervention and 291 control patients with type 2 diabetes in a hospital-based internal medicine clinic. Providers were randomly assigned from May 1998 through April 1999 to have access to the DMA (intervention) or not to have access (control). The DMA displays interactive patient-specific clinical data, treatment advice, and links to other web-based care resources. We compared patients in the intervention and control groups for changes in processes and outcomes of care from the year preceding the study through the year of the study by intention-to-treat analysis. The DMA was used for 42% of scheduled patient visits. The number of HbA(1c) tests obtained per year increased significantly in the intervention group (+0.3 tests/year) compared with the control group (-0.04 tests/year, P = 0.008), as did the number of LDL cholesterol tests (intervention, +0.2 tests/year; control, +0.01 tests/year; P = 0.02) and the proportions of patients undergoing at least one foot examination per year (intervention, +9.8%; control, -0.7%; P = 0.003). Levels of HbA(1c) decreased by 0.2 in the intervention group and increased by 0.1 in the control group (P = 0.09); proportions of patients with LDL cholesterol levels <130 mg/dl increased by 20.3% in the intervention group and 10.5% in the control group (P = 0.5). Web-based patient-specific decision support has the potential to improve evidence-based parameters of diabetes care.
Utz, Bettina; Assarag, Bouchra; Essolbi, Amina; Barkat, Amina; El Ansari, Nawal; Fakhir, Bouchra; Delamou, Alexandre; De Brouwere, Vincent
2017-06-19
Morocco is facing a growing prevalence of diabetes and according to latest figures of the World Health Organization, already 12.4% of the population are affected. A similar prevalence has been reported for gestational diabetes (GDM) and although it is not yet high on the national agenda, immediate and long-term complications threaten the health of mothers and future generations. A situational analysis on GDM conducted in 2015 revealed difficulties in access to screening and delays in receiving appropriate care. This implementation study has as objective to evaluate a decentralized GDM detection and management approach through the primary level of care and assess its potential for scaling up. We will conduct a hybrid effectiveness-implementation research using a cluster randomized controlled trial design in two districts of Morocco. Using the health center as unit of randomization we randomly selected 20 health centers with 10 serving as intervention and 10 as control facilities. In the intervention arm, providers will screen pregnant women attending antenatal care for GDM by capillary glucose testing during antenatal care. Women tested positive will receive nutritional counselling and will be followed up through the health center. In the control facilities, screening and initial management of GDM will follow standard practice. Primary outcome will be birthweight with weight gain during pregnancy, average glucose levels and pregnancy outcomes including mode of delivery, presence or absence of obstetric or newborn complications and the prevalence of GDM at health center level as secondary outcomes. Furthermore we will assess the quality of life /care experienced by the women in both arms. Qualitative methods will be applied to evaluate the feasibility of the intervention at primary level and its adoption by the health care providers. In Morocco, gestational diabetes screening and its initial management is fragmented and coupled with difficulties in access and treatment delays. Implementation of a strategy that enables detection, management and follow-up of affected women at primary health care level is expected to positively impact on access to care and medical outcomes. The trial has been registered on clininicaltrials.gov ; identifier NCT02979756 ; retrospectively registered 22 November 2016.
Product Definition Data Interface (PDDI) Product Specification
1991-07-01
syntax of the language gives a precise specification of the data without interpretation of it. M - Constituent Read Block. CSECT - Control Section, the...to conform to the PDDI Access Software’s internal data representation so that it may be further processed. JCL - Job Control Language - IBM language...software development and life cycle * phases. OUALITY CONTROL - The planned and systematic application of all actions (management/technical) necessary to
Managing healthcare information using short message service (SMS) in wireless broadband networks
NASA Astrophysics Data System (ADS)
Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.
2007-03-01
Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.
Using Causal Models to Manage the Cyber Threat to C2 Agility: Working with the Benefit of Hindsight
2014-06-01
comprising event types that begin with access to the Ground Control Station network (‘Reconnaissance’), carry out persona management activities leading to...occurring. Figure 9 shows a chain where ‘GCS Hostile Persona Management’ has been detected, leading to a heightened assessment of the probability of...evidence occurs of hostile persona management that calls into question the integrity of the mission itself. What now: search for a mitigation, assess
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hutchinson, Ken
2004-01-26
Vegetation Management for the Ashe-Hanford (tower 13/1 to 15/2) and Scooteney Tap (tower 2/1+1200 to 4/1+50) line corridor. The Ashe-Hanford line is a 500 kV single circuit transmission line having an easement width of 350 feet. The Scooteney Tap line is a 230 kV single circuit line having an easement width of 262.5 feet on the Department of Energy’s Hanford Nuclear Reservation (Reservation) and an easement width of 100 feet on private lands. The proposed work will be accomplished in the indicated sections of the transmission lines as referenced on the attached checklist. The work will include the performance ofmore » tower pad maintenance and access road maintenance in the referenced areas. Maintenance will include the control of all brush species within 30 feet of transmission structures and controlling all vegetation, except grass along the access roads to provide a 14-foot width for travel. Noxious weed management will also occur on the rights-of- way where needed.« less
50 CFR 660.383 - Open access fishery management measures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery management measures... West Coast Groundfish Fisheries § 660.383 Open access fishery management measures. (a) General. Groundfish species taken in open access fisheries will be managed with cumulative trip limits (see trip...
NASA Astrophysics Data System (ADS)
Kershaw, P.
2016-12-01
CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective integration with services and resources which they must protect. Effective policy and governance structures are needed for ongoing operations Federated identity infrastructures often exist only at the national level making it difficult for international research collaborations to exploit them.
Universal Payload Information Management
NASA Technical Reports Server (NTRS)
Elmore, Ralph B.
2003-01-01
As the overall manager and integrator of International Space Station (ISS) science payloads, the Payload Operations Integration Center (POIC) at Marshall Space Flight Center has a critical need to provide an information management system for exchange and control of ISS payload files as well as to coordinate ISS payload related operational changes. The POIC's information management system has a fundamental requirement to provide secure operational access not only to users physically located at the POIC, but also to remote experimenters and International Partners physically located in different parts of the world. The Payload Information Management System (PIMS) is a ground-based electronic document configuration management and collaborative workflow system that was built to service the POIC's information management needs. This paper discusses the application components that comprise the PIMS system, the challenges that influenced its design and architecture, and the selected technologies it employs. This paper will also touch on the advantages of the architecture, details of the user interface, and lessons learned along the way to a successful deployment. With PIMS, a sophisticated software solution has been built that is not only universally accessible for POIC customer s information management needs, but also universally adaptable in implementation and application as a generalized information management system.
A Public-Health-Based Vision for the Management and Regulation of Psychedelics.
Haden, Mark; Emerson, Brian; Tupper, Kenneth W
2016-01-01
The Health Officers Council of British Columbia has proposed post-prohibition regulatory models for currently illegal drugs based on public health principles, and this article continues this work by proposing a model for the regulation and management of psychedelics. This article outlines recent research on psychedelic substances and the key determinants of benefit and harm from their use. It then describes a public-health-based model for the regulation of psychedelics, which includes governance, supervision, set and setting controls, youth access, supply control, demand limitation, and evaluation.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-09
... design Subscriber Entitlement Controls to produce an audit report and make each audit report available to... manages its own non-display infrastructure and controls the access to and permissioning of the market data... proposed non-display fees); (3) the rationale for creating a new non- display usage fee structure; (4) the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-21
... access programmers an alternative substantially equivalent to that offered to comparable non-leased... currently valid control number. No person shall be subject to any penalty for failing to comply with a collection of information subject to the PRA that does not display a valid control number. Comments are...
Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope
2011-01-01
Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded without delay. PMID:22180793
Land Development and Subdivision Regulations that Support Access Management
DOT National Transportation Integrated Search
1993-01-01
This report examines the role of the comprehensive plan in developing an access : management program, aspects of current regulatory practice that contribute to : access problems, and regulatory techniques that support access management : principles. ...
Access Control Is More than Security.
ERIC Educational Resources Information Center
Fickes, Michael
2002-01-01
Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)
Efficient accesses of data structures using processing near memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jayasena, Nuwan S.; Zhang, Dong Ping; Diez, Paula Aguilera
Systems, apparatuses, and methods for implementing efficient queues and other data structures. A queue may be shared among multiple processors and/or threads without using explicit software atomic instructions to coordinate access to the queue. System software may allocate an atomic queue and corresponding queue metadata in system memory and return, to the requesting thread, a handle referencing the queue metadata. Any number of threads may utilize the handle for accessing the atomic queue. The logic for ensuring the atomicity of accesses to the atomic queue may reside in a management unit in the memory controller coupled to the memory wheremore » the atomic queue is allocated.« less
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.
Eom, Jieun; Lee, Dong Hoon; Lee, Kwangsu
2016-12-01
In recent years, many countries have been trying to integrate electronic health data managed by each hospital to offer more efficient healthcare services. Since health data contain sensitive information of patients, there have been much research that present privacy preserving mechanisms. However, existing studies either require a patient to perform various steps to secure the data or restrict the patient to exerting control over the data. In this paper, we propose patient-controlled attribute-based encryption, which enables a patient (a data owner) to control access to the health data and reduces the operational burden for the patient, simultaneously. With our method, the patient has powerful control capability of his/her own health data in that he/she has the final say on the access with time limitation. In addition, our scheme provides emergency medical services which allow the emergency staffs to access the health data without the patient's permission only in the case of emergencies. We prove that our scheme is secure under cryptographic assumptions and analyze its efficiency from the patient's perspective.
CrossTalk. The Journal of Defense Software Engineering. Volume 26, Number 5
2013-10-01
to a backend domain managed by the cyber criminal. Mobile bots can perform piggybacking on legitimate applications and steal data by controlling...technology infrastructure for managing identities, interfaces (web and/or mobile ), and agreements with service providers. The necessary capabilities and...platforms of unknown or dubious origin, global access by mobile (and largely insecure) devices, eroded trust boundaries, and the possibility of malevolent
Quantification of the benefits of access management for Kentucky : final report.
DOT National Transportation Integrated Search
2006-07-01
This report describes the benefits quantification performed for the proposed access management plan for Kentucky. This study evaluates the capacity, safety and economic impacts associated with access management programs. The proposed Kentucky access ...
Impact of access management practices to pedestrian safety.
DOT National Transportation Integrated Search
2017-03-31
This study focused on the impact of access management practices to the safety of pedestrians. Some : of the access management practices considered to impact pedestrian safety included limiting direct : access to and from major streets, locating signa...
Sari, Nazmi; Osman, Meric
2015-08-17
Adherence to medication is one of the critical determinants of successful management of chronic diseases including asthma and chronic obstructive pulmonary disease (COPD). Given that poor adherence with self-management medication is very common among asthma and COPD patients, interventions that improve the use of chronic disease management medications for this patient group have potential to generate positive health outcomes. In an effort to improve asthma and COPD care, the Lung Association of Saskatchewan has implemented an intervention by providing access to effective and high quality asthma and COPD education for both patients and health care professionals along with increasing access to spirometry. By evaluating the impacts of this intervention, our purpose in this paper is to examine the effectiveness of spirometry use, and asthma and COPD education in primary care setting on medication use among asthma and COPD patients. At the time of the intervention, the Lung Association of Saskatchewan has not assigned a control group. Therefore we used a propensity score matching to create a control group using administrative health databases spanning 6 years prior to the intervention. Using Saskatchewan administrative health databases, the impacts of the intervention on use of asthma and COPD medications were estimated for one to four years after the intervention using a difference in difference regression approach. The paper shows that overall medication use for the intervention group is higher than that of the control group. On average, intervention group uses more asthma and COPD drugs. Within the asthma and COPD drugs, this intervention creates a persistent effect over time in the form of higher utilization of chronic management drugs equivalent to $157 and $195 in a given year during four years after the intervention. The study suggests that effective patient education and increasing access to spirometry increases the utilization of chronic disease management drugs among asthma and COPD patients. This type of interventions with patient education focus has potential to save healthcare dollars by providing better disease management among this patient group.
Poston, Walker S. C.; Suminski, Richard R.; Hoffman, Kevin M.; Jitnarin, Nattinee; Hughey, Joseph; Lando, Harry A.; Winsby, Amelia; Haddock, Keith
2011-01-01
Despite progress in policy changes, tobacco use rates are still high in the military. Little is known about the views of those who create and implement tobacco control policies within the Department of Defense. These individuals determine what policy initiatives will be developed, prioritized, and implemented. We conducted key informant interviews with 16 service-level policy leaders (PLs) and 36 installation-level tobacco control managers (TCMs). PLs and TCMs believed that line leadership view tobacco control as a low priority that has minimal impact on successful mission completion. They also identified cultural factors that perpetuate tobacco use, such as low cost and easy accessibility to tobacco, smoke breaks, and uneven or unknown enforcement of current tobacco policies. PMID:20968274
Parenthood as a Terror Management Mechanism: The Moderating Role of Attachment Orientations.
Yaakobi, Erez; Mikulincer, Mario; Shaver, Phillip R
2014-06-01
Six studies examined the hypothesis that parenthood serves a terror management function, with effects that are moderated by attachment orientations. In Studies 1 and 2, mortality salience, as compared with control conditions, increased the self-reported vividness and implicit accessibility of parenthood-related cognitions. In Studies 3 and 4, activating parenthood-related thoughts reduced death-thought accessibility and romantic intimacy following mortality salience. In Study 5, heightening the salience of parenthood-related obstacles increased death-thought accessibility. Across the five studies, the effects were significant mainly among participants who scored relatively low on avoidant attachment. In Study 6, avoidant people also reacted to mortality salience with more positive parenthood-related cognitions following an experimental manipulation that made parenthood compatible with their core strivings. Overall, the findings suggest that parenthood can have an anxiety-buffering effect that is moderated by attachment-related avoidance. © 2014 by the Society for Personality and Social Psychology, Inc.
General view of the middeck looking aft and port. In ...
General view of the mid-deck looking aft and port. In this view you can clearly see the crew access hatch and the airlock hatch. The hose and ladder in the image are pieces of ground support equipment. The hose is part of the climate control apparatus used while orbiters are being processed. The ladder is used to access the inter-deck passage, leading to the flight deck, while the orbiter is in 1g (earth's gravity). A careful observer will notice a void in the wall near the base of the access ladder, this is the Waste Management Compartment with the Waste Management System, i.e. Space Potty, removed. This view was taken in the Orbiter Processing Facility at the Kennedy Space Center. - Space Transportation System, Orbiter Discovery (OV-103), Lyndon B. Johnson Space Center, 2101 NASA Parkway, Houston, Harris County, TX
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
Galdas, Paul; Darwin, Zoe; Kidd, Lisa; Blickem, Christian; McPherson, Kerri; Hunt, Kate; Bower, Peter; Gilbody, Simon; Richardson, Gerry
2014-11-27
Self-management support interventions can improve health outcomes, but their impact is limited by the numbers of people able or willing to access them. Men's attendance at existing self-management support services appears suboptimal despite their increased risk of developing many of the most serious long term conditions. The aim of this review was to determine whether current self-management support interventions are acceptable and accessible to men with long term conditions, and explore what may act as facilitators and barriers to access of interventions and support activities. A systematic search for qualitative research was undertaken on CINAHL, EMBASE, MEDLINE, PsycINFO and Social Science Citation Index, in July 2013. Reference lists of relevant articles were also examined. Studies that used a qualitative design to explore men's experiences of, or perceptions towards, self-management support for one or more long term condition were included. Studies which focused on experiences of living with a long term condition without consideration of self-management support were excluded. Thirty-eight studies met the inclusion criteria. A meta-ethnography approach was employed to synthesise the findings. Four constructs associated with men's experience of, and perceptions towards, self-management support were identified: 1) need for purpose; 2) trusted environments; 3) value of peers; and 4) becoming an expert. The synthesis showed that men may feel less comfortable participating in self-management support if it is viewed as incongruous with valued aspects of their identity, particularly when activities are perceived to challenge masculine ideals associated with independence, stoicism, and control. Men may find self-management support more attractive when it is perceived as action-oriented, having a clear purpose, and offering personally meaningful information and practical strategies that can be integrated into daily life. Self-management support is most likely to be successful in engaging men when it is congruent with key aspects of their masculine identity. In order to overcome barriers to access and fully engage with interventions, some men may need self-management support interventions to be delivered in an environment that offers a sense of shared understanding, connectedness, and normality, and involves and/or is facilitated by men with a shared illness experience.
Robust Informatics Infrastructure Required For ICME: Combining Virtual and Experimental Data
NASA Technical Reports Server (NTRS)
Arnold, Steven M.; Holland, Frederic A. Jr.; Bednarcyk, Brett A.
2014-01-01
With the increased emphasis on reducing the cost and time to market of new materials, the need for robust automated materials information management system(s) enabling sophisticated data mining tools is increasing, as evidenced by the emphasis on Integrated Computational Materials Engineering (ICME) and the recent establishment of the Materials Genome Initiative (MGI). This need is also fueled by the demands for higher efficiency in material testing; consistency, quality and traceability of data; product design; engineering analysis; as well as control of access to proprietary or sensitive information. Further, the use of increasingly sophisticated nonlinear, anisotropic and or multi-scale models requires both the processing of large volumes of test data and complex materials data necessary to establish processing-microstructure-property-performance relationships. Fortunately, material information management systems have kept pace with the growing user demands and evolved to enable: (i) the capture of both point wise data and full spectra of raw data curves, (ii) data management functions such as access, version, and quality controls;(iii) a wide range of data import, export and analysis capabilities; (iv) data pedigree traceability mechanisms; (v) data searching, reporting and viewing tools; and (vi) access to the information via a wide range of interfaces. This paper discusses key principles for the development of a robust materials information management system to enable the connections at various length scales to be made between experimental data and corresponding multiscale modeling toolsets to enable ICME. In particular, NASA Glenn's efforts towards establishing such a database for capturing constitutive modeling behavior for both monolithic and composites materials
Inside 'bed management': ethnographic insights from the vantage point of UK hospital nurses.
Allen, Davina
2015-03-01
In the face of unprecedented financial and demographic challenges, optimising acute bed utilisation by the proactive management of patient flows is a pressing policy concern in high-income countries. Despite the growing literature on this topic, bed management has received scant sociological attention. Drawing on practice-based approaches, this article deploys ethnographic data to examine bed management from the perspective of UK hospital nurses. While the nursing contribution to bed management is recognised formally in their widespread employment in patient access and discharge liaison roles, nurses at all levels in the study site were enrolled in this organisational priority. Rather than the rational, centrally controlled processes promulgated by policymakers, bed management emerges as a predominantly distributed activity, described here as match-making. An example of micro-level rationing, for the most part, match-making was not informed by explicit criteria nor did it hinge on clearly identifiable decisions to grant or deny access. Rather it was embedded in the everyday practices and situated rationalities through which nurses accomplished the accommodations necessary to balance demand with resources. © 2014 Foundation for the Sociology of Health & Illness.
Specialty pharmacy cost management strategies of private health care payers.
Stern, Debbie; Reissman, Debi
2006-01-01
The rate of increase in spending on specialty pharmaceuticals is outpacing by far the rate of increase in spending for other drugs. To explore the strategies payers are using in response to challenges related to coverage, cost, clinical management, and access of specialty pharmaceuticals and to describe the potential implications for key stakeholders, including patients, physicians, and health care purchasers. Sources of information were identified in the course of providing consulting services in the subject area of specialty pharmaceuticals to health plans, pharmacy benefit managers, employers, and pharmaceutical manufacturers. Specialty pharmaceuticals represent the fastest growing segment of drug spending due to new product approvals, high unit costs, and increasing use. Health care payers are faced with significant challenges related to coverage, cost, clinical management, and access. A variety of short- and long-term strategies have been employed to address these challenges. Current management techniques for specialty pharmaceuticals often represent a stop-gap approach for controlling rising drug costs. Optimum cost and care management methods will evolve as further research identifies the true clinical and economic value of various specialty pharmaceuticals.
Milt, Austin W; Diebel, Matthew W; Doran, Patrick J; Ferris, Michael C; Herbert, Matthew; Khoury, Mary L; Moody, Allison T; Neeson, Thomas M; Ross, Jared; Treska, Ted; O'Hanley, Jesse R; Walter, Lisa; Wangen, Steven R; Yacobson, Eugene; McIntyre, Peter B
2018-03-08
Controlling invasive species is critical for conservation but can have unintended consequences for native species and divert resources away from other efforts. This dilemma occurs on a grand scale in the North American Great Lakes, where dams and culverts block tributary access to habitat of desirable fish species and are a lynchpin of long-standing efforts to limit ecological damage inflicted by the invasive, parasitic sea lamprey (Petromyzon marinus). Habitat restoration and sea-lamprey control create conflicting goals for managing aging infrastructure. We used optimization to minimize opportunity costs of habitat gains for 37 desirable migratory fishes that arose from restricting sea lamprey access (0-25% increase) when selecting barriers for removal under a limited budget (US$1-105 million). Imposing limits on sea lamprey habitat reduced gains in tributary access for desirable species by 15-50% relative to an unconstrained scenario. Additional investment to offset the effect of limiting sea-lamprey access resulted in high opportunity costs for 30 of 37 species (e.g., an additional US$20-80 million for lake sturgeon [Acipenser fulvescens]) and often required ≥5% increase in sea-lamprey access to identify barrier-removal solutions adhering to the budget and limiting access. Narrowly distributed species exhibited the highest opportunity costs but benefited more at less cost when small increases in sea-lamprey access were allowed. Our results illustrate the value of optimization in limiting opportunity costs when balancing invasion control against restoration benefits for diverse desirable species. Such trade-off analyses are essential to the restoration of connectivity within fragmented rivers without unleashing invaders. © 2018 Society for Conservation Biology.
Reducing racial/ethnic disparities in diabetes: the Coached Care (R2D2C2) project.
Kaplan, Sherrie H; Billimek, John; Sorkin, Dara H; Ngo-Metzger, Quyen; Greenfield, Sheldon
2013-10-01
Despite numerous efforts to change healthcare delivery, the profile of disparities in diabetes care and outcomes has not changed substantially over the past decade. To understand potential contributors to disparities in diabetes care and glycemic control. Cross sectional analysis. Seven outpatient clinics affiliated with an academic medical center. Adult patients with type 2 diabetes who were Mexican American, Vietnamese American or non-Hispanic white (n = 1,484). Glycemic control was measured as hemoglobin A1c (HbA1c) level. Patient, provider and system characteristics included demographic characteristics; access to care; quality of process of care including clinical inertia; quality of interpersonal care; illness burden; mastery (diabetes management confidence, passivity); and adherence to treatment. Unadjusted HbA1c values were significantly higher for Mexican American patients (n = 782) (mean = 8.3 % [SD:2.1]) compared with non-Hispanic whites (n = 389) (mean = 7.1 % [SD:1.4]). There were no significant differences in HbA1c values between Vietnamese American and non-Hispanic white patients. There were no statistically significant group differences in glycemic control after adjustment for multiple measures of access, and quality of process and interpersonal care. Disease management mastery and adherence to treatment were related to glycemic control for all patients, independent of race/ethnicity. Generalizability to other minorities or to patients with poorer access to care may be limited. The complex interplay among patient, physician and system characteristics contributed to disparities in HbA1c between Mexican American and non-Hispanic white patients. In contrast, Vietnamese American patients achieved HbA1c levels comparable to non-Hispanic whites and adjustment for numerous characteristics failed to identify confounders that could have masked disparities in this subgroup. Disease management mastery appeared to be an important contributor to glycemic control for all patient subgroups.
Cyber-physical networking for wireless mesh infrastructures
NASA Astrophysics Data System (ADS)
Mannweiler, C.; Lottermann, C.; Klein, A.; Schneider, J.; Schotten, H. D.
2012-09-01
This paper presents a novel approach for cyber-physical network control. "Cyber-physical" refers to the inclusion of different parameters and information sources, ranging from physical sensors (e.g. energy, temperature, light) to conventional network information (bandwidth, delay, jitter, etc.) to logical data providers (inference systems, user profiles, spectrum usage databases). For a consistent processing, collected data is represented in a uniform way, analyzed, and provided to dedicated network management functions and network services, both internally and, through an according API, to third party services. Specifically, in this work, we outline the design of sophisticated energy management functionalities for a hybrid wireless mesh network (WLAN for both backhaul traffic and access, GSM for access only), disposing of autonomous energy supply, in this case solar power. Energy consumption is optimized under the presumption of fluctuating power availability and considerable storage constraints, thus influencing, among others, handover and routing decisions. Moreover, advanced situation-aware auto-configuration and self-adaptation mechanisms are introduced for an autonomous operation of the network. The overall objective is to deploy a robust wireless access and backbone infrastructure with minimal operational cost and effective, cyber-physical control mechanisms, especially dedicated for rural or developing regions.
Lynch, Mary E; Young, Judee; Clark, Alexander J
2006-11-01
The Canadian Marihuana Medical Access Regulations (MMAR) program allows Health Canada to grant access to marihuana for medical use to those who are suffering from grave and debilitating illnesses. This is a report on a case series of 30 patients followed at a tertiary care pain management center in Nova Scotia who have used medicinal marihuana for 1-5 years under the MMAR program. Patients completed a follow-up questionnaire containing demographic and dosing information, a series of 11-point numerical symptom relief rating scales, a side effect checklist, and a subjective measure of improvement in function. Doses of marihuana ranged from less than 1 to 5g per day via the smoked or oral route of administration. Ninety-three percent of patients reported moderate or greater pain relief. Side effects were reported by 76% of patients, the most common of which were increased appetite and a sense of well-being, weight gain, and slowed thoughts. Limitations of the study include self-selection bias, small size, and lack of a control group. The need for further study using controlled trials is discussed along with an overview of the MMAR program.
Fair Trade Metaphor as a Control Privacy Method for Pervasive Environments: Concepts and Evaluation
Esquivel, Abraham; Haya, Pablo; Alamán, Xavier
2015-01-01
This paper presents a proof of concept from which the metaphor of “fair trade” is validated as an alternative to manage the private information of users. Our privacy solution deals with user's privacy as a tradable good for obtaining environmental services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and transaction registry mechanisms, enhances users' confidence in the system while encouraging them to share their information, with the consequent benefit for the community. The study results are promising considering the user responses regarding the usefulness, ease of use, information classification and perception of control with the mechanisms proposed by the metaphor. PMID:26087373
Fair Trade Metaphor as a Control Privacy Method for Pervasive Environments: Concepts and Evaluation.
Esquivel, Abraham; Haya, Pablo; Alamán, Xavier
2015-06-16
This paper presents a proof of concept from which the metaphor of "fair trade" is validated as an alternative to manage the private information of users. Our privacy solution deals with user's privacy as a tradable good for obtaining environmental services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and transaction registry mechanisms, enhances users' confidence in the system while encouraging them to share their information, with the consequent benefit for the community. The study results are promising considering the user responses regarding the usefulness, ease of use, information classification and perception of control with the mechanisms proposed by the metaphor.
The USA-NPN Information Management System: A tool in support of phenological assessments
NASA Astrophysics Data System (ADS)
Rosemartin, A.; Vazquez, R.; Wilson, B. E.; Denny, E. G.
2009-12-01
The USA National Phenology Network (USA-NPN) serves science and society by promoting a broad understanding of plant and animal phenology and the relationships among phenological patterns and all aspects of environmental change. Data management and information sharing are central to the USA-NPN mission. The USA-NPN develops, implements, and maintains a comprehensive Information Management System (IMS) to serve the needs of the network, including the collection, storage and dissemination of phenology data, access to phenology-related information, tools for data interpretation, and communication among partners of the USA-NPN. The IMS includes components for data storage, such as the National Phenology Database (NPD), and several online user interfaces to accommodate data entry, data download, data visualization and catalog searches for phenology-related information. The IMS is governed by a set of standards to ensure security, privacy, data access, and data quality. The National Phenology Database is designed to efficiently accommodate large quantities of phenology data, to be flexible to the changing needs of the network, and to provide for quality control. The database stores phenology data from multiple sources (e.g., partner organizations, researchers and citizen observers), and provides for integration with legacy datasets. Several services will be created to provide access to the data, including reports, visualization interfaces, and web services. These services will provide integrated access to phenology and related information for scientists, decision-makers and general audiences. Phenological assessments at any scale will rely on secure and flexible information management systems for the organization and analysis of phenology data. The USA-NPN’s IMS can serve phenology assessments directly, through data management and indirectly as a model for large-scale integrated data management.
Management of Central Venous Access Device-Associated Skin Impairment: An Evidence-Based Algorithm.
Broadhurst, Daphne; Moureau, Nancy; Ullman, Amanda J
Patients relying on central venous access devices (CVADs) for treatment are frequently complex. Many have multiple comorbid conditions, including renal impairment, nutritional deficiencies, hematologic disorders, or cancer. These conditions can impair the skin surrounding the CVAD insertion site, resulting in an increased likelihood of skin damage when standard CVAD management practices are employed. Supported by the World Congress of Vascular Access (WoCoVA), developed an evidence- and consensus-based algorithm to improve CVAD-associated skin impairment (CASI) identification and diagnosis, guide clinical decision-making, and improve clinician confidence in managing CASI. A scoping review of relevant literature surrounding CASI management was undertaken March 2014, and results were distributed to an international advisory panel. A CASI algorithm was developed by an international advisory panel of clinicians with expertise in wounds, vascular access, pediatrics, geriatric care, home care, intensive care, infection control and acute care, using a 2-phase, modified Delphi technique. The algorithm focuses on identification and treatment of skin injury, exit site infection, noninfectious exudate, and skin irritation/contact dermatitis. It comprised 3 domains: assessment, skin protection, and patient comfort. External validation of the algorithm was achieved by prospective pre- and posttest design, using clinical scenarios and self-reported clinician confidence (Likert scale), and incorporating algorithm feasibility and face validity endpoints. The CASI algorithm was found to significantly increase participants' confidence in the assessment and management of skin injury (P = .002), skin irritation/contact dermatitis (P = .001), and noninfectious exudate (P < .01). A majority of participants reported the algorithm as easy to understand (24/25; 96%), containing all necessary information (24/25; 96%). Twenty-four of 25 (96%) stated that they would recommend the tool to guide management of CASI.
Cardea: Dynamic Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2004-01-01
Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.
Telecommuting: Implications for Business Education.
ERIC Educational Resources Information Center
Holmquist, Donna; Risk, Shirley
1991-01-01
Advantages to telecommuting are flexibility, control, productivity, morale, quality of life, and, for employers, access to a wider skill pool. Disadvantages are frustration, isolation, sweatshop potential, and resentment of co-workers. Business education should emphasize keyboarding, telecommunications, time management, and communication skills in…
Code of Federal Regulations, 2010 CFR
2010-04-01
... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be established...
Code of Federal Regulations, 2013 CFR
2013-04-01
... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be established...
Code of Federal Regulations, 2012 CFR
2012-04-01
... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be established...
Code of Federal Regulations, 2011 CFR
2011-04-01
... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be established...
Managing Self-Access Language Learning: Principles and Practice
ERIC Educational Resources Information Center
Gardner, David; Miller, Lindsay
2011-01-01
This paper is based on a research project looking at the management of self-access language learning (SALL) from the perspective of the managers of self-access centres. It looks at the factors which influence the practice of seven managers of self-access language learning in tertiary institutions in Hong Kong. The discussion centres around five…
Emergency access to protected health records.
Künzi, Julien; Koster, Paul; Petković, Milan
2009-01-01
Digital Rights Management (DRM) schemes are receiving increased attention in the healthcare domain for the protection of sensitive health records as they offer security against insider attacks and advance protection features such as usage control. However, to be accepted by health care providers, a DRM solution has to fulfill specific healthcare requirements including emergency access. In this paper, we propose such DRM solution that can be deployed in highly distributed environments of electronic or personal health record infrastructures.
An ICT-Based Diabetes Management System Tested for Health Care Delivery in the African Context.
Takenga, Claude; Berndt, Rolf-Dietrich; Musongya, Olivier; Kitero, Joël; Katoke, Remi; Molo, Kakule; Kazingufu, Basile; Meni, Malikwisha; Vikandy, Mambo; Takenga, Henri
2014-01-01
The demand for new healthcare services is growing rapidly. Improving accessibility of the African population to diabetes care seems to be a big challenge in most countries where the number of care centers and medical staff is reduced. Information and communication technologies (ICT) have great potential to address some of these challenges faced by several countries in providing accessible, cost-effective, and high-quality health care services. This paper presents the Mobil Diab system which is a telemedical approach proposed for the management of long-term diseases. The system applies modern mobile and web technologies which overcome geographical barriers, and increase access to health care services. The idea of the system is to involve patients in the therapy process and motivate them for an active participation. For validation of the system in African context, a trial was conducted in the Democratic Republic of Congo. 40 Subjects with diabetes divided randomly into control and intervention groups were included in the test. Results show that Mobil Diab is suitable for African countries and presents a number of benefits for the population and public health care system. It improves clinical management and delivery of diabetes care services by enhancing access, quality, motivation, reassurance, efficiency, and cost-effectiveness.
Green, Carmen R.; Baker, Tamara A.; Ndao-Brumblay, S. Khady
2004-01-01
The purpose of this study was to evaluate healthcare utilization and referral patterns for pain management services in a racially and ethnically diverse population. A study-specific mail survey was directed at African- (N=324) and Caucasian Americans (N=300) receiving chronic pain treatment at a tertiary care pain center to address their healthcare access, referral, and utilization patterns. Overall, 46% (N=286) responded, with the majority of respondents being Caucasian Americans (57%) and women (68%). The majority (58%) reported asking their physicians to refer them to a pain physician. African Americans were more likely to report that chronic pain was a major reason for financial problems. They made significantly more visits to the emergency room for pain care. African Americans agreed more that ethnicity and culture affected access to healthcare and pain management. They also tended to agree more than Caucasian Americans that pain medication could not control pain. These results demonstrate significant differences in healthcare utilization, access, and attitudes amongst African- and Caucasian Americans receiving chronic pain management. In light of the socioeconomic and health consequences of chronic pain, these results suggest the need for further studies addressing variability in pain care access and utilization in diverse populations. PMID:14746352
An ICT-Based Diabetes Management System Tested for Health Care Delivery in the African Context
Takenga, Claude; Berndt, Rolf-Dietrich; Musongya, Olivier; Kitero, Joël; Katoke, Remi; Molo, Kakule; Kazingufu, Basile; Meni, Malikwisha; Vikandy, Mambo; Takenga, Henri
2014-01-01
The demand for new healthcare services is growing rapidly. Improving accessibility of the African population to diabetes care seems to be a big challenge in most countries where the number of care centers and medical staff is reduced. Information and communication technologies (ICT) have great potential to address some of these challenges faced by several countries in providing accessible, cost-effective, and high-quality health care services. This paper presents the Mobil Diab system which is a telemedical approach proposed for the management of long-term diseases. The system applies modern mobile and web technologies which overcome geographical barriers, and increase access to health care services. The idea of the system is to involve patients in the therapy process and motivate them for an active participation. For validation of the system in African context, a trial was conducted in the Democratic Republic of Congo. 40 Subjects with diabetes divided randomly into control and intervention groups were included in the test. Results show that Mobil Diab is suitable for African countries and presents a number of benefits for the population and public health care system. It improves clinical management and delivery of diabetes care services by enhancing access, quality, motivation, reassurance, efficiency, and cost-effectiveness. PMID:25136358
Pham, Quynh; Khatib, Yasmin; Stansfeld, Stephen; Fox, Simon; Green, Tobias
2016-02-01
Meeting the complex needs of patients with chronic common mental health disorders (CMHDs) may be the greatest challenge facing organized medical practice. On the basis of a well-established and proven theoretical foundation for controlled respiration as a behavioral intervention for CMHDs, as well as preliminary evidence that gamification can improve health outcomes through increasing patient engagement, this randomized controlled pilot study evaluated the feasibility and clinical efficacy of a mobile health game called "Flowy" ( www.flowygame.com ) that digitally delivered breathing retraining exercises for anxiety, panic, and hyperventilation symptom management. We designed an unblinded, Web-based, parallel-group randomized controlled trial focusing on feasibility, clinical efficacy, and design proof of concept. In the intervention condition (n = 31), participants received free access to "Flowy" for 4 weeks. In the control condition (n = 32), participants were placed on a waitlist for 4 weeks before being offered free access to "Flowy." Online measurements using psychological self-report questionnaires were made at 2 and 4 weeks post-baseline. At trial conclusion, participants found "Flowy" acceptable as an anxiety management intervention. "Flowy" engaged participants sufficiently to endorse proactive gameplay. Intent-to-treat analysis revealed a reduction in anxiety, panic, and self-report hyperventilation scores in both trial arms, with the intervention arm experiencing greater quality of life. Participants perceived "Flowy" as a fun and useful intervention, proactively used "Flowy" as part of their care, and would recommend "Flowy" to family and friends. Our results suggest that a digital delivery of breathing retraining exercises through a mobile health game can manage anxiety, panic, and hyperventilation symptoms associated with CMHDs.
Biosecurity measures in 48 isolation facilities managing highly infectious diseases.
Puro, Vincenzo; Fusco, Francesco M; Schilling, Stefan; Thomson, Gail; De Iaco, Giuseppina; Brouqui, Philippe; Maltezou, Helena C; Bannister, Barbara; Gottschalk, René; Brodt, Hans-Rheinhard; Ippolito, Giuseppe
2012-06-01
Biosecurity measures are traditionally applied to laboratories, but they may also be usefully applied in highly specialized clinical settings, such as the isolation facilities for the management of patients with highly infectious diseases (eg, viral hemorrhagic fevers, SARS, smallpox, potentially severe pandemic flu, and MDR- and XDR-tuberculosis). In 2009 the European Network for Highly Infectious Diseases conducted a survey in 48 isolation facilities in 16 European countries to determine biosecurity measures for access control to the facility. Security personnel are present in 39 facilities (81%). In 35 facilities (73%), entrance to the isolation area is restricted; control methods include electronic keys, a PIN system, closed-circuit TV, and guards at the doors. In 25 facilities (52%), identification and registration of all staff entering and exiting the isolation area are required. Access control is used in most surveyed centers, but specific lacks exist in some facilities. Further data are needed to assess other biosecurity aspects, such as the security measures during the transportation of potentially contaminated materials and measures to address the risk of an "insider attack."
Biosecurity Measures in 48 Isolation Facilities Managing Highly Infectious Diseases
Puro, Vincenzo; Schilling, Stefan; Thomson, Gail; De Iaco, Giuseppina; Brouqui, Philippe; Maltezou, Helena C.; Bannister, Barbara; Gottschalk, René; Brodt, Hans-Rheinhard; Ippolito, Giuseppe
2012-01-01
Biosecurity measures are traditionally applied to laboratories, but they may also be usefully applied in highly specialized clinical settings, such as the isolation facilities for the management of patients with highly infectious diseases (eg, viral hemorrhagic fevers, SARS, smallpox, potentially severe pandemic flu, and MDR- and XDR-tuberculosis). In 2009 the European Network for Highly Infectious Diseases conducted a survey in 48 isolation facilities in 16 European countries to determine biosecurity measures for access control to the facility. Security personnel are present in 39 facilities (81%). In 35 facilities (73%), entrance to the isolation area is restricted; control methods include electronic keys, a PIN system, closed-circuit TV, and guards at the doors. In 25 facilities (52%), identification and registration of all staff entering and exiting the isolation area are required. Access control is used in most surveyed centers, but specific lacks exist in some facilities. Further data are needed to assess other biosecurity aspects, such as the security measures during the transportation of potentially contaminated materials and measures to address the risk of an “insider attack.” PMID:22571373
ERIC Educational Resources Information Center
Apple, Benjamin G.
2017-01-01
This qualitative study identified those factors that influence the perceived effectiveness of traditional IA control frameworks. The key factors examined in this study are risk management, governance, access control, privacy protection, integrity, availability, reliability, and usability. The researcher endeavored to determine how the…
USDA-ARS?s Scientific Manuscript database
Controlling postharvest pest species is a costly process with insecticide resistance and species specific control requiring multiple tactics. Mating disruption can be used to both decrease a female’s access to males and delay timing of mating and decreases overall mating success in a population and ...
Operating systems. [of computers
NASA Technical Reports Server (NTRS)
Denning, P. J.; Brown, R. L.
1984-01-01
A counter operating system creates a hierarchy of levels of abstraction, so that at a given level all details concerning lower levels can be ignored. This hierarchical structure separates functions according to their complexity, characteristic time scale, and level of abstraction. The lowest levels include the system's hardware; concepts associated explicitly with the coordination of multiple tasks appear at intermediate levels, which conduct 'primitive processes'. Software semaphore is the mechanism controlling primitive processes that must be synchronized. At higher levels lie, in rising order, the access to the secondary storage devices of a particular machine, a 'virtual memory' scheme for managing the main and secondary memories, communication between processes by way of a mechanism called a 'pipe', access to external input and output devices, and a hierarchy of directories cataloguing the hardware and software objects to which access must be controlled.
Lopez-Iturri, Peio; Aguirre, Erik; Trigo, Jesús Daniel; Astrain, José Javier; Azpilicueta, Leyre; Serrano, Luis; Villadangos, Jesús; Falcone, Francisco
2018-01-29
In the context of hospital management and operation, Intensive Care Units (ICU) are one of the most challenging in terms of time responsiveness and criticality, in which adequate resource management and signal processing play a key role in overall system performance. In this work, a context aware Intensive Care Unit is implemented and analyzed to provide scalable signal acquisition capabilities, as well as to provide tracking and access control. Wireless channel analysis is performed by means of hybrid optimized 3D Ray Launching deterministic simulation to assess potential interference impact as well as to provide required coverage/capacity thresholds for employed transceivers. Wireless system operation within the ICU scenario, considering conventional transceiver operation, is feasible in terms of quality of service for the complete scenario. Extensive measurements of overall interference levels have also been carried out, enabling subsequent adequate coverage/capacity estimations, for a set of Zigbee based nodes. Real system operation has been tested, with ad-hoc designed Zigbee wireless motes, employing lightweight communication protocols to minimize energy and bandwidth usage. An ICU information gathering application and software architecture for Visitor Access Control has been implemented, providing monitoring of the Boxes external doors and the identification of visitors via a RFID system. The results enable a solution to provide ICU access control and tracking capabilities previously not exploited, providing a step forward in the implementation of a Smart Health framework.
The Open Data Repositorys Data Publisher
NASA Technical Reports Server (NTRS)
Stone, N.; Lafuente, B.; Downs, R. T.; Blake, D.; Bristow, T.; Fonda, M.; Pires, A.
2015-01-01
Data management and data publication are becoming increasingly important components of researcher's workflows. The complexity of managing data, publishing data online, and archiving data has not decreased significantly even as computing access and power has greatly increased. The Open Data Repository's Data Publisher software strives to make data archiving, management, and publication a standard part of a researcher's workflow using simple, web-based tools and commodity server hardware. The publication engine allows for uploading, searching, and display of data with graphing capabilities and downloadable files. Access is controlled through a robust permissions system that can control publication at the field level and can be granted to the general public or protected so that only registered users at various permission levels receive access. Data Publisher also allows researchers to subscribe to meta-data standards through a plugin system, embargo data publication at their discretion, and collaborate with other researchers through various levels of data sharing. As the software matures, semantic data standards will be implemented to facilitate machine reading of data and each database will provide a REST application programming interface for programmatic access. Additionally, a citation system will allow snapshots of any data set to be archived and cited for publication while the data itself can remain living and continuously evolve beyond the snapshot date. The software runs on a traditional LAMP (Linux, Apache, MySQL, PHP) server and is available on GitHub (http://github.com/opendatarepository) under a GPLv2 open source license. The goal of the Open Data Repository is to lower the cost and training barrier to entry so that any researcher can easily publish their data and ensure it is archived for posterity.
Improving glycemic control with the adjunct use of a data management software program.
Reed, Charles C; Richa, Jacqueline M; Berndt, Andrea E; Beadle, Randy D; Gerhardt, Susan D; Stewart, Ronald; Corneille, Michael
2012-01-01
Published studies have supported the implementation of tight glucose control (TGC) programs to improve patient outcomes and reduce mortality rates. However, measuring a program's efficiency is challenging, because of a lack of systems that capture data, allow access to data, and support analysis and interpretation in a near prospective time frame. We hypothesized that providing clinicians access to real-time blood glucose (BG) results reports could improve the efficacy of our TGC program. We performed a retrospective review of BG data during a 12-month period in a surgical trauma intensive care unit at a level I trauma center. A unit-specific insulin algorithm was used throughout the study. We compared BG values before and after the implementation of a data management software program that allowed clinicians access to real-time BG results reports. Reports were run daily and weekly to monitor the unit's TGC program. A total of 70 616 BG values from 1044 patients were analyzed. An overall decrease was observed in the BG level mean, from 121 mg/dL to 112 mg/dL (P < .001), as well as a decrease in the aggregated mean across patients, from 132 mg/dL to 119 mg/dL (P < .001), after implementation of the software. The percentage of values within the target range of 80 to 110 mg/dL increased from 38.9% to 50.4% (P < .001). The percentage of BG values less than 70 increased from 2.7% to 3.4% (P < .001). However, the percentage of severe hypoglyce-mic episodes (≤ 40 mg/dL) remained unchanged. Access to real-time aggregated BG data reports through the use of a data management software program improved the efficacy of our TGC program.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... Documents Access and Management System (ADAMS) under accession number ML102080569. DATES: Comment period... and Management System (ADAMS): Publicly available documents created or received at the NRC are...-25,'' dated September 1980 (Agencywide Documents Access and Management System [ADAMS] accession...
Privacy protection in HealthGrid: distributing encryption management over the VO.
Torres, Erik; de Alfonso, Carlos; Blanquer, Ignacio; Hernández, Vicente
2006-01-01
Grid technologies have proven to be very successful in tackling challenging problems in which data access and processing is a bottleneck. Notwithstanding the benefits that Grid technologies could have in Health applications, privacy leakages of current DataGrid technologies due to the sharing of data in VOs and the use of remote resources, compromise its widespreading. Privacy control for Grid technology has become a key requirement for the adoption of Grids in the Healthcare sector. Encrypted storage of confidential data effectively reduces the risk of disclosure. A self-enforcing scheme for encrypted data storage can be achieved by combining Grid security systems with distributed key management and classical cryptography techniques. Virtual Organizations, as the main unit of user management in Grid, can provide a way to organize key sharing, access control lists and secure encryption management. This paper provides programming models and discusses the value, costs and behavior of such a system implemented on top of one of the latest Grid middlewares. This work is partially funded by the Spanish Ministry of Science and Technology in the frame of the project Investigación y Desarrollo de Servicios GRID: Aplicación a Modelos Cliente-Servidor, Colaborativos y de Alta Productividad, with reference TIC2003-01318.
Implementation of remote monitoring and managing switches
NASA Astrophysics Data System (ADS)
Leng, Junmin; Fu, Guo
2010-12-01
In order to strengthen the safety performance of the network and provide the big convenience and efficiency for the operator and the manager, the system of remote monitoring and managing switches has been designed and achieved using the advanced network technology and present network resources. The fast speed Internet Protocol Cameras (FS IP Camera) is selected, which has 32-bit RSIC embedded processor and can support a number of protocols. An Optimal image compress algorithm Motion-JPEG is adopted so that high resolution images can be transmitted by narrow network bandwidth. The architecture of the whole monitoring and managing system is designed and implemented according to the current infrastructure of the network and switches. The control and administrative software is projected. The dynamical webpage Java Server Pages (JSP) development platform is utilized in the system. SQL (Structured Query Language) Server database is applied to save and access images information, network messages and users' data. The reliability and security of the system is further strengthened by the access control. The software in the system is made to be cross-platform so that multiple operating systems (UNIX, Linux and Windows operating systems) are supported. The application of the system can greatly reduce manpower cost, and can quickly find and solve problems.
Chamratrithirong, Aphichat; Ford, Kathleen; Punpuing, Sureeporn; Prasartkul, Pramote
2017-12-01
Vulnerability to Human Immunodeficiency Virus (HIV) infection among factory workers is a global problem. This study investigated the effectiveness of an intervention to increase AIDS knowledge, perceived accessibility to condoms and condom use among young factory workers in Thailand. The intervention was a workplace program designed to engage the private sector in HIV prevention. A cross-sectional survey conducted in 2008 to measure program outcomes in factories in Thailand was used in this study. The workplace intervention included the development of policies for management of HIV-positive employees, training sessions for managers and workers, and distribution of educational materials and condoms. A multi-level analysis was used to investigate the effect of HIV/AIDS prevention program components at the workplace on HIV/AIDS knowledge, perceived accessibility to condoms and condom use with regular sexual partners among 699 young factory workers (aged 18-24 years), controlling for their individual socio-demographic characteristics. Interventions related to the management and services component including workplace AIDS policy formulation, condom services programs and behavioral change campaigns were found to be significantly related to increased AIDS knowledge, perceived accessibility to condoms and condom use with regular partners. The effect of the HIV/AIDS training for managers, peer leaders and workers was positive but not statistically significant. With some revision of program components, scaling up of workplace interventions and the engagement of the private sector in HIV prevention should be seriously considered.
77 FR 28407 - Special Nuclear Material Control and Accounting Systems for Nuclear Power Plants
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-14
... and Management System (ADAMS): You may access publicly-available documents online in the NRC Library... revised ANSI N15.8 in February 2009. ANSI N15.8-2009 provides guidance on the fundamentals of an SNM...
Review of modern biometric user authentication and their development prospects
NASA Astrophysics Data System (ADS)
Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.
2015-09-01
This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.
A hierarchical distributed control model for coordinating intelligent systems
NASA Technical Reports Server (NTRS)
Adler, Richard M.
1991-01-01
A hierarchical distributed control (HDC) model for coordinating cooperative problem-solving among intelligent systems is described. The model was implemented using SOCIAL, an innovative object-oriented tool for integrating heterogeneous, distributed software systems. SOCIAL embeds applications in 'wrapper' objects called Agents, which supply predefined capabilities for distributed communication, control, data specification, and translation. The HDC model is realized in SOCIAL as a 'Manager'Agent that coordinates interactions among application Agents. The HDC Manager: indexes the capabilities of application Agents; routes request messages to suitable server Agents; and stores results in a commonly accessible 'Bulletin-Board'. This centralized control model is illustrated in a fault diagnosis application for launch operations support of the Space Shuttle fleet at NASA, Kennedy Space Center.
Reactive power management and voltage control in deregulated power markets
NASA Astrophysics Data System (ADS)
Spangler, Robert G.
The research that is the subject of this dissertation is about the management of reactive power and voltage support in the wholesale open access power markets in the United States (US). The purpose of this research is to place decisions about open access market structures, as they relate to reactive power and voltage control, on a logical and consistent economic basis, given the engineering needs of a commercial electric power system. An examination of the electricity markets operating in the US today reveals that current approaches to reactive power management and voltage support are extensions of those based on historical, regulated monopoly electric service. A case for change is built by first looking at the subject of reactive power from an engineering viewpoint and then from an economic perspective. Ultimately, a set of market rules for managing reactive power and voltage support is proposed. The proposal suggests that cost recovery for static and dynamic VARs is appropriately accomplished through the regulated transmission cost of service. Static VAR cost recovery should follow traditional rate recovery methodologies. In the case of dynamic VARs, this work provides a methodology based on the microeconomic theory of the firm for determining such cost. It further suggests that an operational strategy that reduces and limits the use of dynamic VARs, during normal operations, is appropriate. This latter point leads to an increase in the fixed cost of the transmission network but prevents price spikes and short supply situations from affecting, or being affected by, the reactive capability limitations associated with dynamic VARs supplied from synchronous generators. The rules are consistent with a market structure that includes competitive generation and their application will result in the communication of a clear understanding of the responsibilities, related to voltage control, of each type of market entity. In this sense, their application will contribute to the efficient functioning of the wholesale open access markets.
Development of access management performance measures.
DOT National Transportation Integrated Search
2009-05-01
In 2007, the Virginia General Assembly passed legislation calling for Access Management, the : regulation of entrances and intersections along highway corridors in Virginia. Some property owners may oppose : access management. Therefore, performance ...
Skytt, Bernice; Hagerman, Heidi; Strömberg, Annika; Engström, Maria
2015-11-01
To elucidate first-line managers' descriptions and reflections regarding their staff's access to empowering structures using Kanter's theory of structural empowerment. Good structural conditions within workplaces are essential to employees' wellbeing, and their ability to access empowerment structures is largely dependent on the management. Twenty-eight first-line managers in elderly care were interviewed. Deductive qualitative content analysis was used to analyse data. Managers perceived that staff had varying degrees of access to the empowering structures described in Kanter's theory - and that they possessed formal power in their roles as contact persons and representatives. The descriptions mostly started from the managers' own actions, although some started from the needs of staff members. All managers described their staff's access to the empowering structures in Kanter's theory as important, yet it seemed as though this was not always reflected on and discussed as a strategic issue. Managers could make use of performance and appraisal dialogues to keep up to date on staff's access to empowering structures. Recurrent discussions in the management group based on such current information could promote staff's access to power through empowering structures and make job definitions a strategic issue in the organisation. © 2014 John Wiley & Sons Ltd.
Dara, Masoud; de Colombani, Pierpaolo; Petrova-Benedict, Roumyana; Centis, Rosella; Zellweger, Jean-Pierre; Sandgren, Andreas; Heldal, Einar; Sotgiu, Giovanni; Jansen, Niesje; Bahtijarevic, Rankica; Migliori, Giovanni Battista
2012-01-01
The World Health Organization (WHO) European region estimates that more than 400,000 tuberculosis (TB) cases occur in Europe, a large proportion of them among migrants. A coordinated public health mechanism to guarantee TB prevention, diagnosis, treatment and care across borders is not in place. A consensus paper describing the minimum package of cross-border TB control and care was prepared by a task force following a literature review, and with input from the national TB control programme managers of the WHO European region and the Wolfheze 2011 conference. A literature review focused on the subject of TB in migrants was carried out, selecting documents published during the 11-yr period 2001–2011. Several issues were identified in cross-border TB control and care, varying from the limited access to early TB diagnosis, to the lack of continuity of care and information during migration, and the availability of, and access to, health services in the new country. The recommended minimum package addresses the current shortcomings and intends to improve the situation by covering several areas: political commitment (including the implementation of a legal framework for TB cross-border collaboration), financial mechanisms and adequate health service delivery (prevention, infection control, contact management, diagnosis and treatment, and psychosocial support). PMID:22653772
Transforming cold chain performance and management in lower-income countries.
Brison, Mike; LeTallec, Yann
2017-04-19
In many countries, one of the common factors limiting full and equitable access to effective immunization is the existence of gaps in cold chain and logistics (CCL) systems. This article focuses on the critical contribution that better management of CCL performance can make in addressing these barriers, as well as some essential practices needed to achieve and sustain these gains. These include (i) an emphasis on continuous improvement in CCL performance indicators, (ii) strong coordination and accountability across multiple stakeholders, and (iii) making the most of limited financial resources. This article is informed by the Clinton Health Access Initiative's (CHAI's) experience working with National Immunization Programs (NIPs) and immunization partners to improve the effectiveness and efficiency of CCL systems (including CCE deployment and maintenance, temperature monitoring and control, stock management and distribution) across ten Gavi-supported "focus" countries. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.
2016-04-01
the DOD will put DOD systems and data at a risk level comparable to that of their neighbors in the cloud. Just as a user browses a Web page on the...proxy servers for controlling user access to Web pages, and large-scale storage for data management. Each of these devices allows access to the...user to develop applications. Acunetics.com describes Web applications as “computer programs allowing Website visitors to submit and retrieve data
The AGARD tip research agenda for Scientific and Technical Information (STI)
NASA Technical Reports Server (NTRS)
Blados, Walter R.
1992-01-01
The Research Agenda contains three themes: information management, provision of information, and access to information. Provision of information is further divided into two subordinate themes, dissemination and bibliographic control; access to information is also further divided into two subordinate themes, barriers and equity and networking. Each theme or sub-theme was examined from four possible aspects, namely, human resources, quality assurance, cost, and technology. It was concluded that, in fact, a theme or sub-theme need not contain all four aspects.
Information management for clinicians.
Mehta, Neil B; Martin, Stephen A; Maypole, Jack; Andrews, Rebecca
2016-08-01
Clinicians are bombarded with information daily by social media, mainstream television news, e-mail, and print and online reports. They usually do not have much control over these information streams and thus are passive recipients, which means they get more noise than signal. Accessing, absorbing, organizing, storing, and retrieving useful medical information can improve patient care. The authors outline how to create a personalized stream of relevant information that can be scanned regularly and saved so that it is readily accessible. Copyright © 2016 Cleveland Clinic.
SigmaCLIPSE = presentation management + NASA CLI PS + SQL
NASA Technical Reports Server (NTRS)
Weiss, Bernard P., Jr.
1990-01-01
SigmaCLIPSE provides an expert systems and 'intelligent' data base development program for diverse systems integration environments that require support for automated reasoning and expert systems technology, presentation management, and access to 'intelligent' SQL data bases. The SigmaCLIPSE technology and and its integrated ability to access 4th generation application development and decision support tools through a portable SQL interface, comprises a sophisticated software development environment for solving knowledge engineering and expert systems development problems in information intensive commercial environments -- financial services, health care, and distributed process control -- where the expert system must be extendable -- a major architectural advantage of NASA CLIPS. SigmaCLIPSE is a research effort intended to test the viability of merging SQL data bases with expert systems technology.
Mobile Recommender Apps with Privacy Management for Accessible and Usable Technologies.
Hersh, Marion; Leporini, Barbara
2017-01-01
The paper presents the preliminary results of an ongoing survey of the use of computers and mobile devices, interest in recommender apps and knowledge and concerns about privacy issues amongst English and Italian speaking disabled people. Participants were found to be regular users of computers and mobile devices for a range of applications. They were interested in recommender apps for household items, computer software and apps that met their accessibility and other requirements. They showed greater concerns about controlling access to personal data of different types than this data being retained by the computer or mobile device. They were also willing to make tradeoffs to improve device performance.
Remote access to medical specialists: home care interactive patient management system
NASA Astrophysics Data System (ADS)
Martin, Peter J.; Draghic, Nicole; Wiesmann, William P.
1999-07-01
Diabetes management involves constant care and rigorous compliance. Glucose control is often difficult to maintain and onset of complications further compound health care needs. Status can be further hampered by geographic isolation from immediate medical infrastructures. The Home Care Interactive Patient Management System is an experimental telemedicine program that could improve chronic illness management through Internet-based applications. The goal of the system is to provide a customized, integrated approach to diabetes management to supplement and coordinate physician protocol while supporting routine patient activity, by supplying a set of customized automated services including health data collection, transmission, analysis and decision support.
Management commitments and primary care: another lesson from Costa Rica for the world?
Soors, Werner; De Paepe, Pierre; Unger, Jean-Pierre
2014-01-01
Maintained dedication to primary care has fostered a public health delivery system with exceptional outcomes in Costa Rica. For more than a decade, management commitments have been part of Costa Rican health reform. We assessed the effect of the Costa Rican management commitments on access and quality of care and on compliance with their intended objectives. We constructed seven hypotheses on opinions of primary care providers. Through a mixed qualitative and quantitative approach, we tested these hypotheses and interpreted the research findings. Management commitments consume an excessive proportion of consultation time, inflate recordkeeping, reduce comprehensiveness in primary care consultations, and induce a disproportionate consumption of hospital emergency services. Their formulation relies on norms in need of optimization, their control on unreliable sources. They also affect professionalism. In Costa Rica, management commitments negatively affect access and quality of care and pose a threat to the public service delivery system. The failures of this pay-for-performance-like initiative in an otherwise well-performing health system cast doubts on the appropriateness of pay-for-performance for health systems strengthening in less advanced environments.
An Intelligent Parking Management System for Urban Areas.
Vera-Gómez, Juan A; Quesada-Arencibia, Alexis; García, Carmelo R; Suárez Moreno, Raúl; Guerra Hernández, Fernando
2016-06-21
In this article we describe a low-cost, minimally-intrusive system for the efficient management of parking spaces on both public roads and controlled zones. This system is based on wireless networks of photoelectric sensors that are deployed on the access roads into and out of these areas. The sensors detect the passage of vehicles on these roads and communicate this information to a data centre, thus making it possible to know the number of vehicles in the controlled zone and the occupancy levels in real-time. This information may be communicated to drivers to facilitate their search for a parking space and to authorities so that they may take steps to control traffic when congestion is detected.
ERIC Educational Resources Information Center
Obeng, Letitia E.
1975-01-01
All countries require an ample supply of water for agricultural and industrial uses. Most have sufficient water supplies, but availability and accessibility vary. With the development of water irrigation systems, health conditions often deteriorate. The author recommends a water management program to control quality and quantity of available…
DOT National Transportation Integrated Search
1972-11-01
Analyses are made of waveforms, parameters, codes, error rates, and multi-access noise for proposed communications and surveillance subsystems to be useful for air traffic control in the 1990-2000 time period. The systems represented in these analyse...
Helping Adolescents Respond with Integrity to Defensive Teaching
ERIC Educational Resources Information Center
Thorkildsen, Theresa A.; Driver, Persis
2017-01-01
Integrity in student-teacher interaction is more likely when students and teachers tactfully disrupt the pacing of efficient, but fragmented lessons. Yet, teachers sometimes cling to fragmented, oversimplified definitions of knowledge, and defensively manage classroom behavior by controlling students' access to information. Ironically, adolescents…
Kent F. Kovacs; Robert G. Haight; Rodrigo J. Mercader; Deborah G. McCullough
2014-01-01
Bio-invasions occur in management mosaics where local control affects spread and damage across political boundaries. We address two obstacles to local implementation of optimal regional control of a bio-invasion that damages public and private resources across jurisdictions: lack of local funds to protect the public resource and lack of access to protect the private...
9. View southeast corner of perimeter acquisition radar power plant ...
9. View southeast corner of perimeter acquisition radar power plant room #214, control room; showing central monitoring station console in foreground. Well and booster control panel in left background and electric power management panel on far right - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Power Plant, In Limited Access Area, Southwest of PARB at end of Service Road B, Nekoma, Cavalier County, ND
Development of «Park-and-Ride» system as a tool for sustainable access control managing
NASA Astrophysics Data System (ADS)
Danilina, Nina; Vlasov, Denis
2017-10-01
Large cities, whereby people use private transport, are facing the same challenges related to traffic congestion, reliability of public transportation and parking demand. Managing urban traffic and transport has become the most relevant police in transport planning. The article deals with the potential for further implementation in Russian Federation of «Park-and- Ride» recognized as an essential part of the overall transport and parking offer and successful planning tool to reducing congestion for any urban area around the world. The studies have been carried out in Moscow acknowledged as the city core of Moscow agglomeration — the largest and most populous in Russia. The research aims to support for the development of «Park-and-Ride» system applying the methodical approach adapted by the authors for the study to make it relevant for cities. A three-steps access control is offered to reduce private cars use in the city center. The results of the studies shows that such traffic management tool can help successfully in balancing the traffic demand and supply and, consequently, in resolving transport congestion and the number of coherent social, urban and economic challenges addressed to the sustainable development of urban areas.
Quality Control Review of the Defense Logistics Agency Audit Organization
2014-12-19
Management Information Distribution and Access System ( MIDAS ). The auditors used data generated from MIDAS to analyze property receipt transaction...However, because there was no evaluation of the effectiveness of controls over MIDAS , the auditors may not have assessed audit risk adequately...Operations in Afghanistan, auditors used property receipt transaction data that were generated from MIDAS to determine whether the audited entity had
Hussain, Zainudin; Man, Azmi; Othman, Ahmad Sofiman
2011-12-01
Weedy rice (WR) is the most significant weed in direct-seeded fields. It has morphological characteristics similar to those of cultivated rice varieties. WR is more difficult to control than other weeds. We collected WR accessions from four sites within the Pulau Pinang rice growing areas. Thirty six different accessions were collected from each site: B, the northern site; P, the central site; A, the southern site; and N, the southwestern site. Wild rice (Oryza rufipogon), which grows in the sampled areas, was also collected together with four varieties (MR84, MR185, MR211 and MR219) that have been widely planted in these areas for a long period of time. The objective of this study was to compare the morphological characteristics of the WR accessions and cultivated rice. Twenty characteristics were observed for the comparison of WR accessions and rice cultivars. Morpho-matrix analyses allowed the specimens to be grouped to two main groups (A and B), based on a 95% dissimilarity matrix. Group A was subdivided into 7 subgroups consisting of a few WR accessions, wild rice and MR211 (control), and group B was subdivided to 10 subgroups consisting of other WR accessions and the 3 other control varieties. Dendrogram analysis indicated that the morphological traits used in this study were able to differentiate among the WR accessions and the cultivars, except for rice cultivar MR211 and WRA8, which grouped together in subgroup A2. STRUCTURE program analysis indicated that all individuals were distinguishable and were divided into 18 clusters. These results suggest that some genes of the WR accessions have been influenced by commercial varieties. The information gained from this study will be useful to develop rice weed management protocols and good agricultural practices to control WR in the future.
The private management of public hospitals.
Rundall, T G; Lambert, W K
1984-01-01
Since the public sector traditionally has provided the public goods viewed as unprofitable by the private sector, the growing trend to manage public hospitals under outside private contract raises some fundamental issues of concern. It is hypothesized here that the system maintenance and output goals of privately managed public hospitals become increasingly similar to those of investor-owned hospitals. The thesis is empirically tested using documented effects of private contract management on the operative goals of short-term, general hospitals owned by local governmental bodies. Traditionally managed public hospitals matched with the study hospitals on important characteristics serve as the control group. Costs do appear to be reduced under private contract management, but the service structure becomes somewhat altered. It is the task of public health policymakers to reconcile the cost-control and efficiency mechanisms brought about by private management with the community's right of access to comprehensive medical care. Carefully structured regionalization plans--a possible means of providing both--will require the stimulation of more government involvement during an era of cutbacks. PMID:6490379
15 CFR 923.24 - Shorefront access and protection planning.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Shorefront access and protection... COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Special Management Areas § 923.24 Shorefront access and protection planning. (a) The management program must include a definition of the term...
15 CFR 923.24 - Shorefront access and protection planning.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Shorefront access and protection... COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Special Management Areas § 923.24 Shorefront access and protection planning. (a) The management program must include a definition of the term...
15 CFR 923.24 - Shorefront access and protection planning.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Shorefront access and protection... COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Special Management Areas § 923.24 Shorefront access and protection planning. (a) The management program must include a definition of the term...
15 CFR 923.24 - Shorefront access and protection planning.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Shorefront access and protection... COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Special Management Areas § 923.24 Shorefront access and protection planning. (a) The management program must include a definition of the term...
15 CFR 923.24 - Shorefront access and protection planning.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 3 2014-01-01 2014-01-01 false Shorefront access and protection... COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Special Management Areas § 923.24 Shorefront access and protection planning. (a) The management program must include a definition of the term...
DOD Weapon Systems Software Management Study, Appendix B. Shipborne Systems
1975-06-01
program management, from Inception to development maintenance, 2. Detailed documentation requirements, 3. Standard high -level language development (CS-1...the Guided Missile School (GMS) at Dam Neck. The APL Land-Based Test Site (LETS) consisted of a Mk 152 digital fire control computer, SPG-55B radar...instruction and data segments are respectively placed in low and high core addresses to take advantage of UYK-7 memory accessing time savings. UYK-7
Autonomous Information Unit: Why Making Data Smart Can also Make Data Secured?
NASA Technical Reports Server (NTRS)
Chow, Edward T.
2006-01-01
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and self-manage. In our approach, we decompose data into smaller pieces and provide individualized protection. We also provide a policy control mechanism to allow 'smart' access control and context based re-assembly of the decomposed data. By combining smart policy with individually protected data, we are able to provide better protection of sensitive information and achieve more flexible access during emergency conditions. As a result, this new fine-grain protection mechanism can enable us to achieve better solutions for problems such as distributed information protection and identity theft.
Shared Medical Imaging Repositories.
Lebre, Rui; Bastião, Luís; Costa, Carlos
2018-01-01
This article describes the implementation of a solution for the integration of ownership concept and access control over medical imaging resources, making possible the centralization of multiple instances of repositories. The proposed architecture allows the association of permissions to repository resources and delegation of rights to third entities. It includes a programmatic interface for management of proposed services, made available through web services, with the ability to create, read, update and remove all components resulting from the architecture. The resulting work is a role-based access control mechanism that was integrated with Dicoogle Open-Source Project. The solution has several application scenarios like, for instance, collaborative platforms for research and tele-radiology services deployed at Cloud.
Smith-Strøm, Hilde; Iversen, Marjolein M; Graue, Marit; Skeie, Svein; Kirkevold, Marit
2016-10-01
Diabetic foot ulcers are a feared complication of diabetes. Care delivered via telemedicine is suggested to be a more integrated care pathway to manage diabetic foot ulcers than traditionally delivered healthcare. Our aim was to explore patients' experiences with telemedicine follow-up care as compared to traditional care. Interpretive description was used as an analysis strategy. Data were collected using individual semi-structured interviews in the context of a larger ongoing clustered randomized controlled trial. Twenty-four patients (13 in the intervention group; 11 in the control group), aged 38-88 years were purposively recruited from the RCT in order to obtain a diverse sample in terms of group composition (intervention vs. control), age, gender, marital status, setting, and comorbidities present. The control group received traditional care. Three themes emerged from the interpretive analysis: competence of healthcare professionals, continuity of care, and easy access. This was independed of types of follow-up that had limited impact on the patients' follow-up experiences. Competence of healthcare professionals and continuity of care were crucial, because they can either enhance or jeopardize wound care. If these two latter factors were absent, patients would lose confidence in the wound care process. If this happened, patients pointed out that the expert knowledge of a specialist clinic was essential to receive good care. When telemedicine functioned optimally, telemedicine was an advantage in the treatment, because the images quickly captured changes in the wound healing that immediately could be corrected. Easy access is important for patients, but the importance of accessibility appears to be primary when the other two factors were present. The best wound care pathway for patients with diabetes foot ulcers is depended on a combination of competence and professional skills in wound management, and continuity of care. If telemedicine is functioning as intended, it can be an important additional tool. Copyright © 2016. Published by Elsevier Ireland Ltd.
Roundabouts and access management : [summary].
DOT National Transportation Integrated Search
2014-03-01
Roundabouts, once rare in the U.S., are : being installed more often to address access : management and safety concerns. Access : management is how planners look at means of : entering and exiting a roadway, for example, how : to place features such ...
Modeling rural landowners' hunter access policies in East Texas, USA
NASA Astrophysics Data System (ADS)
Wright, Brett A.; Fesenmaier, Daniel R.
1988-03-01
Private landowners in East Texas, USA, were aggregated into one of four policy categories according to the degree of access allowed to their lands for hunting. Based on these categories, a logistic regression model of possible determinants of access policy was developed and probabilities of policy adoption were calculated. Overwhelmingly, attitudes toward hunting as a sport, incentives, and control over the actions of hunters were most predictive of landowners' policies. Additionally, the availability of deer was found to be negatively correlated with access, thereby suggesting management efforts to increase deer populations may be counter to increasing access. Further, probabilities derived from the model indicated that there was almost a 7 in 10 chance (0.66) that landowners would adopt policies commensurate with allowing family and personal acquaintances to hunt on their property. However, the probability of increasing access beyond this level, where access was provided for the general public, dropped off drastically to less than 5% (0.04).
Knowledge management for chronic patient control and monitoring
NASA Astrophysics Data System (ADS)
Pedreira, Nieves; Aguiar-Pulido, Vanessa; Dorado, Julián; Pazos, Alejandro; Pereira, Javier
2014-10-01
Knowledge Management (KM) can be seen as the process of capturing, developing, sharing, and effectively using organizational knowledge. In this context, the work presented here proposes a KM System to be used in the scope of chronic patient control and monitoring for distributed research projects. It was designed in order to enable communication between patient and doctors, as well as to be usedbythe researchers involved in the project for its management. The proposed model integrates all the information concerning every patient and project management tasks in the Institutional Memory of a KMSystem and uses an ontology to maintain the information and its categorization independently. Furthermore, taking the philosophy of intelligent agents, the system will interact with the user to show him the information according to his preferences and access rights. Finally, three different scenarios of application are described.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-05-17
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
38 CFR 52.90 - Participant behavior and program practices.
Code of Federal Regulations, 2010 CFR
2010-07-01
... use of a sedating psychotropic drug to manage or control behavior. (ii) Physical restraint is any method of physically restricting a person's freedom of movement, physical activity or normal access to... any chemical or physical restraints imposed for purposes of discipline or convenience. When a...
Captive insurance: is it the right choice for your insurance exposures?
Frese, Richard C
2015-12-01
Potential benefits of a captive insurance company include: Broader coverage Improved cash flow and stability. Direct access to reinsurance markets. Tax advantages. Better handling and control of risk management and claims. Potential drawbacks and challenges include: Startup capitalization. Underwriting losses. Administration and commitment.
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
34 CFR 361.82 - Evaluation standards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... with disabilities under the VR program. (b) A DSU must achieve successful performance on both evaluation standards during each performance period. (c) The evaluation standards for the VR program are— (1... equal access to VR services. (Approved by the Office of Management and Budget under control number 1820...
Gender Preferences in Technology Student Association Competitions
ERIC Educational Resources Information Center
Mitts, Charles R.
2008-01-01
Society is increasingly dominated by rapidly evolving systems of technology. The goal of technology education, as an academic component of public education, is to ensure that students become "technologically literate" members of society who are able to understand, access, use, manage, and control these technological systems.…
User Centric Policy Management
ERIC Educational Resources Information Center
Cheek, Gorrell P.
2013-01-01
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…
75 FR 8043 - National Institute of Standards and Technology
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... the National Institute of Standards and Technology (``NIST''), U.S. Department of Commerce, is... and commonwealths, to NIST's interest in the invention embodied in U.S. Patent No. 6,088,679 (Application No. 08/ 980,908), titled ``Workflow Management Employing Role-based Access Control,'' NIST Docket...
78 FR 59344 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-26
... includes the Navy Access Control Management System (NACMS) and the U.S. Marine Corps Biometric and... identifying or verifying an individual through the use of biometric databases and associated data processing... appear in person, record their personal identifiable information on the SECNAV 5512/1 Department of the...
Ho, Kendall; Newton, Lana; Boothe, Allison; Novak-Lauscher, Helen
2015-01-01
The mobile Digital Access to a Web-enhanced Network (mDAWN) program was implemented as an online, mobile self-management system to support patients with type-2 diabetes and their informal caregivers. Patients used wireless physiological sensors, received text messages, and had access to a secure web platform with health resources and semi-facilitated discussion forum. Outcomes were evaluated using (1) pre and post self-reported health behavior measures, (2) physiological outcomes, (3) program cost, and (4) in-depth participant interviews. The group had significantly decreased health distress, HbA1c levels, and systolic blood pressure. Participants largely saw the mDAWN as providing good value for the costs involved and found the program to be empowering in gaining control over their diabetes. mHealth programs have the potential to improve clinical outcomes through cost effective patient-led care for chronic illness. Further evaluation needs to examine integration of similar mHealth programs into the patient-physician relationship.
Managed care and the quality of substance abuse treatment.
Shepard, Donald S; Daley, Marilyn; Ritter, Grant A; Hodgkin, Dominic; Beinecke, Richard H
2002-12-01
In the US, the spiraling costs of substance abuse and mental health treatment caused many state Medicaid agencies to adopt managed behavioral health care (MBHC) plans during the 1990s. Although research suggests that these plans have successfully reduced public sector spending, their impact on the quality of substance abuse treatment has not been established. The Massachusetts Medicaid program started a risk-sharing contract with MHMA, a private, for-profit specialty managed behavioral health care (MBHC) carve-out vendor on July 1, 1992. This paper evaluates the carve-out s impact on spending per inpatient episode and three proxy measures of quality: (i) access to inpatient treatment (ii) 30-day re-admissions and (iii) continuity of care. Medicaid claims for inpatient treatment were collapsed into episodes. Clients were tracked across the five-year period and an interrupted time series design was used to compare the three quality outcomes and spending in the year prior to (FY1992) and the four years during MHMA (FY1993-FY1996). Logistic and linear regression models were used to control for race, disability status, age, gender and primary diagnosis. Despite a 99% reduction in the use of hospital-based settings, access to 24-hour services overall increased by 38%, largely due to an expansion in the use of freestanding detoxification and acute residential services. Continuity improved by 73%. Nevertheless, rates of 7-day (58%) and 30-day (24%) readmission increased significantly, even after controlling for increases in disability status. Per episode spending decreased by 76% ($2,773), characterized by a dramatic spending reduction in FY1993 that was maintained but not augmented in subsequent years. The carve-out had mixed effects on the quality of substance abuse treatment. While one of the three measures (readmission rates) deteriorated, two improved (access and continuity). Rapid re-admissions were strongly associated with shorter lengths of stay, suggesting that strengthening discharge planning may preserve the benefits of MBHC while avoiding its risks. Since reductions in Medicaid spending were impressive but finite, MBHC may not be the permanent solution to inflation in behavioral health care. MBHC firms should implement quality-monitoring programs to ensure that aggressive utilization management strategies do not compromise quality of care. The impact of managed behavioral health care should ideally be evaluated in randomized controlled studies. In addition, research is needed to establish that the quality measures employed in this evaluation - improved access, enhanced continuity and fewer rapid re-admissions actually correspond to reductions in drug or alcohol use and other favorable outcomes obtained through client self-report or urinalysis.
2014-01-01
Background To design and test a web-based self-management tool for patients with type 2 diabetes for its usability and feasibility. Methods An evidence-based, theory-driven website was created for patients with type 2 diabetes. Twenty-three patients with type 2 diabetes aged ≥ 25 years were recruited from 2 diabetes care centers in Toronto, Canada. We employed focus group methodology to assess acceptability, sustainability, strengths and weaknesses of the self-management website. Based on these results, revisions were made to the website. Three cycles of individual usability testing sessions using cognitive task analysis were conducted with patients with type 2 diabetes. Revisions to the website were made based on results from this testing. Results We identified five themes concerning participants’ experiences of health care and related unmet needs: 1) Desire for information and for greater access to timely and personalized care to gain a sense of control of their disease; 2) Desire for community (sharing experiences with others) to fulfill practical and emotional needs; 3) Potential roles of an online self-management website in self-empowerment, behavior change, self-management and health care delivery; 4) Importance of a patient-centered perspective in presenting content (e.g. common assumptions, medical nomenclature, language, messaging, sociocultural context); 5) Barriers and facilitators to use of a self-management website (including perceived relevance of content, incorporation into usual routine, availability for goal-directed use, usability issues). Conclusions Participants outlined a series of unmet health care needs, and stated that they wanted timely access to tailored knowledge about their condition, mechanisms to control and track their disease, and opportunities to share experiences with other patients. These findings have implications for patients with type 2 diabetes of diverse ages, socioeconomic backgrounds, and disease severity, as well as to the design of other computer-based resources for chronic disease management. PMID:25056379
Yu, Catherine H; Parsons, Janet A; Hall, Susan; Newton, David; Jovicic, Aleksandra; Lottridge, Danielle; Shah, Baiju R; Straus, Sharon E
2014-07-23
To design and test a web-based self-management tool for patients with type 2 diabetes for its usability and feasibility. An evidence-based, theory-driven website was created for patients with type 2 diabetes. Twenty-three patients with type 2 diabetes aged ≥ 25 years were recruited from 2 diabetes care centers in Toronto, Canada. We employed focus group methodology to assess acceptability, sustainability, strengths and weaknesses of the self-management website. Based on these results, revisions were made to the website. Three cycles of individual usability testing sessions using cognitive task analysis were conducted with patients with type 2 diabetes. Revisions to the website were made based on results from this testing. We identified five themes concerning participants' experiences of health care and related unmet needs: 1) Desire for information and for greater access to timely and personalized care to gain a sense of control of their disease; 2) Desire for community (sharing experiences with others) to fulfill practical and emotional needs; 3) Potential roles of an online self-management website in self-empowerment, behavior change, self-management and health care delivery; 4) Importance of a patient-centered perspective in presenting content (e.g. common assumptions, medical nomenclature, language, messaging, sociocultural context); 5) Barriers and facilitators to use of a self-management website (including perceived relevance of content, incorporation into usual routine, availability for goal-directed use, usability issues). Participants outlined a series of unmet health care needs, and stated that they wanted timely access to tailored knowledge about their condition, mechanisms to control and track their disease, and opportunities to share experiences with other patients. These findings have implications for patients with type 2 diabetes of diverse ages, socioeconomic backgrounds, and disease severity, as well as to the design of other computer-based resources for chronic disease management.
NASA Astrophysics Data System (ADS)
Shavlovskyi, V. I.; Puha, S. P.; Vidmachenko, A. P.; Volovyk, D. V.; Puha, G. P.; Obolonskyi, V. O.; Kratko, O. O.; Stefurak, M. V.
2018-05-01
The telescope AZT-2 of the MAO of NAS of Ukraine in recent years has been widely use for photometric, spectral and polarimetric observations of celestial objects. In 2012-2017 at automation of the operation of telescope AZT-2, we created a control program for a personal computer (PC), which is now used to control as separate nodes of the telescope AZT-2, and for control of the telescope, in remote access mode. Also in 2017, a number of astronomical observations with spectropolarimetric equipment and other astronomical devices were carried out. The results obtained by us have shown that in order to complete work on management of telescope under astronomical observations in the mode of remote access with the help of a PC - need to further refine the control nodes by powerful servo motors of reducer drive for the rapid transfer of the AZT-2 telescope to a new position.
Managing Information Resources for Accessibility.
ERIC Educational Resources Information Center
General Services Administration, Washington, DC. Clearinghouse on Computer Accommodation.
This handbook presents guidance for federal managers and other personnel who are unfamiliar with the policy and practice of information accessibility to accommodate users with disabilities and to provide for their effective access to information resources. It addresses federal requirements for accessibility, adopting accessibility as a sound…
Challenges in Obtaining Property Access: The FUSRAP Maywood Site Experience - 13433
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kollar, William
2013-07-01
The Formerly Utilized Sites Remedial Action Program (FUSRAP) is the US government program started in 1974 to identify, investigate and clean up or control sites that became contaminated as a result of the nation's early atomic programs. Many of these sites are not owned by the federal government and therefore require owner permission to enter. The experience in pursuing such access at the FUSRAP Maywood Superfund Site (the Maywood Site or the Site) in Bergen County, New Jersey, is extensive. Since the US Army Corps of Engineers (the Corps) assumed responsibility for the Maywood Site from the US Department ofmore » Energy in 1997, at least 186 separate property access agreements (known in FUSRAP as a Real Estate Right-of- Entry or ROE) have been executed between the Corps and approximately 55 different land owners and tenant occupants at the Maywood Site (agreement renewals with the same owners over time account for the difference). Maywood's experience during the Corps' tenure, reflected here in three case studies of representative property access efforts, offers some lessons and best practices that may apply to other remedial programs. While the Site Community Relations Manager (the author of this paper) managed the property access task, multi-disciplinary support from across the project was also critical to success in this endeavor. (authors)« less
Developing an Ontology for Ocean Biogeochemistry Data
NASA Astrophysics Data System (ADS)
Chandler, C. L.; Allison, M. D.; Groman, R. C.; West, P.; Zednik, S.; Maffei, A. R.
2010-12-01
Semantic Web technologies offer great promise for enabling new and better scientific research. However, significant challenges must be met before the promise of the Semantic Web can be realized for a discipline as diverse as oceanography. Evolving expectations for open access to research data combined with the complexity of global ecosystem science research themes present a significant challenge, and one that is best met through an informatics approach. The Biological and Chemical Oceanography Data Management Office (BCO-DMO) is funded by the National Science Foundation Division of Ocean Sciences to work with ocean biogeochemistry researchers to improve access to data resulting from their respective programs. In an effort to improve data access, BCO-DMO staff members are collaborating with researchers from the Tetherless World Constellation (Rensselaer Polytechnic Institute) to develop an ontology that formally describes the concepts and relationships in the data managed by the BCO-DMO. The project required transforming a legacy system of human-readable, flat files of metadata to well-ordered controlled vocabularies to a fully developed ontology. To improve semantic interoperability, terms from the BCO-DMO controlled vocabularies are being mapped to controlled vocabulary terms adopted by other oceanographic data management organizations. While the entire process has proven to be difficult, time-consuming and labor-intensive, the work has been rewarding and is a necessary prerequisite for the eventual incorporation of Semantic Web tools. From the beginning of the project, development of the ontology has been guided by a use case based approach. The use cases were derived from data access related requests received from members of the research community served by the BCO-DMO. The resultant ontology satisfies the requirements of the use cases and reflects the information stored in the metadata database. The BCO-DMO metadata database currently contains information that powers several different user and machine-to-machine interfaces to the BCO-DMO data repositories. One goal of the ontology development project is to enable subsequent development of semantically-enabled components (e.g. faceted search) to enhance the power of those interfaces. Addition of semantic capabilities to the existing data interfaces will improve data access through enhanced data discovery. In addition to sharing the ontology, we will describe the challenges encountered thus far in the project, the technologies currently being used, and the strategies associated with the use case based informatics approach.
Namisango, Eve; Allsop, Matthew J; Powell, Richard A; Friedrichsdorf, Stefan J; Luyirika, Emmanuel B K; Kiyange, Fatia; Mukooza, Edward; Ntege, Chris; Garanganga, Eunice; Ginindza-Mdluli, Mavis Ntombifuthi; Mwangi-Powell, Faith; Mondlane, Lidia Justino; Harding, Richard
2018-03-01
Sub-Saharan Africa faces an increasing incidence and prevalence of life-limiting and life-threatening conditions. These conditions are associated with a significant burden of pain linked to high morbidity and disability that is poorly assessed and undertreated. Barriers to effective pain management partly relate to lack of access to opioid analgesia and challenges in their administration. To identify country-specific and broader regional barriers to access, as well as the administration of opioids, and generate recommendations for advancing pain management in Southern Africa. A parallel mixed methods design was used across three countries: Mozambique, Swaziland, and Zimbabwe. Three activities were undertaken: 1) a review of regulatory and policy documentation, 2) group interviews, and 3) a self-administered key informant survey. Barriers to accessing opioid analgesics for medical use include overly restrictive controlled medicines' laws; use of stigmatizing language in key documents; inaccurate actual opioid consumption estimation practices; knowledge gaps in the distribution, storage, and prescription of opioids; critical shortage of prescribers; and high out-of-pocket financial expenditures for patients against a backdrop of high levels of poverty. Policies and relevant laws should be updated to ensure that the legislative environment supports opioid access for pain management. Action plans for improving pain treatment for patients suffering from HIV or non-communicable diseases should address barriers at the different levels of the supply chain that involve policymakers, administrators, and service providers. Copyright © 2017 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.
Aguirre, Erik
2018-01-01
In the context of hospital management and operation, Intensive Care Units (ICU) are one of the most challenging in terms of time responsiveness and criticality, in which adequate resource management and signal processing play a key role in overall system performance. In this work, a context aware Intensive Care Unit is implemented and analyzed to provide scalable signal acquisition capabilities, as well as to provide tracking and access control. Wireless channel analysis is performed by means of hybrid optimized 3D Ray Launching deterministic simulation to assess potential interference impact as well as to provide required coverage/capacity thresholds for employed transceivers. Wireless system operation within the ICU scenario, considering conventional transceiver operation, is feasible in terms of quality of service for the complete scenario. Extensive measurements of overall interference levels have also been carried out, enabling subsequent adequate coverage/capacity estimations, for a set of Zigbee based nodes. Real system operation has been tested, with ad-hoc designed Zigbee wireless motes, employing lightweight communication protocols to minimize energy and bandwidth usage. An ICU information gathering application and software architecture for Visitor Access Control has been implemented, providing monitoring of the Boxes external doors and the identification of visitors via a RFID system. The results enable a solution to provide ICU access control and tracking capabilities previously not exploited, providing a step forward in the implementation of a Smart Health framework. PMID:29382148
FixO3: Advancement towards Open Ocean Observatory Data Management Harmonisation
NASA Astrophysics Data System (ADS)
Behnken, Andree; Pagnani, Maureen; Huber, Robert; Lampitt, Richard
2015-04-01
Since 2002 there has been a sustained effort, supported as European framework projects, to harmonise both the technology and the data management of Open Ocean fixed observatories run by European nations. FixO3 started in September 2013, and for 3 more years will coordinate the convergence of data management best practice across a constellation of moorings in the Atlantic, in both hemispheres, and in the Mediterranean. To ensure the continued existence of these unique sources of oceanographic data as sustained observatories it is vital to improve access to the data collected, both in terms of methods of presentation, real-time availability, long-term archiving and quality assurance. The data management component of FixO3 improves access to marine observatory data by harmonising data management standards, formats and workflows covering the complete life cycle of data from real time data acquisition to long-term archiving. Legal and data policy aspects have been examined and discussed to identify transnational barriers to open-access to marine observatory data. As a result, a harmonised FixO3 data policy was drafted, which provides a formal basis for data exchange between FixO3 infrastructures, and also enables open access to data for the general public. FixO3 interacts with other European infrastructures such as EMODnet, SeaDataNet, PANGAEA, and especially aims to harmonise efforts with OceanSites and MyOcean. The project landing page (www.fixo3.eu) offers detailed information about every observatory as well as data visualisations and direct downloads. In addition to this, metadata for all FixO3 - relevant data are available from the searchable FixO3 metadata catalogue, which is also accessible from the project web page. This catalogue is hosted by PANGAEA and receives updates in regular intervals. The FixO3 Standards & Services registry ties in with the GEOSS Components and Services Registry (CSR) and provides additional observatory information. The data management efforts are central to FixO3. As a result of the procedural and technological harmonisation efforts undertaken in the project, the FixO3 network of observatories is accumulating unique, quality controlled data sets that will develop into a legacy repository of openly accessible oceanographic data.
An evidential approach to problem solving when a large number of knowledge systems is available
NASA Technical Reports Server (NTRS)
Dekorvin, Andre
1989-01-01
Some recent problems are no longer formulated in terms of imprecise facts, missing data or inadequate measuring devices. Instead, questions pertaining to knowledge and information itself arise and can be phrased independently of any particular area of knowledge. The problem considered in the present work is how to model a problem solver that is trying to find the answer to some query. The problem solver has access to a large number of knowledge systems that specialize in diverse features. In this context, feature means an indicator of what the possibilities for the answer are. The knowledge systems should not be accessed more than once, in order to have truly independent sources of information. Moreover, these systems are allowed to run in parallel. Since access might be expensive, it is necessary to construct a management policy for accessing these knowledge systems. To help in the access policy, some control knowledge systems are available. Control knowledge systems have knowledge about the performance parameters status of the knowledge systems. In order to carry out the double goal of estimating what units to access and to answer the given query, diverse pieces of evidence must be fused. The Dempster-Shafer Theory of Evidence is used to pool the knowledge bases.
Ford, Tamsin; Edwards, Vanessa; Sharkey, Siobhan; Ukoumunne, Obioha C; Byford, Sarah; Norwich, Brahm; Logan, Stuart
2012-08-30
Childhood antisocial behaviour has high immediate and long-term costs for society and the individual, particularly in relation to mental health and behaviours that jeopardise health. Managing challenging behaviour is a commonly reported source of stress and burn out among teachers, ultimately resulting in a substantial number leaving the profession. Interventions to improve parenting do not transfer easily to classroom-based problems and the most vulnerable parents may not be easily able to access them. Honing teachers' skills in proactive behaviour management and the promotion of socio-emotional regulation, therefore, has the potential to improve both child and teacher mental health and well-being and the advantage that it might potentially benefit all the children subsequently taught by any teacher that accesses the training. Cluster randomised controlled trial (RCT) of the Incredible Years teacher classroom management (TCM) course with combined economic and process evaluations.One teacher of children aged 4-9 years, from 80 schools in the South West Peninsula will be randomised to attend the TCM (intervention arm) or to "teach as normal" (control arm). The primary outcome measure will be the total difficulties score from the Strengths and Difficulties Questionnaire (SDQ) completed by the current class teachers prior to randomisation, and at 9, 18 and 30 months follow-up, supplemented by parent SDQs. Secondary measures include academic attainment (teacher report supplemented by direct measurement in a sub-sample), children's enjoyment of school, and teacher reports of their professional self-efficacy, and levels of burn out and stress, supplemented by structured observations of teachers classroom management skills in a subsample. Cost data for the economic evaluation will be based on parental reports of services accessed. Cost-effectiveness, using the SDQ as the measure of effect, will be examined over the period of the RCT and over the longer term using decision analytic modelling. The process evaluation will use quantitative and qualitative approaches to assess fidelity to model, as well as explore Head teacher and teachers' experiences of TCM and investigate school factors that influence the translation of skills learnt to practice. This study will provide important information about whether the Teacher Classroom Management course influences child and teacher mental health and well-being in both the short and long term. It will also provide valuable insights into factors that may facilitate or impede any impact.The trial has been registered with ISCTRN (Controlled Trials Ltd) and assigned an ISRCTN number ISRCTN84130388. (http://www.controlled-trials.com/isrctn/search.html?srch=ISRCTN84130388&sort=3&dir=desc&max=10).
2012-01-01
Background Childhood antisocial behaviour has high immediate and long-term costs for society and the individual, particularly in relation to mental health and behaviours that jeopardise health. Managing challenging behaviour is a commonly reported source of stress and burn out among teachers, ultimately resulting in a substantial number leaving the profession. Interventions to improve parenting do not transfer easily to classroom-based problems and the most vulnerable parents may not be easily able to access them. Honing teachers’ skills in proactive behaviour management and the promotion of socio-emotional regulation, therefore, has the potential to improve both child and teacher mental health and well-being and the advantage that it might potentially benefit all the children subsequently taught by any teacher that accesses the training. Methods/Design Cluster randomised controlled trial (RCT) of the Incredible Years teacher classroom management (TCM) course with combined economic and process evaluations. One teacher of children aged 4–9 years, from 80 schools in the South West Peninsula will be randomised to attend the TCM (intervention arm) or to “teach as normal” (control arm). The primary outcome measure will be the total difficulties score from the Strengths and Difficulties Questionnaire (SDQ) completed by the current class teachers prior to randomisation, and at 9, 18 and 30 months follow-up, supplemented by parent SDQs. Secondary measures include academic attainment (teacher report supplemented by direct measurement in a sub-sample), children’s enjoyment of school, and teacher reports of their professional self-efficacy, and levels of burn out and stress, supplemented by structured observations of teachers classroom management skills in a subsample. Cost data for the economic evaluation will be based on parental reports of services accessed. Cost-effectiveness, using the SDQ as the measure of effect, will be examined over the period of the RCT and over the longer term using decision analytic modelling. The process evaluation will use quantitative and qualitative approaches to assess fidelity to model, as well as explore Head teacher and teachers’ experiences of TCM and investigate school factors that influence the translation of skills learnt to practice. Discussion This study will provide important information about whether the Teacher Classroom Management course influences child and teacher mental health and well-being in both the short and long term. It will also provide valuable insights into factors that may facilitate or impede any impact. The trial has been registered with ISCTRN (Controlled Trials Ltd) and assigned an ISRCTN number ISRCTN84130388. (http://www.controlled-trials.com/isrctn/search.html?srch=ISRCTN84130388&sort=3&dir=desc&max=10) PMID:22935476
Selling Our Collecting Souls: How License Agreements Are Controlling Collection Management.
ERIC Educational Resources Information Center
McGinnis, Suzan D.
2000-01-01
Considers the challenges that licensing for electronic products are creating for academic libraries. Discusses ownership of versus access to information; packaging of electronic journals; cost-benefit analysis; multiple versions of the same information, e.g. print and electronic; consortial agreements; negotiating; legal issues; and the question…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
...'s own trading system (other than any risk management controls established for purposes of compliance... establishing a two-phased approach to implementation.\\6\\ In the first phase, the Commission provided a... through a sponsored access arrangement \\8\\ (``Phase One''). In the [[Page 20961
9 CFR 351.22 - Certified plants to maintain records and make reports; access to records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION AND CERTIFICATION CERTIFICATION OF TECHNICAL ANIMAL FATS FOR... the regulations in this part. (Approved by the Office of Management and Budget under control number...
9 CFR 351.22 - Certified plants to maintain records and make reports; access to records.
Code of Federal Regulations, 2012 CFR
2012-01-01
... INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION AND CERTIFICATION CERTIFICATION OF TECHNICAL ANIMAL FATS FOR... the regulations in this part. (Approved by the Office of Management and Budget under control number...
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
ERIC Educational Resources Information Center
Mussa, Constance C.
2011-01-01
In recent years, many health care organizations have begun to take advantage of computerized information systems to facilitate more effective and efficient management and processing of information. However, commensurate with the vastly innovative enhancements that computer technology has contributed to traditional paper-based health care…
A School-Based Program for Overweight and Obese Adolescents: A Randomized Controlled Trial
ERIC Educational Resources Information Center
Pbert, Lori; Druker, Susan; Barton, Bruce; Schneider, Kristin L.; Olendzki, Barbara; Gapinski, Mary A.; Kurtz, Stephen; Osganian, Stavroula
2016-01-01
Background: Given the dramatic increase in adolescent overweight and obesity, models are needed for implementing weight management treatment through readily accessible venues. We evaluated the acceptability and efficacy of a school-based intervention consisting of school nurse-delivered counseling and an afterschool exercise program in improving…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-28
... NUCLEAR REGULATORY COMMISSION [Docket No. NRC-2013-0112] Agency Information Collection Activities... for employment), contractors, and consultants of NRC licensees and contractors whose activities involve access to, or control over, special nuclear material at either fixed sites or for transportation...
27 CFR 6.6 - Administrative provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... reasonable times have access to, for the purpose of examination, and the right to copy any documentary... and the production of all such documentary evidence relating to any matter under investigation, upon a.... (Approved by the Office of Management and Budget under control number 1512-0392) [T.D. ATF-364, 60 FR 20421...
27 CFR 8.6 - Administrative provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... reasonable times have access to, for the purpose of examination, and the right to copy any documentary... and the production of all such documentary evidence relating to any matter under investigation, upon a.... (Approved by the Office of Management and Budget under control number 1512-0392) [T.D. ATF-364, 60 FR 20425...
27 CFR 10.6 - Administrative provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... reasonable times have access to, for the purpose of examination, and the right to copy any documentary... and the production of all such documentary evidence relating to any matter under investigation, upon a.... (Approved by the Office of Management and Budget under control number 1512-0392) [T.D. ATF-364, 60 FR 20426...
Supporting Student Self-Regulation to Access the General Education Curriculum
ERIC Educational Resources Information Center
Korinek, Lori; deFur, Sharon H.
2016-01-01
Educators express an almost universal desire for students to exhibit self-control--that is, manage, monitor, and assess their own social and academic behaviors. These skills comprise self-regulation, a complex set of functions derived from several fields of research, including social cognition (Zimmerman, 2000), self-determination (Wehmeyer &…
DOT National Transportation Integrated Search
2012-10-01
The development of raised medians is an important access management technique commonly used in urban settings. It : can be used to control or restrict mid-block left turns, U-turns or crossing maneuvers for implementing of alternative : left-turn/U-t...
1987-01-16
menus , controls user and device access to the system, manages the security features associated with menus , devices, and users, provides...in the files, or the number of files in the system. 2-2 3.0 MODULE INPUT PROCESSES 3.1 Summary of Input Processes The EE module contains many menu ...Output Processes The EE module contains many menu options which enable the user to obtain needed information from the module. These options can be
Kondoh, Hiroshi; Teramoto, Kei; Kawai, Tatsurou; Mochida, Maki; Nishimura, Motohiro
2013-01-01
A Newly developed Oshidori-Net2, providing medical professionals with remote access to electronic patient record systems (EPR) and PACSs of four hospitals, of different venders, using cloud computing technology and patient identifier cross reference manager. The operation was started from April 2012. The patients moved to other hospital were applied. Objective is to show the merit and demerit of the new system.
Corbel, Vincent; Fonseca, Dina M; Weetman, David; Pinto, João; Achee, Nicole L; Chandre, Fabrice; Coulibaly, Mamadou B; Dusfour, Isabelle; Grieco, John; Juntarajumnong, Waraporn; Lenhart, Audrey; Martins, Ademir J; Moyes, Catherine; Ng, Lee Ching; Raghavendra, Kamaraju; Vatandoost, Hassan; Vontas, John; Muller, Pie; Kasai, Shinji; Fouque, Florence; Velayudhan, Raman; Durot, Claire; David, Jean-Philippe
2017-06-02
Vector-borne diseases transmitted by insect vectors such as mosquitoes occur in over 100 countries and affect almost half of the world's population. Dengue is currently the most prevalent arboviral disease but chikungunya, Zika and yellow fever show increasing prevalence and severity. Vector control, mainly by the use of insecticides, play a key role in disease prevention but the use of the same chemicals for more than 40 years, together with the dissemination of mosquitoes by trade and environmental changes, resulted in the global spread of insecticide resistance. In this context, innovative tools and strategies for vector control, including the management of resistance, are urgently needed. This report summarizes the main outputs of the first international workshop on Insecticide resistance in vectors of arboviruses held in Rio de Janeiro, Brazil, 5-8 December 2016. The primary aims of this workshop were to identify strategies for the development and implementation of standardized insecticide resistance management, also to allow comparisons across nations and across time, and to define research priorities for control of vectors of arboviruses. The workshop brought together 163 participants from 28 nationalities and was accessible, live, through the web (> 70,000 web-accesses over 3 days).
Scheid, Teresa L; Smith, Galen H
2017-07-01
The authors examined the association between physician-patient concordance and patient trust for low socio-economic status women who were enrolled in Medicaid case management. The data were collected from October 2006 through March 2007 from a stratified random sample of 2,815 adult beneficiaries enrolled in North Carolina Medicaid's primary care case management delivery system. We limited our analyses to women enrolled in primary care, hence controlling for gender and social class as well as access to care. We were also able to control for the availability of minority providers. The findings revealed that the enrollee's race, education, and experiences seeking help with their health providers were significantly related to patient's trust of their physicians. Neither race concordance nor gender concordance improved trust. This may be because relatively few minority providers were included in the sample. These results extend research on physician-patient concordance by examining the relationship of both racial and gender concordance with patient trust while controlling for access and social class. Research on physician-patient concordance needs to account for multiple measures of social status, as well as differences in culture and communication styles between physicians and their patients.
Lee, Hwan Young; Song, Injee; Ha, Eunho; Cho, Sung-Bae; Yang, Woo Ick; Shin, Kyoung-Jin
2008-01-01
Background For the past few years, scientific controversy has surrounded the large number of errors in forensic and literature mitochondrial DNA (mtDNA) data. However, recent research has shown that using mtDNA phylogeny and referring to known mtDNA haplotypes can be useful for checking the quality of sequence data. Results We developed a Web-based bioinformatics resource "mtDNAmanager" that offers a convenient interface supporting the management and quality analysis of mtDNA sequence data. The mtDNAmanager performs computations on mtDNA control-region sequences to estimate the most-probable mtDNA haplogroups and retrieves similar sequences from a selected database. By the phased designation of the most-probable haplogroups (both expected and estimated haplogroups), mtDNAmanager enables users to systematically detect errors whilst allowing for confirmation of the presence of clear key diagnostic mutations and accompanying mutations. The query tools of mtDNAmanager also facilitate database screening with two options of "match" and "include the queried nucleotide polymorphism". In addition, mtDNAmanager provides Web interfaces for users to manage and analyse their own data in batch mode. Conclusion The mtDNAmanager will provide systematic routines for mtDNA sequence data management and analysis via easily accessible Web interfaces, and thus should be very useful for population, medical and forensic studies that employ mtDNA analysis. mtDNAmanager can be accessed at . PMID:19014619
A controllable sensor management algorithm capable of learning
NASA Astrophysics Data System (ADS)
Osadciw, Lisa A.; Veeramacheneni, Kalyan K.
2005-03-01
Sensor management technology progress is challenged by the geographic space it spans, the heterogeneity of the sensors, and the real-time timeframes within which plans controlling the assets are executed. This paper presents a new sensor management paradigm and demonstrates its application in a sensor management algorithm designed for a biometric access control system. This approach consists of an artificial intelligence (AI) algorithm focused on uncertainty measures, which makes the high level decisions to reduce uncertainties and interfaces with the user, integrated cohesively with a bottom up evolutionary algorithm, which optimizes the sensor network"s operation as determined by the AI algorithm. The sensor management algorithm presented is composed of a Bayesian network, the AI algorithm component, and a swarm optimization algorithm, the evolutionary algorithm. Thus, the algorithm can change its own performance goals in real-time and will modify its own decisions based on observed measures within the sensor network. The definition of the measures as well as the Bayesian network determine the robustness of the algorithm and its utility in reacting dynamically to changes in the global system.
NASA Astrophysics Data System (ADS)
Alvarez, Alejandro; Beche, Alexandre; Furano, Fabrizio; Hellmich, Martin; Keeble, Oliver; Rocha, Ricardo
2012-12-01
The Disk Pool Manager (DPM) is a lightweight solution for grid enabled disk storage management. Operated at more than 240 sites it has the widest distribution of all grid storage solutions in the WLCG infrastructure. It provides an easy way to manage and configure disk pools, and exposes multiple interfaces for data access (rfio, xroot, nfs, gridftp and http/dav) and control (srm). During the last year we have been working on providing stable, high performant data access to our storage system using standard protocols, while extending the storage management functionality and adapting both configuration and deployment procedures to reuse commonly used building blocks. In this contribution we cover in detail the extensive evaluation we have performed of our new HTTP/WebDAV and NFS 4.1 frontends, in terms of functionality and performance. We summarize the issues we faced and the solutions we developed to turn them into valid alternatives to the existing grid protocols - namely the additional work required to provide multi-stream transfers for high performance wide area access, support for third party copies, credential delegation or the required changes in the experiment and fabric management frameworks and tools. We describe new functionality that has been added to ease system administration, such as different filesystem weights and a faster disk drain, and new configuration and monitoring solutions based on the industry standards Puppet and Nagios. Finally, we explain some of the internal changes we had to do in the DPM architecture to better handle the additional load from the analysis use cases.
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
Consumer-directed health care: implications for health care organizations and managers.
Guo, Kristina L
2010-01-01
This article uses a pyramid model to illustrate the key components of consumer-directed health care. Consumer-directed health care is considered the essential strategy needed to lower health care costs and is valuable for making significant strides in health care reform. Consumer-directed health care presents new challenges and opportunities for all health care stakeholders and their managers. The viability of the health system depends on the success of managers to respond rapidly and with precision to changes in the system; thus, new and modified roles of managers are necessary to successfully sustain consumerism efforts to control costs while maintaining access and quality.
Chapman, Ann LN; Darton, Thomas C; Foster, Rachel A
2013-01-01
Tuberculosis (TB) remains a global health emergency. Ongoing challenges include the coordination of national and international control programs, high levels of drug resistance in many parts of the world, and availability of accurate and rapid diagnostic tests. The increasing availability and reliability of Internet access throughout both affluent and resource-limited countries brings new opportunities to improve TB management and control through the integration of web-based technologies with traditional approaches. In this review, we explore current and potential future use of web-based tools in the areas of TB diagnosis, treatment, epidemiology, service monitoring, and teaching and training. PMID:24294008
Spatially explicit control of invasive species using a reaction-diffusion model
Bonneau, Mathieu; Johnson, Fred A.; Romagosa, Christina M.
2016-01-01
Invasive species, which can be responsible for severe economic and environmental damages, must often be managed over a wide area with limited resources, and the optimal allocation of effort in space and time can be challenging. If the spatial range of the invasive species is large, control actions might be applied only on some parcels of land, for example because of property type, accessibility, or limited human resources. Selecting the locations for control is critical and can significantly impact management efficiency. To help make decisions concerning the spatial allocation of control actions, we propose a simulation based approach, where the spatial distribution of the invader is approximated by a reaction–diffusion model. We extend the classic Fisher equation to incorporate the effect of control both in the diffusion and local growth of the invader. The modified reaction–diffusion model that we propose accounts for the effect of control, not only on the controlled locations, but on neighboring locations, which are based on the theoretical speed of the invasion front. Based on simulated examples, we show the superiority of our model compared to the state-of-the-art approach. We illustrate the use of this model for the management of Burmese pythons in the Everglades (Florida, USA). Thanks to the generality of the modified reaction–diffusion model, this framework is potentially suitable for a wide class of management problems and provides a tool for managers to predict the effects of different management strategies.
Hong, Wuyang; Yang, Chengyun; Chen, Liuxin; Zhang, Fangfang; Shen, Shaoqing; Guo, Renzhong
2017-04-15
Ecological control line is a system innovation in the field of ecological environment protection in China and it has become as an important strategy of national ecological protection. Ten years have passed since the first ecological control line in Shenzhen was delimited in 2005. This study examines the connotations of ecological control line and the current study status in China and abroad, and then takes a brief description about the delimitation background and existing problems of the ecological control line in Shenzhen. The problem-solving strategy is gradually transforming from extensive management to refined management. This study proposes a differential ecological space management model that merges the space system, management system, and support system. The implementation paths include the following five aspects: delimiting ecological bottom lines to protect core ecological resources; formulating access systems for new construction projects to strictly control new construction; implementing construction land inventory reclamation assisted by market means; regulating boundary adjusting procedures and processes; and constructing ecological equity products by using multiple means to implement rights relief. Finally, this study illustrates the progress of the implementation and discusses the rigorousness and flexibility problems of ecological control line and calls for the promotion of the legislation. The management model and implementation paths proposed in this study have referential significance for developing countries and megacities to achieve ecological protection and sustainable development. Copyright © 2017 Elsevier Ltd. All rights reserved.
An Intelligent Parking Management System for Urban Areas
Vera-Gómez, Juan A.; Quesada-Arencibia, Alexis; García, Carmelo R.; Suárez Moreno, Raúl; Guerra Hernández, Fernando
2016-01-01
In this article we describe a low-cost, minimally-intrusive system for the efficient management of parking spaces on both public roads and controlled zones. This system is based on wireless networks of photoelectric sensors that are deployed on the access roads into and out of these areas. The sensors detect the passage of vehicles on these roads and communicate this information to a data centre, thus making it possible to know the number of vehicles in the controlled zone and the occupancy levels in real-time. This information may be communicated to drivers to facilitate their search for a parking space and to authorities so that they may take steps to control traffic when congestion is detected. PMID:27338397
An enhanced Ada run-time system for real-time embedded processors
NASA Technical Reports Server (NTRS)
Sims, J. T.
1991-01-01
An enhanced Ada run-time system has been developed to support real-time embedded processor applications. The primary focus of this development effort has been on the tasking system and the memory management facilities of the run-time system. The tasking system has been extended to support efficient and precise periodic task execution as required for control applications. Event-driven task execution providing a means of task-asynchronous control and communication among Ada tasks is supported in this system. Inter-task control is even provided among tasks distributed on separate physical processors. The memory management system has been enhanced to provide object allocation and protected access support for memory shared between disjoint processors, each of which is executing a distinct Ada program.
Managing Information On Technical Requirements
NASA Technical Reports Server (NTRS)
Mauldin, Lemuel E., III; Hammond, Dana P.
1993-01-01
Technical Requirements Analysis and Control Systems/Initial Operating Capability (TRACS/IOC) computer program provides supplemental software tools for analysis, control, and interchange of project requirements so qualified project members have access to pertinent project information, even if in different locations. Enables users to analyze and control requirements, serves as focal point for project requirements, and integrates system supporting efficient and consistent operations. TRACS/IOC is HyperCard stack for use on Macintosh computers running HyperCard 1.2 or later and Oracle 1.2 or later.
McMahon, Graham T; Fonda, Stephanie J; Gomes, Helen E; Alexis, George; Conlin, Paul R
2012-11-01
Care management may improve the quality of diabetes care by enhancing contact between high-risk patients and their providers. This prospective, longitudinal, randomized trial sought to investigate whether telephone or online care management improves diabetes-related outcomes over time compared with usual care supplemented with Internet access and training. One hundred fifty-one adult subjects with type 2 diabetes mellitus and an elevated hemoglobin A1c (A1c) level (≥8.5%) were randomly assigned to online care management (n=51), telephone-based care management (n=51), or Web training (n=49) groups. Online and telephone participants interacted with a care manager through a diabetes education and care management Web site and by telephone, respectively. The Web training group was provided with online diabetes self-management resources but no care management support. The primary outcome measure was A1c measured every 3 months for a year. A1c declined significantly and substantially in all groups over 12 months. A1c declined linearly at a rate of 0.32% (P<0.0001) per quarter for the online group, 0.36% (P<0.0001) for the telephone group, and 0.41% for the Web training group (P<0.0001). The rate of change over time did not differ significantly among groups. The groups converged at 12 months with average absolute A1c difference of -1.5%. The number of interactions with care providers was not significantly associated with the change in A1c. Blood pressure, weight, lipid levels, and diabetes distress did not differ among groups over time. Online, telephone-based care management, and Web training for diabetes patients with elevated A1c were each associated with a substantial improvement in A1c over a 1-year period. Internet access and training alone may be as effective as care management in patients with poorly controlled diabetes.
Entrepreneurial proliferation: Russia`s nuclear industry suits the buyers market. Master`s thesis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Whalen, T.D.; Williams, A.R.
1995-06-01
The Soviet Union collapsed in December 1991, bringing an end to four decades of the Cold War. A system of tight centralized controls has given way to chaotic freedom and un-managed, entrepreneurial capitalism. Of immediate concern to most world leaders has been the control and safety of over 30,000 Soviet nuclear weapons. After 1991, the Soviet, centralized system of management lost one key structural element: a reliable `human factor` for nuclear material control. The Soviet systems for physical security and material control are still in place in the nuclear inheritor states - Russia, Ukraine, Khazakhnstan, and Belarus - but theymore » do not restrain or regulate their nuclear industry. In the chaos created by the Soviet collapse, the nonproliferation regime may not adequately temper the supply of the nuclear materials of the new inheritor states. This could permit organizations or states seeking nuclear weapons easier access to fissile materials. New initiatives such as the United States Cooperative Threat Reduction program, which draws upon U.S. technology and expertise to help the NIS solve these complex problems, are short-tern tactics. At present there are no strategies which address the long-tern root problems caused by the Soviet collapse.This thesis demonstrates the extent of the nuclear control problems in Russia. Specifically, we examine physical security, material control and accounting regulation and enforcement, and criminal actions. It reveals that the current lack of internal controls make access to nuclear materials easier for aspiring nuclear weapons States.« less
Burkiewicz, Jill S
2005-08-01
To determine the effect of access to ambulatory anticoagulation management services (AMS) on the rate of warfarin use in patients with atrial fibrillation. Retrospective medical record review. Two ambulatory care clinics in the same managed care system: one with and one without access to pharmacist-managed AMS. One hundred seventy-eight patients with atrial fibrillation diagnosed between June 2000 and June 2001. Warfarin use was assessed overall and by contraindications and risk factors for stroke. Independent predictors of therapy were identified. The overall rate of warfarin use in atrial fibrillation was higher in the clinic with access to AMS than in the clinic without access (77.9% vs 61.7%, p=0.03). In patients with no known contraindications, warfarin use increased by 20.2% with access to AMS versus no access (80.2% vs 60.0%, p=0.023). Patients aged 65 years or older with one or more risk factors for stroke and no contraindications were more likely to receive warfarin in the clinic with access to AMS than in the clinic without access (85.1% vs 53.8%, p=0.001). Access to AMS was an independent predictor of warfarin use (odds ratio 2.19, 95% confidence interval [CI] 1.05-4.56). Female sex was an independent negative predictor of warfarin use (odds ratio 0.48, 95% CI 0.24-0.96). In the managed care setting, use of warfarin for stroke prophylaxis in patients with atrial fibrillation was higher in the ambulatory care clinic with access to pharmacist-managed AMS than in the clinic without access.
Beyond the online catalog: developing an academic information system in the sciences.
Crawford, S; Halbrook, B; Kelly, E; Stucki, L
1987-01-01
The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed. PMID:3315052
Beyond the online catalog: developing an academic information system in the sciences.
Crawford, S; Halbrook, B; Kelly, E; Stucki, L
1987-07-01
The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed.
Park, Chang-Seop
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-12-31
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General`s Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-01-01
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General's Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
Hanberger, Lena; Ludvigsson, Johnny; Nordfeldt, Sam
2013-08-23
Diabetes requires extensive self-care and comprehensive knowledge, making patient education central to diabetes self-management. Web 2.0 systems have great potential to enhance health information and open new ways for patients and practitioners to communicate. To develop a Web portal designed to facilitate self-management, including diabetes-related information and social networking functions, and to study its use and effects in pediatric patients with diabetes. A Web 2.0 portal was developed in collaboration with patients, parents, and practitioners. It offered communication with local practitioners, interaction with peers, and access to relevant information and services. Children and adolescents with diabetes in a geographic population of two pediatric clinics in Sweden were randomized to a group receiving passwords for access to the portal or a control group with no access (n=230) for 1 year. All subjects had access during a second study year. Users' activity was logged by site and page visits. Health-related quality of life (HRQOL), empowerment (DES), and quality of information (QPP) questionnaires were given at baseline and after 1 and 2 study years. Clinical data came from the Swedish pediatric diabetes quality registry SWEDIABKIDS. There was a continuous flow of site visits, decreasing in summer and Christmas periods. In 119/233 families (51%), someone visited the portal the first study year and 169/484 (35%) the second study year. The outcome variables did not differ between intervention and control group. No adverse treatment or self-care effects were identified. A higher proportion of mothers compared to fathers visited once or more the first year (P<.001) and the second year (P<.001). The patients who had someone in the family visiting the portal 5 times or more, had shorter diabetes duration (P=.006), were younger (P=.008), had lower HbA1c after 1 year of access (P=.010), and were more often girls (P<.001). Peer interaction seems to be a valued aspect. The Web 2.0 portal may be useful as a complement to traditional care for this target group. Widespread use of a portal would need integration in routine care and promotion by diabetes team members. International Standard Randomized Controlled Trial Number (ISRCTN):92107365; http://www.controlled-trials.com/ISRCTN92107365/ (Archived by WebCite at http://webcitation.org/6IkiIvtSb).
Data Management Guidance in the Context of Climate Risk-Management
NASA Astrophysics Data System (ADS)
Sylak-Glassman, E.
2016-12-01
Climate risk-management, while a national issue, often occurs at a local level. To prepare for the effects of climate change, community decision-makers require a diverse set of data from historical records, social science, observations, and models, much of which is collected and curated by Federal agencies. The President's Climate Action Plan calls for building stronger and safer communities and infrastructure to prepare the United States for the impacts of climate change, and the Obama Administration has prioritized making Federal data more discoverable, accessible, and usable to inform both climate risk-management, and other data-informed decisions. In order to understand the state of guidance for data provision for climate risk-management, we analyzed Federal, agency, and interagency documents such as the Common Framework for Earth-Observation Data, related to open data, climate data, and data management in general. We examined guidance related to the principles of data discovery, access, and ease of use, as well as the data management categories of application programming interfaces, controlled vocabularies and ontologies, metadata, persistent dataset identifiers, preservation, and usage metrics. This analysis showed both the extent of guidance provided, as well as gaps in guidance. Following the literature review, we held structured conversations with Federal climate data managers and tool developers to identify areas where further efforts could enhance provision of agency data for climate risk-management. Our analysis can be used by data managers to understand how various data management practices can help improve climate risk-management and where to find further guidance.
Increasing access and support for emergency management higher education programs.
Cwiak, Carol L
2014-01-01
The number of emergency management higher education programs has grown dramatically since 1994 when the FEMA Higher Education Program was created to propagate and support such growth. Data collected annually since 2007 from emergency management higher education programs shows that these programs face some consistent challenges. These challenges were coupled with annual data on program access and support indicators via dimensional analysis to answer the questions: To what extent are the challenges linked to a lack of access or support? If there is linkage, what can be gleaned from these linkages that can help address the challenges through improving access and support? The analysis showed that lack of access to funding and resources, and lack of support from partner organizations, has an impact on emergency management higher education. Discussion of that impact is followed with detailed recommendations that are focused on strengthening both internal and external access and support relationships for emergency management higher education programs.
Exploration Medical System Demonstration (EMSD) Project
NASA Technical Reports Server (NTRS)
Chin, Duane
2012-01-01
The Exploration Medical System Demonstration (EMSD) is a project under the Exploration Medical Capability (ExMC) element managed by the Human Research Program (HRP). The vision for the EMSD is to utilize ISS as a test bed to show that several medical technologies needed for an exploration mission and medical informatics tools for managing evidence and decision making can be integrated into a single system and used by the on-orbit crew in an efficient and meaningful manner. Objectives: a) Reduce and even possibly eliminate the time required for on-orbit crew and ground personnel (which include Surgeon, Biomedical Engineer (BME) Flight Controller, and Medical Operations Data Specialist) to access and move medical data from one application to another. b) Demonstrate that the on-orbit crew has the ability to access medical data/information using an intuitive and crew-friendly software solution to assist/aid in the treatment of a medical condition. c) Develop a common data management framework and architecture that can be ubiquitously used to automate repetitive data collection, management, and communications tasks for all crew health and life sciences activities.
2000-02-01
Pharmacy costs are outpacing other healthcare expenditures, with psychotropic medications accounting for 16% to 25% of the total pharmacy costs. Managed care organizations (MCOs) can be expected to exert considerable pressure to control such costs. Avenues for cost containment include changing the management and spending decisions of MCOs, influencing physician prescribing patterns, encouraging economically efficient pharmacy policies and procedures, and controlling patient access to prescription drugs. From the cost standpoint of an MCO, briefer approaches to treating depressed patients are desirable. The MCOs prefer a limited number of psychotherapeutic sessions, rapid titration and prescription of higher dosage levels of appropriate drugs, and a longer continuation phase of pharmacological treatment to avert a relapse.
Liu, Xuemei; Ge, Baofeng
2012-04-01
This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.
First Experiences Using XACML for Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit
2003-01-01
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.
Augusto, Lia Giraldo da Silva; Gurgel, Idê Gomes Dantas; Câmara Neto, Henrique Fernandes; de Melo, Carlos Henrique; Costa, André Monteiro
2012-06-01
The scope of this article is to analyze the challenges involved in ensuring access to water for human consumption taking the international and national context into consideration. Based on the UN declaration that access to safe and clean drinking water is a fundamental human right, vulnerabilities are identified that can consist in restrictions to access to adequate supplies. The distribution of water and the population across the planet, pollution, inadequate policies and management lead to environmental injustice. The iniquity of access to water constitutes the contemporary water crisis. From the 1980s onwards, the transnational water market emerged for private control that occurs at three main levels: surface and underground water sources; bottled water; and public water supply services. The conflicts of the multiple uses of water resources, the market and environmental problems have contributed to rendering the health of the population and ecosystems vulnerable. Adequate public policies are essential to ensure the basic human right to access to safe and clean drinking water.
Niesink, A; Trappenburg, J C A; de Weert-van Oene, G H; Lammers, J W J; Verheij, T J M; Schrijvers, A J P
2007-11-01
Chronic disease management for patients with chronic obstructive pulmonary disease (COPD) may improve quality, outcomes and access to care. To investigate effectiveness of chronic disease management programmes on the quality-of-life of people with COPD. Medline and Embase (1995-2005) were searched for relevant articles, and reference lists and abstracts were searched for controlled trials of chronic disease management programmes for patients with COPD. Quality-of-life was assessed as an outcome parameter. Two reviewers independently reviewed each paper for methodological quality and extracted the data. We found 10 randomized-controlled trials comparing chronic disease management with routine care. Patient populations, health-care professionals, intensity, and content of the intervention were heterogeneous. Different instruments were used to assess quality of life. Five out of 10 studies showed statistically significant positive outcomes on one or more domains of the quality of life instruments. Three studies, partly located in primary care, showed positive results. All chronic disease management projects for people with COPD involving primary care improved quality of life. In most of the studies, aspects of chronic disease management were applied to a limited extent. Quality of randomized-controlled trials was not optimal. More research is needed on chronic disease management programmes in patients with COPD across primary and secondary care.
Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal
2011-01-01
In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following:more » 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.« less
Polycythemia Vera Management and Challenges in the Community Health Setting
Gerds, Aaron T.; Dao, Kim-Hien
2017-01-01
Patients with polycythemia vera (PV) experience shortened survival, increased risk of thromboembolic and hemorrhagic events, and burdensome symptoms. For all patients with PV, treatment with aspirin and hematocrit control with phlebotomy are recommended. In addition, patients with high-risk status or poor hematocrit control benefit from cytoreductive therapy with hydroxyurea, although approximately 1 in 4 patients develops resistance or intolerance. For patients who are resistant to or intolerant of hydroxyurea, studies have shown that ruxolitinib, a Janus kinase 1/2 inhibitor, provides hematocrit control, reduces spleen size, normalizes blood counts, and improves PV-related symptoms. For many patients, PV is managed in a community health setting, and it is important that community hematologists, oncologists, and internists are familiar with the contemporary management of PV to improve patient outcomes, including management for patients who present with unique health-care needs. This review provides an overview of current treatment options for patients with PV and discusses challenging circumstances encountered by community providers in the management of PV, including symptom assessment, identification of hydroxyurea resistance/intolerance, pregnancy, elective surgeries, concomitant immunosuppressants, and managing patients in areas with limited access to specialized hematologic care. PMID:28095380
Using the Internet in the management of asthma.
Patel, A M
2001-01-01
The ultimate goals of managing asthma are to eliminate death, prevent or promptly treat exacerbations, and maximize the quality of life and health status of patients. Current strategies include appropriate education, trigger control, and timely access to effective pharmacotherapy and follow-up. Internet-based technologies have emerged as potentially powerful tools to enable meaningful communication and proactive partnership in care for various medical conditions. The main types of Internet-based applications for asthma management include remote monitoring and feedback between health professionals and their patients; online education and marketing for either patients or professionals; networking and collaborative research; and administrative oversight through policy making, planning, and decision support. With increased understanding of integrated disease management and the technostructural as well as psychodynamic issues related to Internet use, further refinement and evolution of the Internet and related technologies may drastically improve the way we monitor, educate, treat, and establish policies for this global problem while attending to individual or local community needs. This review presents a conceptual overview of the current challenges and use of the Internet for improving asthma management through timely and tailored education and appropriate access to health care expertise.
Changing an automated drug inventory control system to a data base design.
Bradish, R A
1982-09-01
A pharmacy department's change from indexed sequential access files to a data base management system (DBMS) for purposes of automated inventory control is described. The DBMS has three main functional areas: (1) inventory ordering and accountability, (2) charging of interdepartmental and intradepartmental orders, and (3) data manipulation with report design for management control. There are seven files directly related to the inventory ordering and accountability area. Each record can be accessed directly or through another file. Information on the quantity of a drug on hand, drug(s) supplied by a specific vendor, status of a purchase order, or calculation of an estimated order quantity can be retrieved quickly. In the drug master file, two records contain a reorder point and safety-stock level that are determined by searching the entries in the order history file and vendor master file. The intradepartmental and interdepartmental orders section contains five files assigned to record and store information on drug distribution. All items removed from the stockroom and distributed are recorded, and reports can be generated for itemized bills, total cost by area, and as formatted files for the accounts payable department. The design, development, and implementation of the DBMS took approximately a year using a part-time pharmacist and minimal outside help, while the previous system required constant expensive help of a programmer/analyst. The DBMS has given the pharmacy department a flexible inventory management system with increased drug control, decreased operating expenses, increased use of department personnel, and the ability to develop and enhance other systems.
44 CFR 6.32 - Granting access.
Code of Federal Regulations, 2013 CFR
2013-10-01
... access. (a) Upon receipt of a request for access to non-exempt records, the system manager shall make... its receipt by FEMA. The acknowledgment shall indicate when the system manager will make the records available. (b) If the system manager anticipates more than a 10 day delay in making a record available, he...
44 CFR 6.32 - Granting access.
Code of Federal Regulations, 2014 CFR
2014-10-01
... access. (a) Upon receipt of a request for access to non-exempt records, the system manager shall make... its receipt by FEMA. The acknowledgment shall indicate when the system manager will make the records available. (b) If the system manager anticipates more than a 10 day delay in making a record available, he...
44 CFR 6.32 - Granting access.
Code of Federal Regulations, 2011 CFR
2011-10-01
... access. (a) Upon receipt of a request for access to non-exempt records, the system manager shall make... its receipt by FEMA. The acknowledgment shall indicate when the system manager will make the records available. (b) If the system manager anticipates more than a 10 day delay in making a record available, he...
44 CFR 6.32 - Granting access.
Code of Federal Regulations, 2010 CFR
2010-10-01
... access. (a) Upon receipt of a request for access to non-exempt records, the system manager shall make... its receipt by FEMA. The acknowledgment shall indicate when the system manager will make the records available. (b) If the system manager anticipates more than a 10 day delay in making a record available, he...
Marshall Space Flight Center's role in EASE/ACCESS mission management
NASA Technical Reports Server (NTRS)
Hawkins, Gerald W.
1987-01-01
The Marshall Space Flight Center (MSFC) Spacelab Payload Project Office was responsible for the mission management and development of several successful payloads. Two recent space construction experiments, the Experimental Assembly of Structures in Extravehicular Activity (EASE) and the Assembly Concept for Construction of Erectable Space Structures (ACCESS), were combined into a payload managed by the center. The Ease/ACCESS was flown aboard the Space Shuttle Mission 61-B. The EASE/ACCESS experiments were the first structures assembled in space, and the method used to manage this successful effort will be useful for future space construction missions. The MSFC mission management responsibilities for the EASE/ACCESS mission are addressed and how the lessons learned from the mission can be applied to future space construction projects are discussed.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-01-01
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840
A Framework for Managing the Assured Information Sharing Lifecycle
2013-11-06
Mohamed Nabeel , Elisa Bertino: Privacy preserving delegated access control in the storage as a service model. IRI 2012: 645-652 • Mohamed Nabeel , Ning...2012: 67-68 • M. Nabeel , J. Zage, S. Kerr, E. Bertino, N. Athula Kulatunga, U. Sudheera Navaratne, M. Duren: Crypto- graphic Key Management for Smart...Military Communications Conf., Nov.2011. • Pramod Jagtap, Anupam Joshi, Tim Finin and Laura Zavala, Preserving Privacy in Context-Aware Sys - tems, Proc. 5th IEEE Int. Conf. on Semantic Computing, Oct. 2011.
Arts, Lindy P J; van de Poll-Franse, Lonneke V; van den Berg, Sanne W; Prins, Judith B; Husson, Olga; Mols, Floortje; Brands-Nijenhuis, Angelique V M; Tick, Lidwine; Oerlemans, Simone
2017-04-28
Patients with lymphoma are at risk of experiencing adverse physical and psychosocial problems from their cancer and its treatment. Regular screening of these symptoms by the use of patient-reported outcomes (PROs) could increase timely recognition and adequate symptom management. Moreover, self-management interventions intend to enhance knowledge and skills and empower patients to better manage their disease and related problems. The objective of the Lymphoma InterVEntion (LIVE) trial is to examine whether feedback to patients on their PROs and access to a web-based, self-management intervention named Living with lymphoma will increase self-management skills and satisfaction with information, and reduce psychological distress. The LIVE randomised controlled trial consists of three arms: (1) standard care, (2) PRO feedback, and (3) PRO feedback and the Living with lymphoma intervention. Patients who have been diagnosed with Hodgkin lymphoma, non-Hodgkin lymphoma, including chronic lymphocytic leukaemia, as registered in the Netherlands Cancer Registry in various hospitals will be selected for participation. Patients are invited via their haemato-oncologist 6 to 15 months after diagnosis. The PRO feedback includes a graphical overview of patients' own symptom and functioning scores and an option to compare their scores with those of other patients with lymphoma and a normative population of the same age and sex. The Living with lymphoma intervention is based on cognitive behavioural therapy components and includes information, assignments, assessments, and videos. Changes in outcomes from baseline to 16 weeks, 12, and 24 months post intervention will be measured. Primary outcomes are self-management skills, satisfaction with information, and psychological distress. Secondary outcomes are health-related quality of life, illness perceptions, fatigue, and health care use. The results of the LIVE trial will provide novel insights into whether access to PRO feedback and the Living with lymphoma intervention will be effective in increasing self-management skills and satisfaction with information, and reducing distress. The LIVE trial is embedded in a population-based registry, which provides a unique setting to ascertain information on response, uptake, and characteristics of patients with lymphoma in web-based intervention(s). When effective, PRO feedback and Living with lymphoma could serve as easily and widely accessible interventions for coping with lymphoma. Netherlands Trial Register, identifier NTR5953 . Registered on 14 July 2016.
Attaining and maintaining data integrity with configuration management
NASA Astrophysics Data System (ADS)
Huffman, Dorothy J.; Jeane, Shirley A.
1993-08-01
Managers and scientists are concerned about data integrity because they draw conclusions from data that can have far reaching effects. Projects managers use Configuration Management to insure that hardware, software, and project information are controlled. They have not, as yet, applied its rigorously to data. However, there is ample opportunity in the data collection and production process to jeopardize data integrity. Environmental changes, tampering and production problems can all affect data integrity. There are four functions included in the Configuration Management process: configuration identification, control, auditing and status accounting. These functions provide management the means to attain data integrity and the visibility into engineering processes needed to maintain data integrity. When project managers apply Configuration Management processes to data, the data user can trace back through history to validate data integrity. The user knows that the project allowed only orderly changes to the data. He is assured that project personnel followed procedures to maintain data quality. He also has access to status information about the data. The user receives data products with a known integrity level and a means to assess the impact of past events ont he conclusions derived from the data. To obtain these benefits, project managers should apply the Configuration Management discipline to data.
The Open Data Repository's Data Publisher
NASA Astrophysics Data System (ADS)
Stone, N.; Lafuente, B.; Downs, R. T.; Bristow, T.; Blake, D. F.; Fonda, M.; Pires, A.
2015-12-01
Data management and data publication are becoming increasingly important components of research workflows. The complexity of managing data, publishing data online, and archiving data has not decreased significantly even as computing access and power has greatly increased. The Open Data Repository's Data Publisher software (http://www.opendatarepository.org) strives to make data archiving, management, and publication a standard part of a researcher's workflow using simple, web-based tools and commodity server hardware. The publication engine allows for uploading, searching, and display of data with graphing capabilities and downloadable files. Access is controlled through a robust permissions system that can control publication at the field level and can be granted to the general public or protected so that only registered users at various permission levels receive access. Data Publisher also allows researchers to subscribe to meta-data standards through a plugin system, embargo data publication at their discretion, and collaborate with other researchers through various levels of data sharing. As the software matures, semantic data standards will be implemented to facilitate machine reading of data and each database will provide a REST application programming interface for programmatic access. Additionally, a citation system will allow snapshots of any data set to be archived and cited for publication while the data itself can remain living and continuously evolve beyond the snapshot date. The software runs on a traditional LAMP (Linux, Apache, MySQL, PHP) server and is available on GitHub (http://github.com/opendatarepository) under a GPLv2 open source license. The goal of the Open Data Repository is to lower the cost and training barrier to entry so that any researcher can easily publish their data and ensure it is archived for posterity. We gratefully acknowledge the support for this study by the Science-Enabling Research Activity (SERA), and NASA NNX11AP82A, Mars Science Laboratory Investigations and University of Arizona Geosciences.
Study of mobile satellite network based on GEO/LEO satellite constellation
NASA Astrophysics Data System (ADS)
Hu, Xiulin; Zeng, Yujiang; Wang, Ying; Wang, Xianhui
2005-11-01
Mobile satellite network with Inter Satellite Links (ISLs), which consists of non-geostationary satellites, has the characteristic of network topology's variability. This is a great challenge to the design and management of mobile satellite network. This paper analyzes the characteristics of mobile satellite network, takes multimedia Quality of Service (QoS) as the chief object and presents a reference model based on Geostationary Earth Orbit (GEO)/ Low Earth Orbit (LEO) satellite constellation which adapts to the design and management of mobile satellite network. In the reference model, LEO satellites constitute service subnet with responsibility for the access, transmission and switch of the multimedia services for mobile users, while GEO satellites constitute management subnet taking on the centralized management to service subnet. Additionally ground control centre realizes the whole monitoring and control via management subnet. Comparing with terrestrial network, the above reference model physically separates management subnet from service subnet, which not only enhances the advantage of centralized management but also overcomes the shortcoming of low reliability in terrestrial network. Routing of mobile satellite network based on GEO/LEO satellite constellation is also discussed in this paper.
Aeropropulsion facilities configuration control: Procedures manual
NASA Technical Reports Server (NTRS)
Lavelle, James J.
1990-01-01
Lewis Research Center senior management directed that the aeropropulsion facilities be put under configuration control. A Configuration Management (CM) program was established by the Facilities Management Branch of the Aeropropulsion Facilities and Experiments Division. Under the CM program, a support service contractor was engaged to staff and implement the program. The Aeronautics Directorate has over 30 facilities at Lewis of various sizes and complexities. Under the program, a Facility Baseline List (FBL) was established for each facility, listing which systems and their documents were to be placed under configuration control. A Change Control System (CCS) was established requiring that any proposed changes to FBL systems or their documents were to be processed as per the CCS. Limited access control of the FBL master drawings was implemented and an audit system established to ensure all facility changes are properly processed. This procedures manual sets forth the policy and responsibilities to ensure all key documents constituting a facilities configuration are kept current, modified as needed, and verified to reflect any proposed change. This is the essence of the CM program.
An employer's experience with infertility coverage: a case study.
Silverberg, Kaylen; Meletiche, Dennis; Del Rosario, Gina
2009-12-01
A case study of Southwest Airlines, a Fortune 500 company, demonstrates that a well-designed infertility coverage plan can control resource use. This successful model could be used by employers who wish to ensure that their employees have access to high-quality, cost-effective infertility services in a managed-care environment.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-08
...: Exchange Programs Alumni Web Site Registration ACTION: Notice of request for public comment. SUMMARY: The... following methods: Web: Persons with access to the Internet may use the Federal Docket Management System... Programs Alumni Web site Registration OMB Control Number: 1405-0192 Type of Request: Extension of an...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-27
... Control Number: 3060-XXXX. Title: Sections 1.1420; 1.1422; and 1.1424 Pole Attachment Access Requirements... mandate that communications companies (attachers) should be able to place facilities on utility poles. The... include the pole owner notifying all known entities with existing attachments and the requesting attacher...
NASA Technical Reports Server (NTRS)
Keller, Richard M.; Norvig, Peter (Technical Monitor)
2000-01-01
NASA's ScienceDesk Project at the Ames Research Center is responsible for scientific knowledge management which includes ensuring the capture, preservation, and traceability of scientific knowledge. Other responsibilities include: 1) Maintaining uniform information access which is achieved through intelligent indexing and visualization, 2) Collaborating both asynchronous and synchronous science teamwork, 3) Monitoring and controlling semi-autonomous remote experimentation.
ERIC Educational Resources Information Center
Walker, Mary Margaret
1996-01-01
A discussion of donor records in college and university fund-raising programs looks at a variety of issues, including who sees them (administrators, donors, volunteers, and members of the legal profession), how access to them is controlled, and what is kept in them. Suggestions are offered for managing such records, and the experiences of a number…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-23
... the sand dune habitat of the Coachella Valley. Access onto the Refuge is limited to a designated...), the Service would expand current habitat management activities to enhance habitat quality... support actions, implement an IPM plan to control invasive plants; enhance the habitat quality of an old...
Boosting a Low-Cost Smart Home Environment with Usage and Access Control Rules.
Barsocchi, Paolo; Calabrò, Antonello; Ferro, Erina; Gennaro, Claudio; Marchetti, Eda; Vairo, Claudio
2018-06-08
Smart Home has gained widespread attention due to its flexible integration into everyday life. Pervasive sensing technologies are used to recognize and track the activities that people perform during the day, and to allow communication and cooperation of physical objects. Usually, the available infrastructures and applications leveraging these smart environments have a critical impact on the overall cost of the Smart Home construction, require to be preferably installed during the home construction and are still not user-centric. In this paper, we propose a low cost, easy to install, user-friendly, dynamic and flexible infrastructure able to perform runtime resources management by decoupling the different levels of control rules. The basic idea relies on the usage of off-the-shelf sensors and technologies to guarantee the regular exchange of critical information, without the necessity from the user to develop accurate models for managing resources or regulating their access/usage. This allows us to simplify the continuous updating and improvement, to reduce the maintenance effort and to improve residents’ living and security. A first validation of the proposed infrastructure on a case study is also presented.
Bridging the Digital Divide in Diabetes: Family Support and Implications for Health Literacy
Mayberry, Lindsay S.; Kripalani, Sunil; Rothman, Russell L.
2011-01-01
Abstract Background Patient web portals (PWPs) offer patients remote access to their medical record and communication with providers. Adults with health literacy limitations are less likely to access and use health information technology (HIT), including PWPs. In diabetes, PWP use has been associated with patient satisfaction, patient–provider communication, and glycemic control. Methods Using mixed methods, we explored the relationships between health literacy, numeracy, and computer literacy and the usage of a PWP and HIT. Participants (N=61 adults with type 2 diabetes) attended focus groups and completed surveys, including measures of health literacy, numeracy, and computer anxiety (an indicator of computer literacy) and frequency of PWP and HIT use. Results Computer literacy was positively associated with health literacy (r=0.41, P<0.001) and numeracy (r=0.35, P<0.001), but health literacy was not associated with numeracy. Participants with limited health literacy (23%), numeracy (43%), or computer literacy (25%) were no less likely to access PWPs or HIT, but lower health literacy was associated with less frequent use of a computer to research diabetes medications or treatments. In focus groups, participants spontaneously commented on family support when accessing and using PWPs or HIT for diabetes management. Conclusions Participants reported family members facilitated access and usage of HIT, taught them usage skills, and acted as online delegates. Participant statements suggest family members may bridge the HIT “digital divide” in diabetes by helping adults access a PWP or HIT for diabetes management. PMID:21718098
Elbahnasy, Abdelhamid M; Farhat, Yasser A; Aboramadan, Ahmad R; Taha, Mohamed Rasheed
2010-12-01
Percutaneous endoscopic management of bladder stones is not new. The ideal technique to establish suprapubic access, however, is still not justified. In this study, we used the 12-mm self-retaining laparoscopic trocar for access during management of large bladder stones. With the patient in the lithotomy position, a 12-mm self-retaining laparoscopic trocar was inserted in a full bladder under cystoscopic visual control. A 28F nephroscope was used to fragment the stone using ultrasound and pneumoclast lithotriptors. After stone treatment, the trocar was left in place, and transurethral resection of the prostate (TURP) was completed when indicated. Both urethral and suprapubic catheters were left at the end of the procedure. Clinical examination, urinalysis, and ultrasonographic examination were routinely performed during follow-up visits. The mean stone size was 4.07 + 0.20 cm (2.8-6 cm). The average time for stone fragmentation was 32.78 + 2.16 minutes (range 8-53 min). A concomitant TURP was performed in 12 patients. The mean hospital stay was 2.56 + 0.15 days (range 1-4 days). All patients were stone free, and a total of six complications occurred, including extravasation, one patient; hematuria, two patients; and fever, three patients. All were treated conservatively. The mean follow-up time was 15.65 + 1.51 months (range 9-36 mos). Suprapubic percutaneous cystolithotripsy is a safe, minimally invasive alternative for management of large bladder stones. The use of a self-retaining trocar facilitates access and allows use of a large nephroscope for rapid fragmentation and extraction of the stone fragments. The presence of specific trocars for suprapubic access into the urinary bladder will encourage more transvesical end-laparoscopic procedures.
Andreu-Cazenave, Miguel; Subida, Maria Dulce; Fernandez, Miriam
2017-01-01
There is an urgent need to quantify the impacts of artisanal fisheries and define management practices that allow for the recovery and conservation of exploited stocks. The extent of illegal catch is particularly critical as a driver of overexploitation in artisanal fisheries. However, the lack of data at proper spatial scales limits the evaluation of illegal fishing and effectiveness of management practices. We used a catch curve analysis to estimate total instantaneous mortality as a proxy of fishing pressure in the artisanal benthic fishery in central Chile. We compared the patterns of total mortality in fishing grounds under the well-studied territorial use rights for fisheries system (TURF) immersed in a landscape of open access areas (OAA; no access restriction), and from these patterns determined the extent of illegal fishing in open access areas focusing on the two most frequently extracted resources: locos (Concholepas concholepas) and keyhole limpets (Fissurella spp.). The beauty of this seascape is the presence of the no-take (NT) area of Las Cruces as control (no fishing), allowing us to estimate natural mortality. Loco exploitation is banned in OAAs. However, loco mortality in OAAs was 92% higher than in the NT, and 42% higher than in TURFs. Keyhole limpet mortality was similar between TURFs and the NT, but doubled in OAAs. We also found strong differences in mortality among fishing grounds with the same level of protection (i.e. TURFs), and over time. Our results highlight (a) the high level of illegal fishing that may occur in artisanal fisheries under traditional management regimes, and (b) that TURFs can be effective to reduce fishing mortality. However, large variability among TURFs suggests the need for a deeper understanding of the drivers of success of TURFs.
Use of computers and the Internet for health information by patients with epilepsy.
Escoffery, Cam; Diiorio, Colleen; Yeager, Katherine A; McCarty, Frances; Robinson, Elise; Reisinger, Elizabeth; Henry, Thomas; Koganti, Archana
2008-01-01
The purpose of this study was to describe computer and Internet use among an online group and a clinic-based group of people with epilepsy. Greater than 95% of the online group and 60% of the clinic group have access to computers and the Internet. More than 99% of the online group and 57% of the clinic group used the Internet to find health information. A majority of people reported being likely to employ an Internet-based self-management program to control their epilepsy. About 43% reported searching for general information on epilepsy, 30% for medication, 23% for specific types of epilepsy, and 20% for treatment. This study found that people with epilepsy have access to computers and the Internet, desire epilepsy-specific information, and are receptive to online health information on how to manage their epilepsy.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... available in the Agencywide Documents Access and Management System (ADAMS) under Accession Number ML071420428. Documents: You can access publicly available documents related to this notice using the following..., Maryland. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly available documents...
Oceans 2.0 API: Programmatic access to Ocean Networks Canada's sensor data.
NASA Astrophysics Data System (ADS)
Heesemann, M.; Ross, R.; Hoeberechts, M.; Pirenne, B.; MacArthur, M.; Jeffries, M. A.; Morley, M. G.
2017-12-01
Ocean Networks Canada (ONC) is a not-for-profit society that operates and manages innovative cabled observatories on behalf of the University of Victoria. These observatories supply continuous power and Internet connectivity to various scientific instruments located in coastal, deep-ocean and Arctic environments. The data from the instruments are relayed to the University of Victoria where they are archived, quality-controlled and made freely available to researchers, educators, and the public. The Oceans 2.0 data management system currently contains over 500 terabytes of data collected over 11 years from thousands of sensors. In order to facilitate access to the data, particularly for large datasets and long-time series of high-resolution data, a project was started in 2016 create a comprehensive Application Programming Interface, the "Oceans 2.0 API," to provide programmatic access to all ONC data products. The development is part of a project entitled "A Research Platform for User-Defined Oceanographic Data Products," funded through CANARIE, a Canadian organization responsible for the design and delivery of digital infrastructure for research, education and innovation [1]. Providing quick and easy access to ONC Data Products from within custom software solutions, allows researchers, modelers and decision makers to focus on what is important: solving their problems, answering their questions and making informed decisions. In this paper, we discuss how to access ONC's vast archive of data programmatically, through the Oceans 2.0 API. In particular we discuss the following: Access to ONC Data Products Access to ONC sensor data in near real-time Programming language support Use Cases References [1] CANARIE. Internet: https://www.canarie.ca/; accessed March 6, 2017.
Urban Wood-Based Bio-Energy Systems in Seattle
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stan Gent, Seattle Steam Company
2010-10-25
Seattle Steam Company provides thermal energy service (steam) to the majority of buildings and facilities in downtown Seattle, including major hospitals (Swedish and Virginia Mason) and The Northwest (Level I) Regional Trauma Center. Seattle Steam has been heating downtown businesses for 117 years, with an average length of service to its customers of 40 years. In 2008 and 2009 Seattle Steam developed a biomass-fueled renewable energy (bio-energy) system to replace one of its gas-fired boilers that will reduce greenhouse gases, pollutants and the amount of waste sent to landfills. This work in this sub-project included several distinct tasks associated withmore » the biomass project development as follows: a. Engineering and Architecture: Engineering focused on development of system control strategies, development of manuals for start up and commissioning. b. Training: The project developer will train its current operating staff to operate equipment and facilities. c. Flue Gas Clean-Up Equipment Concept Design: The concept development of acid gas emissions control system strategies associated with the supply wood to the project. d. Fuel Supply Management Plan: Development of plans and specifications for the supply of wood. It will include potential fuel sampling analysis and development of contracts for delivery and management of fuel suppliers and handlers. e. Integrated Fuel Management System Development: Seattle Steam requires a biomass Fuel Management System to track and manage the delivery, testing, processing and invoicing of delivered fuel. This application will be web-based and accessed from a password-protected URL, restricting data access and privileges by user-level.« less
Rural household chicken management and challenges in the Upper River Region of the Gambia.
Olaniyan, Olawale Festus; Camara, Samba
2018-06-23
Systematic assessment and documentation of extensive livestock production systems are necessary to design or review breeding programs, extension services, and policies. This study therefore examined management practices and challenges concerning village chicken production in the Upper River Region of the Gambia. The data gathered with 45-variable semi-structured questionnaires were analyzed based on the household head's education status and gender. Illiteracy level was high, and only 38% indicated that they attended certain schools. There was a significant relationship (p < 0.05) and phi coefficient of 0.35 between household heads' education status and record keeping. None of the examined management practices had a statistically significant relationship (p > 0.05) with household heads' gender. Children (10-14 years) were mostly responsible for providing care to the chickens. Foundation and replacement stocks were mainly acquired through purchase (78%). Many households (74%) indicated supplementary feeding of their flocks but only 34% provided separate houses apart from the household dwellings. Newcastle (68%) was the most common disease. Sick birds were recognized by restlessness (34%) and diarrhea (28%). External parasites were mainly controlled through local practices (52%) while the most common way to dispose dead birds was to throw them away (88%). Up to 90% indicated no formal training on disease management and access to extension agents was also low (20%). Control of chicken movement was occasionally done to protect birds from predators (60%) and then, to avoid contagious diseases (38%). Individual farmers and their associations need to be supported by stakeholders to access relevant information and uptake improved management techniques.
Blood-brain barrier transport of drugs for the treatment of brain diseases.
Gabathuler, Reinhard
2009-06-01
The central nervous system is a sanctuary protected by barriers that regulate brain homeostasis and control the transport of endogenous compounds into the brain. The blood-brain barrier, formed by endothelial cells of the brain capillaries, restricts access to brain cells allowing entry only to amino acids, glucose and hormones needed for normal brain cell function and metabolism. This very tight regulation of brain cell access is essential for the survival of neurons which do not have a significant capacity to regenerate, but also prevents therapeutic compounds, small and large, from reaching the brain. As a result, various strategies are being developed to enhance access of drugs to the brain parenchyma at therapeutically meaningful concentrations to effectively manage disease.
Leveraging Commercially Issued Multi-Factor Identification Credentials
NASA Technical Reports Server (NTRS)
Baldridge, Tim W.
2010-01-01
This slide presentation reviews the Identity, Credential and Access Management (ICAM) system. This system is a complete system of identity management, access to desktops and applications, use of smartcards, and building access throughout NASA.
A development framework for artificial intelligence based distributed operations support systems
NASA Technical Reports Server (NTRS)
Adler, Richard M.; Cottman, Bruce H.
1990-01-01
Advanced automation is required to reduce costly human operations support requirements for complex space-based and ground control systems. Existing knowledge based technologies have been used successfully to automate individual operations tasks. Considerably less progress has been made in integrating and coordinating multiple operations applications for unified intelligent support systems. To fill this gap, SOCIAL, a tool set for developing Distributed Artificial Intelligence (DAI) systems is being constructed. SOCIAL consists of three primary language based components defining: models of interprocess communication across heterogeneous platforms; models for interprocess coordination, concurrency control, and fault management; and for accessing heterogeneous information resources. DAI applications subsystems, either new or existing, will access these distributed services non-intrusively, via high-level message-based protocols. SOCIAL will reduce the complexity of distributed communications, control, and integration, enabling developers to concentrate on the design and functionality of the target DAI system itself.
FRIEDA: Flexible Robust Intelligent Elastic Data Management Framework
Ghoshal, Devarshi; Hendrix, Valerie; Fox, William; ...
2017-02-01
Scientific applications are increasingly using cloud resources for their data analysis workflows. However, managing data effectively and efficiently over these cloud resources is challenging due to the myriad storage choices with different performance, cost trade-offs, complex application choices and complexity associated with elasticity, failure rates in these environments. The different data access patterns for data-intensive scientific applications require a more flexible and robust data management solution than the ones currently in existence. FRIEDA is a Flexible Robust Intelligent Elastic Data Management framework that employs a range of data management strategies in cloud environments. FRIEDA can manage storage and data lifecyclemore » of applications in cloud environments. There are four different stages in the data management lifecycle of FRIEDA – (i) storage planning, (ii) provisioning and preparation, (iii) data placement, and (iv) execution. FRIEDA defines a data control plane and an execution plane. The data control plane defines the data partition and distribution strategy, whereas the execution plane manages the execution of the application using a master-worker paradigm. FRIEDA also provides different data management strategies, either to partition the data in real-time, or predetermine the data partitions prior to application execution.« less
FRIEDA: Flexible Robust Intelligent Elastic Data Management Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ghoshal, Devarshi; Hendrix, Valerie; Fox, William
Scientific applications are increasingly using cloud resources for their data analysis workflows. However, managing data effectively and efficiently over these cloud resources is challenging due to the myriad storage choices with different performance, cost trade-offs, complex application choices and complexity associated with elasticity, failure rates in these environments. The different data access patterns for data-intensive scientific applications require a more flexible and robust data management solution than the ones currently in existence. FRIEDA is a Flexible Robust Intelligent Elastic Data Management framework that employs a range of data management strategies in cloud environments. FRIEDA can manage storage and data lifecyclemore » of applications in cloud environments. There are four different stages in the data management lifecycle of FRIEDA – (i) storage planning, (ii) provisioning and preparation, (iii) data placement, and (iv) execution. FRIEDA defines a data control plane and an execution plane. The data control plane defines the data partition and distribution strategy, whereas the execution plane manages the execution of the application using a master-worker paradigm. FRIEDA also provides different data management strategies, either to partition the data in real-time, or predetermine the data partitions prior to application execution.« less
The impact of managed care in dentistry.
Clouse, H R
1999-01-01
Managed care plans attempt to control health care expenditures aggressively. These plans directly influence access to medical care and the type, level, and frequency of care rendered. As a result, hospital stays are reduced, focus shifts from inpatient to outpatient care, and patients are responsible for a larger share of health care costs. Dentistry is not immune from the impact of managed care. The attractiveness of the dental market has drawn many managed care organizations, insurers, and entrepreneurs to encourage dentists to participate in a wide variety of managed care programs. However, the delivery of dental care differs markedly in many respects from that of medical care. Therefore, many of the cost saving aspects of managed care that have been so successful in medicine may not result in similar cost savings in dentistry.
Enhancing Ocean Research Data Access
NASA Astrophysics Data System (ADS)
Chandler, Cynthia; Groman, Robert; Shepherd, Adam; Allison, Molly; Arko, Robert; Chen, Yu; Fox, Peter; Glover, David; Hitzler, Pascal; Leadbetter, Adam; Narock, Thomas; West, Patrick; Wiebe, Peter
2014-05-01
The Biological and Chemical Oceanography Data Management Office (BCO-DMO) works in partnership with ocean science investigators to publish data from research projects funded by the Biological and Chemical Oceanography Sections and the Office of Polar Programs Antarctic Organisms & Ecosystems Program at the U.S. National Science Foundation. Since 2006, researchers have been contributing data to the BCO-DMO data system, and it has developed into a rich repository of data from ocean, coastal and Great Lakes research programs. While the ultimate goal of the BCO-DMO is to ensure preservation of NSF funded project data and to provide open access to those data, achievement of those goals is attained through a series of related phases that benefits from active collaboration and cooperation with a large community of research scientists as well as curators of data and information at complementary data repositories. The BCO-DMO is just one of many intermediate data management centers created to facilitate long-term preservation of data and improve access to ocean research data. Through partnerships with other data management professionals and active involvement in local and global initiatives, BCO-DMO staff members are working to enhance access to ocean research data available from the online BCO-DMO data system. Continuing efforts in use of controlled vocabulary terms, development of ontology design patterns and publication of content as Linked Open Data are contributing to improved discovery and availability of BCO-DMO curated data and increased interoperability of related content available from distributed repositories. We will demonstrate how Semantic Web technologies (e.g. RDF/XML, SKOS, OWL and SPARQL) have been integrated into BCO-DMO data access and delivery systems to better serve the ocean research community and to contribute to an expanding global knowledge network.
41 CFR 60-250.81 - Access to records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Access to records. 60-250.81 Section 60-250.81 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Ancillary Matters § 60-250.81 Access to records. Each contractor shall permit access during normal...
41 CFR 60-250.81 - Access to records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Access to records. 60-250.81 Section 60-250.81 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Ancillary Matters § 60-250.81 Access to records. Each contractor shall permit access during normal...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... Agencywide Documents Access and Management System (ADAMS) under Accession Number ML080510164. The proposed..., Maryland. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly available documents..., Revision 3. You can access publicly available documents related to this notice using the following methods...
Utilizing a diabetic registry to manage diabetes in a low-income Asian American population.
Seto, Winnie; Turner, Barbara S; Champagne, Mary T; Liu, Lynn
2012-08-01
Racial and income disparities persist in diabetes management in America. One third of African and Hispanic Americans with diabetes receive the recommended diabetes services (hemoglobin A1c [A1c] testing, retinal and foot examinations) shown to reduce diabetes complications and mortality, compared to half of whites with diabetes. National data for Asian Americans are limited, but studies suggest that those with language and cultural barriers have difficulty accessing health services. A diabetic registry has been shown to improve process and clinical outcomes in a population with diabetes. This study examined whether a community center that serves primarily low-income Asian American immigrants in Santa Clara County, California, could improve diabetes care and outcomes by implementing a diabetic registry. The registry was built using the Access 2007 software program. A total of 580 patients with diabetes were identified by reviewing charts, the appointment database, and reimbursement records from Medicaid, Medicare, and private insurance companies. Utilizing the registry, medical assistants contacted patients for follow-up appointments, and medical providers checked and tracked the patients' A1c results. Among the 431 patients who returned for treatment, the mean A1c was reduced from 7.27% to 6.97% over 8 months (P<0.001). Although 10.8% of the patients changed from controlled to uncontrolled diabetes post intervention, 32.6% of patients with uncontrolled diabetes converted to controlled diabetes (P<0.001). The diabetes control rate improved from 47% to 59% at the end of the study. This study demonstrated that a diabetic registry is an effective tool to manage an underserved population with diabetes, thereby reducing disparities in diabetes management.
CDC WONDER: a cooperative processing architecture for public health.
Friede, A; Rosen, D H; Reid, J A
1994-01-01
CDC WONDER is an information management architecture designed for public health. It provides access to information and communications without the user's needing to know the location of data or communication pathways and mechanisms. CDC WONDER users have access to extractions from some 40 databases; electronic mail (e-mail); and surveillance data processing. System components include the Remote Client, the Communications Server, the Queue Managers, and Data Servers and Process Servers. The Remote Client software resides in the user's machine; other components are at the Centers for Disease Control and Prevention (CDC). The Remote Client, the Communications Server, and the Applications Server provide access to the information and functions in the Data Servers and Process Servers. The system architecture is based on cooperative processing, and components are coupled via pure message passing, using several protocols. This architecture allows flexibility in the choice of hardware and software. One system limitation is that final results from some subsystems are obtained slowly. Although designed for public health, CDC WONDER could be useful for other disciplines that need flexible, integrated information exchange. PMID:7719813
Combining fuzzy mathematics with fuzzy logic to solve business management problems
NASA Astrophysics Data System (ADS)
Vrba, Joseph A.
1993-12-01
Fuzzy logic technology has been applied to control problems with great success. Because of this, many observers fell that fuzzy logic is applicable only in the control arena. However, business management problems almost never deal with crisp values. Fuzzy systems technology--a combination of fuzzy logic, fuzzy mathematics and a graphical user interface--is a natural fit for developing software to assist in typical business activities such as planning, modeling and estimating. This presentation discusses how fuzzy logic systems can be extended through the application of fuzzy mathematics and the use of a graphical user interface to make the information contained in fuzzy numbers accessible to business managers. As demonstrated through examples from actual deployed systems, this fuzzy systems technology has been employed successfully to provide solutions to the complex real-world problems found in the business environment.
Security Concepts for Satellite Links
NASA Astrophysics Data System (ADS)
Tobehn, C.; Penné, B.; Rathje, R.; Weigl, A.; Gorecki, Ch.; Michalik, H.
2008-08-01
The high costs to develop, launch and maintain a satellite network makes protecting the assets imperative. Attacks may be passive such as eavesdropping on the payload data. More serious threat are active attacks that try to gain control of the satellite, which may lead to the total lost of the satellite asset. To counter these threats, new satellite and ground systems are using cryptographic technologies to provide a range of services: confidentiality, entity & message authentication, and data integrity. Additionally, key management cryptographic services are required to support these services. This paper describes the key points of current satellite control and operations, that are authentication of the access to the satellite TMTC link and encryption of security relevant TM/TC data. For payload data management the key points are multi-user ground station access and high data rates both requiring frequent updates and uploads of keys with the corresponding key management methods. For secure satellite management authentication & key negotiation algorithms as HMAC-RIPEMD160, EC- DSA and EC-DH are used. Encryption of data uses algorithms as IDEA, AES, Triple-DES, or other. A channel coding and encryption unit for payload data provides download data rates up to Nx250 Mbps. The presented concepts are based on our experience and heritage of the security systems for all German MOD satellite projects (SATCOMBw2, SAR-Lupe multi- satellite system and German-French SAR-Lupe-Helios- II systems inter-operability) as well as for further international (KOMPSAT-II Payload data link system) and ESA activities (TMTC security and GMES).
Weighing the evidence: trends in managed care formulary decision making.
de Lissovoy, Gregory
2003-01-01
Health plans, pharmacy benefit managers, and other organizations use drug formularies to promote quality care while controlling costs. However, restrictive formularies are often viewed as constraints on physician practice and potential barriers to optimal patient care. Reluctance to add new drugs to an established formulary is rational economic behavior. Innovative compounds may have unknown properties with uncertain outcomes and therefore may impose costs in the form of risk. Products that seemingly duplicate drugs already on formulary may increase transaction costs without additional benefit. In evaluating new products, formulary managers face the task of identifying, assembling, and synthesizing a wide range of complex information. Manufacturers, who may be in the best position to supply that information, have been severely restricted by U.S. Food and Drug Administration (FDA) regulations that limited marketing communications to findings from well-controlled clinical trials. The FDA Modernization Act of 1997 eased these restrictions somewhat by acknowledging that sophisticated purchasers such as organized health plans were capable of weighing the quality and impartiality of manufacturer-supplied evidence. The Academy of Managed Care Pharmacy (AMCP) created a standardized template that formularies can use to request comprehensive information about specific drugs from manufacturers. Widespread adoption of the AMCP format by health plans and manufacturers will greatly increase access to information about new drugs, speeding the process of formulary committee deliberation, and instilling greater confidence in the outcome of those decisions. Wider access to new drugs may result.
Public Involvement Techniques: A Reader of Ten Years Experience at the Institute for Water Resource
1983-05-01
reflected in the "new humanistic " approaches to planning of Turner, Dunn, Schon, and Freidman. ° Recent empirical planning studies by authors such as Gross...conflict to each, and potential benefits of resolving it. 10. Crisis Management--minimization of hostility and violence ,n extremely tense conflict...situations through such meas- ures as rationalizing the command-and-control system of forces of order, controlling access to weapons of violence on all
Silverman, Julie; Krieger, James; Sayre, George; Nelson, Karin
2018-03-01
To describe community health workers (CHWs) roles in a diabetes self-management intervention. Retrospective qualitative inductive analysis of open text home visit encounter form from Peer Support for Achieving Independence in Diabetes (Peer AID), a randomized controlled trial in which low-income individuals with poorly controlled diabetes received either CHW home visits or usual care. Following visits, CHWs completed encounter forms documenting the health goal of the visit, the self-management strategies discussed and participant concerns. 634 encounter reports were completed for the 145 intervention participants. CHW notes revealed three main obstacles to optimal disease control: gaps in diabetes knowledge and self-management skills; socioeconomic conditions; and the complexity of the healthcare system. CHWs helped participants overcome these obstacles through extensive, hands-on education, connecting participants to community resources, and assistance navigating the medical system. In addition, the CHWs offered uncomplicated accessibility and availability to their clients. CHWs can be a valuable asset for low-income patients with chronic health conditions who may require more support than what can provided in a typical primary care visit.
Contamination Mitigation Strategies for Long Duration Human Spaceflight Missions
NASA Technical Reports Server (NTRS)
Lewis, Ruthan; Lupisella, Mark; Bleacher, Jake; Farrell, William
2017-01-01
Contamination control issues are particularly challenging for long-term human spaceflight and are associated with the search for life, dynamic environmental conditions, human-robotic-environment interaction, sample collection and return, biological processes, waste management, long-term environmental disturbance, etc. These issues impact mission success, human health, planetary protection, and research and discovery. Mitigation and control techniques and strategies may include and integrate long-term environmental monitoring and reporting, contamination control and planetary protection protocols, habitation site design, habitat design, and surface exploration and traverse pathways and area access planning.
2011-01-01
Background Access to prompt and effective treatment is a cornerstone of the current malaria control strategy. Delays in starting appropriate treatment is a major contributor to malaria mortality. WHO recommends home management of malaria using artemisininbased combination therapy (ACT) and Rapid Diagnostic tests (RDTs) as one of the strategies for improving access to prompt and efective malaria case management. Methods A prospective evaluation of the effectiveness of using community health workers (CHWs) as delivery points for ACT and RDTs in the home management of malaria in two districts in Zambia. Results CHWs were able to manage malaria fevers by correctly interpreting RDT results and appropriately prescribing antimalarials. All severe malaria cases and febrile non-malaria fevers were referred to a health facility for further management. There were variations in malaria prevalence between the two districts and among the villages in each district. 100% and 99.4% of the patients with a negative RDT result were not prescribed an antimalarial in the two districts respectively. No cases progressed to severe malaria and no deaths were recorded during the study period. Community perceptions were positive. Conclusion CHWs are effective delivery points for prompt and effective malaria case management at community level. Adherence to test results is the best ever reported in Zambia. Further areas of implementation research are discussed. PMID:21651827
Socioeconomic Disparities in the Use of Home Health Services in a Medicare Managed Care Population
Freedman, Vicki A; Rogowski, Jeannette; Wickstrom, Steven L; Adams, John; Marainen, Jonas; Escarce, José J
2004-01-01
Objective To investigate socioeconomic disparities in access to home health visits and durable medical equipment by persons enrolled in two Medicare managed care health plans. Data Sources A telephone survey of 4,613 Medicare managed care enrollees conducted between April and October of 2000 and linked to administrative claims for a subsequent 12-month period. Study Design We estimated a series of logistic regression models to determine which socioeconomic factors were related to home health visits and the use of durable medical equipment (DME) among Medicare managed care enrollees. Principal Findings Controlling for health and demographic differences, Medicare managed care enrollees in the lowest tertile for nonhousing assets had 50 percent greater odds than those in the highest tertile of having one or more home health visits. All else equal, enrollees with less than a high school education had 30 percent lower odds than those who had graduated from high school of using durable medical equipment. Conclusions Medicare managed care enrollees of low socioeconomic status do not appear to have reduced access to home health visits; however, use of durable medical equipment is considerably lower for enrollees with less than a high school education. Physicians and therapists working with Medicare managed care enrollees may want to actively target DME prescriptions to those with educational disadvantages. PMID:15333109
McDermott, J J; Randolph, T F; Staal, S J
1999-08-01
Livestock kept or produced in smallholder farming systems are an important component of the agricultural economy in the developing world. The role of livestock on smallholder farms varies widely, providing draught power for crop production or as a production activity for subsistence needs or market sale under systems ranging from extensive pastoralist to intensive, peri-urban feeder and dairy systems. A set of unique conditions and features characterise smallholder systems, and these need to be appreciated when assessing the strategies that have evolved for managing animal health in smallholder systems, and evaluating opportunities for improving disease control strategies. To provide a framework for discussing animal health issues and analytical methodogies, a typology of smallholder livestock and crop/livestock systems is developed. The typology considers livestock systems both in terms of the degree of intensification, as measured by market orientation and intensity of factor use, and in terms of importance within the household economy, as measured by contribution to household income. A number of characteristics are identified that distinguish smallholder systems from the commercialised systems of developed countries, including the multiple functions livestock serve, the integrated nature of livestock activities, multiple objectives of producers and lower capacity to bear risk at the household level, as well as poor infrastructure, markets, and access to information at the community level. Three representative smallholder livestock systems from Africa are described in detail, highlighting the relevant characteristics and the implications for analysing disease control strategies. Smallholder dairy systems in Kenya demonstrate the role of individual producer decision-making for animal health management in intensive, market-oriented systems, placing emphasis on farm-level risk and production management aspects of disease control. In extensive pastoralist systems where epidemic disease are still important and infrastructure is poor, disease control primarily involves managing communal natural resources, requiring a different analytical approach. Finally, in crop farming systems using draught cattle, the livestock activity is an integrated component of crop production and this must be reflected in the approach used to evaluate draught animal health management. Continued development of analytical approaches and decision-support tools for disease control strategies adapted to the special characteristics of these systems will be needed as smallholder systems continue to intensify in areas with good market access, and those in marginal areas face increasing pressures to optimally manage the natural resource base.
Chip architecture - A revolution brewing
NASA Astrophysics Data System (ADS)
Guterl, F.
1983-07-01
Techniques being explored by microchip designers and manufacturers to both speed up memory access and instruction execution while protecting memory are discussed. Attention is given to hardwiring control logic, pipelining for parallel processing, devising orthogonal instruction sets for interchangeable instruction fields, and the development of hardware for implementation of virtual memory and multiuser systems to provide memory management and protection. The inclusion of microcode in mainframes eliminated logic circuits that control timing and gating of the CPU. However, improvements in memory architecture have reduced access time to below that needed for instruction execution. Hardwiring the functions as a virtual memory enhances memory protection. Parallelism involves a redundant architecture, which allows identical operations to be performed simultaneously, and can be directed with microcode to avoid abortion of intermediate instructions once on set of instructions has been completed.
Igbedioh, S O
1996-01-01
Nigeria's nutrition crisis has been shown to have a considerable negative impact on infants, young children and women. Available evidence suggests that 'caring capacity' when properly planned and targeted at the most-at-risk can help. Strategies that can achieve this care are increasing women's income and control over income, increasing investment in women's education and improving access to credit facilities. Others are the aggressive promotion of gender-biased labour saving technology, increasing women's access to basic health and family planning services and implementing reforms in land ownership while instituting social security for women.
Bell, Janice F; Krupski, Antoinette; Joesch, Jutta M; West, Imara I; Atkins, David C; Court, Beverly; Mancuso, David; Roy-Byrne, Peter
2015-06-01
To evaluate outcomes of a registered nurse-led care management intervention for disabled Medicaid beneficiaries with high health care costs. Washington State Department of Social and Health Services Client Outcomes Database, 2008-2011. In a randomized controlled trial with intent-to-treat analysis, outcomes were compared for the intervention (n = 557) and control groups (n = 563). A quasi-experimental subanalysis compared outcomes for program participants (n = 251) and propensity score-matched controls (n = 251). Administrative data were linked to describe costs and use of health services, criminal activity, homelessness, and death. In the intent-to-treat analysis, the intervention group had higher odds of outpatient mental health service use and higher prescription drug costs than controls in the postperiod. In the subanalysis, participants had fewer unplanned hospital admissions and lower associated costs; higher prescription drug costs; higher odds of long-term care service use; higher drug/alcohol treatment costs; and lower odds of homelessness. We found no health care cost savings for disabled Medicaid beneficiaries randomized to intensive care management. Among participants, care management may have the potential to increase access to needed care, slow growth in the number and therefore cost of unplanned hospitalizations, and prevent homelessness. These findings apply to start-up care management programs targeted at high-cost, high-risk Medicaid populations. © Health Research and Educational Trust.
Modeling Virus Coinfection to Inform Management of Maize Lethal Necrosis in Kenya.
Hilker, Frank M; Allen, Linda J S; Bokil, Vrushali A; Briggs, Cheryl J; Feng, Zhilan; Garrett, Karen A; Gross, Louis J; Hamelin, Frédéric M; Jeger, Michael J; Manore, Carrie A; Power, Alison G; Redinbaugh, Margaret G; Rúa, Megan A; Cunniffe, Nik J
2017-10-01
Maize lethal necrosis (MLN) has emerged as a serious threat to food security in sub-Saharan Africa. MLN is caused by coinfection with two viruses, Maize chlorotic mottle virus and a potyvirus, often Sugarcane mosaic virus. To better understand the dynamics of MLN and to provide insight into disease management, we modeled the spread of the viruses causing MLN within and between growing seasons. The model allows for transmission via vectors, soil, and seed, as well as exogenous sources of infection. Following model parameterization, we predict how management affects disease prevalence and crop performance over multiple seasons. Resource-rich farmers with large holdings can achieve good control by combining clean seed and insect control. However, crop rotation is often required to effect full control. Resource-poor farmers with smaller holdings must rely on rotation and roguing, and achieve more limited control. For both types of farmer, unless management is synchronized over large areas, exogenous sources of infection can thwart control. As well as providing practical guidance, our modeling framework is potentially informative for other cropping systems in which coinfection has devastating effects. Our work also emphasizes how mathematical modeling can inform management of an emerging disease even when epidemiological information remains scanty. [Formula: see text] Copyright © 2017 The Author(s). This is an open access article distributed under the CC BY-NC-ND 4.0 International license .
De Urioste-Stone, Sandra M.; Pennington, Pamela M.; Pellecer, Elizabeth; Aguilar, Teresa M.; Samayoa, Gabriela; Perdomo, Hugo D.; Enríquez, Hugo; Juárez, José G.
2015-01-01
Background Integrated vector management strategies depend on local eco-bio-social conditions, community participation, political will and inter-sectorial partnership. Previously identified risk factors for persistent Triatoma dimidiata infestation include the presence of rodents and chickens, tiled roofs, dirt floors, partial wall plastering and dog density. Methods A community-based intervention was developed and implemented based on cyclical stakeholder and situational analyses. Intervention implementation and evaluation combined participatory action research and cluster randomized pre-test post-test experimental designs. The intervention included modified insecticide application, education regarding Chagas disease and risk factors, and participatory rodent control. Results At final evaluation there was no significant difference in post-test triatomine infestation between intervention and control, keeping pre-test rodent and triatomine infestations constant. Knowledge levels regarding Chagas disease and prevention practices including rodent control, chicken management and health service access increased significantly only in intervention communities. The odds of nymph infection and rat infestation were 8.3 and 1.9-fold higher in control compared to intervention communities, respectively. Conclusion Vector control measures without reservoir control are insufficient to reduce transmission risk in areas with persistent triatomine infestation. This integrated vector management program can complement house improvement initiatives by prioritizing households with risk factors such as tiled roofs. Requirement for active participation and multi-sectorial coordination poses implementation challenges. PMID:25604767
Applications for radio-frequency identification technology in the perioperative setting.
Zhao, Tiyu; Zhang, Xiaoxiang; Zeng, Lili; Xia, Shuyan; Hinton, Antentor Othrell; Li, Xiuyun
2014-06-01
We implemented a two-year project to develop a security-gated management system for the perioperative setting using radio-frequency identification (RFID) technology to enhance the management efficiency of the OR. We installed RFID readers beside the entrances to the OR and changing areas to receive and process signals from the RFID tags that we sewed into surgical scrub attire and shoes. The system also required integrating automatic access control panels, computerized lockers, light-emitting diode (LED) information screens, wireless networks, and an information system. By doing this, we are able to control the flow of personnel and materials more effectively, reduce OR costs, optimize the registration and attire-changing process for personnel, and improve management efficiency. We also anticipate this system will improve patient safety by reducing the risk of surgical site infection. Application of security-gated management systems is an important and effective way to help ensure a clean, convenient, and safe management process to manage costs in the perioperative area and promote patient safety. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Gries, C.; Read, J. S.; Winslow, L. A.; Hanson, P. C.; Weathers, K. C.
2014-12-01
The Global Lake Ecological Observatory Network (GLEON) is an international community of scientists, educators and citizens with the mission to conduct innovative science by sharing and interpreting high-resolution sensor data to understand, predict and communicate the role and response of lakes in a changing global environment. During its almost ten years of existence and continual growth, GLEON has inspired innovative science, new modeling approaches, and accumulated extensive experience in the management of streaming, high resolution, and large volume data. However, a recent 'data task force' identified inhibiting data infrastructure issues, including providing access to data, discovering distributed data, and integrating data into useful data products for scientific research and management. Accordingly, in support of the complete data lifecycle, tools are being developed by the GLEON community and integrated with innovative technology from other groups to improve environmental observations data management in the broader community. Specifically we will discuss raw data handling with tools developed by the Consortium of Universities for the Advancement of Hydrologic Sciences (CUAHSI, Observation Data Model and DataLoader), quality control practices using a newly developed R package (sensorQC), data access with HydroDesktop, or webservices delivering WaterML, data analysis with the R package rLakeAnalyzer, and final storage of the quality controlled, harmonized and value added data product in a DataONE member node. Such data product is then discoverable, accessible for new analyses and citable in subsequent publications. Leveraging GLEON's organizational structure, community trust, extensive experience, and technological talent the goal is to develop a design and implementation plan for a data publishing and sharing system that will address not only GLEON's needs, but also those of other environmental research communities.
A Quality-Control-Oriented Database for a Mesoscale Meteorological Observation Network
NASA Astrophysics Data System (ADS)
Lussana, C.; Ranci, M.; Uboldi, F.
2012-04-01
In the operational context of a local weather service, data accessibility and quality related issues must be managed by taking into account a wide set of user needs. This work describes the structure and the operational choices made for the operational implementation of a database system storing data from highly automated observing stations, metadata and information on data quality. Lombardy's environmental protection agency, ARPA Lombardia, manages a highly automated mesoscale meteorological network. A Quality Assurance System (QAS) ensures that reliable observational information is collected and disseminated to the users. The weather unit in ARPA Lombardia, at the same time an important QAS component and an intensive data user, has developed a database specifically aimed to: 1) providing quick access to data for operational activities and 2) ensuring data quality for real-time applications, by means of an Automatic Data Quality Control (ADQC) procedure. Quantities stored in the archive include hourly aggregated observations of: precipitation amount, temperature, wind, relative humidity, pressure, global and net solar radiation. The ADQC performs several independent tests on raw data and compares their results in a decision-making procedure. An important ADQC component is the Spatial Consistency Test based on Optimal Interpolation. Interpolated and Cross-Validation analysis values are also stored in the database, providing further information to human operators and useful estimates in case of missing data. The technical solution adopted is based on a LAMP (Linux, Apache, MySQL and Php) system, constituting an open source environment suitable for both development and operational practice. The ADQC procedure itself is performed by R scripts directly interacting with the MySQL database. Users and network managers can access the database by using a set of web-based Php applications.
Oregon Department of Transportation : access management best practices manual.
DOT National Transportation Integrated Search
2012-12-01
This manual is provided as a resource to help Oregon transportation professionals quantify the expected benefits of various access management applications. As a result, this manual includes recommendations for how to evaluate potential access managem...
Benefits of access management.
DOT National Transportation Integrated Search
2003-01-01
This brochure serves as a guide to the major benefits of several : access management techniques in use across the United States. The : purpose of this brochure is to provide a comprehensive and succinct : examination of the benefits of access managem...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... Documents Access and Management System (ADAMS) under Accession Number ML090510686. The proposed changes... Documents Access and Management System (ADAMS): Publicly available documents created or received at the NRC... expedited approval of plant-specific adoption of TSTF- 501, Revision 1. Documents: You can access publicly...
Black and White Women Managers: Access to Opportunity
ERIC Educational Resources Information Center
Hite, Linda M.
2004-01-01
This study explores the differing views of Black and White female managers regarding access to key career opportunities for White women and women of color. Items addressed include access to hiring, promotions, key assignments, salary increases, acknowledgment for work, and mentors. Access to each is described by comparing White women and women of…
ERIC Educational Resources Information Center
San Nicolas-Rocca, Tonia
2010-01-01
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Antibiotic treatment of urinary tract infection by community pharmacists: a cross-sectional study.
Booth, Jill L; Mullen, Alexander B; Thomson, David A M; Johnstone, Christopher; Galbraith, Susan J; Bryson, Scott M; McGovern, Elizabeth M
2013-04-01
Urinary tract infections (UTIs) are one of the most common conditions seen in female patients within primary care. Community pharmacists are familiar with symptomatic UTI management and supplying trimethoprim under patient group direction (PGD) for moderate-to-severe uncomplicated UTIs could improve patient access to treatment. To compare the care pathway of patients with UTI symptoms attending GP services with those receiving management, including trimethoprim supply under PGD, via community pharmacies. Prospective, cross-sectional, mixed methods approach in 10 community pharmacies within NHS Greater Glasgow and Clyde. Pharmacies invited a purposive sample of female patients to participate. Pharmacists had the option of supplying trimethoprim under PGD to patients with moderate-to-severe infection meeting the PGD inclusion criteria. Data from patient (questionnaires and semi-structured telephone interviews) and pharmacist (questionnaires and semi-structured, face-to-face interviews) were quantitatively and qualitatively analysed. Data were recorded on 153 patients, 97 presenting with GP prescriptions and 56 presenting directly in the pharmacy with symptoms suggestive of UTI, of whom 41 received trimethoprim via PGD and 15 received symptomatic management. Both GP adherence to local infection management guidelines and pharmacist application of PGD inclusion/exclusion criteria required improvement. There was demand and support, from patients and pharmacists, for access to antibiotic treatments for UTIs, without prescription, through community pharmacies. Operating within PGD controls, antibiotic treatments for UTIs could be provided via community pharmacy to improve patient access to treatment which may also maintain antibiotic stewardship and reduce GP workload.
Cleary, J; Simha, N; Panieri, A; Scholten, W; Radbruch, L; Torode, J; Cherny, N I
2013-12-01
India is the world's largest democracy with control of opioids divided between the national and state governments. While the global consumption of opioids has increased, the consumption has not increased at the same rate. This is the first comprehensive study of opioid availability and accessibility for cancer patients in India. Data are reported on the availability and accessibility of opioids for the management of cancer pain in 24 of the states that make up India and the Administrative area around Delhi. About 1061 million of the nation's 1189 million people (89%) are covered by this survey. Without exception, opioid availability continues to be low throughout all of India. Even when opioids are on formulary, they are often unavailable. Access is significantly impaired by widespread over-regulation that continues to be pervasive across the nation.
NSF-Sponsored Biological and Chemical Oceanography Data Management Office
NASA Astrophysics Data System (ADS)
Allison, M. D.; Chandler, C. L.; Copley, N.; Galvarino, C.; Gegg, S. R.; Glover, D. M.; Groman, R. C.; Wiebe, P. H.; Work, T. T.; Biological; Chemical Oceanography Data Management Office
2010-12-01
Ocean biogeochemistry and marine ecosystem research projects are inherently interdisciplinary and benefit from improved access to well-documented data. Improved data sharing practices are important to the continued exploration of research themes that are a central focus of the ocean science community and are essential to interdisciplinary and international collaborations that address complex, global research themes. In 2006, the National Science Foundation Division of Ocean Sciences (NSF OCE) funded the Biological and Chemical Oceanography Data Management Office (BCO-DMO) to serve the data management requirements of scientific investigators funded by the National Science Foundation’s Biological and Chemical Oceanography Sections. BCO-DMO staff members work with investigators to manage marine biogeochemical, ecological, and oceanographic data and information developed in the course of scientific research. These valuable data sets are documented, stored, disseminated, and protected over short and intermediate time frames. One of the goals of the BCO-DMO is to facilitate regional, national, and international data and information exchange through improved data discovery, access, display, downloading, and interoperability. In May 2010, NSF released a statement to the effect that in October 2010, it is planning to require that all proposals include a data management plan in the form of a two-page supplementary document. The data management plan would be an element of the merit review process. NSF has long been committed to making data from NSF-funded research publicly available and the new policy will strengthen this commitment. BCO-DMO is poised to assist in creating the data management plans and in ultimately serving the data and information resulting from NSF OCE funded research. We will present an overview of the data management system capabilities including: geospatial and text-based data discovery and access systems; recent enhancements to data search tools; data export and download utilities; and strategic use of controlled vocabularies to facilitate data integration and improve interoperability.
Health Information Security: A Case Study of Three Selected Medical Centers in Iran
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-01-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients’ electronic records and health information systems have become a source for hackers. Methods This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts’ points of view. Results and discussion Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of “verification and system design, user access management, access control system”, Al Zahra Hospital in two indicators of “access management and network access control” and Amin Hospital in “equipment safety and system design”. In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place. PMID:23572861
NASA Astrophysics Data System (ADS)
Evans, B. J. K.; Wyborn, L. A.; Druken, K. A.; Richards, C. J.; Trenham, C. E.; Wang, J.
2016-12-01
The Australian National Computational Infrastructure (NCI) manages a large geospatial repository (10+ PBytes) of Earth systems, environmental, water management and geophysics research data, co-located with a petascale supercomputer and an integrated research cloud. NCI has applied the principles of the "Common Framework for Earth-Observation Data" (the Framework) to the organisation of these collections enabling a diverse range of researchers to explore different aspects of the data and, in particular, for seamless programmatic data analysis, both in-situ access and via data services. NCI provides access to the collections through the National Environmental Research Data Interoperability Platform (NERDIP) - a comprehensive and integrated data platform with both common and emerging services designed to enable data accessibility and citability. Applying the Framework across the range of datasets ensures that programmatic access, both in-situ and network methods, work as uniformly as possible for any dataset, using both APIs and data services. NCI has also created a comprehensive quality assurance framework to regularise compliance checks across the data, library APIs and data services, and to establish a comprehensive set of benchmarks to quantify both functionality and performance perspectives for the Framework. The quality assurance includes organisation of datasets through a data management plan, which anchors the data directory structure, version controls and data information services so that they are kept aligned with operational changes over time. Specific attention has been placed on the way data are packed inside the files. Our experience has shown that complying with standards such as CF and ACDD is still not enough to ensure that all data services or software packages correctly read the data. Further, data may not be optimally organised for the different access patterns, which causes poor performance of the CPUs and bandwidth utilisation. We will also discuss some gaps in the Framework that have emerged and our approach to resolving these.
Avian research on Experimental Forests and Ranges: Emergent themes, opportunities, and challenges
Scott H. Stoleson; David I. King; Monica. Tomosy
2011-01-01
Since 1908, U.S. Forest Service Experimental Forests and Ranges have been dedicated to long-term inter-disciplinary research on a variety of ecological and management questions. They encompass a wide diversity of life zones and ecoregions, and provide access to research infrastructure, opportunities for controlled manipulations, and integration with other types of long...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... name and/or OMB Control Number and should be sent to: Colette Pollard, Reports Management Officer, QDAM... the proposed forms or other available information. Persons with hearing or speech impairments may... with hearing or speech impairments may access this number through TTY by calling the toll-free Federal...
Bounded and Unbounded Knowledge: Teaching and Learning in a Web 2 World
ERIC Educational Resources Information Center
Nagy, Judy; Bigum, Chris
2007-01-01
In the recent past, the proliferation of digitally available content heralded the beginning of serious problems for the business models of publishers. The ease with which content can be accessed, copied and distributed disrupts the control of those whose role has been to manage and profit from the intellectual property rights of content producers.…
Securing Secrets and Managing Trust in Modern Computing Applications
ERIC Educational Resources Information Center
Sayler, Andy
2016-01-01
The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-03
... allows certain uses (including grazing, measures to control fire, insects and disease) to continue in... designation as Wild, Scenic, or Recreational under the Wild and Scenic Rivers Act? What Visual Resource... emergency or fire access; Designating all public lands within the planning area as open, limited, or closed...
Wiki and Digital Video Use in Strategic Interaction-Based Experiential EFL Learning
ERIC Educational Resources Information Center
Dehaan, Jonathan; Johnson, Neil H.; Yoshimura, Noriko; Kondo, Takako
2012-01-01
This paper details the use of a free and access-controlled wiki as the learning management system for a four-week teaching module designed to improve the oral communication skills of Japanese university EFL students. Students engaged in repeated experiential learning cycles of planning, doing, observing, and evaluating their performance of a role…
NASA Technical Reports Server (NTRS)
Mielke, Roland V. (Inventor); Stoughton, John W. (Inventor)
1990-01-01
Computationally complex primitive operations of an algorithm are executed concurrently in a plurality of functional units under the control of an assignment manager. The algorithm is preferably defined as a computationally marked graph contianing data status edges (paths) corresponding to each of the data flow edges. The assignment manager assigns primitive operations to the functional units and monitors completion of the primitive operations to determine data availability using the computational marked graph of the algorithm. All data accessing of the primitive operations is performed by the functional units independently of the assignment manager.
Data Management Applications for the Service Preparation Subsystem
NASA Technical Reports Server (NTRS)
Luong, Ivy P.; Chang, George W.; Bui, Tung; Allen, Christopher; Malhotra, Shantanu; Chen, Fannie C.; Bui, Bach X.; Gutheinz, Sandy C.; Kim, Rachel Y.; Zendejas, Silvino C.;
2009-01-01
These software applications provide intuitive User Interfaces (UIs) with a consistent look and feel for interaction with, and control of, the Service Preparation Subsystem (SPS). The elements of the UIs described here are the File Manager, Mission Manager, and Log Monitor applications. All UIs provide access to add/delete/update data entities in a complex database schema without requiring technical expertise on the part of the end users. These applications allow for safe, validated, catalogued input of data. Also, the software has been designed in multiple, coherent layers to promote ease of code maintenance and reuse in addition to reducing testing and accelerating maturity.
Remotely Accessed Vehicle Traffic Management System
NASA Astrophysics Data System (ADS)
Al-Alawi, Raida
2010-06-01
The ever increasing number of vehicles in most metropolitan cities around the world and the limitation in altering the transportation infrastructure, led to serious traffic congestion and an increase in the travelling time. In this work we exploit the emergence of novel technologies such as the internet, to design an intelligent Traffic Management System (TMS) that can remotely monitor and control a network of traffic light controllers located at different sites. The system is based on utilizing Embedded Web Servers (EWS) technology to design a web-based TMS. The EWS located at each intersection uses IP technology for communicating remotely with a Central Traffic Management Unit (CTMU) located at the traffic department authority. Friendly GUI software installed at the CTMU will be able to monitor the sequence of operation of the traffic lights and the presence of traffic at each intersection as well as remotely controlling the operation of the signals. The system has been validated by constructing a prototype that resembles the real application.
Mammen, Jennifer R.; Rhee, Hyekyun; Norton, Sally A.; Butz, Arlene M.
2016-01-01
Background Teens often have inadequate asthma self-management and control. However, little is known of their perceptions of or rationales for self-management behaviors. Objectives To explore how teens self-manage asthma, including experiences, perceptions, responses to and reporting of symptoms. Methods A case-based, qualitative-descriptive design was used. Data were collected from minority and non-minority teens with controlled and uncontrolled asthma and their respective parents (N=28). There were four data-collection points, including: (1) a primary teen interview; (2) parent interview; (3) two-week self-management voice-diary; and (4) follow-up teen interview, incorporating symptom-response card-sorting to map symptoms and associated self-management responses. Seventy data sources were included in the analysis. Results Teens thought of their asthma symptoms as normal or unusual relative to their personal baseline symptom pattern; Those with uncontrolled asthma normalized higher levels of asthma symptoms than their counterparts with controlled asthma. Second, teens’ decisions to treat symptoms of asthma with rescue medication were based on perceived benefits, burdens and accessibility of treatment balanced against perceived normalcy of symptoms. Teens with uncontrolled asthma had substantially higher treatment thresholds and delayed responses to symptoms compared to controlled peers. Third, teens never reported perceived normal symptoms of asthma to parents or providers, who were thus only aware of unusual or visible/audible symptoms. Conclusions Teen’s perceptions of symptoms and understanding of what is normal is the basis for self-management decisions. Improving self-management will likely entail modifying perceptions of symptoms and benefits/burdens of treatment to achieve healthier self-management patterns. PMID:27337035
Mammen, Jennifer R; Rhee, Hyekyun; Norton, Sally A; Butz, Arlene M
2017-03-01
Teens often have inadequate asthma self-management and control. However, little is known of their perceptions of or rationales for self-management behaviors. To explore how teens self-manage asthma, including experiences, perceptions, responses to and reporting of symptoms. A case-based, qualitative-descriptive design was used. Data were collected from minority and non-minority teens with controlled and uncontrolled asthma and their respective parents (N = 28). There were four data-collection points, including: (1) a primary teen interview; (2) parent interview; (3) 2-week self-management voice-diary; and (4) follow-up teen interview, incorporating symptom-response card-sorting to map symptoms and associated self-management responses. Seventy data sources were included in the analysis. Teens thought of their asthma symptoms as normal or unusual relative to their personal baseline symptom pattern; Those with uncontrolled asthma normalized higher levels of asthma symptoms than their counterparts with controlled asthma. Second, teens' decisions to treat symptoms of asthma with rescue medication were based on perceived benefits, burdens and accessibility of treatment balanced against perceived normalcy of symptoms. Teens with uncontrolled asthma had substantially higher treatment thresholds and delayed responses to symptoms compared to controlled peers. Third, teens never reported perceived normal symptoms of asthma to parents or providers, who were thus only aware of unusual or visible/audible symptoms. Teen's perceptions of symptoms and understanding of what is normal is the basis for self-management decisions. Improving self-management will likely entail modifying perceptions of symptoms and benefits/burdens of treatment to achieve healthier self-management patterns.
Zwerenz, Rüdiger; Gerzymisch, Katharina; Edinger, Jens; Holme, Martin; Knickenberg, Rudolf J; Spörl-Dönch, Sieglinde; Kiwus, Ulrich; Beutel, Manfred E
2013-01-25
Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202).
2013-01-01
Background Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Methods Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. Discussion We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. Trial registration International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202) PMID:23351836
Birch, Julie Melsted; Agger, Jens Frederik; Dahlin, Christina; Jensen, Vibeke Frøkjær; Hammer, Anne Sofie; Struve, Tina; Jensen, Henrik Elvang
2017-06-29
Pre-weaning diarrhea in mink, also known as "sticky kits", is a syndrome and outbreaks occur every year on commercial mink farms in all mink producing countries. Morbidity and mortality can be considerable on a farm with huge economic consequences for the farmer as well as compromised welfare for the mink kits. Although efforts have been taken to identify etiologic agents involved in outbreaks, the syndrome is still regarded as multifactorial and recurring problems on the same farms draw attention to management and environmental risk factors. In the pre-weaning period from May to June 2015, a case control study was carried out on 30 Danish mink farms. Data concerning management, biosecurity, hygiene, feed consumption, antibacterial prescription and production efficiency were analyzed. The proportion of 1-year old females, farm size (total number of females), energy supply per female in the late gestation period, and dogs accessing the farm area were significantly associated with being a case farm. Case farms were prescribed almost twice the amount of antibacterials per gestational unit (female and litter) as in control farms. Farmers on case farms spent significantly more time nursing and treating the animals and experienced more females with mastitis compared to farmers on control farms. No significant differences in cleaning practices or hygienic measures between case and control farms were found and there were no differences in drinking water quality, bedding material, composition neither of color types nor in management regarding litter equalization. Results from this study showed an association between the occurrence of pre-weaning diarrhea on mink farms and parity profile, farm size and feeding intensity in the gestational period. The access of dogs to the farm area was a significant risk factor, but needs further clarification.
Lu, Christine Y; Ritchie, Jan; Williams, Ken; Day, Ric
2007-01-01
Background In Australia, government-subsidised access to high-cost medicines is "targeted" to particular sub-sets of patients under the Pharmaceutical Benefits Scheme to achieve cost-effective use. In order to determine how this access system could be improved, the opinions of key stakeholders on access to biological agents for rheumatoid arthritis were explored. Methods Thirty-six semi-structured interviews were conducted with persons from relevant stakeholder groups. These were transcribed verbatim, and analysed thematically. Results Controlled access to expensive medicines was considered to be equitable and practical; however, there was disagreement as to the method of defining the target patient populations. Other concerns included timeliness of access, excessive bureaucracy, and the need for additional resources to facilitate the scheme. Collaboration between stakeholders was deemed important because it allows more equitable distribution of limited resources. The majority considered that stakeholder consultation should have been broader. Most wanted increased transparency of the decision-making process, ongoing and timely review of access criteria, and an increased provision of information for patients. More structured communication between stakeholders was proposed. Conclusion The Pharmaceutical Benefit Scheme is adapting to meet the changing needs of patients. Provision of subsidised access to high-cost medicines in a manner that is affordable for individuals and society, and that is equitable and efficiently managed is challenging. The views of stakeholders on targeted access to anti-rheumatic biological medicines in Australia acknowledged this challenge and provided a number of suggestions for modifications. These could serve as a basis to inform the debate on how to change the processes and policies so as to improve the scheme. PMID:18096055
Shiver, Stacy A; Schmitt, Karla; Cooksey, Adrian
2009-01-01
The business of sexually transmitted disease (STD) prevention and control demands technology that is capable of supporting a wide array of program activities-from the processing of laboratory test results to the complex and confidential process involved in contact investigation. The need for a tool that enables public health officials to successfully manage the complex operations encountered in an STD prevention and control program, and the need to operate in an increasingly poor resource environment, led the Florida Bureau of STD to develop the Patient Reporting Investigation Surveillance Manager. Its unique approach, technical architecture, and sociotechnical philosophy have made this business application successful in real-time monitoring of disease burden for local communities, identification of emerging outbreaks, monitoring and assurance of appropriate treatments, improving access to laboratory data, and improving the quality of data for epidemiologic analysis. Additionally, the effort attempted to create and release a product that promoted the Centers for Disease Control and Prevention's ideas for integration of programs and processes.
44 CFR 16.150 - Program accessibility: Existing facilities.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Program accessibility: Existing facilities. 16.150 Section 16.150 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT... IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE FEDERAL EMERGENCY MANAGEMENT AGENCY § 16.150 Program...
Effective Management of Ocean Biogeochemistry and Ecological Data: the BCO-DMO Story
NASA Astrophysics Data System (ADS)
Chandler, C. L.; Groman, R. C.; Allison, M. D.; Wiebe, P. H.; Glover, D. M.; Gegg, S. R.
2012-04-01
Data availability expectations of the research community, environmental management decision makers, and funding agency representatives are changing. Consequently, data management practices in many science communities are changing as well. In an effort to improve access to data generated by ocean biogeochemistry and ecological researchers funded by the United States (US) National Science Foundation (NSF) Division of Ocean Sciences (OCE), the Biological and Chemical Oceanography Data Management Office (BCO-DMO) was created in late 2006. Currently, the main BCO-DMO objective is to ensure availability of data resulting from select OCE and Office of Polar Programs (OPP) research awards granted by the US NSF. An important requirement for the BCO-DMO data management system is that it provides open access to data that are supported by sufficient metadata to enable data discovery and accurate reuse. The office manages and serves all types of oceanographic data (in situ, experimental, model results) generated during the research process and contributed by the originating investigators from large national programs and medium-sized collaborative research projects, as well as researchers with single investigator awards. BCO-DMO staff members have made strategic use of standards and use of terms from controlled vocabularies while balancing the need to maintain flexible data ingest systems that accommodate the heterogeneous nature of ocean biogeochemistry and ecological research data. Many of the discrete ocean biogeochemistry data sets managed by BCO-DMO are still acquired manually, often with prototype sensor systems. Data sets such as these that are not "born-digital" present a significant management challenge. Use of multiple levels of term-mappings and development of an ontology has enabled BCO-DMO to incorporate a semantically enabled faceted search into the data access system that will improve data access through enhanced data discovery. BCO-DMO involves an ongoing collaboration between data managers and marine scientists funded by the US NSF. BCO-DMO staff members work with investigators throughout the data life cycle, beginning with the data management plan that is part of the original proposal, during cruise planning and experimental design, through data reporting to meet funding agency requirements and finally to submission of final data sets for publication and final archive in a permanent data center. It is important to note that support from and continued active involvement of the NSF program managers has been a significant contributor to the success of this developing system. URL: http://bco-dmo.org/
Li, Limin; Xu, Yubin; Soong, Boon-Hee; Ma, Lin
2013-01-01
Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN). Moreover, for the media access control (MAC) scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS) embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience. PMID:24193101
HIV testing updates and challenges: when regulatory caution and public health imperatives collide.
Branson, Bernard M
2015-03-01
Numerous improvements in HIV testing technology led recently to the first revision of recommendations for diagnostic laboratory testing in the USA in 25 years. Developments in HIV testing continue to produce tests that identify HIV infection earlier with faster turnaround times for test results. These play an important role in identifying HIV infection during the highly infectious acute phase, which has implication for both patient management and public health interventions to control the spread of HIV. Access to these developments, however, is often delayed by the regulatory apparatus for approval and oversight of HIV testing in the USA. This article summarizes recent developments in HIV diagnostic testing technology, outlines their implications for clinical management and public health, describes current systems of regulatory oversight for HIV testing in the USA, and proposes alternatives that could expedite access to improved tests as they become available.
Experience of wireless local area network in a radiation oncology department.
Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan
2010-01-01
The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.